Académique Documents
Professionnel Documents
Culture Documents
Copyright 2008-2011, Hangzhou H3C Technologies Co., Ltd. and its licensors
Preface
This document is the Web-based configuration guide for the H3C MSR series routers, and describes
how to visually manage and maintain the H3C MSR series routers through a Web-based interface.
This preface includes:
Audience
Conventions
Obtaining documentation
Technical support
Documentation feedback
Audience
This documentation is intended for:
Network planners
Conventions
This section describes the conventions used in this documentation set.
GUI conventions
Convention
Description
Boldface
Window names, button names, field names, and menu items are in Boldface. For
example, the New User window appears; click OK.
>
Multi-level menus are separated by angle brackets. For example, File > Create > Folder.
Convention
Description
Symbols
WARNING
An alert that calls attention to important information that if not understood or followed can
result in personal injury.
CAUTION
An alert that calls attention to important information that if not understood or followed can
result in data loss, data corruption, or damage to hardware or software.
IMPORTANT
NOTE
TIP
Contents
1 Web Overview
How to log in to the Web interface, the layout and basic functions of the Web
interface.
2 Device Informatio
3 Basic Services
Configuration
4 WAN Interface
Configuration
How to configure the WAN interface parameters such as the connection mode
and MTU.
5 VLAN Interface
Configuration
How to configure a VLAN and its VLAN interface, and how to configure WLAN
parameters.
6 Wireless Configuration
7 3G Management
8 NAT Configuration
How to configure NAT, a NAT server, and application layer protocol check.
9 Security Configuration
10 Redirection
Configuration
11 Route Configuration
12 User-Based Load
Sharing
13 Traffic Ordering
Configuration
14 DNS Configuration
15 DHCP Configuration
16 QoS Configuration
17 SNMP
18 Bridging
Configuration
19 Group Management
20 MSTP Configuration
21 RADIUS Configuration
22 Login Control
Configuration
23 ARP Configuration
24 IPsec VPN
Configuration
25 L2TP Configuration
26 GRE Configuration
27 Certificate
Management
30. Syslog
31 Diagnostic Tools
32 WiNet Configuration
33 Voice
Management-Configurati
on Wizard
34 Voice
Management-Local
Number and Call Route
How to configure the VoIP basic parameters, local number, call route, fax,
modem, voice services, and related advanced parameters.
35 Voice
Management-Dial Plan
Configuration
36 Voice
Management-Call
Connection Configuration
How to configure SIP connection of the registration server and proxy server, and
SIP calls parameters.
37 Voice
Management-SIP Trunk
Management
How to configure SIP trunk,call route for outbound calls related parameters.
38 Voice
Management-Digital Link
Management
39 Voice
Management-Line
Management
How to configure FXS, FXO, E&M, and ISDN lines related parameters.
40 Voice
Management-SIP Local
Survival
41 Voice
Management-IVR
42 Voice
How to configure the advanced parameters for local number, call route, and link
Management-Advanced
Configuration
43 Voice
Management-Statistics
management.
Obtaining documentation
You can access the most up-to-date H3C product documentation on the World Wide Web at
http://www.h3c.com.
Click the links on the top navigation bar to obtain different categories of product documentation:
[Technical Support & Documents > Technical Documents] Provides hardware installation, software
upgrading, and software feature configuration and maintenance documentation.
[Products & Solutions] Provides information about products and technologies, as well as solutions.
[Technical Support & Documents > Software Download] Provides the documentation released with the
software version.
Technical support
customer_service@h3c.com
http://www.h3c.com
Documentation feedback
You can e-mail your comments about product documentation to info@h3c.com.
We appreciate your comments.
Contents
Web overview 1
Device information 26
VLAN configuration 58
Overview 58
Configuring a VLAN and its VLAN interface 58
Configuration task lists 58
Creating a VLAN and its VLAN interface 59
Configuring VLAN member ports 60
Configuring parameters for a VLAN interface 60
Configuration guidelines 62
Overview 63
Configuration task list 63
ii
3G management 154
Overview154
Managing the 3G modem 154
Displaying the 3G information 154
Managing the pin code 155
Overview158
Configuring NAT158
Configuration overview 158
Configuring dynamic NAT 159
Configuring a DMZ host160
Configuring an internal server 161
Enabling application layer protocol check163
Configuring connection limit 163
NAT configuration examples 164
NAT configuration example I164
Internal server configuration example166
iii
Overview204
Route configuration 204
Creating an IPv4 static route204
Displaying the active route table 206
Static route configuration example 207
IPv4 static route configuration example 207
Precautions209
Overview211
Configuring user-based load sharing 211
Overview213
Configuring traffic ordering 213
Configuration overview 213
Setting the traffic ordering interval 214
Specifying the traffic ordering mode214
Displaying internal interface traffic ordering statistics214
Displaying external interface traffic ordering statistics215
DDNS overview225
Configuration prerequisites226
Configuration procedure 226
DDNS configuration example227
Overview265
QoS overview 265
Subnet limit265
Advanced limit265
Advanced queue 266
Configuring QoS266
Configuring subnet limit266
Configuring advanced limit268
Configuring advanced queue 271
QoS configuration examples 275
Subnet limit configuration example 275
Advanced queue configuration example277
Appendix Packet Priorities 280
SNMP 283
SNMP overview283
SNMP agent configuration 284
Configuration task list 284
Enabling the SNMP agent function 285
Configuring an SNMP view 287
Configuring an SNMP community289
Configuring an SNMP group290
v
Bridging 307
Overview307
Bridging overview 307
Configuring bridging 307
Configuration task list 307
Enabling a bridge set307
Adding an interface to a bridge set308
Bridging configuration example 309
Overview313
Configuring user groups313
Configuration task list 313
Configuring a user group 314
Configuring a user 315
Configuring access control316
Configuring application control317
Configuring bandwidth control317
Configuring packet filtering318
Synchronizing user group configuration for wan interfaces320
User group configuration example320
Overview380
Configuring periodic sending of gratuitous ARP packets 380
Configuring ARP automatic scanning 381
Configuring fixed ARP 382
Overview384
Configuring IPsec VPN 385
Configuration task list 385
Configuring an IPsec connection 385
Displaying IPsec VPN monitoring information 392
IPsec VPN configuration example 393
Configuration guidelines 395
L2TP overview397
Configuring L2TP398
L2TP configuration task list 398
Enabling L2TP 398
Adding an L2TP group399
Displaying L2TP tunnel information 406
L2TP configuration example406
Client-initiated VPN configuration example 406
SNMP overview466
SNMP agent configuration 466
SNMP configuration example468
SNMPv1/SNMPv2c configuration example 468
SNMPv3 configuration example470
Syslog 473
Overview477
Trace route 477
Ping 477
Tools operations 478
Trace route operation478
Ping operation 478
Overview480
Configuring WiNet 481
Enabling WiNet 481
Setting the background image for the WiNet topology diagram482
Managing WiNet482
Configuring a RADIUS user485
viii
Overview495
Basic service setup 495
Entering the configuration wizard homepage495
Selecting a country495
Configuring local numbers 496
Configuring connection properties 497
Finishing configuration wizard 497
Overview628
Background 628
Features 629
Typical applications 629
Protocols and standards 630
Configuring SIP trunk 630
Configuration task list 630
Enabling the SIP trunk function631
Configuring a SIP server group 631
Configuring a SIP trunk account 632
Configuring a call route for outbound calls 633
Configuring a call route for a SIP trunk account633
Configuring fax and Modem parameters of the call route of a SIP trunk account635
Configuring advanced settings of the call route of a SIP trunk account635
Configuring codec transparent transmission 637
Configuring a call route for inbound calls 637
SIP trunk configuration examples 637
Configuring a SIP server group with only one member server637
Configuring a SIP server group with multiple member servers644
Configuring call match rules 647
xi
Introduction 694
Configuring SIP local survival 695
Service configuration 695
User management 696
Trusted nodes 697
Call-out route697
Area prefix 698
Call authority control699
SIP local survival configuration examples 700
Configuring local SIP server to operate in alone mode 700
Configuring local SIP server to operate in alive mode703
Configuring call authority control 705
Configuring an area prefix 710
Configuring a call-out route713
IVR 716
Overview716
Advantages716
Customizable voice prompts 716
Various codecs 716
xii
Global configuration771
Batch configuration 772
Local number772
Call route779
Line management 782
SIP local survival services 786
Line states788
Displaying detailed information about analog voice subscriber lines789
Displaying detailed information about digital voice subscriber lines789
Call statistics 790
Displaying active call summary 791
Displaying history call summary 791
SIP UA states792
Displaying TCP connection information 792
Displaying TLS connection information 792
Displaying number register status793
Displaying number subscription status 793
Local survival service states794
SIP trunk account states 795
Server group information 795
xiii
Index 798
xiv
Web overview
The device provides the web-based network management function to facilitate the operations and
maintenance of network devices. Through this function, the administrator can visually manage and
maintain network devices through the web interfaces.
Figure 1 Web-based network management operating environment
Username: admin
Password: admin
You can follow the steps below to log in to the device through the web interface.
1.
Connect the Ethernet interface Ethernet 0/0 of the device to the PC using a crossover Ethernet cable.
2.
Configure an IP address for the PC and ensure that the PC and device can communicate with each
other properly.
Modify the IP address of the PC to one that within the network segment 192.168.1.0/24 (except for
192.168.1.1), for example, 192.168.1.2.
3.
On the PC, open the browser, type the IP address http://192.168.1.1 in the address bar, press Enter and
you can enter the login page of the web interface, as shown in Figure 2. Input the username and
password admin, and the verification code, select the language (English and Chinese are supported at
present), and click Login.
Figure 2 Login page of the web interface
CAUTION:
The PC in Figure 1 is the one where you configure the device, but not necessarily the web-based network
management terminal. The web-based network management terminal is a PC (or another terminal)
used to log in to the web interface and is required to be reachable to the device.
After logging in to the web interface, you can create a new user and configure the IP address of the
interface connecting the user and the device.
If you click the verification code displayed on the web login page, you can get a new verification code.
Up to 24 users can concurrently log in to the device through the web interface.
Navigation area: Organizes the web function menus in the form of a navigation tree, where you
can select function menus as needed. The result is displayed in the body area.
Title area: On the left, displays the path of the current configuration interface in the navigation area;
on the right, provides the Save button to quickly save the current configuration, the Help button to
display the web related help information, and the Logout button to log out of the web interface.
Body area: The area where you can configure and display a function.
User level
Web user levels, ranging from low to high, are visitor, monitor, configure, and management.
Visitor: Users of this level can perform the ping and traceroute operations, but can neither access
the device data nor configure the device.
Monitor: Users of this level can only access the device data but cannot configure the device.
Configure: Users of this level can access data from the device and configure the device, but they
cannot upgrade the host software, add/delete/modify users, or back up/restore the application
file.
Management: Users of this level can perform any operations for the device.
Device Information
Device Information
Integrated Service
Management
Wizard
Interface
Setup
WAN Interface
Setup
Description
User level
Monitor
Monitor
Configure
Configure
Monitor
Configure
Function menu
VLAN Setup
LAN Interface
Setup
VLAN Interface Setup
Summary
Access Service
Radio
Wireless
Configuration
Security
Wireless QoS
Country Code
3G Information
3G
PIN Code Management
Description
User level
Monitor
Configure a VLAN.
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Monitor
Configure
Function menu
Dynamic NAT
DMZ HOST
NAT
Configuratio
n
NAT
Configuration
ALG
Security
Setup
Access
URL Filter
Blacklist
Attack Defend
Intrusion Detection
Application
Control
Application Control
Description
User level
Monitor
Configure NAT.
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Function menu
Description
User level
Configure
Configure
Monitor
Configure
Monitor
Configure
Summary
Monitor
Create
Configure
Remove
Configure
Monitor
Configure
Monitor
Configure
Statistics of Inbound
Interfaces
Monitor
Statistics of Outbound
Interfaces
Monitor
Monitor
Configure DNS.
Configure
Monitor
Configure
Monitor
Configure
Load Application
Custom Application
Advance
Redirection
Route Setup
User-based-sharing
Config
Traffic Ordering
DNS Configuration
DNS Setup
DDNS Configuration
DHCP Setup
DHCP Enable
Function menu
Description
User level
Monitor
Configure
Summary
Monitor
Create
Configure
Basic Config
Configure
Advanced Config
Configure
Link Config
Configure
Remove
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure interface
bandwidth, add, modify, or
delete bandwidth guarantee
policies.
Configure
Summary
Monitor
Create
Create a classifier.
Configure
Setup
Configure
Remove
Remove a classifier.
Configure
Summary
Monitor
Create
Create a behavior.
Configure
Setup
Configure
Remove
Remove a behavior.
Configure
Summary
Monitor
Create
Configure
ACL IPv4
Subnet Limit
Advanced Limit
Advanced Queue
Classifier
Behavior
Policy
Function menu
Port Policy
Description
User level
Setup
Configure classifier-behavior
associations.
Configure
Remove
Configure
Summary
Monitor
Setup
Configure
Remove
Configure
Monitor
Configure SNMP.
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Global Config
Configure
Config Interface
Configure
Monitor
Configure
Monitor
View users.
Configure
Setup
Community
Group
SNMP (supported
on the MSR 20,
MSR 30, and MSR
50)
User
Trap
View
Bridge
Security
UserGro
up
Group
User
Function menu
WAN
Synchroni
zation
Connection Control
Description
User level
Configure
Monitor
Configure
Monitor
Customize applications.
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Configure
Manageme
nt
Monitor
Configure
Monitor
Configure
Monitor
Configure
Application Control
Bandwidth
Packet Filter
Region
MSTP
Port
Global
RADIUS
Access
ARP
Management
ARP Table
Gratuitous ARP
10
Function menu
Description
User level
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Monitor
Configure
Monitor
Entity
Configure
Domain
Monitor
Dynamic Entry
Scan
ARP Anti-Attack
Fix
IPsec Connection
IPsec VPN
Monitoring Information
VPN
L2TP
L2TP Configuration
Tunnel Info
GRE
Certificate
Managemen
t
11
Function menu
Description
User level
Configure
Monitor
Configure
View CRLs.
Monitor
Retrieve CRLs.
Configure
Configure
Manageme
nt
Initialize
Configure
Backup Configuration
Manageme
nt
Restore Configuration
Manageme
nt
Monitor
Configure
Configure
Configure
Manageme
nt
User Summary
Monitor
Super Password
Manageme
nt
Certificate
CRL
System
Managemen
t
Save
Configuration
Reboot
Service Management
Users
12
Function menu
Description
User level
Create User
Create a user.
Manageme
nt
Modify User
Manageme
nt
Remove User
Remove a user.
Manageme
nt
Switch To Management
Visitor
Monitor
Configure SNMP.
Configure
Monitor
Configure
Monitor
Set TR-069.
Configure
Manageme
nt
Monitor
Configure
Monitor
Configure
Monitor
Configure
Ping
Visitor
Trace Route
Visitor
Monitor
System Time
System Time
TR-069
Software Upgrade
Loglist
Loghost
Syslog
Other
Logset
Diagnostic
Tools
WiNet
WiNet Management
13
Function menu
Setup
User Management
Voice
Managemen
t
Configuration Wizard
Local Number
Call Route
Number Match
Dial Plan
Number Substitution
Call Connection
SIP Connection
14
Description
User level
Configure
Configure WiNet.
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure connection
properties, session properties,
advanced settings, and call
release cause code mappings.
Configure
Function menu
SIP Server Group
Management
Line Management
Service Configuration
SIP Trunk
Management
Account Management
Call Route
SIP Local
Survival
Service Configuration
User Management
Trust Nodes
Call-Out Route
Area Prefix
Call Authority Control
15
Description
User level
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Function menu
Media Resources
Management
Access Number
Management
IVR Services
Processing Methods
Customization
Advanced Settings
Global Configuration
Advanced
Configuration
Batch Configuration
States and
Statistics
Line States
Call Statistics
SIP UA States
16
Description
User level
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Configure
Monitor
Monitor
Configure
Monitor
Function menu
Description
User level
Configure
Monitor
Description
Validates the configuration.
Cancels the configuration, and goes to the corresponding display page or
device information page.
Refreshes the current page.
Clears all statistics or items in a list.
Adds an item.
Deletes entries on a list.
Selects all the entries on a list or all ports on a device panel.
Clears all the entries on a list or all ports on a device panel.
Typically locating at the Operation column of a display page, it allows you
to enter the modify page of a corresponding entry to display or modify the
configurations of the entry.
Typically locating at the Operation column of a display page, it allows you
to remove an entry.
17
Searching function
The web interface provides you with the basic and advanced searching functions to display only the
entries that match specific searching criteria.
Basic search: As shown in Figure 4, input the keyword in the text box above the list, select a search
item from the drop-down list and click the Search button to display the entries that match the criteria.
Figure 5 shows an example of searching for entries with VLAN ID being 2.
Advanced search: Advanced search function: As shown in Figure 4, you can click the Advanced
Search link to open the advanced search page, as shown in Figure 6. Specify the search criteria,
and click Apply to display the entries that match the criteria.
18
Take the ARP table shown in Figure 4 as an example. If you want to search for the ARP entries with
interface being Ethernet 0/4, and IP address range being 192.168.1.50 to 192.168.1.59, follow these
steps:
1.
Click the Advanced Search link, specify the search criteria on the advanced search page as shown
in Figure 7, and click Apply. The ARP entries with interface being Ethernet 0/4 are displayed.
2.
Click the Advanced Search link, specify the search criteria on the advanced search page as shown
in Figure 8, and click Apply. The ARP entries with interface being Ethernet 0/4 and IP address
range being 192.168.1.50 to 192.168.1.59 are displayed as shown in Figure 9.
19
Sorting function
The web interface provides you with the basic sorting function to display entries in certain orders.
Basic sorting function: On a list page, you can click the blue heading item of each column to sort the
entries based on the heading item you selected. After your clicking, the heading item is displayed with
an arrow beside it as shown in Figure 10. The upward arrow indicates the ascending order, and the
downward arrow indicates the descending order.
20
Figure 10 Basic sorting function example (based on IP address in the descending order)
ip http enable
21
Configuration guidelines
The web-based configuration interface supports the operating systems of Windows XP, Windows
2000, Windows Server 2003 Enterprise Edition, Windows Server 2003 Standard Edition,
Windows Vista, Linux and MAC OS.
The web-based configuration interface supports the browsers of Microsoft Internet Explorer 6.0 SP2
and higher, Mozilla Firefox 3.0 and higher, and Google Chrome 2.0.174.0 and higher.
The web-based configuration interface does not support the Back, Next, Refresh buttons provided
by the browser. Using these buttons may result in abnormal display of web pages.
The Windows firewall limits the number of TCP connections, when you use IE to log in to the web
interface, sometimes you may be unable to open the web interface. To avoid this problem, turn off
the Windows firewall before login.
If the software version of the device changes, clear the cache data on the browser before logging
in to the device through the web interface; otherwise, the web page content may not be displayed
correctly.
You can display at most 20,000 entries that support content display by pages.
Analysis
If you use the Microsoft Internet Explorer, you can access the web interface only when the following
functions are enabled: Run ActiveX controls and plug-ins, script ActiveX controls marked safe for
scripting and active scripting.
If you use the Mozilla Firefox, you can access the web interface only when JavaScript is enabled.
Open the Internet Explorer, and then select Tools > Internet Options.
2.
Click the Security tab, and then select a web content zone to specify its security settings, as shown
in Figure 11.
22
3.
4.
As shown in Figure 12, enable these functions: Run ActiveX controls and plug-ins, script ActiveX
controls marked safe for scripting and active scripting.
23
5.
Open the Firefox web browser, and then select Tools > Options.
2.
Click the Content tab, select the Enable JavaScript check box, and click OK, as shown in Figure
13.
24
25
Device information
Displaying device information
You can view the following information on the Device Info menu:
Device information
LAN information
WLAN information
Services information
After logging in to the web interface, you will enter the Device Info page, as shown in Figure 14.
NOTE:
The Device Info page contains five parts, which correspond to the five tabs below the figure on the page
except the Services Information and Recent System Logs tabs. When you put your cursor on a part of the
figure, the system prompts you for the tab of the corresponding information, and you can jump to the tab
by clicking this part.
26
27
If you select a specific period, the system periodically refreshes the Device Info page;
If you select Manual, you need to click Refresh to refresh the page.
Device information
Table 5 Device information fields
Field
Description
Device Model
Device name
Device ID
Device ID
Software Version
Firmware Version
Hardware Version
Running Time
CPU Usage
Memory Usage
Description
Interface
Interface name
Session Type
Network-Side Connection
State
IP Address/Mask
DNS Server
Average rate in the outgoing direction on the interface in recent 300 seconds
Downlink Rate
(Kbits/Second)
Average rate in the incoming direction on the interface in recent 300 seconds
Work Mode
28
Description
3G Modem Information
3G Modem State
Model
Manufacturer
CMII ID
Serial Number
Hardware Version
Firmware Version
PRL Version
29
Field
Description
State of the UIM card, which can be:
Absent
Being initialized
Fault
Destructed
PIN code protection is disabled.
PIN code protection is enabled. Enter the PIN code for authentication.
PIN code protection is enabled, and the PIN code has passed the
authentication.
The PIN code has been blocked. Enter the PUK code to unblock it.
IMSI
Voltage
Mobile Network
Network Type
RSSI
No Service
CDMA
HDR
CDMA/HDR HYBRID
Unknown
LAN information
Table 8 Fields for LAN information
Field
Description
Interface
Interface name
Link State
Work Mode
WLAN information
Table 9 Fields for WLAN information
Field
Description
Service Status
30
Service information
Table 10 Fields for service information
Field
Description
Service
Status
Description
Time
Level
Description
Properly set the URL address of the card, and then connect the card to the LAN to which the
administrator belongs. On the page as shown in Figure 16, click the Manage button, a page linked
to the specified URL address pops up, and then you can log in to the web interface of this card to
manage it.
31
32
Ethernet interface
Figure 19 Set Ethernet interface parameters
Description
WAN Interface
Use the MAC address of the device: Use the default MAC address of the
MAC Address
Use the customized MAC address: Assign a MAC address in the field to the
Ethernet interface.
Description
WAN Interface
TCP-MSS
MTU
Item
Description
IP Address
Subnet Mask
Gateway Address
DNS1
Specify a DNS server IP address for the interface. Note that DNS server 1 is used
before DNS server 2.
DNS2
To configure the global DNS server on the page you enter, select Advanced > DNS
Setup > DNS Configuration. The global DNS server is prior to the DNS servers of
the interfaces. In other words, the DNS query is sent to the global DNS server first.
If the query fails, the DNS query is sent to the DNS server of the interface until the
query succeeds.
Specify the MAC address of the Ethernet interface in either of the two ways:
Use the MAC address of the device: Use the default MAC address of the
MAC Address
Use the customized MAC address: Assign a MAC address in the field to the
Ethernet interface.
Description
WAN Interface
In PPPoE mode, a user name and password should be provided by the local
Internet Service Provider (ISP).When the device connects to the ISP server, the ISP
server initiates PPPoE authentication. When the device passes the authentication,
the ISP server will send the IP address, subnet mask, gateway IP address, and DNS
server IP address to the device.
User Name
Password
TCP-MSS
MTU
Use the MAC address of the device: Use the default MAC address of the
MAC Address
Use the customized MAC address: Assign a MAC address in the field to the
Ethernet interface.
34
SA interface
Figure 20 Set SA parameters
Description
WAN Interface
User Name
Password
TCP-MSS
MTU
IP Address
Subnet Mask
ADSL/G.SHDSL interface
Figure 21 Set ADSL/G.SHDSL parameters
35
Description
WAN Interface
PVC
TCP-MSS
MTU
IP Address
Subnet Mask
Map IP
Description
WAN Interface
PVC
TCP-MSS
MTU
IP Address
Subnet Mask
Description
WAN Interface
PVC
User Name
Password
TCP-MSS
MTU
Description
WAN Interface
PVC
User Name
Item
Description
Password
TCP-MSS
MTU
CE1/PR1 interface
The CE1/PR1 interface works in two modes: E1 mode and CE1 mode.
1.
In E1 mode
Description
WAN Interface
Work Mode: E1
User Name
Password
TCP-MSS
MTU
2.
In CE1 mode
37
Description
WAN Interface
Operation
Serial
Timeslot-List
User Name
Password
TCP-MSS
MTU
38
CT1/PR1 interface
Figure 24 Set CT1/PR1 parameters
Description
WAN Interface
Work Mode: E1
Operation
Serial
Timeslot-List
User Name
Password
TCP-MSS
MTU
39
Description
WLAN Setting
Network Name
(SSID)
Network Hide
Radio Unit
Enable Encrypt
With data encryption enabled, data transmission between wireless client and wireless
device can be secured.
Encrypt Act
When you select WEP40, the key can be a 5-character string or 10-digit hexadecimal
Key Mode
number.
When you select WEP104, the key can be a 13-character string or a 26-digit
hexadecimal number.
Key Seed
You can either use a key seed to generate keys or type keys manually. Then, you can
choose one of the configured keys.
Key 1
When you select WEP40 and ASCII, the generated or input key is a 5-character
Key 2
string.
When you select WEP40 and HEX, the generated or input key is a 10-digit
40
Item
Description
hexadecimal number.
Key 3
When you select WEP104 and ASCII, the generated or input key is a 13-character
Key 4
When you select WEP104 and HEX, the generated or input key is a 26-digit
string.
hexadecimal number.
Description
Displays the ID of the VLAN interface to be configured.
VLAN Interface
IP Address
Subnet Mask
DHCP Server
Start IP Address
IMPORTANT:
By default, the VLAN interface on the device that has the smallest number is displayed. If no
VLAN interface is available on the device, the system automatically creates an interface
numbered 1 and displays it.
Specify the IP address and a subnet mask for the VLAN interface.
Select whether to enable DHCP server.
If you enable DHCP server, the configuration items of the DHCP server will be displayed.
Specify the IP address range for dynamic allocation in an extended address pool.
41
Item
Description
IMPORTANT:
End IP Address
If the extended address pool is configured on an interface, when a DHCP client's request
arrives at the interface, the server assigns an IP address from this extended address pool
only. Thus, the client cannot obtain an IP address if no IP address is available in the
extended address pool.
Specify a gateway IP address in the DHCP address pool for DHCP clients.
Gateway IP
Address
DNS Server 1
DNS Server 2
When accessing a server or host that is not in its network segment, a DHCP client needs
the gateway to forward data for it. When you specify a gateway IP address in the
address pool, the DHCP server sends an IP address as well as the gateway IP address to
a requesting client.
Specify a DNS server IP address in the DHCP address pool for DHCP clients. Note that
DNS server 1 is used before DNS server 2.
To allow DHCP clients to access the Internet through domain names, the DHCP server
needs to send an IP address as well as a DNS server IP address to clients.
This page shows the configurations that you have made through the previous steps. Check the
configurations, and click Finish to validate them. To make any modification, click Back to go to previous
pages and edit the settings.
42
The page also provides an option Save Current Configuration for you to save the configurations to the
configuration file (both the .cfg file and the .xml file) to be used at the next startup of the device. If the
option is selected, the configurations you make survive a device reboot.
43
Auto: The interface acts as a DHCP client to obtain an IP address through DHCP.
Manual: The IP address and subnet mask are configured manually for the interface.
PPPoE: The interface acts as a PPPoE (Point-to-Point Protocol) client. PPPoE provides access to the
Internet for hosts in an Ethernet through remote access devices. It also implements access control
and accounting on a per-host basis. Because it is cost-effective, PPPoE gains popularity in various
applications, such as residential networks.`
Click the
icon corresponding to an Ethernet interface to enter the page for configuring the Ethernet
interface, as shown in Figure 29.
44
Description
WAN Interface
If this item shows as Connected, indicating that the current interface is up and
connected, you can click the Disable button to shut down the interface.
Interface Status
If this item shows as Not connected, indicating that the current interface is up but
not connected, you can click the Disable button to shut down the interface.
If this item shows as Administratively Down, indicating that the current interface
is shut down by a network administrator, you can click the Enable button to bring
up the interface.
Connect Mode: Auto
Select Auto as the connection mode. The interface will obtain an IP address
automatically.
Set the MAC address of the Ethernet interface using one of these available options:
Use the MAC address of the device: Use the default MAC address of the Ethernet
MAC Address
Use the customized MAC address: Manually set the MAC address of the Ethernet
interface. When this option is selected, you need to type a MAC address in the
text box below.
45
Description
WAN Interface
If this item shows as Connected, indicating that the current interface is up and
connected, you can click the Disable button to shut down the interface.
Interface Status
If this item shows as Not connected, indicating that the current interface is up but
not connected, you can click the Disable button to shut down the interface.
If this item shows as Administratively Down, indicating that the current interface
is shut down by a network administrator, you can click the Enable button to bring
up the interface.
Connect Mode: Manual
Select Manual as the connection mode. In this mode, you must assign an IP address
and subnet mask for the interface manually.
TCP-MSS
MTU
IP Address
IP Mask
Gateway IP Address
DNS1
Assign an IP address to the DNS servers. DNS1 has a higher precedence than
DNS2.
DNS2
To configure a global DNS server, select Advanced > DNS Setup > DNS
Configuration from the navigation tree. The global DNS server has a higher
precedence than all the DNS servers configured on the interfaces. That is, an
interface first sends a query request to the global DNS server. If failing to receive a
response, it sends query requests to the DNS servers configured on the interfaces
one by one.
Set the MAC address of the Ethernet interface using one of these available options:
Use the MAC address of the device: Use the default MAC address of the Ethernet
MAC Address
Use the customized MAC address: Manually set the MAC address of the Ethernet
interface. When this option is selected, you need to type a MAC address in the
text box below.
Description
WAN Interface
If this item shows as Connected, indicating that the current interface is up and
connected, you can click the Disable button to shut down the interface.
Interface Status
If this item shows as Not connected, indicating that the current interface is up but
not connected, you can click the Disable button to shut down the interface.
If this item shows as Administratively Down, indicating that the current interface
is shut down by a network administrator, you can click the Enable button to bring
up the interface.
Connect Mode: PPPoE
Item
Description
User Name
Password
TCP-MSS
MTU
Idle timeout
If Online for all time is selected, the connection will be maintained until being
disconnected manually or upon an anomaly.
If Online according to the Idle Timeout value is selected, the connection will be
disconnected automatically if no traffic is transmitted or received on the link for a
period of time. The connection will be re-set up when an access to the Internet
request is received.
If the Online according to the Idle Timeout value is selected, the Idle timeout value
must be specified.
Set the MAC address of the Ethernet interface by using one of these available
options:
Use the MAC address of the device: Use the default MAC address of the Ethernet
MAC Address
Use the customized MAC address: Manually set the MAC address of the Ethernet
interface. When this option is selected, you need to type a MAC address in the
text box below.
Configuring an SA interface
SA interface overview
The synchronous/asynchronous serial (SA) interface supports PPP connection mode.
Point-to-Point Protocol (PPP) is a link layer protocol that carries packets over point-to-point links. It has
been widely used because it can provide user authentication and allows for easy extension while
supporting synchronous/asynchronous communication.
PPP contains a set of protocols, including a link control protocol (LCP), a network control protocol (NCP),
and authentication protocols such as Password Authentication Protocol (PAP) and Challenge Handshake
Authentication Protocol (CHAP). Among these protocols,
The LCP is responsible for establishing, tearing down, and monitoring data links.
The NCP is used for negotiating the packet format and type of data links.
Configuration procedure
Select Interface Setup > WAN Interface Setup from the navigation tree to enter the WAN interface
configuration page. Click the
icon corresponding to the SA interface you want to configure to enter
the SA interface configuration page, as shown in Figure 30.
47
Description
WAN Interface
If this item shows as Connected, indicating that the current interface is up and
connected, you can click the Disable button to shut down the interface.
Interface Status
If this item shows as Not connected, indicating that the current interface is up but not
connected, you can click the Disable button to shut down the interface.
If this item shows as Administratively Down, indicating that the current interface is
shut down by a network administrator, you can click the Enable button to bring up the
interface.
User Name
Password
TCP-MSS
MTU
IP Address
IP Mask
48
IPoA
IP over ATM (IPoA) enables IP packets to traverse an ATM network. In an IPoA implementation, ATM
provides the data link layer for the IP hosts on the same network to communicate with one another and
IP packets must be adapted in order to traverse the ATM network.
IPoA makes full use of the advantages of ATM, including high speed point-to-point connections, which
help improve the bandwidth performance of an IP network, excellent network performance, and
complete, mature QoS services.
IPoEoA
IPoE over ATM (IPoEoA) adopts a three-layer architecture, with IP encapsulation at the uppermost layer,
IP over Ethernet (IPoE) in the middle, and IPoEoA at the bottom.
IPoEoA is suitable where Ethernet packets are to be forwarded through an ATM interface, for example,
when a network device forwards traffic from an Ethernet across an ATM PVC to a network access server.
PPPoA
PPP over ATM (PPPoA) enables ATM to carry PPP protocol packets. With PPPoA, PPP packets, in which IP
packets or other protocols packets can be encapsulated, are encapsulated in ATM cells. In this case,
ATM can be simply viewed as the carrier of PPP packets. As the communication process of PPPoA is
managed by PPP, PPPoA inherits the flexibility and comprehensive applications of PPP.
PPPoEoA
PPPoE over ATM (PPPoEoA) enables ATM to carry PPPoE (PPP over Ethernet) protocol packets. With
PPPoEoA, Ethernet packets are encapsulated in ATM cells, through which you can use a PVC to simulate
all the functions of Ethernet. To allow ATM to carry Ethernet frames, the interface management module
provides the virtual Ethernet (VE) interface. The VE interface has Ethernet characteristics and can be
dynamically created through configuration commands. The following is the protocol stack adopted by
the VE interface.
Protocols the same as those for a common Ethernet interface at the network layer and upper layers
Configuration Procedure
Select Interface Setup > WAN Interface Setup from the navigation tree to enter the WAN interface
configuration page. Click the
icon corresponding to the ADSL/G.SHDSL interface you want to
configure to enter the ADSL/G.SHDSL interface configuration page, as shown in Figure 31.
49
Description
WAN Interface
If this item shows as Connected, indicating that the current interface is up and
connected, you can click the Disable button to shut down the interface.
Interface Status
If this item shows as Not connected, indicating that the current interface is up
but not connected, you can click the Disable button to shut down the interface.
PVC
TCP-MSS
MTU
IP Address
IP Mask
Map IP
Description
WAN Interface
50
Item
Description
Display and set the interface status:
If this item shows as Connected, indicating that the current interface is up and
connected, you can click the Disable button to shut down the interface.
Interface Status
If this item shows as Not connected, indicating that the current interface is up
but not connected, you can click the Disable button to shut down the interface.
PVC
TCP-MSS
MTU
IP Address
IP Mask
Description
WAN Interface
If this item shows as Connected, indicating that the current interface is up and
connected, you can click the Disable button to shut down the interface.
Interface Status
If this item shows as Not connected, indicating that the current interface is up
but not connected, you can click the Disable button to shut down the interface.
PVC
User Name
Password
TCP-MSS
MTU
Description
WAN Interface
51
Item
Description
Display and set the interface status:
If this item shows as Connected, indicating that the current interface is up and
connected, you can click the Disable button to shut down the interface.
Interface Status
If this item shows as Not connected, indicating that the current interface is up
but not connected, you can click the Disable button to shut down the interface.
PVC
User Name
Password
TCP-MSS
MTU
Idle timeout
If Online for all time is selected, the connection will be maintained until being
disconnected manually or upon an anomaly.
If Online according to the Idle Timeout value is selected, the connection will be
disconnected automatically if no traffic is transmitted or received on the link for
a period of time. The connection will be re-set up when an access to the
Internet request is received.
If the Online according to the Idle Timeout value is selected, the Idle timeout value
must be specified.
A CE1/PRI interface in E1 mode equals an interface of 2048 Mbps data bandwidth, on which no
timeslots are divided. Its logical features are the same as those of a synchronous serial interface. It
supports link layer protocols such as PPP, FR, LAPB and X.25 and network protocols such as IP and
IPX.
A CE1/PRI interface in CE1 mode is physically divided into 32 timeslots numbered 0 to 31. Among
them, timeslot 0 is used for transmitting synchronizing information. All the timeslots except timeslot
0 can be randomly divided into multiple channel sets and each set can be used as an interface
upon timeslot bundling. Its logical features are the same as those of a synchronous serial interface.
It supports link layer protocols such as PPP, HDLC, FR, LAPB and X.25, and network protocols such
as IP.
52
Configuration procedure
Select Interface Setup > WAN Interface Setup from the navigation tree to enter the WAN interface
configuration page. Click the
icon corresponding to the CE1/PRI interface you want to configure to
enter the CE1/PRI interface configuration page, which varies with the operating mode of the CE1/PRI
interface.
Description
WAN Interface
If this item shows as Connected, indicating that the current interface is up and
connected, you can click the Disable button to shut down the interface.
Interface Status
If this item shows as Not connected, indicating that the current interface is up but
not connected, you can click the Disable button to shut down the interface.
If this item shows as Administratively Down, indicating that the current interface
is shut down by a network administrator, you can click the Enable button to bring
up the interface.
Work Mode: E1
User Name
Password
TCP-MSS
MTU
53
Description
WAN Interface
If this item shows as Connected, indicating that the current interface is up and
connected, you can click the Disable button to shut down the interface.
Interface Status
If this item shows as Not connected, indicating that the current interface is up but not
connected, you can click the Disable button to shut down the interface.
If this item shows as Administratively Down, indicating that the current interface is
shut down by a network administrator, you can click the Enable button to bring up
the interface.
Work Mode: CE1
Operation
Serial
Timeslot-List
User Name
Password
TCP-MSS
MTU
Configuration procedure
Select Interface Setup > WAN Interface Setup from the navigation tree to enter the WAN interface
configuration page. Click the
icon corresponding to the CT1/PRI interface you want to configure to
enter the CT1/PRI interface configuration page, as shown in Figure 34.
Figure 34 Configure a CT1/PRI interface
Description
WAN Interface
55
Item
Description
Display and set the interface status:
If this item shows as Connected, indicating that the current interface is up and
connected, you can click the Disable button to shut down the interface.
Interface Status
If this item shows as Not connected, indicating that the current interface is up but
not connected, you can click the Disable button to shut down the interface.
If this item shows as Administratively Down, indicating that the current interface is
shut down by a network administrator, you can click the Enable button to bring up
the interface.
Work Mode: CT1
Operation
Serial
Timeslot-List
User Name
Password
TCP-MSS
MTU
56
57
VLAN configuration
You can configure the following port-based VLAN and VLAN interface functions through the web
interface:
Overview
Ethernet is a network technology based on the Carrier Sense Multiple Access/Collision Detect
(CSMA/CD) mechanism. As the medium is shared, collisions and excessive broadcasts are common on
Ethernet networks. To address the issue, virtual LAN (VLAN) was introduced to break a LAN down into
separate VLANs. VLANs are isolated from each other at Layer 2. A VLAN is a bridging domain, and all
broadcast traffic is contained within it.
For hosts of different VLANs to communicate, you must use a router or Layer 3 switch to perform Layer 3
forwarding. To achieve this, VLAN interfaces are used. VLAN interfaces are virtual interfaces used for
Layer 3 communication between different VLANs. They do not exist as physical entities on devices. For
each VLAN, you can create one VLAN interface. You can configure VLAN interfaces to forward traffic at
the network layer.
NOTE:
For more information about VLANs and VLAN interfaces, see the H3C MSR Series Routers Layer 2LAN
Task
Remarks
Required
Required
58
Remarks
Required
Optional
Configuring parameters
for a VLAN interface
Configure an IP address and MAC address for a VLAN interface; select whether to
enable the DHCP server function for a VLAN interface, and if yes, configure
related parameters.
IMPORTANT:
You can also configure the DHCP server function in Advanced > DHCP Setup. For
more information, see the chapter DHCP configuration. This chapter only
describes the DHCP server configuration in the LAN Setup module.
59
Description
VLAN IDs
Input the ID of the VLAN (or VLAN interface) to be created or removed. You can
create or remove multiple VLANs at a time.
You can remove the VLAN interface of a VLAN without removing the VLAN.
Description
VLAN ID
Select the ID of the VLAN that you want to assign ports to or remove ports from.
Port list
Add
Remove
60
Description
VLAN ID
IP Address
Subnet Mask
61
Item
Description
Set the MAC address of the VLAN interface using one of these available options:
Use the MAC address of the device: Use the default MAC address of the VLAN
MAC Address
Use the customized MAC address: Manually set the MAC address of the VLAN
interface. When this option is selected, you must type a MAC address in the text
box below.
Select whether the VLAN interface operates in DHCP server mode or not.
DHCP Server
If you select to enable DHCP server on the interface, you can continue to configure
related DHCP server parameters.
Set an extended DHCP address pool used for dynamic IP address allocation. The IP
address range is defined by a start IP address and an end IP address.
Start IP Address
End IP Address
IMPORTANT:
If an extended address pool is configured on the port that receives the DHCP request
packet, the server allocates an IP address in the extended address pool to the client,
regardless of whether a common address pool (static binding or dynamic allocation) is
also configured on the port. If no IP address is available in the pool, the server will not
be able to allocate an IP address to the client.
Set the gateway IP address allocated to the DHCP clients from the DHCP address pool.
Gateway IP Address
DNS Server 1
DNS Server 2
When DHCP clients access servers or hosts on other network segments, their data
needs to be forwarded through the gateway. After specifying a gateway IP address,
the server sends the gateway IP address to the clients along with the IP addresses
allocated to them.
Assign an IP address in the address pool for the DNS server allocated to the DHCP
clients on the local network segment. DNS Server 1 has a higher preference than DNS
Server 2.
To enable DHCP clients to access hosts on the Internet by domain names, the DHCP
server needs to specify the local DNS servers IP address when assigning IP addresses
to these DHCP clients.
Set the IP addresses that are not to be auto assigned in the DHCP address pool.
Reserved IP Address
Configuration guidelines
When configuring VLANs, follow these guidelines:
As the default VLAN, VLAN 1 can neither be created nor removed manually.
You cannot manually create or remove VLANs reserved for special purposes.
You cannot directly remove protocol-reserved VLANs, voice VLANs, management VLANs, or
dynamically learned VLANs. To remove them, you must remove relevant configurations first.
62
Displaying radio
After these configurations, you can build an integrated, stable, secure, effective wireless network.
Overview
Wireless Local Area Network (WLAN) is popular nowadays. Compared with wired LANs, WLANs are
easier and cheaper to implement because only one or several access points (APs) can provide wireless
access for an entire building or area. A WLAN does not necessarily mean that everything is wireless. The
servers and backbones still reside on wired networks. WLANs mainly provide the following services:
Wireless access and mobility to free users from the restrictions of wires and cables.
Remarks
Required
Radio configuration
63
Task
Remarks
Optional
Advanced configuration
64
Configuration Guide.
Click Add to enter the page for creating a wireless access service, as shown in Figure 39:
Figure 39 Create a wireless service
65
Description
Radio Unit
Mode
Description
Wireless Service
VLAN (Untagged)
66
Item
Description
Set the default VLAN of a port.
Default VLAN
Delete VLAN
By default, the default VLAN of all ports is VLAN 1. After you set
the new default VLAN, VLAN 1 is the ID of the VLAN whose
packets are to be sent untagged.
Removes the IDs of the VLANs whose packets are to be sent
untagged and tagged.
IMPORTANT:
Description
Maximum number of clients of an SSID to be associated with the
same radio of the AP
IMPORTANT:
When the number of clients of an SSID to be associated with the
same radio of the AP reaches the maximum, the SSID is
automatically hidden.
67
Item
Description
Web interface management right of online clients
Management Right
Description
Authentication Type
For the clear type wireless service, you can select Open-System only.
68
Item
Description
mac-authentication: Performs MAC address authentication on users.
mac-else-userlogin-secure: This mode is the combination of the
mac-authentication and userlogin-secure modes, with MAC
authentication having a higher priority. Upon receiving a non-802.1X
frame, a port in this mode performs only MAC authentication; upon
receiving an 802.1X frame, the port performs MAC authentication and
then, if MAC authentication fails, 802.1X authentication.
The authentication mode before Or and that after Or have the same
priority. The device determines the authentication mode according to
the protocol type of the packets to be authenticated. For wireless users,
the 802.1X authentication mode is used preferentially.
A security mode with Ext allows multiple 802.1X users to pass the
authentication. A security mode without Ext allows only one 802.1X user
to pass the authentication.
Max User
1.
69
Description
Port Mode
Max User
MAC Authentication
Domain
Configure userlogin-secure/userlogin-secure-ext
70
Description
userlogin-secure: Perform port-based 802.1X authentication
Port Mode
Max User
Mandatory Domain
Authentication Method
71
Item
Description
Enable: Enable the online user handshake function so that the
Handshake
IMPORTANT:
For a WLAN, the clients can actively initiate authentication, or the
AP can discover users and trigger authentication. Therefore, the
ports do not need to send 802.1X multicast trigger messages
periodically for initiating authentication. H3C recommends you to
disable the multicast trigger function in a WLAN because the
multicast trigger messages consume bandwidth.
3.
Figure 44 Port security configuration page for the other four security modes (mac-else-userlogin-secure
is taken for example)
72
Description
mac-else-userlogin-secure: This mode is the
Port Mode
Max User
Mandatory Domain
Authentication Method
73
Item
Description
Enable: Enable the online user handshake function
so that the device can periodically send handshake
messages to a user to check whether the user is
online. By default, the function is enabled.
Handshake
Multicast Trigger
MAC Authentication
Domain
74
See Table 42 for the configuration items of basic configuration of crypto type wireless service.
Description
Maximum number of clients of an SSID to be
associated with the same radio of the AP
IMPORTANT:
75
Item
Description
Set the TKIP countermeasure time.
By default, the TKIP countermeasure time is 0 seconds,
that is, the TKIP countermeasure policy is disabled.
If the TKIP countermeasure time is set to a value other
than 0, the TKIP countermeasure policy is enabled.
Message integrity check (MIC) is designed to avoid
hacker tampering. It uses the Michael algorithm and
is extremely secure. When failures occur to MIC, the
data may have been tampered, and the system may
be under attack. In this case, TKIP will enable the
countermeasure policy to prevent hackers from
attacking. With the countermeasure policy enabled, if
more than two MIC failures occur within the specified
time, the TKIP disassociates all connected wireless
clients and no new associations are allowed within
the TKIP countermeasure time.
TKIP CM Time
Management Right
76
Description
Link authentication method, which can be:
Shared-Key: The two parties need to have the same shared key
configured for this authentication mode. You can select this
option only when WEP encryption mode is used.
algorithm.
CCMP and TKIP: It indicates that you can select both CCMP
and TKIP encryption.
Wireless service type (IE information carried in the beacon or
probe response frame):
WPA and WPA2: It indicates that you can select both WPA and
WPA2.
Encryption
WEP
Item
Description
Configure the key index, which can be:
Key ID
1: Key index 1.
2: Key index 2.
3: Key index 3.
4: Key index 4.
psk: An access user must use the pre-shared key (PSK) that is
pre-configured to negotiate with the device. The access to the
port is allowed only after the negotiation succeeds.
78
Description
Port Mode
Max User
MAC Authentication
Domain
Preshared Key
79
2.
Configure psk
Description
Port Mode
Max User
Preshared Key
3.
Configure userlogin-secure-ext
80
Authenticat
ion mode
Encryption
type
Security IE
WEP
encryption
/key ID
Port mode
mac-authentication
mac-else-userlogin-secure
Clear
Open-Syste
m
mac-else-userlogin-secure-ext
Unavailable
Unavailable
Unavailable
userlogin-secure
userlogin-secure-ext
userlogin-secure-or-mac
userlogin-secure-or-mac-ext
Selected
Required
Open-Syste
m
Unselected
Crypto
Shared-Key
Unavailable
Selected
Unavailable
Unavailable
Required
Open-Syste
m and
Shared-Key
Unselected
Unavailable
81
WEP
encryption is
available
The key ID
can be 1, 2,
3, or 4
userlogin-secure-ext
WEP
encryption is
required
The key ID
can be 1, 2,
3 or 4
WEP
encryption is
required
The key ID
can be 1, 2,
3 or 4
psk
mac-authentication
mac-authentication
WEP
encryption is
required
The key ID
can be 2, 3
or 4
userlogin-secure-ext
WEP
encryption is
required
The key ID
can be 1, 2,
3 or 4
psk
mac-authentication
Description
SSID
Authentication Method
SSID-hide
beacon frames.
Status of service template:
Service Template Status
The detailed information of wireless service (crypto type) is as shown in Figure 51.
82
Description
SSID
Security IE
Authentication Method
SSID-hide
Cipher Suite
GTK Rekey
83
Displaying client
Displaying client detailed information
Select Interface Setup > Wireless > Summary from the navigation tree, and click the Client tab to enter
the Client page. Then click the Detail Information tab on the page, and click the name of the specified
client to view the detailed information of the client.
The detailed information of a client is as shown in Figure 54. For the description of the fields in the client
detailed information, see Table 56.
84
Description
: Indicates that 0 < RSSI <= 20.
: Indicates that 20 < RSSI <= 30.
Client RSSI
Description
MAC address
AID
User Name
Radio Interface
SSID
BSSID
Port
VLAN
State
Field
Description
Wireless Mode
QoS Mode
RSSI
SNR
Rx/Tx Rate
Client Type
Authentication Method
AKM Method
Roam Status
Up Time
Time for which the client has been associated with the
device
Description
Refresh
Add to Blacklist
Reset Statistic
Disconnect
86
Description
AP Name
Radio Id
Radio ID
SSID
BSSID
MAC Address
RSSI
Transmitted Frames
Back Ground(Frames/Bytes)
Best Effort(Frames/Bytes)
Video(Frames/Bytes)
Voice(Frames/Bytes)
Received Frames
Discarded Frames
87
Description
No./MCS
Rate(Mbps)
TxCnt
RxCnt
Number of wireless ping frames that the radio interface received from the client
RSSI
Received signal strength indication. This value indicates the client signal strength
detected by the AP.
Retries
RTT(ms)
88
The device provides plain-text wireless access service with SSID service1.
802.11g is adopted.
Configuration procedure
1.
Click Apply.
2.
Select Interface Setup > Wireless > Access Service from the navigation tree to enter the page for enabling
wireless service, as shown in Figure 59:
89
Click Enable.
3.
Enable 802.11g radio (By default, 802.11g radio is enabled. Therefore, this step is optional.)
Select Interface Setup > Wireless > Access Service from the navigation tree to enter the Radio Setup page,
as shown in Figure 60. Make sure that 802.11g radio is enabled.
Figure 60 Enable 802.11g radio
Configuration verification
If you select Interface Setup > Wireless > Summary from the navigation tree, and click the Client tab, you
can view the online clients.
Configuration guidelines
Note the following guidelines when configuring a wireless service:
Set up a wireless access service named research, and configure it to use the PSK authentication.
Clients that access the wireless network are in VLAN 2.
Set up a wireless access service named office, and configure it to use the clear text authentication.
Clients that access the wireless network are in VLAN 3.
90
SSIDresearch
VLAN2
Client0040-96b3-8a77
IP network
Router
SSIDoffice
VLAN3
Client0014-6c8a-43ff
Configuration procedure
1.
Click Apply.
# After the wireless service is created, the system is automatically navigated to the wireless service page,
where you can perform the VLAN settings (before this operation, select Network > VLAN and create
VLAN 2 first).
Figure 62 Set the VLANs
NOTE:
For PSK-related configuration, see PSK authentication configuration example. You can strictly follow
the configuration example to configure the PSK configuration.
2.
91
Select Interface Setup > Wireless > Access Service from the navigation tree, and click Create to enter the
page for creating a wireless service.
Click Apply.
# After the wireless service is created, the system is automatically navigated to the wireless service page,
where you can configure the VLANs (first select Network > VLAN from the navigation tree, and create
VLAN 3).
Figure 63 Set the VLANs
Click Apply.
3.
If you select Interface Setup > Wireless > Summary from the navigation tree, and click the Client tab, you
can view the online clients.
On this page, you can see that the client 0014-6c8a-43ff, which accesses the SSID office, is in VLAN 3,
while the client 0040-96b3-8a77, which accesses the SSID research, is in VLAN 2. Because the two
clients are in different VLANs, they cannot access each other.
Configuration procedure
1.
Select Interface Setup > Wireless > Access Service from the navigation tree, and click Add to enter the
page for creating a wireless service, as shown in Figure 65:
Figure 65 Create a wireless service
Click Apply.
2.
After you create a wireless service, you will enter the wireless service configuration page. You need to
perform security setup when configuring PSK authentication, as shown in Figure 66:
Figure 66 Security setup
Select the Cipher Suite option, select CCMP and TKIP (select an encryption type as needed), and
then select WPA from the Security IE drop-down list.
Select the Port Set option, and select psk from the Port Mode drop-down list.
Select pass-phrase from the Preshared Key drop-down list, and type key ID 12345678.
Click Apply.
3.
Select Interface Setup > Wireless > Access Service from the navigation tree to enter the page for enabling
a wireless service, as shown in Figure 67:
Figure 67 Enable the wireless service
Click Enable.
4.
Enable 802.11g radio (By default, 802.11g radio is enabled. Therefore, this step is optional. )
Select Interface Setup > Wireless > Radio from the navigation tree to enter the Radio page. Make sure
that 802.11g radio is enabled.
5.
Launch the client, and refresh the network list. Select the configured service in Choose a wireless network
(PSK in this example), and click Connect. In the popup dialog box, type the key (12345678 in this
example), and then click Connect, as shown in Figure 68.
94
The client has the same preshared PSK key as the AP, so the client can associate with the AP.
95
Configuration verification
The same PSK pre-shared key is configured on the client. The client can successfully associate with
the device and can access the WLAN network.
If you select Interface Setup > Wireless > Access Service from the navigation tree, and then click the
Client tab, you can view the online clients.
Configuration procedure
1.
96
Select Interface Setup > Wireless > Access Service from the navigation tree, and click Add to enter the
page for creating a wireless service, as shown in Figure 71:
Figure 71 Create a wireless service
Click Apply.
2.
After you have created a wireless service, you will enter the wireless service configuration page. You
need to perform security setup when configuring MAC authentication, as shown in Figure 72:
Figure 72 Security setup
Select the Port Set option, and select mac-authentication from the Port Mode drop-down list.
Select the MAC Authentication option, and select system from the Domain drop-down list.
97
Click Apply.
3.
Select Interface Setup > Wireless > Access Service from the navigation tree to enter the page for enabling
a wireless service, as shown in Figure 73:
Figure 73 Enable the wireless service
Click Enable.
4.
Select Interface Setup > Wireless > Access Service from the navigation tree, and click MAC
Authentication List to enter the page for configuring a MAC authentication list, as shown in Figure 74:
Figure 74 Add a MAC authentication list
Add a local user in the MAC Address box. 00-14-6c-8a-43-ff is used in this example.
Click Add.
5.
Enable 802.11g radio (By default, 802.11g radio is enabled. Therefore, this step is optional. )
Select Interface Setup > Wireless > Radio from the navigation tree to enter the Radio page. Make sure
that 802.11g is enabled.
6.
Launch the client, and refresh the network list. Select the configured service in Choose a wireless network
(mac-auth in this example), and click Connect, as shown in Figure 75. If the MAC address of the client is
in the MAC address list, the client can pass the MAC authentication and access the wireless network.
98
Configuration verification
If the MAC address of the client is in the MAC authentication list, the client can pass authentication and
access the WLAN network. If you select Interface Setup > Wireless > Access Service from the navigation
tree, and then click the Client tab, you can view the online clients.
Use the intelligent management center (iMC) as the RADIUS server for authentication, authorization,
and accounting (AAA). On the RADIUS server, configure the clients username and password as
the MAC address of the client and the shared key as expert. The IP address of the RADIUS server
is 10.18.1.88.
99
The IP address of the device is 10.18.1.1. On the device, configure the shared key for communication
with the RADIUS server as expert, and configure the device to remove the domain name of a
username before sending it to the RADIUS server.
Configuration procedure
1.
Click Apply.
2.
After you create a wireless service, the wireless service configuration page appears. Then you can
configure MAC authentication on the Security Setup area, as shown in Figure 78:
100
Select the Port Set option, and select mac-authentication from the Port Mode drop-down list.
Select the MAC Authentication option, and select system from the Domain drop-down list.
Click Apply.
3.
Select Interface Setup > Wireless > Access Service from the navigation tree to enter the page as shown
in the following figure.
Figure 79 Enable the wireless service
Click Enable.
4.
Enable 802.11g radio (By default, the 802.11g radio is enabled. Therefore, this step is optional.)
Select Interface Setup > Wireless > Radio from the navigation tree to enter the Radio page. Make sure
that 802.11g is enabled.
5.
NOTE:
The following takes the iMC (iMC PLAT 3.20-R2602 and iMC UAM 3.60-E6102) as an example to
illustrate the basic configuration of the RADIUS server.
101
Add ports 1812, and 1813 for Authentication Port and Accounting Port respectively.
Select or manually add the access device with the IP address 10.18.1.1.
# Add service.
Select the Service tab, and then select Access Service > Service Configuration from the navigation tree to
enter the add service page. Then click Add on the page to enter the following configuration page. Set the
service name as mac, and keep the default values for other parameters.
Figure 81 Add service
# Add an account.
102
Select the User tab, and then select User > All Access Users from the navigation tree to enter the user
page. Then, click Add on the page to enter the page as shown in Figure 82.
6.
NOTE:
The following takes the iMC (iMC PLAT 5.0 and iMC UAM 5.0) as an example to illustrate the basic
configuration of the RADIUS server.
# Add an access device.
Log in to the iMC management platform. Select the Service tab, and then select Access Service > Access
Device from the navigation tree to enter the access device configuration page. Click Add on the page to
enter the configuration page as shown in Figure 80:
Input expert as the Shared Key. keep the default values for other parameters.
Select or manually add the access device with the IP address 10.18.1.1.
103
# Add service.
Select the Service tab, and then select Access Service > Service Configuration from the navigation tree to
enter the add service page. Then click Add on the page to enter the following configuration page. Set the
service name as mac, and keep the default values for other parameters.
Figure 84 Add service
# Add an account.
Select the User tab, and then select User > All Access Users from the navigation tree to enter the user
page. Then, click Add on the page to enter the page as shown in Figure 82.
104
Configuration verification
During authentication, the user does not need to input the username or password. After passing MAC
authentication, the client can associate with the device and access the WLAN. You can view the online
clients by selecting Interface Setup > Wireless > Summary from the navigation tree and then clicking the
Client tab.
Use the CAMS or iMC as a RADIUS server for AAA. On the RADIUS server, configure the clients
username as user, password as dot1x, and shared key as expert. The IP address of the RADIUS
server is 10.18.1.88.
On the device, configure the shared key as expert, and configure the device to remove the domain
name of a username before sending it to the RADIUS server. The IP address of the device is
10.18.1.1.
105
10.18.1.1
IP network
SSIDdot1x
Switch
Router
Client
Configuration procedure
1.
Click Apply.
2.
After you create a wireless service, the wireless service configuration page appears. Then you can
configure 802.1X authentication on the Security Setup area, as shown in Figure 88:
106
Select the Cipher Suite option, select CCMP from the Cipher Suite drop-down list, and select WPA2
from the Security IE drop-down list.
Select the Port Set option, and select userlogin-secure-ext from the Port Mode drop-down list.
Click Apply.
3.
Select Interface Setup > Wireless > Access Service from the navigation tree.
Click Enable.
4.
Enable 802.11g radio (By default, the 802.11g radio is enabled. Therefore, this step is optional.)
Select Interface Setup > Wireless > Radio from the navigation tree to enter the Radio page. Make sure
that 802.11g is enabled.
5.
NOTE:
The following takes the iMC (iMC PLAT 3.20-R2602 and iMC UAM 3.60-E6102) as an example to
illustrate the basic configuration of the RADIUS server.
# Add an access device.
Log in to the iMC management platform. Select the Service tab, and then select Access Service > Access
Device from the navigation tree to enter the access device configuration page. Click Add on the page to
enter the configuration page as shown in Figure 89:
107
Add ports 1812, and 1813 for Authentication Port and Accounting Port respectively.
Select or manually add the access device with the IP address 10.18.1.1.
# Add a service.
Select the Service tab, and then select Access Service > Service Configuration from the navigation tree to
enter the add service page. Then click Add on the page to enter the following configuration page.
Set the Certificate Type to EAP-PEAP AuthN and the Certificate Sub Type to MS-CHAPV2 AuthN.
108
# Add an account.
Select the User tab, and then select User > All Access Users from the navigation tree to enter the user
page. Then, click Add on the page to enter the page shown in Figure 91.
6.
109
NOTE:
The following takes the iMC (iMC PLAT 5.0 and iMC UAM 5.0) as an example to illustrate the basic
configuration of the RADIUS server.
# Add an access device.
Log in to the iMC management platform. Select the Service tab, and then select Access Service > Access
Device from the navigation tree to enter the access device configuration page. Click Add on the page to
enter the configuration page as shown in Figure 89:
Input expert as the Shared Key. Keep the default values for other parameters.
Select or manually add the access device with the IP address 10.18.1.1.
# Add a service.
Select the Service tab, and then select Access Service > Service Configuration from the navigation tree to
enter the add service page. Then click Add on the page to enter the following configuration page.
Set the Certificate Type to EAP-PEAP AuthN and the Certificate Sub Type to MS-CHAPV2 AuthN.
110
# Add an account.
Select the User tab, and then select User > All Access Users from the navigation tree to enter the user
page. Then, click Add on the page to enter the page shown in Figure 91.
111
7.
112
113
114
Configuration verification
After you input username user and password dot1x in the popup dialog box, the client can
associate with the device and access the WLAN.
You can view the online clients by selecting Interface Setup > Wireless > Summary from the
navigation tree, and then clicking the Client tab.
Configuration procedure
1.
Click Apply.
2.
Select Interface Setup > Wireless > Access Service from the navigation tree to enter the page for enabling
a wireless service, as shown in Figure 100:
Figure 100 Enable the wireless service
Click Enable.
3.
Enable 802.11n(2.4GHZ) radio (By default, 802.11n(2.4GHZ) radio is enabled. Therefore, this
step is optional. )
Configuration verification
If you select Interface Setup > Wireless > Summary from the navigation tree, and click the Client tab, you
can view the online clients.
Among these online clients, 0014-6c8a-43ff is an 802.11g client, and 001e-c144-473a is a 802.11n
client. In this example, client types are not restricted. Therefore, both 802.11g and 802.11n clients can
access the wireless network. If Client 802.11n Only is configured, only 001e-c144-473a can access the
wireless network.
116
Configuration guidelines
When configuring 802.11n, note that:
Select Interface Setup > Wireless > Radio from the navigation tree, select the radio unit to be
icon to enter the radio configuration page, where you
configured, and click the corresponding
can modify the 802.11n-related parameters, including Bandwidth Mode, A-MSDU, A-MPDU, Short
GI, and Client 802.11n Only (permitting only 802.11n users to access the wireless network).
Select Interface Setup > Wireless > Radio from the navigation tree to modify the 802.11n rate
117
Client mode
The client mode means that a router operating accesses the wireless network as a client. Multiple hosts
or printers in the wired network can access the wireless network through the router.
Figure 101 Client mode
118
NOTE:
Support for radio mode types depends on your device model.
You cannot enable an access service or WDS service on a radio interface with the client mode enabled.
To modify the radio mode, select Radio > Radio from the navigation tree, find the radio to be configured
in the list, click the corresponding
icon, and change the radio mode in the Radio Mode option.
If the 802.11(2.4GHz) client mode is used, the client can scan 802.11(2.4GHz) wireless services.
With the client mode enabled, you can check the existing wireless services in the wireless service list.
Figure 103 Check the wireless service list
Click the Connect icon of the wireless service in the wireless service list, and a SET CODE dialog box
shown in Figure 104 appears.
Figure 104 Set a code
Open System
Shared key
119
RSN + PSK
Remarks
Specify the network authentication mode, which can be:
Clear: no encryption
WEP: WEP encryption
TKIP/CCMP: TKIP/CCMP encryption
Password
KeyID
There are four static keys in WEP. Their key indexes are 1, 2, 3,
and 4. The key corresponding to the specified key index will be
used for encrypting and decrypting frames.
2.
You can also input a wireless service to specify the wireless service to be connected on the page
displayed after clicking the Connect icon of the wireless service.
Figure 105 Associate the specified wireless service
Input the specified wireless service in the input box, and click Connect. Then the dialog box in Figure 104
appears. Set the options on the dialog box according to the specified wireless service type.
Displaying statistics
Select Interface Setup > Wireless Service > Client Mode from the navigation tree and click Statistic
Information to enter the page shown in Figure 106.
Figure 106 Display statistics
120
The AP accesses the wired LAN, and the router accesses the AP as a client.
The router accesses the wireless service psk by passing the RSN(CCMP)+PSK authentication.
Client with MAC address 0014-6c8a-43ff also accesses the wireless service psk.
Configuration procedure
1.
Select Interface Setup > Wireless Service > Client Mode from the navigation tree and click Connect Setup
to enter the page shown in Figure 108.
121
Select the option corresponding to 802.11g and click Enable. With the client mode enabled, you can
check the existing wireless services in the wireless service list.
Figure 109 Check the wireless service list
2.
Click the Connect icon of the wireless service psk in the wireless service list, and a SET CODE dialog box
shown in Figure 110 appears.
Figure 110 Set a code
Click Apply.
122
Configuration verification
On the AP shown in Figure 107, select Interface Setup > Wireless Service > Summary > Client from the
navigation tree to enter the page shown in Figure 111, where you can check that the router is online.
Figure 111 Check that the workgroup bridge is online
You can see that the client with MAC address 0014-6c8a-43ff and the router with MAC address
000f-e2333-5510 have been successfully associated with the AP.
The wired devices on the right (such as printers and PCs) can access the wireless network through
the router.
Configuration guidelines
As shown in Figure 112, if the router uses two radio interfaces at the same time, the client connecting to
radio 2 can access the AP through the router.
Figure 112 Network diagram for the router using two radio interfaces at the same time
123
Radio configuration
802.11b/g/n operates in 2.4 GHz band. Each band can be divided into multiple channels for wireless
communication. You can configure and adjust the channels to achieve optimal performance.
To configure a radio, select Interface Setup > Wireless > Radio from the navigation tree to enter the Radio
page, select the desired AP, and click the
icon to enter the page for AP radio setup page, as shown
in Figure 113:
Figure 113 Radio setup
Description
Radio Unit
Radio Mode
Transmit Power
Channel
auto: The working channel is automatically selected. If you select this mode,
the AP checks the channel quality in the WLAN network, and selects the
channel of the best quality as its working channel.
If you modify the working channel configuration, the transmit power will be
automatically adjusted.
802.11n
IMPORTANT:
The option is available only when the device supports 802.11n.
124
Item
Description
802.11n can bond two adjacent 20-MHz channels together to form a
40-MHz channel. During data forwarding, the two 20-MHz channels can
work separately with one acting as the primary channel and the other acting
as the secondary channel or work together as a 40-MHz channel. This
provides a simple way of doubling the data rate.
bandwidth mode
If you modify the bandwidth mode configuration, the transmit power will be
automatically adjusted.
client dot11n-only
If you select the client dot11n-only option, non-802.11n clients are prohibited
from access. If you want to provide access for all 802.11b/g clients, you need
to disable this function.
Selecting the A-MSDU option enables A-MSDU.
A-MSDU
Multiple MAC Service Data Units (MSDU) can be aggregated into a single
A-MSDU. This reduces the MAC header overhead and thus improves MAC
layer forwarding efficiency.
At present, only A-MSDUs can be received.
IMPORTANT:
When 802.11n radios are used in a mesh WLAN, ensure that they have the
same A-MSDU configuration.
Selecting the A-MPDU option enables A-MPDU.
A-MPDU
802.11n introduces the A-MPDU frame format. By using only one PHY header,
each A-MPDU can accommodate multiple Message Protocol Data Units
(MPDUs) which have their PHY headers removed. This reduces the overhead in
transmission and the number of ACK frames to be used, and thus improves
network throughput.
IMPORTANT:
When 802.11n radios are used in a mesh WLAN, ensure that they have the
same A-MSDU configuration.
Selecting the short GI option enables short GI.
short GI
Delays may occur during receiving radio signals due to factors like multi-path
reception. Therefore, a subsequently sent frame may interfere with a
previously sent frame. The GI function is used to avoid such interference. It
increases the throughput by 10 percent.
The short GI function is independent of bandwidth and thus supports both
20MHz and 40MHz bandwidths.
125
Description
Preamble is a pattern of bits at the beginning of a frame so that the receiver
can sync up and be ready for the real data. There are two different kinds of
preambles:
Preamble
ANI
Adaptive Noise Immunity (ANI). After the ANI function is enabled, the device
automatically adjusts the noise immunity level according to the surrounding
signal environment to eliminate RF interference.
In a wireless network where error rate is high, you can decrease the
Fragment Threshold
126
Item
Description
Beacon Interval
Interval for sending beacon frames. Beacon frames are transmitted at a regular
interval to allow mobile clients to join the network. Beacon frames are used for
a client to identify nearby APs or network control devices.
Request to send (RTS) threshold length. If a frame is larger than this value, the
RTS mechanism will be used.
RTS is used to avoid data collisions in a WLAN.
RTS Threshold
A smaller RTS threshold causes RTS packets to be sent more often, thus
consuming more available bandwidth. However, the more often RTS packets
are sent, the quicker the system can recover from interference or collisions.
In a high-density WLAN, you can decrease the RTS threshold by a rational
value to reduce collisions in the network.
IMPORTANT:
The RTS mechanism occupies bandwidth. Therefore, this mechanism applies only
to data frames larger than the RTS threshold.
DTIM Period
Number of retransmission attempts for unicast frames larger than the RTS
threshold.
Number of retransmission attempts for unicast frames smaller than the RTS
threshold if no acknowledgment is received for it.
Interval for which a frame received by a device can stay in the buffer memory
127
Description
Configure rates (in Mbps) for 802.11b.
By default:
802.11b
802.11g
128
Description
Set the maximum MCS index for 802.11n mandatory rates.
IMPORTANT:
If you select the client dot11n-only option, you must configure the mandatory
maximum MCS.
Set the multicast MCS for 802.11n.
Multicast MCS
The multicast MCS is adopted only when all the clients use 802.11n. If a non
802.11n client exists, multicast traffic is transmitted at a mandatory MCS data
rate.
IMPORTANT:
When the multicast MCS takes effect, the corresponding data rates defined for
20 MHz are adopted no matter whether the 802.11n radio operates in 40 MHz
mode or in 20 MHz mode.
129
NOTE:
For more information about MCS, see the H3C MSR Series Routers WLAN Configuration Guide.
Displaying radio
Displaying wireless services bound to a radio
Select Interface Setup > Wireless > Summary from the navigation tree, click the Radio tab, click the
specified radio unit, and select the Wireless Service tab to view the wireless services bound to the radio.
Figure 117 Display wireless services bound to the radio
NOTE:
The Noise Floor item in the table indicates various random electromagnetic waves during the wireless
communication. For the environment with a high noise floor, you can improve the signal-to-noise ration
(SNR) by increasing the transmit power or reducing the noise floor.
130
Description
Hardware Address
Radio-type dot11g
channel
power(dBm)
131
Field
Description
Input packet statistics of the interface:
unicast packets
: 0 fragmented
discarded bytes
: 0 decryption errors
unicast packets
discarded bytes
132
White list: Contains the MAC addresses of all clients allowed to access the WLAN. If the whitelist
is used, only permitted clients can access the WLAN, and all frames from other clients will be
discarded.
Static blacklist: Contains the MAC addresses of clients forbidden to access the WLAN. This list is
manually configured.
Dynamic blacklist: Contains MAC addresses of clients whose frames will be dropped. A client is
dynamically added to the list if it is considered sending attacking frames until the timer of the entry
expires.
When a device receives an 802.11 frame, it checks the source MAC address of the frame and processes
the frame as follows:
1.
If the source MAC address does not match any entry in the white list, it is dropped. If there is a
match, the frame is considered valid and will be further processed.
2.
If no white list entries exist, the static and dynamic blacklists are searched.
If the source MAC address matches an entry in any of the two lists, it is dropped.
If there is no match, or no blacklist entries exist, the frame is considered valid and will be further
processed.
133
Description
Enable: Enables dynamic blacklist.
Disable: Disables dynamic blacklist.
Dynamic Blacklist
IMPORTANT:
Before enabling the dynamic blacklist function, you need to select the Flood Attack
Detect option in the WIDS Setup page.
Lifetime
Configure the lifetime of the entries in the blacklist. When the lifetime of an entry
expires, the entry is removed from the blacklist.
NOTE:
At present, these attacks can be detected through a dynamic blacklist: Assoc-Flood, Reassoc-Flood,
Disassoc-Flood, ProbeReq-Flood, Action-Flood, Auth-Flood, Deauth-Flood and NullData-Flood.
134
Description
Select the MAC Address option, and then add a MAC address to the static black
list.
If you select the option, the table below lists the current existing clients. Select the
options of the clients to add their MAC addresses to the static blacklist.
Description
Item
Description
MAC Address
Select the MAC Address option and then add a MAC address to the white list.
If you select the option, the table below lists the current existing clients. Select the
check boxes of the clients to add their MAC addresses to the white list.
User isolation
If a device has the user isolation feature enabled, clients associated with it are isolated at Layer 2.
As shown in Figure 122, after user isolation is enabled on the device, all the clients cannot ping each
other or learn each other's MAC or IP addresses, because they cannot exchange Layer 2 packets.
Figure 122 Network diagram for user isolation
136
Description
Enable: Enables user isolation on the AP to isolate the clients associated with it
User Isolate
at Layer 2.
137
Select the check box in front of the radio unit to be configured, and click Enable. By default, wireless QoS
is enabled.
NOTE:
The WMM protocol is the foundation of the 802.11n protocol. Therefore, when the radio works in
802.11n (2.4 GHz) radio mode, you must enable WMM. Otherwise, the associated 802.11n clients may
fail to communicate.
138
Description
Radio
SVP Mapping
AC-VO
AC-VI
AC-BE
AC-BK
NOTE:
SVP mapping is applicable to only non-WMM client access.
139
Description
Client Number
Channel Utilization
Description
Radio
Priority type
AIFSN
Item
Description
TXOP Limit
ECWmin
ECWmax
No ACK
If you select the checkbox before No ACK, the No ACK policy is used by the
device.
By default, the normal ACK policy is used by the device.
TXOP Limit
AIFSN
ECWmin
ECWmax
AC-BK
10
AC-BE
AC-VI
94
AC-VO
47
NOTE:
ECWmin cannot be greater than ECWmax.
On a device operating in 802.11b radio mode, H3C recommends you to set the TXOP-Limit to 0, 0, 188,
and 102 for AC-BK, AC-BE, AC-VI, and AC-VO.
Description
Radio
Priority type
AIFSN
141
Item
Description
TXOP Limit
ECWmin
ECWmax
CAC
AC-VO and AC-VI support CAC, which is disabled by default. This item is not
available for AC-BE or AC-BK, because they do not support CAC.
TXOP Limit
AIFSN
ECWmin
ECWmax
AC-BK
10
AC-BE
10
AC-VI
94
AC-VO
47
NOTE:
ECWmin cannot be greater than ECWmax.
If all clients operate in 802.11b radio mode, H3C recommends you to set TXOPLimit to 188 and 102 for
AC-VI and AC-VO.
If some clients operate in 802.11b radio mode and some clients operate in 802.11g radio mode in the
network, the TXOPLimit parameters in Table 75 are recommended.
Once you enable CAC for an AC, it is enabled automatically for all ACs with higher priority. For
example, if you enable CAC for AC-VI, CAC is also enabled for AC-VO. However, enabling CAC for
AC-VO does not enable CAC for AC-VI.
142
Description
Radio interface
QoS mode
Client accepted
Threshold
143
Field
Description
Response policy adopted for CAC-disabled ACs
ECWmin
ECWmax
AIFSN
TXOPLimit
Ack Policy
CAC
144
Description
MAC address
SSID
QoS Mode
Max SP length
AC
Access category
APSD attribute of an AC, which can be:
State
T: The AC is trigger-enabled.
D: The AC is delivery-enabled.
T | D: The AC is both trigger-enabled and delivery-enabled.
L: The AC is of legacy attributes.
Assoc State
Downgrade packets
Downgrade bytes
Discard packets
Discard bytes
145
Configure the total bandwidth shared by all clients in the same BSS. This is called dynamic mode.
The rate limit of a client is the configured total rate/the number of online clients. For example, if the
configure total rate is 10 Mbps and five clients are online, the rate of each client is 2 Mbps.
Configure the maximum bandwidth that can be used by each client in the BSS. This is called static
mode. For example, if the configured rate is 1 Mbps, the rate limit of each user online is 1 Mbps.
When the set rate limit multiplied by the number of access clients exceeds the available bandwidth
provided by the device, no clients can get the guaranteed bandwidth.
Select Interface Setup > Wireless > Wireless QoS from the navigation tree on the left, select the Client
Rate Limit tab, and click Add to enter the page for setting rate limiting, as shown in Figure 132.
Figure 132 Set rate limiting
Description
Wireless Service
Direction
Mode
Dynamic mode
Static mode
Set the rate of the clients
If you select the static mode, static rate is displayed, and the rate is
Rate
If you select the dynamic mode, share rate is displayed, and the rate
is the total bandwidth of all clients.
146
Configuration procedure
1.
For related configurations, see Wireless access configuration examples. You can strictly follow the
steps in the related configuration example to configure the wireless service.
2.
# Select Interface Setup > Wireless > Wireless QoS from the navigation tree, and select the QoS Service
tab to enter the page shown in Figure 134. Make sure that WMM is enabled.
Figure 134 Wireless QoS configuration page
# Select the radio unit to be configured in the list and click the corresponding
icon in the Operation
column to enter the page for configuring wireless QoS. In the Client EDCA list, select the priority type
(AC_VO is taken for example here) to be modified, and click the corresponding
icon in the Operation
column to enter the page for setting client EDCA parameters.
Figure 135 Enable CAC
Click Apply.
Click Apply.
Client 1
IP network
Router
Client 2
Configuration procedure
1.
For the configuration procedure, see Wireless access configuration examples. You can strictly follow
the related configuration example to configure the wireless service.
148
2.
Select Interface Setup > Wireless > Wireless QoS from the navigation tree, click Client Rate Limit, and
click Add to enter the page for configuring rate limit settings for clients, as shown in Figure 138.
Figure 138 Configure static rate limiting
Click Apply.
Client 1 and Client 2 access the WLAN through an SSID named service1.
Check that traffic from Client 1 is rate limited to around 128 kbps, so is traffic from Client 2.
Configuration procedure
1.
For the configuration procedure, see Wireless access configuration examples. You can strictly follow
the related configuration example to configure the wireless service.
149
2.
Select Interface Setup > Wireless > Wireless QoS from the navigation tree, click Client Rate Limit, and
click Add to enter the page for configuring rate limit settings for clients, as shown in Figure 140.
Figure 140 Configure dynamic rate limiting
Click Apply.
When only Client 1 accesses the WLAN through SSID service2, its traffic can pass through at a
rate as high as 8000 kbps.
2.
When both Client 1 and Client 2 access the WLAN through SSID service2, their traffic flows can
each pass through at a rate as high as 4000 kbps.
150
Advanced configuration
District code
Radio frequencies for countries and regions vary based on country regulations. A district code
determines characteristics such as frequency range, channel, and transmit power level. Configure the
valid country code or area code for a WLAN device to meet the specific country regulations.
Description
Select a district code.
District Code
NOTE:
If the drop-down list is grayed out, the setting is preconfigured to meet the requirements of the target
market and is locked. It cannot be changed.
Support for district code depends on your device model.
151
Click the
icon of a target AP to enter channel busy testing page, as shown in Figure 143.
Description
Radio Unit
Radio Mode
152
Item
Test time per channel
Description
Set a time period in seconds within which a channel is tested.
Defaults to 3 seconds.
153
3G management
Overview
You can connect a router to a 3G modem via the USB interface on the main board of the router. After
connected to an external UIM card, the 3G modem can access the wireless network provided by China
Telecom and carry out 3G wireless communications.
The router supports 3G modems provided by different venders. As a peripheral, the 3G modem is not a
part of the router. However, you can maintain and manage the 3G modem through the Web interface
of the router.
Table 81, Table 82 and Table 83 describe the 3G modem information, UIM card information, and 3G
network information, respectively.
154
Description
State of the 3G modem, which can be
3G Modem State
Manufacturer
CMII ID
Serial Number
Hardware Version
Firmware Version
PRL Version
Description
State of the UIM card, which can be
UIM Card
State
Absent
Being initialized
Fault
Destructed
PIN code protection is disabled.
PIN code protection is enabled. Enter the PIN code for authentication.
PIN code protection is enabled, and the PIN code has passed the authentication.
The PIN code has been blocked. Enter the PUK code to unblock it.
IMSI
Voltage
Description
Mobile Network
Network Type
RSSI
No Service
CDMA
HDR
CDMA/HDR HYBRID
Unknown
CAUTION:
If the PIN code is entered incorrectly many times that exceed the maximum attempts allowed by the
device, the PIN code is blocked. To unblock the PIN code, you must enter the correct PUK code.
If the PUK code is entered incorrectly many times that exceed the maximum attempts allowed by the
device, the UIM card is destructed. Be cautious when entering the PUK code.
Select 3G > PIN Code Management from the navigation tree to enter the PIN code management page.
The PIN code allows you to perform different operations depending on the UIM card status.
When the PIN code protection is disabled for the UIM card
Figure 146 shows the PIN code management page in the case that the PIN code protection for the UIM
card is disabled. To enable the PIN code protection, type the PIN code correctly and click Apply. A pin
code comprises of four to eight figures.
Figure 146 PIN code management page II
When the UIM card has passed the PIN code authentication
Figure 148 shows the PIN code management page in the case that the UIM card has passed the PIN
code authentication. You can do the following operations:
156
In the Disable PIN Code Protection field, type the PIN code correctly and click Apply to disable the
PIN code protection for the UIM card.
In the PIN Code Modification field, type the current PIN code correctly and the new PIN code twice,
and then click Apply to modify the current PIN code.
When the PUK code needs to be entered to unblock the PIN code of the UIM card
Figure 149 shows the PIN code management page in the case that the PIN code of the UIM card has
been locked and the PUK code needs to be entered. To unblock the PIN code of the UIM card and set
a new PIN code, enter the PUK code correctly and the new PIN code twice, and then click Apply.
Figure 149 PIN code management page V
157
NAT configuration
You can do the following to configure NAT on the web interface:
Overview
Network Address Translation (NAT) provides a way of translating an IP address to another IP address for
a packet. In practice, NAT is primarily used to allow private hosts to access public networks. With NAT,
a few public IP addresses are used to translate a large number of internal IP addresses, effectively solving
the IP address depletion problem.
NOTE:
For more information about NAT, see the H3C MSR Series Routers Layer 3IP Services Configuration
Guide.
Configuring NAT
Configuration overview
Table 84 NAT configuration task list
Task
Remarks
158
Task
Remarks
Optional
Limit the number of connections from a source IP address.
Description
Interface
Interface Address: In this mode, the NAT gateway directly uses an interfaces public
Translation Mode
IP address as the translated IP address. You do not need to configure any address
pool for this mode.
PAT: In this mode, both IP addresses and port numbers of packets are translated. You
need to configure an address pool for this mode.
No-PAT: In this mode, only IP addresses of packets are translated. You need to
configure an address pool for this mode.
159
Item
Description
Specify the start and the end IP addresses for the NAT address pool.
The start IP address must be lower than the end IP address. If the end IP address and the
start IP address are the same, you specify only one IP address.
Start IP Address
End IP Address
IMPORTANT:
Only one translation mode can be selected for the same address pool.
NAT address pools used by some device models cannot be those used by other
address translation policies, IP addresses of interfaces with Easy IP enabled, or
external IP addresses of internal servers.
Select NAT Configuration > NAT Configuration from the navigation tree, and click the DMZ HOST tab to
enter the page as shown in Figure 151.
Figure 151 Create a DMZ host
Description
Host IP Address
Global IP Address
Select NAT Configuration > NAT Configuration from the navigation tree, and click the DMZ HOST tab to
enter the page as shown in Figure 152. You can enable or disable the DMZ host on interfaces.
The icon indicates that the DMZ host is disabled on the corresponding interface. Click the Enable
link next to the interface to enable DMZ host on the interface.
The icon indicates that DMZ host is enabled on the corresponding interface. Click the Disable
link next to the interface to disable the DMZ host on the interface.
160
161
Description
Interface
Protocol
Global IP Address
Global Port
Select Other and then type a port number. If you type 0, all types of services are
provided. That is, only a static binding between the external IP address and the
internal IP address is established.
Select a service and the corresponding port number is provided. You cannot modify
the port number displayed.
Host IP Address
162
Item
Description
Internal port number for the internal server.
From the drop-down list, you can:
Host Port
Select Other and then type a port number. If you type 0, all types of services are
provided. That is, only a static binding between the external IP address and the
internal IP address is created.
Select a service and the corresponding port number is provided. You cannot modify
the port number displayed.
Description
Protocol Type
Enable/disable checking the specified application layer protocol(s), including DNS, FTP,
PPTP, NBT, ILS, H.323, and SIP.
163
Description
Max Connections
Set the maximum number of connections that can be initiated from a source IP
address.
The internal users can access the Internet by using public addresses 202.38.1.2 and 202.38.1.3.
Configure the upper limit of connections as 1000 based on the source IP address.
164
Configuration procedure
Configure the IP address of each interface. (Omitted)
# Configure dynamic NAT on Ethernet 0/2.
Select NAT Configuration > NAT Configuration to enter the dynamic NAT configuration page, as
shown in Figure 157.
Click Apply.
Click the Connection Limit tab to enter the connection limit configuration page, as shown in Figure
158.
165
Click Apply.
202.38.1.1 is used as the public IP address for the internal servers and port number 8080 is used
for Web server 2.
10.110.10.2/16
Web server 1
Web server 2
Eth0/1
10.110.10.10/16
Eth0/2
202.38.1.1/24
Internet
Host
Router
FTP server
10.110.10.3/16
Configuration procedure
# Configure the FTP server.
Select NAT Configuration > NAT Configuration from the navigation tree and click the Internal
Server tab to enter the internal server configuration page, as shown in Figure 160.
166
Click on the radio button next to the text box in the Global IP Address filed, and then type
202.38.1.1.
Click Apply.
167
As shown in Figure 161, select Ethernet0/2 from the Interface drop-down list.
Click on the radio button next to the text box in the Global IP Address filed, and then type
202.38.1.1.
Click Apply.
168
As shown in Figure 162, select Ethernet0/2 from the Interface drop-down list.
Click on the radio button next to the text box in the Global IP Address filed, and then type
202.38.1.1.
Click Apply.
169
Access control
Access control overview
Access control allows you to control access to the Internet from the LAN by setting the time range, IP
addresses of computers in the LAN, port range, and protocol type. All data packets matching these
criteria will be denied to access the Internet.
Up to ten access control policies can be configured and they are matched in ascending order of
sequence number. The comparison stops immediately after one match is found.
NOTE:
The ten access control policies correspond to ACL 3980 through 3989 respectively in ascending order of
sequence number. Modifying these ACLs may impact the corresponding access control policies.
Access control is effective to only the outgoing direction of WAN interfaces.
170
Description
Begin-End Time
Week
IMPORTANT:
Set both types of time ranges or set neither
of them. To set neither of them, make sure
the Begin-End Time is 00:00 - 00:00 and
no days of a week are selected. Setting
neither of them means take effect all the
time.
Specify to control accesses based on the protocol used for data transmission.
Protocol
Source IP Address
Destination Port
Configure the IP address range of computers. To control a single IP address, type the
address in the two text boxes.
Set the port range to be filtered.
For example, to control Telnet access, type 23 in the two text boxes.
Action to be taken for matching packets.
Operation
The action is Deny, which means all packets matching the access control policies are
not allowed to pass.
171
Port number
FTP
TCP
21
Telnet
TCP
23
TFTP
UDP
69
Web
TCP
80
Host A to Host C cannot access the Internet from 09:00 to 18:00 every Monday to Friday and can
access the Internet for all the rest of time.
Internet
Eth0/1
Router
Host A
10.1.1.1
Host B
10.1.1.2
Host C
10.1.1.3
Host D
10.1.1.4
Configuration procedure
# Configure an access control policy to prohibit Host A to Host C from accessing the Internet during work
time.
Select Security Setup > Access from the navigation tree and then perform the configurations shown in
Figure 165.
172
Click Apply.
173
URL filtering
URL filtering overview
The URL filtering function allows you to deny access to certain Internet web pages from the LAN by setting
keywords and URL addresses.
NOTE:
The URL filtering function applies to only the outbound direction of WAN interfaces.
174
Description
URL
Keyword
Import
filter list
file
File Name
IMPORTANT:
The URL and keyword are in OR relation.
When both are configured, the system
generates two URL filtering conditions.
If the Import filter list file check box is selected, you can import filtering rules from a
file.
Specify the name and path of the file in the local host from which you obtain the file.
For description of the content format of filter list files, see Figure 167.
175
Eth0/1
Router
Configuration procedure
# Configure the URL filtering function.
Select Security Setup > URL Filter from the navigation tree. Click Add and then perform the
following configurations, as shown in Figure 169.
176
Select the check box before URL and then type www.webflt.com in the textbox.
Click Apply.
177
Description
Select a MAC address filtering type:
Deny access to the Internet: Enables MAC address filtering to deny the hosts whose
MAC addresses are on the MAC address list below from accessing the network
through the device.
IMPORTANT:
A MAC address list will be displayed at the lower part of the page after you select Permit
access to the Internet or Deny access to the Internet.
178
179
Description
Type the MAC addresses to be filtered or select them from the learned
MAC addresses list.
NOTE:
If you select Permit access to the Internet or Deny access to the Internet as the filtering type, the selected
filtering type will take effect as long as you add the MAC addresses for this type, no matter whether or not
you click Apply at the filtering type configuration area on the MAC Address Filtering page.
Eth0/1
Router
000d-88f8-0dd7
192.168.1.17
000d-88f7-b8d6
192.168.1.18
Configuration procedure
# Configure the MAC address filtering function.
Select Security Setup > MAC Address Filtering from the navigation tree and then perform the
following configurations, as shown in Figure 174.
180
Click Add and then perform the following configurations, as shown in Figure 175.
Figure 175 Specify the MAC addresses to be denied access to the Internet
Select 000d-88f8-0dd7 and 000d-88f7-b8d6 from the Learned MAC Addresses list, and then click
the << button to add them to the Selected MAC Addresses list.
Click Apply.
181
Attack protection
Complete the following tasks to configure attack protection functions in the web interface:
Blacklist function
The blacklist function is an attack protection measure that filters packets by source IP address. Compared
with Access Control List (ACL) packet filtering, blacklist filtering is simpler in matching packets and
therefore can filer packets at a high speed. Blacklist filtering is very effective in filtering packets from
certain IP addresses.
One outstanding benefit of the blacklist function is that it allows the device to add and delete blacklist
entries dynamically. This is done by working in conjunction with the scanning attack protection function.
When the device detects a scanning attack according to the packet behavior, it adds the IP address of
the attacker to the blacklist. Thus, packets from the IP address will be filtered. Blacklist entries added
dynamically will be aged in a specified period of time.
The blacklist function also allows you to add and delete blacklist entries manually. Blacklist entries added
manually can be permanent blacklist entries or non-permanent blacklist entries. A permanent entry will
always exist in the blacklist unless you delete it manually. You can configure the aging time of a
non-permanent entry. After the timer expires, the device automatically deletes the blacklist entry, allowing
packets from the corresponding IP address to pass.
The device can defend against two categories of network attacks: single-packet attacks and abnormal
traffic, and the later fall into two sub-categories: scanning attacks and flood attacks, according to attack
characteristics.
The attacker sends defective IP packets, such as overlapping IP fragments and packets with illegal
TCP flags, to a target system so that the target system malfunctions or crashes when processing such
packets.
The attacker sends large quantities of such packets to the network to use up the network bandwidth.
182
Table 95 lists the types of single-packet attacks that can be prevented by the device.
Table 95 Types of single-packet attacks
Single-packet attack
Description
Fraggle
A Fraggle attacker sends large amounts of UDP echo packets (with the UDP port
number of 7) or Chargen packets (with the UDP port number of 19) to a subnet
broadcast address. This will cause a large quantity of responses in the network, using
up the network bandwidth of the subnet or crashing the target host.
LAND
A LAND attacker forges large amounts of TCP SYN packets with both the source
address and destination address being the IP address of the target, causing the target
to send SYN ACK messages to itself and establish half-open connections as a result.
In this way, the attacker may deplete the half-open connection resources of the target,
making it unable to work normally.
WinNuke
A WinNuke attacker sends Out-of-Band (OOB) data packets to the NetBIOS port
(139) of a target running a Windows system. The pointer fields of these attack packets
are overlapped, resulting in NetBIOS fragment overlaps. This will cause the target
host that has established TCP connections with other hosts to crash when it processes
these NetBIOS fragments.
TCP Flag
Different operating systems process abnormal TCP flags differently. The attacker
sends TCP packets with abnormal TCP flags to the target host to probe its operating
system. If the operating system cannot process such packets properly, the host will
crash down.
ICMP Unreachable
Upon receiving an ICMP unreachable packet, some systems conclude that the
destination is unreachable and drop all subsequent packets destined for the
destination. By sending ICMP unreachable packets, an attacker can cut off the
connection between the target host and the network.
ICMP Redirect
Tracert
The Tracert program usually sends UDP packets with a large destination port number
and an increasing TTL (starting from 1). The TTL of a packet is decreased by 1 when
the packet passes each router. Upon receiving a packet with a TTL of 0, a router sends
an ICMP time exceeded message back to the source IP address of the packet. A
Tracert attacker exploits the Tracert program to figure out the network topology.
Smurf
A Smurf attacker sends ICMP echo requests to the broadcast address of the target
network. As a result, all hosts on the target network will reply to the requests, causing
the network congested and hosts on the target network unable to provide services.
Source Route
A Source Route attacker probes the network structure through the Source Route option
in IP packets.
Route Record
A Route Record attacker probes the network structure through the Record Route option
in IP packets.
Large ICMP
For some hosts and devices, large ICMP packets will cause memory allocation error
and thus crash down the protocol stack. An attacker can make a target crash down by
sending large ICMP packets to it.
The single-packet attack protection function takes effect to only incoming packets. It analyzes the
characteristics of incoming packets to determine whether the packets are offensive and, if they are
offensive, logs the events and discards the packets. For example, if the length of an ICMP packet reaches
183
or exceeds 4000 bytes, the device considers the packet a large ICMP attack packet, outputs a warning
log, and discards the packet.
Because of the limited resources, the TCP/IP stack permits only a limited number of TCP connections. A
SYN flood attacker sends a great quantity of SYN packets to a target server, using a forged address as
the source address. After receiving the SYN packets, the server replies with SYN ACK packets. As the
destination address of the SYN ACK packets is unreachable, the server can never receive the expected
ACK packets, resulting in large amounts of half-open connections. In this way, the attacker exhausts the
system resources, making the server unable to service normal clients.
An ICMP flood attacker sends a large number of ICMP requests to the target in a short time by, for
example, using the ping program, causing the target too busy to process normal services.
A UDP flood attacker sends a large number of UDP messages to the target in a short time, so that the
target gets too busy to process normal services.
The flood attack protection function takes effect to only outgoing packets. It is mainly used to protect
servers. It monitors the connection establishment rate and number of half-open connections of a server.
If the rate reaches or exceeds 1000 connections per second or the number of half-open connections
reaches or exceeds 10000 (only SYN flood attack protection supports restriction of half-open
connections), it logs the event, and discards subsequent connection requests to the server.
Remarks
Required
By default, the blacklist function is disabled.
184
Task
Remarks
Required
Optional
185
Description
IP Address
Hold Time
Configure the entry as a non-permanent entry and specify the hold time of the
blacklist entry.
Permanence
Description
IP Address
Manual: The entry was added manually or has been modified after being
added automatically.
Add Method
Start Time
Hold Time
Duration for which the blacklist entry will be held in the blacklist.
Dropped Count
Number of packets matching the blacklist entry and therefore dropped by the
device
186
187
188
Router denies packets from Host C for 50 minutes for temporary access control of Host C.
Router provides scanning attack protection and automatically adds detected attackers to the
blacklist.
Configuration procedure
# Configure IP addresses for the interfaces (omitted).
# Enable the blacklist function.
Select Security Setup > Attack Defend > Blacklist from the navigation tree, and then perform the
following configurations, as shown in Figure 182.
189
Click Apply.
Click Add and then perform the following configurations, as shown in Figure 183:
Click Apply.
Click Add and then perform the following configurations, as shown in Figure 184:
190
Select Hold Time and set the hold time of this blacklist entry to 50 minutes.
Click Apply.
# Configure intrusion detection: Enable scanning attack protection, and enable blacklist function for it;
enable Land attack protection and Smurf attack protection.
Select Security Setup > Attack Defend > Intrusion Detection from the navigation tree and then
perform the following configurations, as shown in Figure 185.
191
Select Enable Land Attack Detection, Enable Smurf Attack Detection, Enable Scanning Attack
Detection, and Add Source IP Address to the Blacklist. Leave all other options unselected.
Click Apply.
Verification
Select Security Setup > Attack Defend > Blacklist. Host D and Host C are in the blacklist.
Router drops all packets from Host D unless you remove Host D from the blacklist.
Router drops packets from Host C within 50 minutes. Then, Router forwards packets from Host C
normally.
Upon detecting the scanning attack, Router outputs an alarm log and adds the IP address of the
attacker to the blacklist. You can view the added blacklist entry by selecting Security Setup > Attack
Defend > Blacklist.
Upon detecting the Land or Smurf attack, Router outputs an alarm log and drops the attack packet.
Router denies packets from Host C for 50 minutes for temporary access control of Host C.
Router provides scanning attack protection and automatically adds detected attackers to the
blacklist on interface Ethernet 0/2, the interface connecting the Internet.
Router provides Land attack protection and Smurf attack protection on Ethernet 0/2.
Configuration procedure
# Configure IP addresses for the interfaces (omitted).
# Enable the blacklist function.
Select Security Setup > Attack Defend > Blacklist from the navigation tree, and then perform the
following configurations, as shown in Figure 187.
192
Click Apply.
Click Add and then perform the following configurations, as shown in Figure 188:
Click Apply.
Click Add and then perform the following configurations, as shown in Figure 189:
193
Select Hold Time and set the hold time of this blacklist entry to 50 minutes.
Click Apply.
# Configure intrusion detection on Ethernet 0/2: Enable scanning attack protection, and enable blacklist
function for it; enable Land attack protection and Smurf attack protection.
Select Security Setup > Attack Defend > Intrusion Detection from the navigation tree. Click Add and
then perform the following configurations, as shown in Figure 190.
194
Select Enable Land Attack Detection, Enable Smurf Attack Detection, Enable Scanning Attack
Detection, and Add Source IP Address to the Blacklist. Leave all other options unselected.
Click Apply.
Verification
Select Security Setup > Attack Defend > Blacklist. Host D and Host C are in the blacklist.
Router drops all packets from Host D unless you remove Host D from the blacklist.
Router drops packets from Host C within 50 minutes. Then, Router forwards packets from Host C
normally.
Upon detecting the scanning attack on Ethernet 0/2, Router outputs an alarm log and adds the IP
address of the attacker to the blacklist. You can view the added blacklist entry by selecting Security
Setup > Attack Defend > Blacklist.
Upon detecting the Land or Smurf attack on Ethernet 0/2, Router outputs an alarm log and drops
the attack packet.
195
Application control
Complete the following tasks to configure application control in the web interface:
Loading applications
Remarks
Optional
Loading applications
Load the signature file that contains the application control rules to the
device.
IMPORTANT:
If you perform this configuration for multiple times, only the last file
loaded to the device takes effect.
Optional
Add a custom application and configure the match rules.
Required
Loading applications
Select Security Setup > Application Control from the navigation tree, and then select the Load
Application tab to enter the page for loading applications, as shown in Figure 191.
196
To load an application control file from the device, select From Device, select the application control
file, and then click Apply.
To load an application control file from the local host to the device, select From Local, click Browse
to find the file, and then click Apply.
After the file is loaded to the device successfully, all the loaded applications will be displayed at the
lower part of the page.
Figure 191 Load applications
197
Description
Application Name
Protocol
Specify the protocol to be used for transferring packets, including TCP, UDP, and All.
All means all IP carried protocols.
IP Address
Match Rule
Port
Start Port
If you do not want to limit port numbers, leave the match rule unselected. In this
case, you do not need to enter the start port and end port.
End Port
If you want to limit a range of ports, select Range for the match rule, and then enter
the start port and end port to specify the port range.
If you select other options of the match rule, you just need to enter the start port.
Return to Application control task list.
198
Eth0/1
Router
Configuration procedure
# Load the application control file (assume that signature file p2p_default.mtd, which can prevent using
of MSN, is stored on the device).
Select Security Setup > Application Control from the navigation tree, and then select the Load
Application tab and perform the following configurations, as shown in Figure 196.
199
Select the radio button before From Device, select file p2p_default.
Click the Application Control tab and then perform the following configurations, as shown in Figure
198.
200
Click Apply.
201
202
Description
Interface
Redirection URL
Type the address of the web page to be displayed, that is, the URL to which the web
access request is redirected. For example, http://192.0.0.1.
Interval
203
Route configuration
NOTE:
The term router in this document refers to both routers and Layer 3 switches.
This chapter mainly describes IPv4 route configuration.
You can perform the following route configurations through the web interface:
Overview
Upon receiving a packet, a router determines the optimal route based on the destination address and
forwards the packet to the next router in the path. When the packet reaches the last router, it then
forwards the packet to the destination host.
Routing provides the path information that guides the forwarding of packets.
A router selects optimal routes from the routing table, and sends them to the forwarding information base
(FIB) table to guide packet forwarding. Each router maintains a routing table and a FIB table.
You can manually configure routes. Such routes are called static routes.
NOTE:
For more information about the routing table and static routes, see the H3C MSR Series Routers Layer
Route configuration
Creating an IPv4 static route
Select Advanced > Route Setup from the navigation tree and then click the Create tab to enter the static
route configuration page, as shown in Figure 201.
204
Description
Destination IP Address
Mask
Preference
Next Hop
Description
Destination IP Address
Mask
Protocol
Preference
Next Hop
Interface
206
Configuration considerations
1.
2.
On Router B, configure one static route with Router A as the next hop and the other with Router C
as the next hop.
3.
Configuration procedure
1.
2.
Select Advanced > Route Setup from the navigation tree of Router A, and then click the Create tab
to perform the following settings on the page as shown in Figure 204.
Click Apply.
207
The newly created static route will be listed at the lower part of the page.
# Configure two static routes on Router B.
Select Advanced > Route Setup from the navigation tree of Router B, and then click the Create tab
to perform the following settings on the page as shown in Figure 204.
Click Apply.
Click Apply.
The newly created static route will be listed at the lower part of the page.
# Configure a default route on Router C.
Select Advanced > Route Setup from the navigation tree or Router C, and then click the Create tab
to perform the following settings on the page as shown in Figure 204.
Click Apply.
The newly created static route will be listed at the lower part of the page.
3.
As shown in Figure 203, configure the IP addresses of the hosts and configure the default gateways of
Host A, B, and C as 1.1.2.3, 1.1.6.1, and 1.1.3.1 respectively. The detailed configuration steps are not
covered.
Configuration verification
# Display the active route table.
208
From the navigation tree of Router A, Router B, and Router C respectively, select Advanced > Route Setup
to display the Summary tab. Verify that the newly created static routes are displayed in the active route
table.
# Ping Host A from Host B (assuming both hosts run Windows XP).
C:\Documents and Settings\Administrator>ping 1.1.2.2
<1 ms
<1 ms
<1 ms
1.1.6.1
<1 ms
<1 ms
<1 ms
1.1.4.1
1 ms
<1 ms
<1 ms
1.1.2.2
Trace complete.
Precautions
1.
If you do not specify the preference when configuring a static route, the default preference will be
used. Reconfiguration of the default preference applies only to newly created static routes.
Currently, the Web interface does not support configuration of the default preference.
2.
When configuring a static route, the static route does not take effect if you specify the next hop
address first and then configure it as the IP address of a local interface, such as an Ethernet
interface and VLAN interface.
3.
If Null 0 or a loopback interface is specified as the output interface, there is no need to configure
the next hop.
If a point-to-point interface is specified as the output interface, you do not need to specify the next
hop, and there is no need to change the configuration after the peer address has changed. For
example, a PPP interface obtains the peers IP address through PPP negotiation, and therefore you
only need to specify it as the output interface.
If the output interface is an NBMA or P2MP interface, which supports point-to-multipoint networks,
the IP address-to-link layer address mapping must be established. H3C recommends specifying the
next hop when you configure it as the output interface.
209
If you want to specify a broadcast interface (such as an Ethernet interface, virtual template, or VLAN
interface) as the output interface, which can have multiple next hops, you must specify the next hop
at the same time.
210
Overview
A routing protocol can have multiple equal-cost routes to the same destination. These routes have the
same preference and will all be used to accomplish load sharing if no route with a higher preference is
available.
The device supports user-based load sharing based on the user information (source IP addresses) of
packets.
Description
Interface
Status of
user-based-sharing
Item
Description
Set the bandwidth of the interface.
Bandwidth
The load ratio of each interface is calculated based on the bandwidth of each
interface. For example, if the bandwidth of Ethernet 0/0 is set to 200 kbps, and that
of Ethernet 0/1 is set to 100 kbps, then the load ratio is 2:1.
212
Traffic ordering
You can do the following to configure traffic ordering on the web interface:
Overview
When multiple packet flows (classified by their source addresses) are received or sent by a device, you
can configure IP traffic ordering on the device to collect statistics of the flows in the inbound/outbound
direction and then rank the statistics. The network administrator can use the traffic ordering statistics to
analyze the network usage for network management.
An interface can be specified as an external or internal interface to collect traffic statistics:
An internal interface collects both inbound and outbound traffic statistics, including total traffic
statistics, total inbound/outbound traffic statistics, inbound/outbound TCP packet statistics,
inbound/outbound UDP packet statistics, and inbound/outbound ICMP packet statistics.
Remarks
Optional
The default traffic ordering interval is 10 seconds.
Required
Optional
You can view the traffic ordering statistics of internal or
external interfaces.
213
Click Internal interface to set the interface(s) as the internal interface(s) to collect traffic statistics.
Click External interface to set the interface(s) as the external interface(s) to collect traffic statistics.
Click Disable statistics collecting to disable the interface(s) from collecting traffic statistics.
215
DNS configuration
You can do the following to configure DNS on the web interface:
DNS overview
Domain Name System (DNS) is a distributed database that provides TCP/IP applications with the
mappings between host names and IP addresses. With DNS, you can use easy-to-remember host names
in some applications and let the DNS server translate them into correct IP addresses.
NOTE:
For more information about DNS, see the H3C MSR Series Routers Layer 3IP Services Configuration
Guide.
DNS proxy: Forwards DNS requests and replies between the DNS client and DNS server.
Configuring DNS
Configuration overview
Configuring dynamic domain name resolution
Table 106 describes the recommended configuration procedures.
Table 106 Dynamic domain name resolution configuration task list
Task
Remarks
Required
Enable dynamic domain name resolution.
Disabled by default.
Required
Not specified by default.
216
Task
Remarks
Optional
A suffix is used when the name to be resolved is
incomplete. The system can supply the missing part.
For example, a user can configure com as the suffix for
aabbcc.com. The user only needs to type aabbcc to
obtain the IP address of aabbcc.com because the
system adds the suffix and delimiter before passing
the name to the DNS server.
Remarks
Required
217
218
Description
Description
As shown in Figure 213, Router B serves as a DNS client and Router A is specified as a DNS server.
Dynamic domain name resolution and the domain name suffix are configured on Router B, and thus
Router B can use domain name host to access the host with the domain name host.com and the IP
address 3.1.1.1/24.
Router A serves as the DNS proxy. The IP address of the actual DNS server is 4.1.1.1/24.
219
4.1.1.1/24
DNS server
Router A
DNS proxy
2.1.1.1/24
2.1.1.2/24
1.1.1.1/24
IP network
3.1.1.1/24
host.com
Host
Configuration procedure
NOTE:
Before performing the following configuration, make sure that the device and the host are routable to
each other, and the IP addresses of the interfaces are configured as shown in Figure 213.
This configuration may vary with different DNS servers. The following configuration is performed on a
PC running Windows server 2000.
1.
220
In Figure 215, right click zone com. and then select New host to bring up a dialog box as shown in Figure
216. Enter host name host and IP address 3.1.1.1.
221
2.
Select Advanced > DNS Setup > DNS Configuration from the navigation tree to enter the
configuration page, as shown in Figure 217.
Click Apply.
222
Click Apply.
3.
Select Advanced > DNS Setup > DNS Configuration from the navigation tree to enter the
configuration page, as shown in Figure 219.
Click Apply.
223
Click Apply.
Click Apply.
Configuration verification
Select Other > Diagnostic Tools from the navigation tree and click the Ping tab. Use the ping host
command to verify that the communication between Router B and the host is normal and that the
corresponding destination IP address is 3.1.1.1.
224
DDNS configuration
DDNS overview
Although DNS allows you to access nodes in networks using their domain names, it provides only the
static mappings between domain names and IP addresses. When you use the domain name to access
a node whose IP address has changed, your access will fail because DNS leads you to the IP address
that is no longer where the node resides.
Dynamic Domain Name System (DDNS) can dynamically update the mappings between domain names
and IP addresses for DNS servers to direct you to the latest IP address corresponding to a domain name.
Figure 222 DDNS networking application
As shown in Figure 222, DDNS works on the client-server model comprising the DDNS client and the
DDNS server.
DDNS client: A device that needs to update the mapping between the domain name and the IP
address dynamically. An Internet user usually uses the domain name to access an application layer
server such as an HTTP and FTP server. When its IP address changes, the application layer server
runs as a DDNS client that sends a request to the DDNS server for updating the mapping between
the domain name and the IP address.
DDNS server: Informs the DNS server of latest mappings. When receiving the mapping update
request from a DDNS client, the DDNS server tells the DNS server to re-map between the domain
name and IP address of the DDNS client. Therefore, the Internet users can use the same domain
name to access the DDNS client even if the IP address of the DDNS client has changed.
NOTE:
The DDNS update process does not have a unified standard and depends on the DDNS server that the
DDNS client contacts. The well-known DDNS service providers include www.3322.org, www.oray.cn
(also known as the PeanutHull server), and www.dyndns.com.
With the DDNS client configured, a device can dynamically update the latest mapping between its
domain name and IP address on the DNS server through a DDNS server at www.3322.org or
www.oray.cn for example.
225
Configuration prerequisites
Visit the website of a DDNS service provider, register an account, and apply for a domain name for
the DDNS client.
Specify the primary IP address of the interface and make sure that the DDNS server and the
interface can reach each other.
Configure static or dynamic domain name resolution to translate the domain name of the DDNS
server into its IP address.
Configuration procedure
Select Advanced > DNS Setup > DDNS Configuration from the navigation tree to enter the DDNS page,
as shown in Figure 223. Click Add to configure a DDNS entry, as shown in Figure 223.
Figure 223 DDNS configuration page
Description
Domain Name
Specify the DDNS entry name, which is the only identifier of the DDNS entry.
Server
Server Provider
226
Item
Description
Settings
Specify the server name of the DDNS server for domain name resolution.
IMPORTANT:
Server Name
After the server provider is selected, the DDNS server name appears
automatically. For example, if the server provider is 3322.org, the server name is
members.3322.org; if the server provider is PeanutHull, the server name is
phservice2.oray.net. H3C recommmends you not to change the server name of
server provider 3322.org, but you can use the server name, such as
phservice2.oray.net, phddns60.oray.net, client.oray.net, or ph031.orat.net for
server provider PeanutHull.
Specify the interval for sending DDNS update requests after DDNS update is
enabled.
IMPORTANT:
of the interface changes or the link state of the interface changes from down
to up, no matter whether the interval is reached.
If you specify the interval as 0, your device will not periodically initiate any
DDNS update request, but will initiate a DDNS update request when the
primary IP address of the interface is changed or the link state of the interface
changes from down to up.
Account
Settings
Username
Password
Associated
Interface
The IP address in the host name-to-IP address mapping for update is the primary
IP address of the interface.
IMPORTANT:
You can bind up to four DDNS entries to an interface.
Other
Settings
Specify the Full Qualified Domain Name (FQDN) in the IP-to-FQDN mapping for
update.
As shown in Figure 225, Router is a Web server with the domain name whatever.3322.org.
Router acquires an IP address through DHCP. Through DDNS service provided by www.3322.org,
Router informs the DNS server of the latest mapping between its domain name and IP address.
The IP address of the DNS server is 1.1.1.1. Router uses the DNS server to translate www.3322.org
into the corresponding IP address.
227
Configuration procedure
NOTE:
Before configuring DDNS on Router, register at http://www.3322.org/ (username Steven and
password nevets in this example), add Router's host name-to-IP address mapping to the DNS server, and
make sure that the devices are reachable to each other.
# Enable dynamic domain name resolution and set the IP address of the DNS server to 1.1.1.1 (omitted).
# Configure DDNS.
Select Advanced > DNS Setup > DDNS Configuration from the navigation tree, and then click Add
to enter the page, as shown in Figure 226.
Click Apply.
After the preceding configuration is completed, Router will notify the DNS server of its new domain
name-to-IP address mapping through the DDNS server provided by www.3322.org whenever its IP
address changes. Therefore, Router can always provide Web service at whatever.3322.org.
229
DHCP configuration
You can do the following to configure DHCP on the web interface:
Enabling DHCP
Introduction to DHCP
The Dynamic Host Configuration Protocol (DHCP) provides a framework to assign configuration
information to network devices.
DHCP uses the client/server model. Figure 227 shows a typical DHCP application.
Figure 227 A typical DHCP application
A DHCP client can obtain an IP address and other configuration parameters from a DHCP server on
another subnet via a DHCP relay agent, as shown in Figure 228.
230
DHCP client
IP network
DHCP relay agent
DHCP client
DHCP client
DHCP server
NOTE:
For more information about DHCP, see the H3C MSR Series Routers Layer 3IP Services Configuration
Guide.
Configuring DHCP
Configuration overview
Configuring the DHCP server
Perform the tasks in Table 111 to configure the DHCP sever.
Table 111 DHCP server configuration task list
Task
Remarks
Required
Enabling DHCP
IMPORTANT:
At present, the DHCP server configuration is supported only on a Layer
3 Ethernet interface (or subinterface), virtual Ethernet interface, VLAN
interface, Layer 3 aggregate interface, serial interface, ATM interface,
MP-group interface, or loopback interface.
Required
An address pool can be either static or dynamic, but not both.
IMPORTANT:
231
Task
Configuring a dynamic address pool for
the DHCP server
Remarks
When a DHCP client tries to obtain an IP address through a DHCP
relay agent, an IP address pool on the same network segment as the
DHCP relay agent interface must be configured. Otherwise, the DHCP
client will fail to obtain an IP address.
Optional
Exclude IP addresses from automatic allocation in the DHCP address
pool.
Remarks
Required
Enabling DHCP
IMPORTANT:
232
Remarks
Required
For detailed configuration, see Configuring DHCP interface
setup.
Enabling DHCP
Select Advanced > DHCP Setup from the navigation tree to enter the default DHCP Enable page as shown
in Figure 229.
Figure 229 DHCP Enable
Description
DHCP
233
Description
Interface
None: Upon receiving a DHCP request, the interface does not assign an IP
address to the requesting client nor serves as a DHCP relay agent to forward
the request.
Type
Server: Upon receiving a DHCP request, the interface assigns the requesting
client an IP address from the address pool.
Relay: Upon receiving a DHCP request, the interface forwards the request to
an external DHCP server, which will assign an IP address for the requesting
client.
You can correlate a DHCP server group with multiple interfaces and make sure
that you already add DHCP server groups for selection.
234
Figure 231 Static address pool setup for the DHCP server
Description
Pool Name
Address Allocation
Mode: Static Binding
Specify the static address allocation mode for the DHCP address pool.
IP Address
IP address and its subnet mask of the static binding. A natural mask is adopted if no
subnet mask is specified.
IMPORTANT:
Subnet Mask
It cannot be the IP address of the DHCP server interface; otherwise, IP address conflicts
may occur, and the client cannot obtain the IP address.
235
Item
Description
MAC Address
Domain Name
After specifying a domain name in the address pool, the DHCP server assigns the
domain name along with an IP address to a client.
Specify a gateway for the DHCP client.
Gateway IP Address
DHCP clients that want to access hosts outside the local subnet needs a gateway to
forward data. After specifying a gateway in the address pool, the DHCP server
assigns the gateway address along with an IP address to a client.
Specify a primary DNS server for the DHCP client.
In order for clients to access the Internet using a domain name, the DHCP server
assigns the specified DNS server address along with an IP address to a client.
236
Figure 232 Dynamic address pool setup for the DHCP server
Description
Pool Name
Specify the dynamic address allocation mode for the DHCP address pool.
IP Address
Subnet Mask
Make sure the IP address is on the same network segment as the IP address of
the DHCP server interface or the DHCP relay agent interface to avoid wrong IP
address allocation.
237
Item
Description
Specify the lease for IP addresses to be assigned.
NOTE:
Lease Duration
If the lease has an end time specified later than the year 2106, the system
considers it an expired lease.
After specifying a domain name in the address pool, the DHCP server assigns
the domain name along with an IP address to a client.
Specify a gateway for the DHCP client.
Gateway IP Address
DHCP clients that want to access hosts outside the local subnet need a
gateway to forward data. After specifying a gateway in the address pool, the
DHCP server assigns the gateway address along with an IP address to a
client.
Specify a primary DNS server for the DHCP client.
In order for clients to access the Internet using a domain name, the DHCP
server assigns the specified DNS server address along with an IP address to
a client.
238
Description
Start IP Address
End IP Address
The end IP address must not be lower than the start IP address. A higher end IP
address and a lower start IP address specify an IP address range while two identical
IP addresses specify a single IP address.
239
Description
DHCP server group ID.
You can create at most 20 DHCP server groups.
Specifies the DHCP server IP addresses for the DHCP server group.
Server IP Address
IMPORTANT:
The IP address of a DHCP server cannot be on the same network segment as that of the
DHCP relay agent interface; otherwise, DHCP clients may fail to obtain IP addresses.
The DHCP server and clients are on the same subnet and directly exchange DHCP messages.
The DHCP server and clients are not on the same subnet and communicate with each other via a
DHCP relay agent.
The DHCP server configuration for the two types is the same.
240
The DHCP server (Router A) assigns IP addresses to clients on subnet 10.1.1.0/24, which is
subnetted into 10.1.1.0/25 and 10.1.1.128/25.
The IP addresses of Ethernet 0/1 and Ethernet 0/2 on Router A are 10.1.1.1/25 and 10.1.1.129/25
respectively.
In subnet 10.1.1.0/25, the lease is ten days and twelve hours, the domain name suffix is
aabbcc.com, the DNS server address is 10.1.1.2/25, and the gateway address is 10.1.1.126/25.
In subnet 10.1.1.128/25, the lease is five days, the domain name suffix is aabbcc.com, the DNS
server address is 10.1.1.2/25, and the gateway address is 10.1.1.254/25.
Subnets 10.1.1.0/25 and 10.1.1.128/25 have the same domain name suffix and DNS server
address. Therefore, the domain name suffix and DNS server address need to be configured only for
subnet 10.1.1.0/24. Subnet 10.1.1.0/25 and 10.1.1.128/25 can inherit the configuration of subnet
10.1.1.0/24.
Router B (DHCP client) obtains a static IP address, DNS server address, and gateway address from
Router A (DHCP server).
Client
10.1.1.4/25
Eth0/1
10.1.1.1/25
Gateway A
10.1.1.126/25
Eth0/1
DNS server
Client
Eth0/2
10.1.1.129/25
Gateway B
Router A
DHCP server
Router B
Client
10.1.1.254/25
Client
Client
10.1.1.2/25
Configuration procedure
1.
Select Advanced > DHCP Setup from the navigation tree of Router A to enter the default DHCP
Enable page and perform the following operations, as shown in Figure 236.
241
Click Apply.
# Enable the DHCP server on interface Ethernet 0/1. (By default, the DHCP server is enabled on interface
Ethernet 0/1. This procedure is omitted.)
# Configure a DHCP static address pool, and bind IP address 10.1.1.5 to Router B.
Click the DHCP Interface Setup tab and perform the following operations, as shown in Figure 237.
242
Click on the Static Binding radio button in the Address Allocation Mode field.
Select the Primary DNS Server checkbox, and then type 10.1.1.2.
Click Apply.
# Configure DHCP address pool 0 (including the address range, client domain name suffix and DNS
server address).
243
Click on the Dynamic Allocation radio button in the Address Allocation Mode field.
Select the Primary DNS Server checkbox, and then type 10.1.1.2.
Click Apply.
# Configure DHCP address pool 1 (including the address range, lease duration, and gateway address).
244
Click Apply.
# Configure DHCP address pool 2 (including the address range, lease duration and gateway IP
address).
245
Click on the Dynamic Allocation radio button in the Address Allocation Mode field.
Click Apply.
# Exclude IP addresses from dynamic allocation (DNS server and gateway addresses).
Expand the Forbidden IP Addresses node and perform the following operations, as shown in Figure
241.
246
Click Apply.
Click Apply.
Click Apply.
2.
Select Advanced > DHCP Setup from the navigation tree of Router B, and then click the DHCP
Interface Setup tab and perform the following operations, as shown in Figure 242.
247
Click Apply.
3.
Select Advanced > DHCP Setup from the navigation tree of Router C, and then click the DHCP
Interface Setup tab, as shown in Figure 242.
Click Apply.
Ethernet 0/1 on the DHCP relay agent (Router A) connects to the network where DHCP clients
reside. The IP address of Ethernet 0/1 is 10.10.1.1/24 and IP address of Ethernet 0/2 is 10.1.1.2/24
that connects to the DHCP server 10.1.1.1/24 (Router B).
Router A forwards DHCP messages so that the DHCP clients on the network segment 10.10.1.0/24
can obtain IP addresses, DNS server address and gateway address from the DHCP server. The IP
address lease is seven days, the domain name suffix is aabbcc.com, the DNS server address is
10.10.1.2/24, and the gateway address is 10.10.1.126/24.
248
Eth0/1
10.10.1.1/24
Gateway
10.10.1.126/24
Eth0/1
DHCP client
10.10.1.2/24
Eth0/2
10.1.1.2/24
Eth0/1
10.1.1.1/24
Router A
DHCP relay agent
Router B
DHCP server
Router C
DHCP client
Configuration procedure
1.
Select Advanced > DHCP Setup from the navigation tree of Router A to enter the default DHCP
Enable tab and perform the following operations, as shown in Figure 244.
Click Apply.
Click the DHCP Interface Setup tab and perform the following operations, as shown in Figure 245.
249
Click Apply.
Click Apply.
2.
# Enable DHCP.
Select Advanced > DHCP Setup from the navigation tree of Router B to enter the default DHCP
Enable tab, as shown in Figure 247.
Click Apply.
# Enable the DHCP server on interface Ethernet 0/1. (By default, the DHCP server is enabled on Ethernet
0/1. This procedure is omitted.)
# Configure a dynamic DHCP address pool.
Click the DHCP Interface Setup tab and perform the following operations, as shown in Figure 248.
251
Click on the Dynamic Allocation radio button in the Address Allocation Mode field.
Select the Primary DNS Server checkbox, and then type 10.10.1.2.
Click Apply.
# Exclude IP addresses from dynamic allocation (DNS server and gateway addresses).
252
Click Apply.
Click Apply.
3.
Select Advanced > DHCP Setup from the navigation tree of Router C, and then click the DHCP
Interface Setup tab and perform the following operations, as shown in Figure 250Figure 250.
253
Click Apply.
Configuration guidelines
1.
If multiple VLAN interfaces sharing one MAC address request IP addresses using DHCP, the DHCP
server cannot be a Windows 2000 server or a Windows 2003 server.
2.
To remove a DHCP server group that is associated with multiple interfaces, you need to cancel the
associations first.
254
ACL configuration
The web interface provides the following ACL configuration functions:
ACL overview
An access control list (ACL) is a set of rules (or permit or deny statements) for identifying traffic based on
criteria such as source IP address, destination IP address, and port number.
ACLs are essentially used for packet filtering. A packet filter drops packets that match a deny rule and
permits packets that match a permit rule. ACLs are also widely used by many modules, for example, QoS
and IP routing, for traffic identification.
IPv4 ACLs fall into the following categories.
Table 120 IPv4 ACL categories
Category
ACL number
Match criteria
Basic ACLs
2000 to 2999
Advanced ACLs
3000 to 3999
Ethernet frame
header ACLs
4000 to 4999
NOTE:
For more information about IPv4 ACL, see the H3C MSR Series Routers ACL and QoS Configuration
Guide.
255
Configuring an ACL
Configuration task list
Table 121 IPv4 ACL configuration task list
Task
Remarks
Required
Required
256
Description
Set the number of the IPv4 ACL, which ranges from
2000 to 2999.
TIP:
ACL Number
257
Description
ACL
Rule ID
IMPORTANT:
If the rule number you specify already exists, the
following operations modify the configuration of the
rule.
Select the action to be taken on the IPv4 packets
matching the rule.
Action
258
Item
Description
Select this option to apply the rule only to non-first
fragments.
Check Fragment
Check Logging
Source IP Address
Source Wildcard
IMPORTANT:
The time ranges available for selection must be created
in the command line interface (CLI).
259
260
Description
Select the advanced IPv4 ACL for which you want to
configure rules.
You can create advanced IPv4 ACLs only in the CLI. For
more information, see the H3C MSR Series Routers ACL
and QoS Configuration Guide. Additionally, the system
automatically generates advanced IPv4 ACLs when you
configure advanced bandwidth limit and advanced
bandwidth guarantee. For more information, see the
chapter QoS configuration.
ACL
Select the Rule ID option, and type a number for the rule.
If you do not specify the rule number, the system will
assign one automatically.
Rule ID
IMPORTANT:
If the rule number you specify already exists, the following
operations modify the configuration of the rule.
Select the action to be performed for IPv4 packets
matching the rule.
Action
Logging
Source IP Address
IP Address Filter
Source Wildcard
Destination IP Address
Destination Wildcard
Protocol
ICMP Type
ICMP Message
ICMP Type
ICMP Code
261
Item
Description
Select this option to make the rule match packets used for
establishing and maintaining TCP connections.
TCP Connection Established
These items are available only when you select 6 TCP from
the Protocol drop-down box.
A rule with this item configured matches TCP connection
packets with the ACK or RST flag.
TCP/UDP Port
Source
Destination
DSCP
TOS
Precedence
Time Range
Select the time range during which the rule takes effect.
262
Figure 254 The page for configuring a rule for an Ethernet frame header ACL
Table 125 Configuration items for an Ethernet frame header IPv4 ACL rule
Item
Description
Select the Ethernet frame header IPv4 ACL for which you want to configure
rules.
ACL
You can create Ethernet frame header IPv4 ACLs only in the CLI. For more
information, see the H3C MSR Series Routers ACL and QoS Configuration
Guide.
Select the Rule ID option, and type a number for the rule.
If you do not specify the rule number, the system will assign one
automatically.
Rule ID
IMPORTANT:
If the rule number you specify already exists, the following operations modify
the configuration of the rule.
Select the action to be performed for IPv4 packets matching the rule.
Action
MAC
Address
Filter
Source MAC
Address
Source Mask
Select the Source MAC Address option, and type a source MAC address
and wildcard.
263
Item
Description
Destination MAC
Address
Destination Mask
COS(802.1p priority)
LSAP Type
Select the Destination MAC Address option, and type a destination MAC
address and wildcard.
Specify the 802.1p priority for the rule.
Select the LSAP Type option, and specify the DSAP and SSAP fields in the
LLC encapsulation by configuring the following items:
LSAP Mask
Protocol Type
Select the Protocol Type option, and specify the link layer protocol type by
configuring the following items:
Type Filter
Configuration guidelines
When configuring an ACL, follow these guidelines:
1.
You cannot create a rule with or modify a rule to have the same permit/deny statement as an
existing rule in the ACL.
2.
You can only modify the existing rules of an ACL that uses the match order of config. When
modifying a rule of such an ACL, you may choose to change just some of the settings, in which
case the other settings remain the same.
264
QoS configuration
The web interface provides the following QoS configuration functions:
Overview
QoS overview
Quality of Service (QoS) is a concept concerning service demand and supply. It reflects the ability to
meet customer needs. Generally, QoS focuses on improving services under certain conditions rather than
grading services precisely.
In an internet, QoS evaluates the ability of the network to forward packets of different services. The
evaluation can be based on different criteria because the network may provide various services.
Generally, QoS refers to the ability to provide improved service by solving the core issues such as delay,
jitter, and packet loss ratio in the packet forwarding process.
Through the web interface, you can configure the following QoS features:
Subnet limit
Advanced limit
Advanced queue
Subnet limit
Subnet limit enables you to regulate the specification of traffic entering or leaving a device based on
source/destination IP address. Packets conforming to the specification can pass through, and packets
exceeding the specification are dropped. In this way, the network resources are protected.
Advanced limit
Similar to subnet limit, advanced limit also implements traffic policing at the IP layer. They differ in that:
Advanced limit can classify traffic based on time range, packet precedence, protocol type, and
port number, and provide more granular services.
In addition to permitting traffic conforming to the specification to pass through, advanced limit can
also set IP precedence, differentiated service codepoint (DSCP) value, and 802.1p priority for
packets as required.
NOTE:
For more information about IP precedence, DSCP values, and 802.1p priority, see Appendix Packet
Priorities.
265
Advanced queue
Advanced queue offers the following functions:
Interface bandwidth limit: uses token buckets for traffic control and limits the rate of transmitting
packets (including critical packets) on an interface. When limiting the rate of all packets on an
interface, interface bandwidth limit is a better approach than subnet limit and advanced limit. This
is because working at the IP layer the latter two functions do not take effect on packets not
processed by the IP layer.
Bandwidth guarantee: when congestion occurs to a port, class-based queuing (CBQ) classifies
packets into different classes according to user-defined match criteria and assigns these classes to
their queues. Before assigning packets to a queue, CBQ performs bandwidth restriction check.
When being dequeued, packets are scheduled by WFQ.
Configuring QoS
Configuring subnet limit
Select Advance > QoS Setup > Subnet Limit from the navigation tree to enter the page shown in Figure
255. Click Add to enter the Subnet Limit Setting page, as shown in Figure 256.
Figure 255 Subnet limit
266
Description
Start Address
Set the address range of the subnet where rate limit is to be performed.
End Address
Interface
CIR
ShareLimits the total rate of traffic for all IP addresses on the subnet, and
Type
Per IPIndividually limits the rate of traffic of each IP address on the subnet to the
configured rate.
Set the direction where the rate limit applies, which can be:
destination IP addresses.
UploadLimits the rate of outgoing packets of the interface based on their source
IP addresses.
267
268
269
Description
Description
Configure a description for the advanced limit policy for management sake
Interface
Direction
CIR
Remark Type
You can configure up to eight IP precedence values for an advanced limit policy, and
the relationship between the IP precedence values is OR. If the same IP precedence
value is specified multiple times, the system considers them as one. The defined IP
precedence values are displayed in ascending order automatically.
Define a rule to match packets based on their DSCP values.
DSCP
You can configure up to eight DSCP values for an advanced limit policy, and the
relationship between the DSCP values is OR. If the same DSCP value is specified
multiple times, the system considers them as one. The defined DSCP values are
displayed in ascending order automatically.
Inbound Interface
Time Range
Set the time range when the advanced limit policy takes effect. The begin-end time
and days of the week are required to set.
Define a rule to match packets based on their protocol types.
Protocol Name
The protocol types available for selection include the system-defined protocols and the
protocols loaded through the P2P signature file. To load a P2P signature file, select
Security Setup > Application Control from the navigation tree and click Load
Application.
Custom Type
Source Port
You should select the transport layer protocol type and set the source service port
range and destination service port range.
Destination Port
270
Description
Interface Name
271
Item
Description
Set the average traffic rate allowed for the interface.
H3C recommends that you configure the interface
bandwidth to be smaller than the actual available
bandwidth of a physical interface or logical link.
IMPORTANT:
If you have specified the interface bandwidth, the
maximum interface bandwidth used for bandwidth
check when CBQ enqueues packets is 1000000 kbps. If
you have not specified the interface bandwidth, the
maximum interface bandwidth varies by interface type
following these rules:
Interface Bandwidth
272
273
Description
Description
Queue Type
Interface
Bandwidth
IMPORTANT:
The sum of the bandwidth specified in the bandwidth
guarantee policies applied to an interface must be no
greater than the available bandwidth of the interface.
Define a rule to match packets based on their IP
addresses.
IP Address/Mask
IP Precedence
274
Item
Description
Define a rule to match packets based on their DSCP
values.
You can configure up to eight DSCP values for a
bandwidth guarantee policy, and the relationship
between the DSCP values is OR. If the same DSCP
value is specified multiple times, the system considers
them as one. After each configuration, The defined
DSCP values are displayed in ascending order
automatically.
DSCP
Inbound Interface
Time Range
Protocol Name
Custom Type
Source Port
Destination Port
275
Configuration procedure
# Configure the bandwidth limit settings for the network segment.
Select Advance > QoS Setup > Subnet Limit from the navigation tree, and click Add on the
displayed page, and make settings as shown in Figure 262.
Click Apply.
276
Perform AF for traffic with the DSCP fields AF11 and AF22 (DSCP values 10 and 18) and set the
minimum bandwidth to 40 kbps.
Perform EF for traffic with the DSCP field EF (DSCP value 46) and set the maximum bandwidth to
240 kbps.
The route from Router C to Router D through Router A and Router B is reachable.
The DSCP fields have been set for the traffic before the traffic enters Router A.
Configuration procedure
Configuration on Router A:
# Perform AF for traffic with DSCP fields AF11 and AF21.
Select Advance > QoS Setup > Advanced Queue from the navigation tree, and click Add on the
displayed page, and make settings as shown in Figure 264.
277
Click Apply.
Select Advance > QoS Setup > Advanced Queue from the navigation tree, and click Add on the
displayed page, and make settings as shown in Figure 265.
278
Click Apply.
After the configurations are completed, EF traffic is forwarded preferentially when congestion occurs in
the network.
279
As shown in Figure 266, the ToS field of the IP header contains eight bits: the first three bits (0 to 2)
represent IP precedence from 0 to 7; the subsequent four bits (3 to 6) represent a ToS value from 0 to 15.
According to RFC 2474, the ToS field of the IP header is redefined as the differentiated services (DS) field,
where a DSCP value is represented by the first six bits (0 to 5) and is in the range 0 to 63. The remaining
two bits (6 and 7) are reserved.
Table 130 Description on IP precedence
IP precedence (decimal)
IP precedence (binary)
Keyword
000
routine
001
priority
010
immediate
011
flash
100
flash-override
101
critical
110
internet
111
network
In a network in the Diff-Serve model, traffic is assigned into the following classes, and packets are
processed according to their DSCP values.
Expedited forwarding (EF) class: The switch forwards the packets of this class without considering
whether the link is shared by other traffic. The class is suitable for preferential services requiring low
delay, low packet loss, low jitter, and high bandwidth.
Assured forwarding (AF) class: This class is divided into four subclasses (AF 1 to AF 4), each
containing three drop priorities for more granular classification. The QoS level of the AF class is
lower than that of the EF class.
Class selector (CS) class: This class is derived from the IP ToS field and includes eight subclasses.
Best effort (BE) class: This class is a special CS class that does not provide any assurance. AF traffic
exceeding the limit is degraded to the BE class. All IP network traffic belongs to this class by default.
280
Keyword
46
101110
ef
10
001010
af11
12
001100
af12
14
001110
af13
18
010010
af21
20
010100
af22
22
010110
af23
26
011010
af31
28
011100
af32
30
011110
af33
34
100010
af41
36
100100
af42
38
100110
af43
001000
cs1
16
010000
cs2
24
011000
cs3
32
100000
cs4
40
101000
cs5
48
110000
cs6
56
111000
cs7
000000
be(default)
802.1p priority
802.1p priority lies in the Layer 2 packet header and is applicable to occasions where Layer 3 header
analysis is not needed and QoS must be assured at Layer 2.
Figure 267 An Ethernet frame with an 802.1q tag header
As shown in Figure 267, the 4-byte 802.1q tag header consists of the tag protocol identifier (TPID, two
bytes in length), whose value is 0x8100, and the tag control information (TCI, two bytes in length). Figure
268 presents the format of the 802.1q tag header.
281
Keyword
000
best-effort
001
background
010
spare
011
excellent-effort
100
controlled-load
101
video
110
voice
111
network-management
The priority in the 802.1q tag header is called 802.1p priority, because its use is defined in IEEE
802.1p.
282
SNMP
NOTE:
Only the MSR 20/30/50 series routers support this function.
For the MSR 900/20-1X series routers, see the chapter SNMP (lite version).
You can do the following to configure the SNMP agent function on the web interface:
SNMP overview
The Simple Network Management Protocol (SNMP) is an Internet standard protocol widely used for a
network management station (NMS) to access and operate the devices (SNMP agents) on a network,
regardless of their vendors, physical characteristics and interconnect technologies.
SNMP enables network administrators to read and set the variables on managed devices to monitor their
operating and health state, diagnose network problems, and collect statistics for management purposes.
H3C SNMP agents support three SNMP versions: SNMPv1, SNMPv2c, and SNMPv3.
SNMPv1 uses password authentication to control access to SNMP agents. SNMPv1 passwords fall
into read only passwords and read and write passwords.
A read password enables reading data from an SNMP agent.
A read and write password enables reading data and setting variables on an SNMP agent.
SNMPv2c also uses password authentication for SNMP agent access control. It is compatible with
SNMPv1, but supports more operation modes, data types, and error codes.
SNMPv3 uses a user-based security model (USM) to secure SNMP communication. You can
configure authentication and privacy mechanisms to authenticate access and encrypt SNMP
packets for integrity, authenticity, and confidentiality.
IMPORTANT:
An NMS and an SNMP agent must use the same SNMP version to communicate with each other.
NOTE:
For more information about SNMP, see the H3C MSR Series Routers Network Management and
283
Remarks
Required
The SNMP agent function is disabled by default.
IMPORTANT:
If SNMP the agent function is disabled, all SNMP
agent-related configurations will be removed.
Optional
Required
Optional
Allows you to configure that the agent can send SNMP
traps to the NMS, and configure information about the
target host of the SNMP traps.
Optional
Configuring SNMPv3
Table 134 SNMPv3 configuration task list
Task
Remarks
Required
The SNMP agent function is disabled by default.
IMPORTANT:
If the SNMP agent function is disabled, all SNMP
agent-related configurations will be removed.
Optional
After creating SNMP views, you can specify an SNMP
view for an SNMP group to limit the MIB objects that
can be accessed by the SNMP group.
284
Task
Remarks
Required
After creating an SNMP group, you can add SNMP
users to the group when creating the users. Therefore,
you can realize centralized management of users in the
group through the management of the group.
Required
Configuring an SNMP user
Optional
285
Table 135 Configuration items for enabling the SNMP agent function
Item
Description
SNMP
Local Engine ID
Maximum Packet
Size
The validity of a user after it is created depends on the engine ID of the SNMP agent. If
the engine ID when the user is created is not identical to the current engine ID, the user
is invalid.
Configure the maximum size of an SNMP packet that the agent can receive/send.
286
Item
Description
Set a character string to describe the contact information for system maintenance.
Contact
If the device is faulty, the maintainer can contact the manufacture factory according to
the contact information of the device.
Location
SNMP Version
Return to SNMPv1 or SNMPv2c configuration task list or SNMPv3 configuration task list.
287
Table 136 describes the configuration items for creating an SNMP view. After configuring the parameters
of a rule, click Add to add the rule into the list box at the lower part of the page. After configuring all rules,
click Apply to crate an SNMP view. Note that the view will not be created if you click Cancel.
Table 136 Configuration items for creating an SNMP view
Item
Description
View Name
Rule
MIB subtree OID identifies the position of a node in the MIB tree, and it can
uniquely identify a MIB subtree.
Set the subtree mask.
Subtree Mask
If no subtree mask is specified, the default subtree mask (all Fs) will be used
for mask-OID matching.
288
NOTE:
You can also click the
icon corresponding to the specified view on the page as shown in Figure 270,
and then you can enter the page to modify the view.
Return to SNMPv1 or SNMPv2c configuration task list or SNMPv3 configuration task list.
289
Description
Community Name
Access Right
ACL
290
Description
Group Name
Security Level
Read View
Write View
If no write view is configured, the NMS cannot perform the write operations to all MIB
objects on the device.
291
Item
Notify View
ACL
Description
Select the notify view of the SNMP group, that is, the view that can send trap messages.
If no notify view is configured, the agent does not send traps to the NMS.
Associate a basic ACL with the group to restrict the source IP address of SNMP packets,
that is, you can configure to allow or prohibit SNMP packets with a specific source IP
address, so as to restrict the intercommunication between the NMS and the agent.
292
Description
User Name
Security Level
Authentication Password
293
Item
Description
Auth/NoPriv or Auth/Priv.
Privacy Mode
Privacy Password
The confirm privacy password must be the same with the privacy
password.
ACL
Associate a basic ACL with the user to restrict the source IP address
of SNMP packets, that is, you can configure to allow or prohibit
SNMP packets with a specific source IP address, so as to allow or
prohibit the specified NMS to access the agent by using this user
name.
294
Description
Set the destination IP address.
Destination IP Address
Security Name
The default port number is 162, which is the SNMP-specified port used
for receiving traps on the NMS. Generally (such as using iMC or MIB
Browser as the NMS), you can use the default port number. To change
this parameter to another value, you need to make sure that the
configuration is the same with that on the NMS.
Select the security model, that is, the SNMP version.
Security Model
IMPORTANT:
The security model must be the same as that running on the NMS;
otherwise, the NMS cannot receive any trap.
295
Item
Description
Security Level
Set the authentication and privacy mode for SNMP traps when the
security model is selected as v3. The available security levels are: no
authentication no privacy, authentication but no privacy, and
authentication and privacy.
If you select v1 or v2c in the Security Model drop-down list, the
Security Level can only be no authentication no privacy, and cannot
be modified.
Return to SNMPv1 or SNMPv2c configuration task list or SNMPv3 configuration task list.
Return to SNMPv1 or SNMPv2c configuration task list or SNMPv3 configuration task list.
296
As shown in Figure 283, the NMS connects to the agent through an Ethernet.
The NMS monitors and manages the agent using SNMPv1 or SNMPv2c. The agent reports errors
or faults to the NMS.
Agent
1.1.1.1/24
NMS
1.1.1.2/24
Configuration procedure
1.
# Enable SNMP.
Select Advanced > SNMP from the navigation tree, and you will enter the Setup page. Perform the
following configuration as shown in Figure 284.
297
Click Apply.
Click the Community tab and then click Add. Perform the following configuration as shown in Figure
285.
298
Click Apply.
Click the Community tab and then click Add. Perform the following configuration as shown in Figure
286.
Select Read and write from the Access Right drop-down list.
Click Apply.
Click the Trap tab and perform the following configuration as shown in Figure 287.
Click Apply.
On the Trap tab page, click Add and perform the following configuration as shown in Figure 288.
Select v1 from the Security Model drop-down list. (This configuration must be the same as that
running on the NMS; otherwise, the NMS cannot receive any trap.)
Click Apply.
2.
NOTE:
The configuration on NMS must be consistent with that on the agent. Otherwise, you cannot perform
corresponding operations.
With SNMPv1 or SNMP v2c, you need to set both read password and read and write password on the
NMS. Besides, you need to configure the aging time and retry times. You can inquire and configure the
device through the NMS. For more information about NMS configuration, see the manual provided for
NMS.
Configuration verification
After the above configuration, an SNMP connection is established between the NMS and the agent.
The NMS can get and configure the values of some parameters on the agent through MIB nodes.
Shut down or bring up an idle interface on the agent, and the NMS receives the corresponding
trap.
As shown in Figure 289, the NMS connects to the agent through an Ethernet.
The NMS monitors and manages the interface status of the agent using SNMPv3, and only the
NMS is allowed to manage the agent. The agent reports errors or faults to the NMS.
The NMS has to pass the authentication to establish an SNMP connection with the agent; the
authentication protocol is MD5 and the authentication password is authkey.
Packets transmitted between the NMS and the agent need to be encrypted by the privacy protocol
DES, and the privacy password is prikey.
Configuration procedure
1.
# Enable SNMP.
Select Advanced > SNMP from the navigation tree, and you will enter the Setup page. Perform the
following configuration as shown in Figure 290.
301
Click Apply.
Click the View tab and then click Add. Perform the following configuration as shown in Figure 291.
302
Click Apply and enter the page of view1. Perform the following configuration as shown in Figure
292.
Click Add.
Click Apply. A configuration progress dialog box appears, as shown in Figure 293.
303
Click the Group tab and then click Add. Perform the following configuration as shown in Figure
294.
Click Apply.
Click the User tab and then click Add. Perform the following configuration as shown in Figure 295.
304
Click Apply.
Click the Trap tab and perform the following configuration as shown in Figure 296.
Click Apply.
On the Trap tab page, click Add and perform the following configuration as shown in Figure 297.
Click Apply.
2.
NOTE:
The configuration on the NMS must be consistent with that on the agent. Otherwise, you cannot perform
corresponding operations.
SNMPv3 adopts a security mechanism of authentication and privacy. You need to configure username
and security level. According to the configured security level, you need to configure the related
authentication mode, authentication password, privacy mode, privacy password, and so on.
Besides, you need to configure the aging time and retry times. After the above configurations, you can
configure the device as needed through the NMS. For more information about NMS configuration, see
the manual provided for NMS.
Configuration verification
After the above configuration, an SNMP connection is established between the NMS and the agent.
The NMS can get and configure the values of some parameters on the agent through MIB nodes.
Shut down or bring up an idle interface on the agent, and the NMS receives the corresponding
trap.
306
Bridging
Through the Web interface, you can configure the following transparent bridging functions:
Overview
Bridging overview
A bridge is a store-and-forward device that connects and transfers traffic between local area network
(LAN) segments at the data-link layer. In some small-sized networks, especially those with dispersed
distribution of users, the use of bridges can reduce the network maintenance costs, without requiring the
end users to perform special configurations on the devices.
In applications, the following major kinds of bridging technologies apply: transparent bridging,
source-route bridging (SRB), translational bridging, and source-route translational bridging (SR/TLB).
The devices support only transparent bridging.
Transparent bridging bridges LAN segments of the same physical media type, primarily in Ethernet
environments. A transparent bridging device keeps a bridge table, which contains mappings between
destination MAC addresses and outbound interfaces.
NOTE:
For more information about the transparent bridging, see the H3C MSR Series Routers Layer 2WAN
Configuration Guide.
Configuring bridging
Configuration task list
Table 141 Basic bridging configuration task list
Task
Enabling a bridge set
Adding an interface to a
bridge set
Remarks
Required
No bridge set is enabled by default.
Required
An interface is not in any bridge set by default.
Remarks
Bridge Group id
308
Remarks
Interface
Bridge Group
Set the ID of the bridge set to which you want add the interface
Enable or disable VLAN transparency on the interface
VLAN Transmit
IMPORTANT:
309
Configuration procedure
1.
Configure Router A
Select Advanced > Bridge from the navigation tree to enter the Global config page. Perform
configuration on the page as shown in Figure 301.
Click Apply.
Click the Config interface tab, and perform configuration on the page as shown in Figure 302.
310
Figure 302 Assign Ethernet 1/1 to bridge set 2 and enable VLAN transparency
Click Apply.
As shown in Figure 303, select Ethernet1/2 from the Interface drop-down list.
Click Apply.
2.
Configure Router B
312
Configuring a user
Overview
You can define the hosts to be managed in the LAN as users and then add them to a user group, so that
you can perform access control, application control, bandwidth control, and packet filtering on a per
user group basis.
Access control: Allows you to deny access from hosts during specific time ranges. All data packets
matching these criteria will be denied to access the Internet.
Application control: Allows you to restrict access to a specific application or protocol (such as Telnet,
DNS, SIP, HTTP, and so on) in the Internet from users in a user group. You can perform application
control based on a user group or all users. For more information about application control, see the
chapter Application control.
Bandwidth control: Allows you to control the bandwidth consumption based on user group. It
evaluates traffic with token buckets and drops the unqualified packets, thus controlling bandwidth
utilization.
Packet filtering: Allows you to filter packets that match specific criteria such as the protocol,
destination IP address, source port, and destination port on a per user group basis.
Remarks
Required
By default, no user groups are configured.
Required
Configuring a user
Required
313
Task
Remarks
Description
Set the name of the group to be added.
The group name is a character string beginning with letters. The string cannot contain
any question mark (?) or space.
314
Configuring a user
Select Advanced > Security > Usergroup from the navigation tree, and then select the User tab to enter
the page for configuring users, as shown Figure 305.
Figure 305 User configuration
Description
Static: In this mode, you need to type the username and IP address manually
Add Mode
Dynamic: The system displays all the devices connected with the device for
you to select.
Set the username.
Username
IP Address
315
Description
Select a user group for access control.
When there are more than one user group, the option all is available. Selecting
all means that the access control configuration applies to all the user groups.
Set the time range in which access to the Internet is denied.
316
Description
Select a user group for application control.
When there are more than one user group, the option all is available. Selecting all
means that the application control configuration applies to all the user groups.
Select the applications and protocols to be controlled. There are three types of
applications for you to select:
Please select
applications to deny
Predefined applications
Custom applications: To customize applications, select Security > Application
Control.
317
Description
Set the user group for bandwidth control configuration.
When there are more than one user group, the option all is available. Selecting all
means that the bandwidth control configuration applies to all the user groups.
Set the committed information rate (CIR), namely, the permitted average rate of traffic.
Set the committed burst size (CBS). CBS is the capacity of the token bucket, namely,
the maximum traffic size that is permitted in each burst.
CBS
The CBS value must be greater than the maximum packet size.
IMPORTANT:
By default, the CBS is the number of bytes transmitted in 500 ms at the rate of CIR. If the
number exceeds the value range, the allowed maximum or minimum value is adopted.
318
Description
Select a user group that the packet filtering is to be applied to.
When there are more than one user group, the option all is available.
Selecting all means that the packet filtering configuration applies to all the
user groups.
Protocol
Destination IP Address
Destination Wildcard
Operator
Source Port
Port
If you select NotCheck as the operator, port numbers will not be checked
and no ports need to be specified.
If you select Range as the operator, you need to specify both start and
ToPort
If you select other option as the operator, only a start port needs to be
specified.
Destination Port
Operator
Port
If you select NotCheck as the operator, port numbers will not be checked
319
Item
Description
and no ports need to be specified.
If you select Range as the operator, you need to specify both start and
ToPort
If you select other option as the operator, only a start port needs to be
specified.
Configure access control so that access from common users to the Internet during work time (9:00
to 18:00 from Monday through Friday) is denied while access from the Manager is allowed.
Configure application control so that access from common users to MSN application is denied
while access from the Manager is allowed.
Configure the maximum average rate of Internet access as 8 kbps for common users and 54 kbps
for the Manager.
Configure packet filtering so that access to the server at the address 2.2.2.1 from common users is
denied.
320
Host B
IP: 192.168.1.11/24
MAC: 0015-e9ac-2def
IP: 192.168.1.12/24
Eth1/0
192.168.1.1/24
Eth1/0
Internet
Router
Host C
Host D
192.168.1.13/24
192.168.1.14/24
Configuration procedure
# Create user groups staff (for common users) and manager (for the Manager).
Select Advanced > Security > Usergroup to enter the group configuration page. Perform the
configurations as shown in Figure 312.
Click Apply.
Click Apply.
Select Advanced > Security > Usergroup, and then select the User tab. Perform the configurations
as shown in Figure 313.
321
Select Dynamic as the add mode. The following area then displays the IP addresses and MAC
addresses of all the hosts in the intranet that connects to the Router.
Click Apply. A configuration progress dialog box appears, as shown in Figure 314.
Select Advanced > Security > Connect Control, and perform the configurations as shown in Figure
316.
323
# Load the application control file (assume the signature file is stored on the device).
Select Security Setup > Application Control from the navigation tree, and then select the Load
Application tab. Perform the configurations as shown in Figure 317.
Figure 317 Load the application control file
Select the From Device radio button, and select file p2p_default.
324
Click Apply. Then, you can view MSN is in the loaded applications on the lower part of the page.
Select Advanced > Security > Application Control from the navigation tree, and perform the
configurations as shown in Figure 318.
Figure 318 Configure application control to user group staff
Select Advanced > Security > Band Width, and the perform the configurations as shown in Figure
319.
325
Figure 319 Configure bandwidth control to user groups staff and manager
Select Advanced > Security > Packet Filter, and then perform the configurations as shown in Figure
320.
326
327
MSTP configuration
NOTE:
This feature is available only on the MSR 20/30/50 routers.
Overview
As a Layer 2 management protocol, the Spanning Tree Protocol (STP) eliminates Layer 2 loops by
selectively blocking redundant links in a network, and in the mean time, allows for link redundancy.
Like many other protocols, STP evolves as the network grows. The later versions of STP are the Rapid
Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol (MSTP). This chapter describes
the characteristics of STP, RSTP, and MSTP.
Introduction to STP
STP was developed based on the 802.1d standard of IEEE to eliminate loops at the data link layer in a
local area network (LAN). Devices running this protocol detect loops in the network by exchanging
information with one another and eliminate loops by selectively blocking certain ports to prune the loop
structure into a loop-free tree structure. This avoids proliferation and infinite cycling of packets that would
occur in a loop network and prevents decreased performance of network devices caused by duplicate
packets received.
In the narrow sense, STP refers to the IEEE 802.1d STP; in the broad sense, STP refers to the IEEE 802.1d
STP and various enhanced spanning tree protocols derived from that protocol.
Configuration BPDUs, used for calculating a spanning tree and maintaining the spanning tree
topology.
Topology change notification (TCN) BPDUs, used for notifying the concerned devices of network
topology changes, if any.
Root bridge
328
Upon initialization of a network, each device generates and sends out BPDUs periodically with itself as
the root bridge; after network convergence, only the root bridge generates and sends out configuration
BPDUs at a certain interval, and the other devices just forward BPDUs.
2.
Root port
On a non-root bridge, the port nearest to the root bridge is the root port. The root port is responsible for
communication with the root bridge. Each non-root bridge has one and only one root port. The root
bridge has no root port.
3.
Designated bridge
Designated port
For a device
For a LAN
As shown in Figure 321, AP1 and AP2, BP1 and BP2, and CP1 and CP2 are ports on Device A, Device
B, and Device C respectively.
If Device A forwards BPDUs to Device B through AP1, the designated bridge for Device B is Device
A, and the designated port of Device B is port AP1 on Device A.
Two devices are connected to the LAN: Device B and Device C. If Device B forwards BPDUs to the
LAN, the designated bridge for the LAN is Device B, and the designated port for the LAN is the port
BP2 on Device B.
NOTE:
All the ports on the root bridge are designated ports.
4.
Path cost
Path cost is a reference value used for link selection in STP. By calculating path costs, STP selects relatively
robust links and blocks redundant links, and finally prunes the network into a loop-free tree.
329
Root bridge ID: consisting of the priority and MAC address of the root bridge.
Root path cost: the cost of the shortest path to the root bridge.
Designated bridge ID: consisting of the priority and MAC address of the designated bridge.
Message age: age of the configuration BPDU while it propagates in the network.
Max age: maximum age of the configuration BPDU can be maintained on a device.
Forward delay: the delay used by STP bridges to transit the state of the root and designated ports
to forwarding.
NOTE:
For simplicity, the descriptions and examples in this document involve only the following fields in the
configuration BPDUs:
Root bridge ID (represented by device priority)
Root path cost (related to the rate of the link connecting the port)
Designated bridge ID (represented by device priority)
Designated port ID (represented by port name)
1.
Initial state
Upon initialization of a device, each port generates a BPDU with itself as the root bridge, in which the
root path cost is 0, designated bridge ID is the device ID, and the designated port is the local port.
Selection of the optimum configuration BPDU
Each device sends out its configuration BPDU and receives configuration BPDUs from other devices.
Table 152 Selection of the optimum configuration BPDU
Step
Actions
Upon receiving a configuration BPDU on a port, the device performs the following:
If the received configuration BPDU has a lower priority than that of the configuration BPDU
1
generated by the port, the device discards the received configuration BPDU and does not
process the configuration BPDU of this port.
If the received configuration BPDU has a higher priority than that of the configuration BPDU
generated by the port, the device replaces the content of the configuration BPDU generated
by the port with the content of the received configuration BPDU.
2
The device compares the configuration BPDUs of all the ports and chooses the optimum
configuration BPDU.
330
NOTE:
Configuration BPDU comparison uses the following principles:
The configuration BPDU that has the lowest root bridge ID has the highest priority.
If all the configuration BPDUs have the same root bridge ID, their root path costs are compared. For
example, the root path cost in a configuration BPDU plus the path cost of a receiving port is S. The
configuration BPDU with the smallest S value has the highest priority.
If all configuration BPDUs have the same S value, their designated bridge IDs, designated port IDs, and
the IDs of the receiving ports are compared in sequence. The configuration BPDU containing a smaller
ID wins out.
Selection of the root bridge
Initially, each STP-enabled device on the network assumes itself to be the root bridge, with the root bridge
ID being its own device ID. By exchanging configuration BPDUs, the devices compare their root bridge
IDs to elect the device with the smallest root bridge ID as the root bridge.
Selection of the root port and designated ports on a non-root device
Description
A non-root device regards the port on which it received the optimum configuration BPDU as
the root port.
Based on the configuration BPDU and the path cost of the root port, the device calculates a
designated port configuration BPDU for each of the rest ports.
The root bridge ID is replaced with that of the configuration BPDU of the root port.
The root path cost is replaced with that of the configuration BPDU of the root port plus the
path cost of the root port.
If the calculated configuration BPDU is superior, the device considers this port as the
3
designated port, and replaces the configuration BPDU on the port with the calculated
configuration BPDU, which will be sent out periodically.
If the configuration BPDU on the port is superior, the device blocks this port without
updating its configuration BPDU. The blocked port can receive BPDUs but cannot send
BPDUs or forward data.
NOTE:
When the network topology is stable, only the root port and designated ports forward traffic, and other
ports are all in the blocked statethey receive BPDUs but do not forward BPDUs or user traffic.
A tree-shape topology forms upon successful election of the root bridge, the root port on each non-root
bridge and the designated ports.
The following is an example of how the STP algorithm works. As shown in Figure 322, the priority of
Device A is 0, the priority of Device B is 1, the priority of Device C is 2, and the path costs of these links
are 5, 10 and 4 respectively.
331
Device B
Device C
Port name
BPDU of port
AP1
{0, 0, 0, AP1}
AP2
{0, 0, 0, AP2}
BP1
{1, 0, 1, BP1}
BP2
{1, 0, 1, BP2}
CP1
{2, 0, 2, CP1}
CP2
{2, 0, 2, CP2}
Comparison process
Port AP1 receives the configuration BPDU of Device B {1, 0, 1,
BP1}. Device A finds that the configuration BPDU of the local
port {0, 0, 0, AP1} is superior to the received configuration
BPDU, and discards the received configuration BPDU.
CP1}. Device A finds that the BPDU of the local port {0, 0, 0,
AP2} is superior to the received configuration BPDU, and
discards the received configuration BPDU.
Device A finds that both the root bridge and designated bridge
in the configuration BPDUs of all its ports are itself, so it assumes
itself to be the root bridge. It does not make any change to the
configuration BPDU of each port, and starts sending out
configuration BPDUs periodically.
332
Device
Comparison process
Port BP1 receives the configuration BPDU of Device A {0, 0, 0,
AP1}. Device B finds that the received configuration BPDU is
superior to the configuration BPDU of the local port {1, 0, 1,
BP1}, and updates the configuration BPDU of BP1.
Device C
After comparison:
333
Device
Comparison process
After comparison:
Because the root path cost of CP2 (9) (root path cost of the
BPDU (5) plus path cost corresponding to CP2 (4)) is smaller
than the root path cost of CP1 (10) (root path cost of the BPDU
(0) + path cost corresponding to CP2 (10)), the BPDU of CP2 is
elected as the optimum BPDU, and CP2 is elected as the root
port, the messages of which will not be changed.
After the comparison processes described in Table 155, a spanning tree with Device A as the root bridge
is established as shown in Figure 323.
Figure 323 The final calculated spanning tree
NOTE:
The spanning tree calculation process in this example is only a simplified process.
2.
Upon network initiation, every device regards itself as the root bridge, generates configuration
BPDUs with itself as the root, and sends the configuration BPDUs at a regular hello interval.
If it is the root port that received a configuration BPDU and the received configuration BPDU is
superior to the configuration BPDU of the port, the device increases the message age carried in the
configuration BPDU following a certain rule and starts a timer to time the configuration BPDU while
sending out this configuration BPDU through the designated port.
If the configuration BPDU received on a designated port has a lower priority than the configuration
BPDU of the local port, the port immediately sends out its own configuration BPDU in response.
If a path becomes faulty, the root port on this path will no longer receive new configuration BPDUs
and the old configuration BPDUs will be discarded due to timeout. The device will generate
334
configuration BPDUs with itself as the root. This triggers a new spanning tree calculation process to
establish a new path to restore the network connectivity.
However, the newly calculated configuration BPDU will not be propagated throughout the network
immediately, so the old root ports and designated ports that have not detected the topology change
continue forwarding data along the old path. If the new root ports and designated ports begin to
forward data as soon as they are elected, a temporary loop may occur.
3.
STP timers
STP calculation involves the following timers: forward delay, hello time, and max age.
A path failure can cause spanning tree re-calculation to adapt the spanning tree structure to the change.
However, the resulting new configuration BPDU cannot propagate throughout the network immediately.
If the newly elected root ports and designated ports start to forward data right away, a temporary loop
is likely to occur.
For this reason, as a mechanism for state transition in STP, the newly elected root ports or designated
ports require twice the forward delay time before transiting to the forwarding state to ensure that the new
configuration BPDU has propagated throughout the network.
Hello time is the time interval at which a device sends hello packets to the surrounding devices to
ensure that the paths are fault-free.
Max age is a parameter used to determine whether a configuration BPDU held by the device has
expired. A configuration BPDU beyond the max age will be discarded.
Introduction to RSTP
Developed based on the 802.1w standard of IEEE, RSTP is an optimized version of STP. It achieves rapid
network convergence by allowing a newly elected root port or designated port to enter the forwarding
state much quicker under certain conditions than in STP.
NOTE:
In RSTP, a newly elected root port can enter the forwarding state rapidly if this condition is met: the old
root port on the device has stopped forwarding data and the upstream designated port has started
forwarding data.
In RSTP, a newly elected designated port can enter the forwarding state rapidly if this condition is met:
the designated port is an edge port or a port connected to a point-to-point link. If the designated port
is an edge port, it can enter the forwarding state directly. If the designated port is connected to a
point-to-point link, it can enter the forwarding state immediately after the device undergoes handshake
with the downstream device and gets a response.
Introduction to MSTP
Why MSTP
1.
STP does not support rapid state transition of ports. A newly elected root port or designated port must
wait twice the forward delay time before transiting to the forwarding state, even if it is a port on a
point-to-point link or an edge port, which directly connects to a user terminal rather than to another
device or a shared LAN segment.
335
Although RSTP supports rapid network convergence, it has the same drawback as STPAll bridges
within a LAN share the same spanning tree, so redundant links cannot be blocked based on VLAN, and
the packets of all VLANs are forwarded along the same spanning tree.
2.
Features of MSTP
Developed based on IEEE 802.1s, MSTP overcomes the limitations of STP and RSTP. In addition to the
support for rapid network convergence, it also allows data flows of different VLANs to be forwarded
along separate paths, providing a better load sharing mechanism for redundant links.
MSTP includes the following features:
MSTP divides a switched network into multiple regions, each containing multiple spanning trees
that are independent of one another.
MSTP prunes a loop network into a loop-free tree, avoiding proliferation and endless cycling of
packets in a loop network. In addition, it provides multiple redundant paths for data forwarding,
supporting load balancing of VLAN data.
336
Assume that all devices in Figure 324 are running MSTP. This section explains some basic concepts of
MSTP.
1.
MST region
A multiple spanning tree region (MST region) consists of multiple devices in a switched network and the
network segments among them. These devices have the following characteristics:
For example, all the devices in region A0 in Figure 324 have the same MST region configuration.
The same VLAN-to-instance mapping configuration (VLAN 1 is mapped to MSTI 1, VLAN 2 to MSTI
2, and the rest to the common and internal spanning tree (CIST or MSTI 0).
Multiple MST regions can exist in a switched network. You can assign multiple devices to the same MST
region.
2.
As an attribute of an MST region, the VLAN-to-instance mapping table describes the mapping
relationships between VLANs and MSTIs. In Figure 324, for example, the VLAN-to-instance mapping
table of region A0 is: VLAN 1 is mapped to MSTI 1, VLAN 2 to MSTI 2, and the rest to CIST. MSTP
achieves load balancing by means of the VLAN-to-instance mapping table.
3.
IST
An internal spanning tree (IST) is a spanning tree that runs in an MST region.
ISTs in all MST regions and the common spanning tree (CST) jointly constitute the common and internal
spanning tree (CIST) of the entire network. An IST is a section of the CIST in an MST region.
In Figure 324, for example, the CIST has a section in each MST region, and this section is the IST in the
respective MST region.
4.
CST
The CST is a single spanning tree that connects all MST regions in a switched network. If you regard each
MST region as a device, the CST is a spanning tree calculated by these devices through STP or RSTP.
CSTs are indicated by red lines in Figure 324.
5.
CIST
Jointly constituted by ISTs and the CST, the CIST is a single spanning tree that connects all devices in a
switched network.
In Figure 324, for example, the ISTs in all MST regions plus the inter-region CST constitute the CIST of the
entire network.
6.
MSTI
Multiple spanning trees can be generated in an MST region through MSTP, one spanning tree being
independent of another. Each spanning tree is referred to as a multiple spanning tree instance (MSTI).
In Figure 324, for example, multiple MSTIs can exist in each MST region, each MSTI corresponding to the
specified VLANs.
337
7.
The root bridge of the IST or an MSTI within an MST region is the regional root bridge of the IST or the
MSTI. Based on the topology, different spanning trees in an MST region may have different regional
roots.
For example, in region D0 in Figure 324, the regional root of MSTI 1 is device B, and that of MSTI 2 is
device C.
8.
Boundary port
A boundary port is a port that connects an MST region to another MST region, or to a single
spanning-tree region running STP, or to a single spanning-tree region running RSTP. It is at the boundary
of an MST region.
During MSTP calculation, the role of a boundary port in an MSTI must be consistent with its role in the
CIST. But this is not true with master ports. A master port on MSTIs is a root port on the CIST. For example,
in Figure 324, if a device in region A0 is interconnected to the first port of a device in region D0 and the
common root bridge of the entire switched network is located in region A0, the first port of that device
in region D0 is the boundary port of region D0.
10.
Roles of ports
MSTP calculation involves the following port roles: root port, designated port, master port, boundary port,
alternate port, and backup port.
Root port: a port responsible for forwarding data to the root bridge.
Designated port: a port responsible for forwarding data to the downstream network segment or
device.
Master port: a port on the shortest path from the current region to the common root bridge,
connecting the MST region to the common root bridge. If the region is seen as a node, the master
port is the root port of the region on the CST. The master port is a root port on IST/CIST and still a
master port on the other MSTIs.
Alternate port: the standby port for the root port and the master port. When the root port or master
port is blocked, the alternate port becomes the new root port or master port.
Backup port: the backup port of a designated port. When the designated port is blocked, the
backup port becomes a new designated port and starts forwarding data without delay. A loop
occurs when two ports of the same MSTP device are interconnected. The device will block either of
the two ports, and the backup port is the port to be blocked.
338
In Figure 325, devices A, B, C, and D constitute an MST region. Port 1 and port 2 of device A are
connected to the common root bridge, port 5 and port 6 of device C form a loop, port 3 and port 4 of
Device D are connected downstream to the other MST regions.
11.
Port states
Forwarding: the port learns MAC addresses and forwards user traffic.
Learning: the port learns MAC addresses but does not forward user traffic.
Discarding: the port does not learn MAC addresses or forwards user traffic.
NOTE:
A port can have different port states in different MSTIs.
A port state is not exclusively associated with a port role. Table 156 lists the port state(s) supported by
each port role. ( indicates that the port state is available for the corresponding port role and
indicates that the port state is not available for the corresponding port role.)
Table 156 Ports states supported by different port roles
Port role
Port state
Root
port/master
port
Designated
port
Boundary port
Alternate port
Backup port
Forwarding
Learning
Discarding
339
CIST calculation
The calculation of a CIST tree is also the process of configuration BPDU comparison. During this process,
the device with the highest priority is elected as the root bridge of the CIST. MSTP generates an IST within
each MST region through calculation, and, at the same time, MSTP regards each MST region as a single
device and generates a CST among these MST regions through calculation. The CST and ISTs constitute
the CIST of the entire network.
2.
MSTI calculation
Within an MST region, MSTP generates different MSTIs for different VLANs based on the
VLAN-to-instance mappings. MSTP performs a separate calculation process, which is similar to spanning
tree calculation in STP/RSTP, for each spanning tree. For more information, see How STP works.
In MSTP, a VLAN packet is forwarded along the following paths:
Within an MST region, the packet is forwarded along the corresponding MSTI.
Between two MST regions, the packet is forwarded along the CST.
Root guard
BPDU guard
Loop guard
TC-BPDU guard
340
Configuring MSTP
Configuration task list
Before configuring MSTP, you need to determine the role of each device in each MSTI: root bridge or leaf
node. In each MSTI, one, and only one device acts as the root bridge, and all others as leaf nodes.
Table 157 MSTP configuration task list
Task
Remarks
Optional
Click Modify to enter the MSTP region configuration page, as shown in Figure 327.
341
Description
Region Name
Revision Level
Instance ID
Manual
VLAN ID
Apply
Set the modulo value based on which 4094 VLANs are automatically
mapped to the corresponding MSTIs.
Modulo
Activate
With the modulo value set, each VLAN is mapped to the MSTI whose ID is
(VLAN ID1) %modulo + 1, where (VLAN ID-1) %modulo is the modulo
operation for (VLAN ID1). If the modulo value is 15, for example, then
VLAN 1 will be mapped to MSTI 1, VLAN 2 to MSTI 2, VLAN 15 to MSTI
15, VLAN 16 to MSTI 1, and so on.
Validate the VLAN-to- instance mappings, the region name, and the revision
level.
342
Description
Enable or disable STP globally:
BPDU Protection
343
Item
Description
Set the STP operating mode:
Mode
MSTPAll ports of the device send out MSTP BPDUs. If the device detects that it
is connected to a legacy STP device, the port connecting to the legacy STP
device will automatically migrate to STP-compatible mode.
Set the maximum number of hops in an MST region to restrict the region size.
Max Hops
The setting can take effect only when it is configured on the regional root bridge.
Specify the standard for path cost calculation. It can be Legacy, IEEE
802.1D-1998, or IEEE 802.1T.
Any two stations in a switched network are interconnected through a specific path
composed of a series of devices. The bridge diameter (or the network diameter) is
the number of devices on the path composed of the most devices.
Bridge Diameter
After you set the network diameter, you cannot set the timers. Instead, the device
automatically calculates the forward delay, hello time, and max age.
IMPORTANT:
The network diameter applies to only the CIST. It takes effect only after you
configure it on the root bridge. Each MST region is regarded as a device.
After you set the network diameter, you cannot set the timers. Instead, the device
calculates the forward delay, hello time, and max age automatically.
Set the delay for the root and designated ports to transit to
the forwarding state.
Timers
Forward
Delay
Hello Time
344
TIP:
The settings of
hello time,
forward delay and
max age must
meet a certain
formula.
Otherwise, the
network topology
will not be stable.
H3C recommends
you to set the
network diameter
and then have the
device
automatically
calculate the
forward delay,
hello time, and
max age.
The bridge
diameter cannot
Item
Description
Set the maximum length of time a configuration BPDU can
be held by the device.
Max Age
Instance ID
be configured
together with the
timers.
Instance
Root Type
Bridge
Priority
Set the bridge priority of the device, which is one of the factors determining
whether the device can be elected as the root bridge.
Select whether to enable TC-BPDU guard.
TC Protection
When receiving topology change (TC) BPDUs, the device flushes its forwarding
address entries. If someone forges TC-BPDUs to attack the device, the device will
receive a large number of TC-BPDUs within a short time and frequently flushes its
forwarding address entries. This affects network stability.
With the TC-BPDU guard function, you can prevent frequent flushing of forwarding
address entries.
IMPORTANT:
H3C does not recommend you to disable this function.
TC Protection Threshold
Set the maximum number of immediate forwarding address entry flushes the device
can perform within a certain period of time after receiving the first TC-BPDU.
345
Click the
icon corresponding to a port to enter the MSTP Port Configuration page of the port, as
shown in Figure 330.
Figure 330 MSTP configuration of a port (2)
Description
Port Number
STP Status
Protection Type
Point to Point
Transmit Limit
346
Item
Description
In a switched network, if a port on an MSTP device connects to an STP device, this
port will automatically migrate to the STP-compatible mode. However, after the STP
device is removed, whether the port on the MSTP device can migrate automatically
to the MSTP mode depends on which of the following parameter is selected:
mCheck
Disabledoes not perform mCheck. The port does not automatically migrate
back to the MSTP mode.
Instance ID
Instance
Port Priority
The priority of a port is an import factor in determining whether the port can be
elected as the root port.
Path Cost
Select to calculate the path cost automatically or set the path cost manually.
Description
Configure the port as an edge port.
Edged Port
Some ports of access layer devices are directly connected to PCs or file servers, which
cannot generate BPDUs. You can set these ports as edge ports to achieve fast transition
for these ports.
H3C recommends you to enable the BPDU guard function in conjunction with the edged
port function to avoid network topology changes when the edge ports receive
configuration BPDUs.
Enable the root guard function.
Root Protection
Configuration errors or attacks may result in configuration BPDUs with their priorities
higher than that of a root bridge, which causes a new root bridge to be elected and
network topology change to occur. The root guard function is used to address such a
problem.
Enable the loop guard function.
Loop Protection
By keeping receiving BPDUs from the upstream device, a device can maintain the state of
the root port and other blocked ports. These BPDUs may get lost because of network
congestion or unidirectional link failures. The device will re-elect a root port, and blocked
ports may transit to the forwarding state, causing loops in the network. The loop guard
function is used to address such a problem.
All routers on the network are in the same MST region. Router A and Router B work on the
distribution layer. Router C and Router D work on the access layer.
347
Configure MSTP so that packets of different VLANs are forwarded along different instances:
packets of VLAN 10 along MSTI 1, those of VLAN 30 along MSTI 3, those of VLAN 40 along MSTI
4, and those of VLAN 20 along MSTI 0.
VLAN 10 and VLAN 30 are terminated on the distribution layer routers, and VLAN 40 is terminated
on the access layer routers, so the root bridges of MSTI 1 and MSTI 3 are Router A and Router B
respectively, and the root bridge of MSTI 4 is Router C.
Eth
0/1
Per
mit
0/1
E th
0
3
20,
AN
0/1
Eth it: VL
m
Per
Eth
:V
LA
N 1 0/1
0, 2
0
NOTE:
"Permit:" next to a link in the figure is followed by the VLANs the packets of which are permitted to pass
this link.
Configuration procedure
1.
Create VLAN 10, VLAN 20, and VLAN 30 on Router A and Router B respectively, create VLAN 10,
VLAN 20, and VLAN 40 on Router C, and create VLAN 20, VLAN 30, and VLAN 40 on Router D;
configure the ports on these routers as hybrid ports and assign them to related VLANs; configure the
security zones to which the combinations of these ports and their permitted VLANs belong. The detailed
configuration procedure is omitted.
2.
Configuration on Router A
# Create an MST region named example, map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3,
and MSTI 4 respectively, and configure the revision level of the MST region as 0.
Log in to Router A. Select Advanced > MSTP > Region from the navigation tree, click Modify, and
make the following configurations on the page shown in Figure 332.
348
Click Apply to map VLAN 10 to MSTI 1 and add the VLAN-to-instance mapping entry to the
VLAN-to-instance mapping list.
Repeat the preceding steps to map VLAN 30 to MSTI 3 and VLAN 40 to MSTI 4 and add the
VLAN-to-instance mapping entries to the VLAN-to-instance mapping list.
# Enable MSTP globally and configure the current device as the root bridge of MSTI 1.
Select Advanced > MSTP > Global from the navigation tree, and make the following configurations
on the page shown in Figure 333.
349
3.
Configuration on Router B
# Create an MST region named example, map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3,
and MSTI 4 respectively, and configure the revision level of the MST region as 0. (The procedure here is
the same as that of configuring an MST region on Router A.)
# Enable MSTP globally and configure the current device as the root bridge of MSTI 3.
Select Advanced > MSTP > Global from the navigation tree, and make the following configurations
on the page similar to that shown in Figure 333.
4.
Configuration on Router C
350
# Create an MST region named example, map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3,
and MSTI 4 respectively, and configure the revision level of the MST region as 0. (The procedure here is
the same as that of configuring an MST region on Router A.)
# Enable MSTP globally and configure the current device as the root bridge of MSTI 4.
Select Advanced > MSTP > Global from the navigation tree, and make the following configurations
on the page similar to that shown in Figure 333.
5.
Configuration on Router D
# Create an MST region named example, map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1, MSTI 3,
and MSTI 4 respectively, and configure the revision level of the MST region as 0. (The procedure here is
the same as that of configuring an MST region on Router A.)
# Enable MSTP globally.
Select Advanced > MSTP > Global from the navigation tree, and make the following configurations
on the page similar to that shown in Figure 333.
Port
Role
STP State
Protection
Ethernet0/1
ALTE
DISCARDING
NONE
Ethernet0/2
DESI
FORWARDING
NONE
Ethernet0/3
ROOT
FORWARDING
NONE
Ethernet0/1
DESI
FORWARDING
NONE
Ethernet0/3
DESI
FORWARDING
NONE
Ethernet0/2
DESI
FORWARDING
NONE
Ethernet0/3
ROOT
FORWARDING
NONE
Port
Role
STP State
Protection
Ethernet0/1
DESI
FORWARDING
NONE
Ethernet0/2
DESI
FORWARDING
NONE
Ethernet0/3
DESI
FORWARDING
NONE
Ethernet0/2
DESI
FORWARDING
NONE
Ethernet0/3
ROOT
FORWARDING
NONE
351
Ethernet0/1
DESI
FORWARDING
NONE
Ethernet0/3
DESI
FORWARDING
NONE
Port
Role
STP State
Protection
Ethernet0/1
DESI
FORWARDING
NONE
Ethernet0/2
ROOT
FORWARDING
NONE
Ethernet0/3
DESI
FORWARDING
NONE
Ethernet0/1
ROOT
FORWARDING
NONE
Ethernet0/2
ALTE
DISCARDING
NONE
Ethernet0/3
DESI
FORWARDING
NONE
Port
Role
STP State
Protection
Ethernet0/1
ROOT
FORWARDING
NONE
Ethernet0/2
ALTE
DISCARDING
NONE
Ethernet0/3
ALTE
DISCARDING
NONE
Ethernet0/1
ROOT
FORWARDING
NONE
Ethernet0/2
ALTE
DISCARDING
NONE
Ethernet0/3
ROOT
FORWARDING
NONE
Based on the above information, you can draw the MSTI corresponding to each VLAN, as shown in
Figure 334.
Figure 334 MSTIs corresponding to different VLANs
Configuration guidelines
Follow these guidelines when configuring MSTP:
352
1.
Two or more MSTP-enabled devices belong to the same MST region only if they are configured
with the same format selector (0 by default, not configurable), MST region name, VLAN-to-instance
mapping entries in the MST region, and MST region revision level, and they are interconnected
through physical links.
2.
After specifying the current device as the root bridge or a secondary root bridge, you cannot
change the priority of the device.
3.
If two or more devices with the same bridge priority have been designated to be root bridges of
the same spanning tree instance, MSTP will select the device with the lowest MAC address as the
root bridge.
4.
The values of forward delay, hello time, and max age are interdependent. Inappropriate settings
of these values may cause network flapping. H3C recommends you to set the network diameter
and let the device automatically set an optimal hello time, forward delay, and max age. The
settings of hello time, forward delay and max age must meet the following formulae:
5.
If the device is not enabled with BPDU guard, when an edge port receives a BPDU from another
port, it transits into a non-edge port. To restore its port role as an edge port, you need to restart the
port.
6.
Configure ports that are directly connected to terminals as edge ports and enable BPDU guard for
them. In this way, these ports can rapidly transit to the forwarding state, and network security can
be ensured.
353
RADIUS configuration
You can configure RADIUS through the web interface.
Introduction to RADIUS
The Remote Authentication Dial-In User Service (RADIUS) protocol implements Authentication,
Authorization, and Accounting (AAA).
RADIUS uses the client/server model. It can protect networks against unauthorized access and is often
used in network environments where both high security and remote user access are required. RADIUS
defines the packet format and message transfer mechanism, and uses UDP as the transport layer protocol
for encapsulating RADIUS packets. It uses UDP port 1812 for authentication and UDP port 1813 for
accounting.
RADIUS was originally designed for dial-in user access. With the addition of new access methods,
RADIUS has been extended to support additional access methods, for example, Ethernet and ADSL.
RADIUS provides access authentication and authorization services, and its accounting function collects
and records network resource usage information.
NOTE:
For more information about RADIUS and AAA, see the H3C MSR Series Routers Security Configuration
Guide.
354
Description
Scheme Name
Common Configuration
Configure the common parameters for the RADIUS scheme, including the server
type, the username format, and the shared keys for authentication and accounting
packets. For more information about common configuration, see Common
configuration.
RADIUS Server
Configuration
Common configuration
Click the expand button before Advanced in the Common Configuration area to expand the advanced
configuration area, as shown in Figure 337.
355
Description
Select the type of the RADIUS servers supported by the device, which can be:
server by using the standard RADIUS protocol and packet format defined in RFC
2865/2866 or later.
356
Item
Description
Select the format of usernames to be sent to the RADIUS server, including Original
format, With domain name, and Without domain name.
Username Format
Authentication Key
Confirm Authentication
Key
Accounting Key
The shared keys configured in the common configuration part are used only when no
corresponding shared keys are configured in the RADIUS server configuration part.
Set the time to wait before the device restores an unreachable RADIUS server to
active state.
Quiet Time
Request Transmission
Attempts
IMPORTANT:
The server response timeout
time multiplied by the
maximum number of RADIUS
packet transmission attempts
must not exceed 75.
Set the interval for sending real-time accounting information to the RADIUS
accounting server. The interval must be a multiple of 3.
Realtime Accounting
Interval
357
Item
Description
Realtime Accounting
Attempts
Set the maximum number of attempts for sending a real-time accounting request.
Specify the unit for data flows sent to the RADIUS server, which can be byte,
kilo-byte, mega-byte, or giga-byte.
Specify the unit for data packets sent to the RADIUS server, which can be
one-packet, kilo-packet, mega-packet, or giga-packet
Specify the VPN to which the RADIUS scheme belongs.
VPN
This setting is effective to all RADIUS authentication servers and accounting servers
configured in the RADIUS scheme, but the VPN individually specified for a RADIUS
authentication or accounting server takes priority.
Buffer stop-accounting
packets
Stop-Accounting
Attempts
Send accounting-on
packets
Enable or disable the accounting-on feature, and set the interval and the maximum
number of attempts for sending accounting-on packets
Accounting-On Interval
Accounting-On Attempts
When enabling the accounting-on feature on a device for the first time, you must save
the configuration so that the feature takes effect after the device reboots.
Attribute
Interpretation
Enable or disable the device to interpret the RADIUS class attribute as CAR
parameters.
358
Description
Server Type
Select the type of the RADIUS server to be configured. Possible values include
primary authentication server, primary accounting server, secondary
authentication server, and secondary accounting server.
IP Address
Port
Key
Specify the shared key for communication with the RADIUS server.
Confirm Key
If no shared key is specified here, the shared key specified in the common
configuration part is used.
Specify the VPN to which the RADIUS server belongs.
VPN
If no VPN is specified here, the VPN specified in the common configuration part is
used.
IMPORTANT:
Support for this configuration item depends on your device model.
As shown in Figure 339, connect the Telnet user to the router and the router to the RADIUS server.
Run the CAMS/iMC Server on the RADIUS server to provide authentication, authorization, and
accounting services for Telnet users. The IP address of the RADIUS server is 10.1.1.1/24.
Set the shared keys for authentication, authorization, and accounting packets exchanged between
the router and the RADIUS server to expert and specify the ports for authentication/authorization
and accounting as 1812 and 1813 respectively.
Specify that a username sent to the RADIUS server carries the domain name.
Add an account on the RADIUS server, with the username and password being hello@bbb and abc.
If the user passes authentication, it is assigned a privilege level of 3.
359
Eth0/1
192.168.1.70/24
Telnet user
192.168.1.58/24
Eth0/2
10.1.1.2/24
Internet
Router
Configuration procedure
1.
Set the shared keys for authentication and accounting both to expert.
Specify the ports for authentication and accounting as 1812 and 1813 respectively.
Click OK.
# Add a user.
From the navigation tree, select User Management > User for Device Management, and then in the right
pane, click Add to enter the Add Account page and perform the following configurations, as shown in
Figure 341.
Figure 341 Add a user account
Set the EXEC privilege level to 3. This value identifies the privilege level of the Telnet user after login,
which is 0 by default.
Specify the IP address range of the hosts to be managed as 192.168.1.0 to 192.168.1.255, and click
Add.
361
Specify the ports for authentication and accounting as 1812 and 1813 respectively.
Select the access device from the device list or manually add the device with the IP address of
10.1.1.2.
NOTE:
The IP address of the access device must be the same as the source IP address of the RADIUS packets sent
from the router. By default, the source IP address of a RADIUS packet is the IP address of the sending
interface.
# Add a user account.
Log into the iMC management platform, select the User tab, and select Access User View > All Access
Users from the navigation tree to enter the All Access Users page. Then, click Add to enter the Add Device
Management User page and perform the following configurations, as shown in Figure 343.
362
Set the EXEC privilege level to 3. This value identifies the privilege level of the Telnet user after login,
which is 0 by default.
Click Add under IP Address List of Managed Devices, and then specify the IP address range of the
hosts to be managed as 10.1.1.0 to 10.1.1.255.
NOTE:
The IP address range of the hosts to be managed must contain the IP address of the access device added.
2.
# Configure the IP address of each interface. Detailed configuration steps are omitted here.
Select Advanced > RADIUS from the navigation tree to enter the RADIUS scheme list page. Click
Add and perform the following configuration.
In the RADIUS Server Configuration area, click Add to enter the RADIUS server configuration page,
and perform the configuration as shown in Figure 344.
363
In the RADIUS Server Configuration area, click Add again to add a RADIUS accounting server as
shown in Figure 345.
Click Apply. The RADIUS scheme configuration page refreshes and the added servers appear in
the server list, as shown in Figure 346. Click Apply to finish the scheme configuration.
364
# Configure the AAA methods for domain bbb. As RADIUS authorization information is sent by the
RADIUS server to the RADIUS client in the authentication response message, be sure to reference the
same scheme for authentication and authorization.
[Router] domain bbb
[Router-isp-bbb] authentication login radius-scheme system
[Router-isp-bbb] authorization login radius-scheme system
[Router-isp-bbb] accounting login radius-scheme system
[Router-isp-bbb] quit
# You can achieve the same result by configuring default AAA methods for all types of users in domain
bbb. (You can use either approach as needed)
[Router] domain bbb
[Router-isp-bbb] authentication default radius-scheme system
[Router-isp-bbb] authorization default radius-scheme system
[Rfm
Verification
After the configuration, the Telnet user should be able to telnet to the router and use the configured
account (username hello@bbb and password abc) to enter the user interface of the router, and access all
the commands of level 0 through level 3.
365
Configuration guidelines
When you configure the RADIUS client, note the following guidelines:
1.
2.
If you remove the accounting server used for online users, the router cannot send real-time
accounting requests and stop-accounting messages for the users to the server, and the
stop-accounting messages are not buffered locally.
3.
The status of RADIUS serversblocked or activedetermines which servers the device will
communicate with or turn to when the current servers are not available. In practice, you can
specify one primary RADIUS server and multiple secondary RADIUS servers, with the secondary
servers that function as the backup of the primary servers. Generally, the device chooses servers
based on these rules:
When the primary server is in the active state, the device communicates with the primary server. If
the primary server fails, the device changes the state of the primary server to blocked, starts a quiet
timer for the server, and turns to a secondary server in the active state (a secondary server
configured earlier has a higher priority). If the secondary server is unreachable, the device changes
the state of the secondary server to blocked, starts a quiet timer for the server, and continues to
check the next secondary server in the active state. This search process continues until the device
finds an available secondary server or has checked all secondary servers in the active state. If the
quiet timer of a server expires or an authentication or accounting response is received from the
server, the status of the server changes back to active automatically, but the device does not check
the server again during the authentication or accounting process. If no server is found reachable
during one search process, the device considers the authentication or accounting attempt a failure.
Once the accounting process of a user starts, the device keeps sending the users real-time
accounting requests and stop-accounting requests to the same accounting server. If you remove the
accounting server, real-time accounting requests and stop-accounting requests for the user cannot
be delivered to the server any more.
If you remove an authentication or accounting server in use, the communication of the device with
the server will soon time out, and the device will look for a server in the active state from scratch: it
checks the primary server (if any) first and then the secondary servers in the order they are
configured.
When the primary server and secondary servers are all in the blocked state, the device
communicates with the primary server. If the primary server is available, its statues changes to
active. Otherwise, its status remains to be blocked.
If one server is in the active state but all the others are in the blocked state, the device only tries to
communicate with the server in the active state, even if the server is unavailable.
After receiving an authentication/accounting response from a server, the device changes the status
of the server identified by the source IP address of the response to active if the current status of the
server is blocked.
4.
1 to 99
100 to 499
500 to 999
12
366
Number of users
1000 or more
15
367
Description
Login Type
User IP Address
Wildcard
Exclude the management IP segment from login control; otherwise, you cannot log
in to the device.
Do not set the wildcard to 255.255.255.255; otherwise, all users cannot log in to
the device.
368
Configuration procedure
# Configure a login control rule so that Host A cannot telnet to Router.
Select Advanced > Access from the navigation tree to enter the page for configuring login control
rules. Perform the configurations shown in Figure 349.
Figure 349 Configure a login control rule so that Host A cannot telnet to Router
Click Apply. A dialog box appears, asking you whether to continue your operation.
Click OK. A configuration progress dialog box appears, as shown in Figure 350.
369
# Configure a login control rule so that Host B cannot access Router through the Web.
Select Advanced > Access from the navigation tree to enter the page for configuring login control
rules. Perform the configurations shown in Figure 351.
Figure 351 Configure a login control rule so that Host B cannot access Router through the Web
Click Apply. A dialog box appears, asking you whether to continue your operation.
Click OK. A configuration progress dialog box that is similar to Figure 350 appears.
370
ARP configuration
You can do the following to configure ARP on the web interface:
The Address Resolution Protocol (ARP) is used to resolve an IP address into a physical address (Ethernet
MAC address, for example).
In an Ethernet LAN, a device uses ARP to resolve the IP address of the next hop to the corresponding
MAC address.
NOTE:
For more information about ARP, see the H3C MSR Series Routers Layer 3IP Services Configuration
Guide.
Determine whether its IP address is already used by another device. If the IP address is already used,
the device will be informed of the conflict by an ARP reply;
371
Description
IP Address
MAC Address
VLAN ID
Advanced
Options
Type a VLAN ID and specify a port for the static ARP entry.
IMPORTANT:
Port
The VLAN ID must be the ID of the VLAN that has already been created, and the port
must belong to the VLAN. The corresponding VLAN interface must have been
created.
VPN
Instance
Type the name of the VPN instance to which the static ARP entry belongs.
To remove specific ARP entries, select the check boxes of target ARP entries, and click Del Selected.
To remove all static and dynamic ARP entries, click Delete Static and Dynamic.
To disable all the listed interfaces from learning dynamic ARP entries, click Disable all.
To disable specific interfaces from learning dynamic ARP entries, select target interfaces and click
Disable selected.
To allow all the listed interfaces to learn dynamic ARP entries, click Enable all.
To allow specific interfaces to learn dynamic ARP entries, select target interfaces and click Enable
selected.
icon of an interface to enter the configuration page as shown in Figure 355, and
Click the
specify the maximum number of dynamic ARP entries that this interface can learn. If you type 0, the
interface is disabled from learning dynamic ARP entries.
373
NOTE:
If you enable an interface to learn dynamic ARP entries on the dynamic entry management page, the
number of dynamic ARP entries that the interface can learn restores the default.
Description
374
Configuration procedure
# Create VLAN 10 and VLAN-interface 10.
Select Interface Setup > LAN Interface Setup from the navigation tree to enter the default VLAN
Setup page. Perform the following configurations, as shown in Figure 358.
Click Apply.
As shown in Figure 359, on the VLAN Setup page, select 10 in the VLAN Config field.
Click Add to bring up the configuration progress dialog box, as shown in Figure 360.
Click the VLAN Interface Setup tab. Perform the following configurations, as shown in Figure 361.
376
Click Apply.
Select Advanced > ARP Management > ARP Table from the navigation tree and click Add. Perform
the following configurations, as shown in Figure 362.
377
Click Apply.
After the above configuration is complete, the page returns to display ARP entries. Select Type for
Search.
Type Static.
Click Search. Then you can view the static ARP entries of Router A, as shown in Figure 363.
378
379
Overview
Although ARP is easy to implement, it provides no security mechanism and thus is prone to network
attacks. ARP attacks and viruses are threatening LAN security. The router can provide the following
features to detect and prevent such attacks.
Prevent the virtual IP address of a VRRP group from being used by a host
Update MAC entries of devices in the VLANs having ambiguous VLAN termination configured
With ARP automatic scanning enabled on an interface, the device automatically scans neighbors
on the interface, sends ARP requests to the neighbors, obtains their MAC addresses, and creates
dynamic ARP entries.
Fixed ARP allows the device to change the existing dynamic ARP entries (including those generated
through ARP automatic scanning) into static ARP entries.
The ARP automatic scanning and fixed ARP feature effectively prevent ARP entries from being modified
by attackers. Use the two functions in a small-sized network with stable environment, such as a cybercaf.
380
Description
Select one or more interfaces on which gratuitous ARP packets will be sent out
periodically, and set the interval at which gratuitous ARP packets are sent.
To enable an interface to send out gratuitous ARP packets periodically, select the
interface from the Standby Interface list box and click <<. To disable an interface from
periodic sending of gratuitous ARP packets, select the interface from the Sending
Interface list box and click >>.
IMPORTANT:
You can enable periodic sending of gratuitous ARP packets on a maximum of 1024
Sending Interface
interfaces.
This feature takes effect only when the link of the enabled interface goes up and an
IP address has been assigned to the interface.
If you change the interval for sending gratuitous ARP packets, the configuration is
effective at the next sending interval.
The frequency of sending gratuitous ARP packets may be much lower than is
expected if this function is enabled on multiple interfaces, or each interface is
configured with multiple secondary IP addresses, or a small sending interval is
configured in the preceding cases.
381
Description
Interface
To reduce the scanning time, you can specify the address range for scanning.
Start IP Address
If no IP address range is specified, the device only scans the network where
the primary IP address of the interface resides for neighbors, and sends ARP
requests in which the sender IP address is the primary IP address of the
interface.
IMPORTANT:
You must specify both the start IP address and the end IP address. Otherwise,
End IP Address
Start and end IP addresses must be on the same network segment as the
primary IP address or a specific manually configured secondary IP address of
the interface. The end IP address must be higher than or equal to the start IP
address.
After the preceding configuration is complete, click Scan to start an ARP automatic scan. To stop an
ongoing scan, click Interrupt. After the scanning is complete, a prompt Scanning is complete appears.
You can view the generated dynamic ARP entries by selecting Advanced > ARP Anti-Attack > Fixed ARP
from the navigation tree.
382
NOTE:
The static ARP entries changed from dynamic ARP entries have the same attributes as the static ARP
entries manually configured.
The number of static ARP entries changed from dynamic ARP entries is restricted by the number of static
ARP entries that the device supports. As a result, the device may fail to change all dynamic ARP entries
into static.
Suppose that the number of dynamic ARP entries is D and that of the existing static ARP entries is S.
When the dynamic ARP entries are changed into static, new dynamic ARP entries may be created
(suppose the number is M) and some of the dynamic ARP entries may be aged out (suppose the number
is N). After the process is complete, the number of static ARP entries is D + S + M N.
Select Advanced > ARP Anti-Attack > Fix from the navigation tree to enter the page shown in Figure 366.
The page displays all dynamic ARP entries and static ARP entries (including manually configured and
changed by the fixed ARP feature).
Figure 366 Fixed ARP configuration page
To change all dynamic ARP entries into static, click Fix All. This operation does not affect existing
static ARP entries.
To remove all static ARP entries, click Del All Fixed. This operation does not affect dynamic ARP
entries.
To change a specific dynamic ARP entry into static, select the ARP entry and click Fix. This operation
does not take effect if you select a static ARP entry.
To remove a specific static ARP entry, select the ARP entry and click Del Fixed. This operation does
not take effect if you select a dynamic ARP entry.
383
Overview
IP Security (IPsec) is a security framework defined by the Internet Engineering Task Force (IETF) for
securing IP communications. It is a Layer 3 virtual private network (VPN) technology that transmits data
in a secure tunnel established between two endpoints.
IPsec provides the following security services in insecure network environments:
ConfidentialityThe sender encrypts packets before transmitting them over the Internet, protecting
the packets from being eavesdropped en route.
Data integrityThe receiver verifies the packets received from the sender to ensure they are not
tampered with during transmission.
Anti-replayThe receiver examines packets and drops outdated and duplicate packets.
Reduced key negotiation overheads and simplified maintenance by supporting the Internet Key
Exchange (IKE) protocol. IKE provides automatic key negotiation and automatic IPsec security
association (SA) setup and maintenance.
Good compatibility. You can apply IPsec to all IP-based application systems and services without
modifying them.
Encryption on a per-packet rather than per-flow basis. Per-packet encryption allows for flexibility
and greatly enhances IP security.
Internet Key Exchange (IKE) is built on a framework defined by the Internet Security Association and Key
Management Protocol (ISAKMP). It provides automatic key negotiation and SA establishment services for
IPsec, simplifying the application, management, configuration and maintenance of IPsec dramatically.
Instead of transmitting keys directly across a network, IKE peers transmit keying materials between them,
and calculate shared keys respectively. Even if a third party captures all exchanged data for calculating
the keys, it cannot calculate the keys.
NOTE:
For more information about IPsec and IKE, see the H3C MSR Series Routers Security Configuration Guide.
384
Remarks
Required
Optional
385
Description
Interface
Network Type
Remote Gateway
Address/Hostname
The IP address can be a host IP address or an IP address range. If the local end is the
initiator of IKE negotiation, it can have only one remote IP address and its remote IP
address must match the local IP address configured on its peer. If the local end is the
responder of IKE negotiation, it can have more than one remote IP address and one
of its remote IP addresses must match the local IP address configured on its peer.
The remote host name uniquely identifies the remote gateway in the netowrk, and
can be resolved into an IP address by the DNS server. The local end can be the
initiator of IKE negotiation when the host name is specified.
386
Item
Description
Type the IP address of the local gateway.
By default, it is the primary IP address of the interface where the IPsec connection is
set up.
IMPORTANT:
Configure this item when you want to specify a special address (a loopback
interface address, for example) for the local gateway. The name or IP address
of the remote gateway is required for an initiator so that the initiator can find
the remote peer in negotiation.
Select the authentication method to be used by the IKE negotiation. Options include:
IP AddressUses an IP address as
the ID in IKE negotiation.
Remote ID Type
IP AddressUses an IP address as
the ID in IKE negotiation.
IMPORTANT:
remote gateway.
IMPORTANT:
387
Item
Destination
Address/Wildcard
Description
To ensure that SAs can be set up, configure the source address/wildcard
on one peer as the destination address/wildcard on the other, and the
destination address/wildcard on one peer as the source address/wildcard
on the other. If you do not configure the parameters this way, SAs can be
set up only when the IP addresses configured on one peer are subsets of
those configured on the other and the peer with the narrower address
range initiates SA negotiation.
If the data range is designated by the remote gateway, the local peer
cannot initiate a negotiation.
Enable or disable IPsec RRI. When enabling IPsec RRI, you can specify a next hop
and change the preference of the static routes.
After an outbound IPsec SA is created, IPsec RRI automatically creates a static route
to the peer private network. You do not have to manually configure the static route.
IMPORTANT:
If you enable IPsec RRI and do not configure the static route, the SA
negotiation must be initiated by the remote gateway.
IPsec RRI creates static routes when IPsec SAs are set up, and delete the
static routes when the IPsec SAs are deleted.
To view the static routes created by IPsec RRI, select Advanced > Route
Setup [Summary] from the navigation tree.
Specify a next hop for the static routes.
Next Hop
If you do not specify any next hop, the remote tunnel endpoints address learned
during IPsec SA negotiation is used.
Change the preference of the static routes.
Priority
Change the route preference for equal-cost multipath (ECMP) routing or route
backup. If multiple routes to the same destination have the same preference, traffic is
balanced among them. If multiple routes to the same destination have different
preference values, the route with the highest preference forwards traffic and all other
routes are backup routes.
On the page for adding an IPsec connection, click Advanced Configuration to expand the advanced
configuration area, as shown in Figure 369.
388
Description
Phase 1
Select the IKE negotiation mode in phase 1, which can be main or aggressive.
IMPORTANT:
Exchange Mode
Authentication
Algorithm
SHA1Uses HMAC-SHA1.
MD5Uses HMAC-MD5.
389
Item
Description
Select the encryption algorithm to be used in IKE negotiation. Options include:
Encryption Algorithm
IMPORTANT:
Phase 2
Select the security protocols to be used. Options include:
Security Protocol
AH Authentication
Algorithm
ESP Authentication
Algorithm
You can select MD5 or SHA1, or select NULL so that ESP performs no authentication.
IMPORTANT:
The ESP authentication algorithm and ESP encryption algorithm cannot be null
at the same time.
390
Item
Description
Select the encryption algorithm for ESP when you select ESP or AH-ESP for Security
Protocol. Options include:
ESP Encryption
Algorithm
Higher security means more complex implementation and lower speed. DES
is enough to meet general requirements. Use 3DES when high confidentiality
and security are required.
The ESP authentication algorithm and ESP encryption algorithm cannot be
null at the same time.
Select the IP packet encapsulation mode. Options include:
Encapsulation Mode
PFS
NoneDisables PFS.
Diffie-Hellman Group1Enables PFS and uses the 768-bit Diffie-Hellman group.
Diffie-Hellman Group2Enables PFS and uses the 1024-bit Diffie-Hellman group.
Diffie-Hellman Group5Enables PFS and uses the 1536-bit Diffie-Hellman group.
Diffie-Hellman Group14Enables PFS and uses the 2048-bit Diffie-Hellman group.
IMPORTANT:
IMPORTANT:
When negotiating to set up IPsec SAs, IKE uses the smaller one between the
lifetime set locally and the lifetime proposed by the peer.
Enables or disables IKE dead peer detection (DPD).
DPD
DPD irregularly detects dead IKE peers. When the local end sends an IPsec packet,
DPD checks the time the last IPsec packet was received from the peer. If the time
exceeds the DPD interval, it sends a DPD hello to the peer. If the local end receives no
DPD acknowledgement within the DPD packet retransmission interval, it retransmits the
DPD hello. If the local end still receives no DPD acknowledgement after having made
the maximum number of retransmission attempts (two by default), it considers the peer
already dead, and clears the IKE SA and the IPsec SAs based on the IKE SA.
391
Item
Description
DPD Query
Triggering Interval
Type the interval after which DPD is triggered if no IPsec protected packets is received
from the peer.
DPD Packet
Retransmission
Interval
Type the interval after which DPD packet retransmission will occur if no DPD response
is received.
Description
Status of an IPsec connection. Possible values include:
Connection Status
Connected
Disconnected
UnconfiguredThe IPsec connection is disabled.
392
Field
Description
The most recent error, if any. Possible values include:
Description
Characteristics of Traffic
SPI
The inbound and outbound SPIs, and the security protocols used.
Configuration procedure
1.
Configure Router A
Select VPN > IPsec VPN from the navigation tree, and then click Add. The IPsec connection configuration
page appears, as shown in Figure 372.
Figure 372 Add an IPsec connection
Click Apply.
2.
Configure Router B
394
Select the Interface check box and then select Ethernet0/1 as the interface.
Click Apply.
Click Apply.
Verification
After you complete the configuration, packets to be exchanged between subnet 10.1.1.0/24 and subnet
10.1.2.0/24 triggers the negotiation of SAs by IKE. After IKE negotiation succeeds and the IPsec SAs are
established, a static route to subnet 10.1.2.0/24 via 2.2.2.2 is added to the routing table on Device A,
and traffic between subnet 10.1.1.0/24 and subnet 10.1.2.0/24 is protected by IPsec.
Configuration guidelines
When configuring IPsec, follow these guidelines:
Typically, IKE uses UDP port 500 for communication, and AH and ESP use the protocol numbers 51
and 50 respectively. Make sure that flows of these protocols are not denied on the interfaces with
IKE or IPsec configured.
395
If you enable both IPsec and QoS on an interface, traffic of an IPsec SA may be put into different
queues by QoS, causing some packets to be sent out of order. As IPsec performs anti-replay
operation, packets outside the anti-replay window in the inbound direction may be discarded,
resulting in packet loss. When using IPsec together with QoS, ensure that the characteristics of
traffic in IPsec is the same as classification of traffic in QoS.
396
L2TP configuration
You can perform the following configurations for the LNS of an L2TP tunnel in the web interface:
Enabling L2TP
L2TP overview
A virtual private dial-up network (VPDN) is a virtual private network (VPN) that utilizes the dial-up function
of public networks such as ISDN or PSTN networks to provide access services for enterprises, small
Internet service providers (ISPs), and telecommuters. VPDN provides an economical and effective,
point-to-point way for remote users to connect to their private LANs.
The VPDN technology uses a tunneling protocol to build secure VPNs across public networks for
enterprises. Branches away from the headquarters and staff on business trips can remotely access the
Intranet resources in the headquarters through a virtual tunnel over public networks, while other users on
the public networks cannot.
There are primarily three VPDN tunneling protocols:
L2TP is the most widely-used VPDN tunneling protocol. Figure 374 shows a typical VPDN built by using
L2TP.
Figure 374 VPDN built by using L2TP
Remote user
LAC
PPPoE/ISDN
LNS
Internet
L2TP tunnel
Remote branch
Internal server
Remote system
A remote system is usually a remote users host or a remote branchs routing device that needs to access
the VPDN network.
LAC
397
An L2TP access concentrator (LAC) is a device that has PPP and L2TP capabilities. An LAC is usually a
Network Access Server (NAS) located at a local ISP, which provides access services mainly for PPP users.
An LAC is an endpoint of an L2TP tunnel and lies between an LNS and a remote system. It encapsulates
packets received from a remote system using L2TP and then sends the resulting packets to the LNS. It
de-encapsulates packets received from the LNS and then sends the resulting packets to the intended
remote system.
Between an LAC and a remote system is a local connection or a PPP link. Usually, a PPP link is used in
a VPDN application.
LNS
An L2TP network server (LNS) functions as both the L2TP server and the PPP end system. It is usually an
edge device on an enterprise network.
An LNS is the other endpoint of an L2TP tunnel and is a peer to the LAC. It is the logical termination point
of a PPP session tunneled by the LAC. The L2TP extends the termination point of a PPP session from a NAS
to an LNS, logically.
NOTE:
For more information about L2TP, see the H3C MSR Series Routers Layer 2WAN Configuration Guide.
Configuring L2TP
L2TP configuration task list
Table 176 L2TP configuration task list
Task
Enabling L2TP
Remarks
Required
By default, L2TP is disabled.
Required
Optional
View the L2TP tunnel information.
Enabling L2TP
Select VPN > L2TP > L2TP Config from the navigation tree to enter the L2TP configuration page, as shown
in Figure 375. On the upper part of the page, you can enable or disable L2TP.
398
Description
Enable L2TP
399
Description
Tunnel Authentication
Authentication Password
IMPORTANT:
400
Item
Description
Authentication
Method
Select the authentication method for PPP users on the local end.
You can select PAP or CHAP. If you do not select an authentication
method, no authentication will be performed.
Specify the ISP domain for PPP user authentication. You can:
Select an ISP domain and click Modify to enter the ISP domain
modification page. See Table 179 for configuration details.
PPP
Authentication
Configuration
Select an ISP domain and click Delete to delete the ISP domain.
Note that:
ISP Domain
If you do not specify any ISP domain, the system will check
whether domain information is carried in a username. If yes,
the domain will be used for authentication (if the domain does
not exist, the authentication will fail); otherwise, the default
domain (system by default) will be used for authentication.
PPP Server IP/Mask
PPP Address
User Address
Advance d
Configuration
Hello Interval
401
Item
Description
Specify whether to transfer Attribute Value Pair (AVP) data in
hidden mode.
AVP Hidden
With L2TP, some parameters are transferred as AVP data. You can
configure an LAC to transfer AVP data in hidden mode, namely,
encrypt AVP data before transmission, for higher security.
This configuration takes effect only on a LAC.
Specify whether to enable flow control for the L2TP tunnel.
Flow Control
The L2TP tunnel flow control function is for control of data packets
in transmission. The flow control function helps in buffering and
adjusting the received out-of-order data packets.
402
Item
Description
Configure user authentication on an LNS.
Mandatory CHAP
403
Description
ISP Domain
404
Item
Description
Specify whether to enable the accounting optional function.
Accounting
Optional
Accounting
Methods
Description
ISP Domain
If you set the IP address pool number to 1, the name of the IP address pool is
pool1.
Start IP
Specify the start IP address and end IP address of the IP address pool.
405
Item
Description
End IP
The number of addresses between the start IP address and end IP address
must not exceed 1024. If you specify only the start IP address, the IP address
pool will contain only one IP address, namely, the start IP address.
Description
Local Tunnel ID
Peer Tunnel ID
Peer Tunnel IP
Session Count
The user first connects to the Internet, and then initiates a tunneling request to the LNS directly.
2.
After the LNS accepts the connection request, an L2TP tunnel is set up between the LNS and the
VPN user.
3.
The VPN user communicates with the headquarters over the tunnel.
406
Configuration procedure
1.
Assign an IP address (2.1.1.1 in this example) to the user host, configure a route to ensure the reachability
of the LNS (1.1.2.2), and create a virtual private network connection using the Windows operating system,
or install L2TP client software such as WinVPN Client and connect to the Internet in dial-up mode. Then,
perform the following configurations (the configuration order may vary with the client software):
Set the Internet interface address of the security gateway as the IP address of the LNS. In this
example, the Ethernet interface on the LNS, the interface for the tunnel, has an IP address of 1.1.2.2.
Modify the connection attributes, setting the protocol to L2TP, the encryption attribute to customized
and the authentication mode to CHAP.
2.
Select System Management > Users from the navigation tree, and then click the Create User tab
and perform the configurations shown in Figure 381.
Click Apply.
# Enable L2TP.
Select VPN > L2TP > L2TP Config from the navigation tree. Then, perform the configurations shown
in Figure 382.
Click Apply.
On the L2TP configuration page, click Add and then perform the following configurations.
Click the Modify button of the ISP domain to perform the configurations shown in Figure 383.
408
Click the Add button of the User Address parameter and then perform the configurations shown in
Figure 384.
Click Apply to finish the IP address pool configuration and return to the L2TP group configuration
page.
Select Enable from the Assign Address Forcibly drop-down list. Figure 385 shows the L2TP group
configuration page after the above configurations.
Click Apply.
409
Verification
# On the user host, initiate an L2TP connection to the LNS. The host will obtain an IP address
(192.168.0.2) and will be able to ping the private address of the LNS (192.168.0.1).
# On the LNS, select VPN > L2TP > Tunnel Info from the navigation tree. Information of the established
L2TP tunnel should appears, as shown in Figure 386.
Figure 386 L2TP tunnel information
410
GRE configuration
You can configure GRE over IPv4 tunnels in the web interface.
GRE overview
Introduction to GRE
Generic Routing Encapsulation (GRE) is a protocol designed for encapsulating and carrying the packets
of one network layer protocol (for example, IP or IPX) over another network layer protocol (for example,
IP). GRE is a tunneling technology and serves as a Layer 3 tunneling protocol.
A GRE tunnel is a virtual point-to-point connection for transferring encapsulated packets. Packets are
encapsulated at one end of the tunnel and de-encapsulated at the other end. Figure 387 depicts the
encapsulation and de-encapsulation processes.
Figure 387 X protocol networks interconnected through the GRE tunnel
NOTE:
For more information about GRE, see the H3C MSR Series Routers Layer 3IP Services Configuration
Guide.
Remarks
Required
Create a tunnel interface and configure GRE tunnel related parameters.
411
Task
Remarks
Optional
Each end of the tunnel must have a route (static or dynamic) through the
tunnel to the other end, so that GRE encapsulated packets can be forwarded
normally.
For more configuration information, see the chapter Route configuration.
Description
Tunnel Interface
412
Item
Description
Specify the IP address and subnet mask of the tunnel interface.
IP/Mask
IMPORTANT:
When configuring a static route on the tunnel interface, note that the destination IP
address of the static route must not be in the subnet of the tunnel interface.
Tunnel Source
IP/Interface
Specify the source IP address and destination IP address for the tunnel interface.
For the tunnel source address, you can input an IP address or select an interface. In
the latter case, the primary IP address of the interface will be used as the tunnel
source address.
IMPORTANT:
Tunnel Destination IP
GRE Key
The source address and destination address of a tunnel uniquely identify a path. They
must be configured at both ends of the tunnel and the source address at one end must
be the destination address at the other end and vice versa.
Specify the key for the GRE tunnel interface. This configuration is to prevent the
tunnel ends from servicing or receiving packets from other places.
IMPORTANT:
The two ends of a tunnel must have the same key or have no key at the same time.
Keepalive
With the GRE keepalive function enabled on a tunnel interface, the device sends
GRE keepalive packets from the tunnel interface periodically. If no response is
received from the peer within the specified interval, the device retransmits the
keepalive packet. If the device still receives no response from the peer after sending
the keepalive packet for the maximum number of attempts, the local tunnel interface
goes down and stays down until it receives a keepalive acknowledgement packet
from the peer.
Keepalive Interval
Specify the interval between sending the keepalive packets and the maximum
number of transmission attempts.
Number of Retries
The two configuration items are available when you select Enable for the GRE
keepalive function.
Configuration procedure
413
NOTE:
Before the configuration, make sure that Router A and Router B are reachable to each other.
1.
Configure Router A
icon of
Click Apply.
# Configure an IP address for interface Ethernet 0/1, the physical interface of the tunnel.
Click the
icon of interface Ethernet 0/1 and then perform the configurations shown in Figure 392.
414
Click Apply.
415
Type the source end IP address 1.1.1.1, the IP address of Ethernet 0/1.
Type the destination end IP address 2.2.2.2, the IP address of Ethernet 0/1 on Router B.
Click Apply.
Select the check box before Interface, and then select egress interface Tunnel0.
Click Apply.
2.
Configure Router B
416
icon of interface
Click Confirm.
# Configure an IP address for interface Ethernet 0/1, the physical interface of the tunnel.
Click the
icon of interface Ethernet 0/1 and then perform the configurations shown in Figure 396.
417
Click Confirm.
418
Type the source end IP address 2.2.2.2, the IP address of Ethernet 0/1.
Type the destination end IP address 1.1.1.1, the IP address Ethernet 0/1 on Router A.
Click Apply.
Select the check box before Interface, and then select egress interface Tunnel0.
Click Apply.
Select Other > Diagnostic Tools from the navigation tree of Router B, and then click the Ping tab.
Click Start.
View the result of the ping operation in the Summary area, as show in Figure 399:
419
420
Certificate management
You can do the following to configure certificate management on the web interface:
Introduction to PKI
The Public Key Infrastructure (PKI) is a general security infrastructure for providing information security
through public key technologies, and it is the most widely applied encryption mechanism currently.
H3C's PKI system provides certificate management for IP Security (IPsec), Secure Sockets Layer (SSL), and
WLAN Authentication and Privacy Infrastructure (WAPI).
PKI, also called asymmetric key infrastructure, uses a key pair to encrypt and decrypt data. The key pair
consists of a private key and a public key. The private key must be kept secret but the public key needs
to be distributed. Data encrypted by one of the two keys can only be decrypted by the other.
A key problem of PKI is how to manage the public keys. Currently, PKI employs the digital certificate
mechanism to solve this problem. The digital certificate mechanism binds public keys to their owners,
helping distribute public keys in large networks securely.
With digital certificates, the PKI system provides network communication and e-commerce with security
services such as user authentication, data non-repudiation, data confidentiality, and data integrity.
The PKI technology can satisfy the security requirements of online transactions. As an infrastructure, PKI
has a wide range of applications. Here are some application examples:
VPNA virtual private network (VPN) is a private data communication network built on the public
communication infrastructure. A VPN can leverage network layer security protocols (for instance,
IPsec) in conjunction with PKI-based encryption and digital signature technologies to achieve
confidentiality.
Web securityFor Web security, two peers can establish a Secure Sockets Layer (SSL) connection
first for transparent and secure communications at the application layer. With PKI, SSL enables
encrypted communications between a browser and a server. Both the communication parties can
verify the identity of each other through digital certificates.
421
Operation of PKI
In a PKI-enabled network, an entity can request a local certificate from the CA and the device can check
the validity of certificate. The following describes how it works:
1.
2.
The RA verifies the identity of the entity and then sends the identity information and the public key
with a digital signature to the CA.
3.
The CA verifies the digital signature, approves the application, and issues a certificate.
4.
The RA receives the certificate from the CA, sends it to the LDAP server to provide directory
navigation service, and notifies the entity that the certificate is successfully issued.
5.
The entity retrieves the certificate. With the certificate, the entity can communicate with other
entities safely through encryption and digital signature.
6.
The entity makes a request to the CA when it needs to revoke its certificate. The CA approves the
request, updates the CRLs and publishes the CRLs on the LDAP server.
Configuring PKI
Configuration task list
The system supports the following PKI certificate request modes:
ManualIn manual mode, you need to retrieve a CA certificate, generate a local RSA key pair,
and submit a local certificate request for an entity.
AutoIn auto mode, an entity automatically requests a certificate through the Simple Certification
Enrollment Protocol (SCEP, a dedicated protocol for an entity to communicate with a CA) when it
has no local certificate or the present certificate is about to expire.
You can specify the PKI certificate request mode for a PKI domain. Different PKI certificate request modes
require different configurations.
Remarks
Required
Create a PKI entity and configure the identity information.
A certificate is the binding of a public key and the identity information of an entity,
where the identity information is identified by an entity distinguished name (DN). A CA
identifies a certificate applicant by entity.
The identity settings of an entity must be compliant to the CA certificate issue policy.
Otherwise, the certificate request might be rejected.
Required
Create a PKI domain, setting the certificate request mode to Manual.
Creating a PKI
domain
422
Task
Remarks
Required
Generate a local RSA key pair.
By default, no local RSA key pair exists.
Generating an RSA
key pair
Generating an RSA key pair is an important step in certificate request. The key pair
includes a public key and a private key. The private key is kept by the user, and the
public key is transferred to the CA along with some other information.
IMPORTANT:
If a local certificate already exists, you must remove the certificate before generating a
new key pair, so as to keep the consistency between the key pair and the local certificate.
Required
Certificate retrieval serves the following purposes:
Locally store the certificates associated with the local security domain for improved
query efficiency and reduced query count,
Retrieving the CA
certificate
Requesting a local
certificate
In online mode, if the request is granted, the local certificate will be retrieved to the
local system automatically.
In offline mode, you need to retrieve the local certificate by an out-of-band means.
IMPORTANT:
If a local certificate already exists, you cannot perform the local certificate retrieval
operation. This will avoid possible mismatch between the local certificate and registration
information resulting from relevant changes. To retrieve a new local certificate, you need
to remove the CA certificate and local certificate first.
Optional
Destroy the existing RSA key pair and the corresponding local certificate.
If the certificate to be retrieved contains an RSA key pair, you need to destroy the
existing RSA key pair. Otherwise, the retrieving operation will fail.
Optional
Retrieving and
displaying a
certificate
Retrieving and
displaying a CRL
Optional
IMPORTANT:
Before retrieving a local certificate in online mode, be sure to complete LDAP server
configuration.
Retrieve a CRL and display its contents.
423
Remarks
Required
Create a PKI entity and configure the identity information.
A certificate is the binding of a public key and the identity information of an entity,
where the identity information is identified by an entity distinguished name (DN). A CA
identifies a certificate applicant by entity.
The identity settings of an entity must be compliant to the CA certificate issue policy.
Otherwise, the certificate request might be rejected.
Required
Create a PKI domain, setting the certificate request mode to Auto.
Creating a PKI
domain
Destroy the existing RSA key pair and the corresponding local certificate.
If the certificate to be retrieved contains an RSA key pair, you need to destroy the
existing RSA key pair. Otherwise, the retrieving operation will fail.
Optional
Retrieve an existing certificate and display its contents.
IMPORTANT:
Retrieving and
displaying a
certificate
Before retrieving a local certificate in online mode, be sure to complete LDAP server
configuration.
Retrieving and
displaying a CRL
Optional
Retrieve a CRL and display its contents.
424
Description
Entity Name
Common Name
IP Address
FQDN
An FQDN is a unique identifier of an entity on the network. It consists of a host name and
a domain name and can be resolved to an IP address. For example,
www.whatever.com is an FQDN, where www indicates the host name and
whatever.com the domain name.
Country/Region
Code
State
Locality
Organization
Organization Unit
Description
Domain Name
CA Identifier
IMPORTANT:
In offline mode, this item is optional. In other modes, this item is required.
The CA identifier is used only when you retrieve a CA certificate. It is not used when
you retrieve a local certificate.
Select the local PKI entity.
Entity Name
When submitting a certificate request to a CA, an entity needs to show its identity
information.
Available PKI entities are those that have been configured.
426
Item
Description
Select the authority for certificate request.
Requesting URL
In offline mode, this item is optional. In other modes, this item is required.
IMPORTANT:
In offline mode, this item is optional. In other modes, this item is required.
Currently, this item does not support domain name resolution.
LDAP IP
Type the IP address, port number, and version of the LDAP server.
Port
An LDAP server is usually deployed to store certificates and CRLs. If this is the case, you
need to configure the IP address of the LDAP server.
Version
Request Mode
Select the online certificate request mode, which can be auto or manual.
Password Encrypt
Type the password for certificate revocation and specify whether to display the password
in cipher text when the certificate request mode is set to Auto.
Password
After receiving the root certificate of the CA, an entity needs to verify the fingerprint of the
root certificate, namely, the hash value of the root certificate content. This hash value is
unique to every certificate. If the fingerprint of the root certificate does not match the one
configured for the PKI domain, the entity will reject the root certificate.
If you specify MD5 as the hash algorithm, type an MD5 fingerprint. The fingerprint
must a string of 32 characters in hexadecimal notation.
If you specify SHA1 as the hash algorithm, type an SHA1 fingerprint. The fingerprint
must a string of 40 characters in hexadecimal notation.
If you do not specify the fingerprint hash, do not type any fingerprint. The entity will not
Fingerprint
verify the CA root certificate, and you yourself must ensure that the CA server is
trusted.
IMPORTANT:
The fingerprint must be configured if you specify the certificate request mode as Auto. If you
specify the certificate request mode as Manual, you can leave the fingerprint settings null. If
you do not configure the fingerprint, the entity will not verify the CA root certificate and you
yourself must ensure that the CA server is trusted.
Polling Count
Polling Interval
Set the polling interval and attempt limit for querying the certificate request status.
After an entity makes a certificate request, the CA might need a long period of time if it
verifies the certificate request in manual mode. During this period, the applicant needs to
query the status of the request periodically to get the certificate as soon as possible after
the certificate is signed.
427
Item
Description
Enable CRL
Checking
Select this box to specify that CRL checking is required during certificate verification.
Type the CRL update period, that is, the interval at which the PKI entity downloads the
latest CRLs.
This item is available when the Enable CRL Checking check box is selected.
By default, the CRL update period depends on the next update field in the CRL file.
IMPORTANT:
The manually configured CRL update period takes precedent over that specified in the CRL
file.
Type the URL of the CRL distribution point.
This item is available when the Enable CRL Checking check box is selected.
CRL URL
When the URL of the CRL distribution point is not set, you should acquire the CA
certificate and a local certificate, and then acquire a CRL through SCEP.
IMPORTANT:
Currently, this item does not support domain name resolution.
428
Description
Key Length
429
Description
Domain Name
Certificate Type
Enable Offline
Mode
Select this check box to retrieve a certificate in offline mode (that is, by an out-of-band
means like FTP, disk, or email) and then import the certificate into the local PKI system.
If the certificate file is saved on a local PC, Select Get File From PC and then specify the
Password
Enter the password for protecting the private key, which was specified when the
certificate was exported.
If the ceritificate file is saved on the device, select Get File From Device and then
specify the path of the file on the devivce.
path to the file and select the partition of the device for saving the the file.
After retrieving a certificate, you can click View Cert corresponding to the certificate from the PKI
certificates list to display the contents of the certificate, as shown in Figure 408.
430
Description
Domain Name
Password
Item
Description
Select this check box to request a certificate in offline mode, that is, by an out-of-band
means like FTP, disk, or email.
Enable Offline
Mode
If you cannot request a certificate from the CA through the SCEP protocol, you can enable
the offline mode. In this case, after clicking Apply, the offline certificate request
information page appears, as shown in Figure 410. Submit the information to the CA to
request a local certificate.
Then, click View CRL for the domain to display the contents of the CRL.
432
The router submits a local certificate request to the CA server, which runs Windows Server 2003.
433
Figure 413 Network diagram for configuring a PKI entity to request a certificate from a CA
Configuration procedure
1.
Select Certificate Management > Entity from the navigation tree and then click Add to perform the
configurations shown in Figure 414.
434
Click Apply.
Select Certificate Management > Domain from the navigation tree and then click Add to perform
the configurations shown in Figure 415.
Type http://4.4.4.1:8080/certsrv/mscep/mscep.dll as the URL for certificate request. The URL must
be in the format of http://host:port/certsrv/mscep/mscep.dll, where host and port are the host
address and port number of the CA server.
Click Apply. When the system displays Fingerprint of the root certificate not specified. No root
certificate validation will occur. Continue?, click OK to confirm.
Select Certificate Management > Certificate from the navigation tree and then click Create Key to
perform the configurations shown in Figure 416.
Select Certificate Management > Certificate from the navigation tree and then click Retrieve Cert to
perform the configurations shown in Figure 417.
Click Apply.
436
Select Certificate Management > Certificate from the navigation tree and then click Request Cert to
perform the configurations shown in Figure 418.
Click Apply. When the system displays Certificate request has been submitted, click OK to
confirm.
The router submits a local certificate request to the CA server, which runs the RSA Keon software.
Figure 419 Diagram for configuring a PKI entity to request a certificate from a CA
437
Configuration procedure
1.
Subject DNDN information of the CA, including the Common Name (CN)
Organization (O)
Country (C)
Select Certificate Management > Entity from the navigation tree, and then click Add to perform the
configurations shown in Figure 420.
Click Apply.
Select Certificate Management > Domain from the navigation tree, and then click Add to perform
the configurations shown in Figure 421.
Click the expansion button before Advanced Configuration to display the advanced configuration
items.
Click Apply. When the system displays Fingerprint of the root certificate not specified. No root
certificate validation will occur. Continue?, click OK to confirm.
Select Certificate Management > Certificate from the navigation tree, and then click Create Key to
perform the configurations shown in Figure 422.
439
Click Apply.
Select Certificate Management > Certificate from the navigation tree, and then click Request Cert to
perform the configurations shown in Figure 424.
440
Click Apply. When the system displays Certificate request has been submitted, click OK to
confirm.
After retrieving a local certificate, select Certificate Management > CRL from the navigation tree.
441
An IPsec tunnel is set up between Router A and Router B to secure the traffic between Host A on
subnet 10.1.1.0/24 and Host B on subnet 11.1.1.0/24.
Router A and Router B use IKE for IPsec tunnel negotiation and RSA digital signature of a PKI
certificate system for identity authentication.
As shown in Figure 426, Router A and Router B use different CAs. They might also use the same CA
as required.
Figure 426 Diagram for applying RSA digital signature in IKE negotiation
PKI certificate system
CA 1
CA 2
1.1.1.101/32
2.1.1.101/32
LDAP 1
1.1.1.100/32
Router A
LDAP 2
1.1.1.102/32
RA 1
Eth0/2
2.2.2.1/24
Eth0/1
10.1.1.1/24
2.1.1.102/32
RA 2
2.1.1.100/32
Internet
Eth0/2
3.3.3.1/24
Router B
Eth0/1
11.1.1.1/24
Host A
Host B
10.1.1.2/24
11.1.1.2/24
Configuration procedure
1.
Configure Router A
Select Certificate Management > Entity from the navigation tree, and then click Add to perform the
configurations shown in Figure 427.
442
Click Apply.
# Create a PKI domain. (The RA URL given here is just an example. Configure the RA URL as required.)
Select Certificate Management > Domain from the navigation tree, and then click Add to perform
the configurations shown in Figure 428.
Type 1.1.1.102 as the IP address of the LDAP server, 389 as the port number, and select 2 as the
version number.
Click the expansion button before Advanced Configuration to display the advanced configuration
items.
Click Apply. When the system displays Fingerprint of the root certificate not specified. No root
certificate validation will occur. Continue?, click OK to confirm.
Select Certificate Management > Certificate from the navigation tree, and then click Create Key to
perform the configurations shown in Figure 429.
Select Certificate Management > Certificate from the navigation tree, and then click Retrieve Cert to
perform the configurations shown in Figure 430.
444
Click Apply.
Select Certificate Management > Certificate from the navigation tree, and then click Request Cert to
perform the configurations shown in Figure 431.
Click Apply. When the system displays Certificate request has been submitted, click OK to
confirm.
Select VPN > IPsec VPN from the navigation tree, and then click Add to perform the configurations
shown in Figure 432.
445
Select Certificate as the authentication method, and select CN=router-a for the certificate.
Click Apply.
2.
Configure Router B (The configuration pages for Router B are similar to those of Router A, and thus
omitted)
Select Certificate Management > Entity from the navigation tree, and then click Add.
Click Apply.
Select Certificate Management > Domain from the navigation tree, and then click Add.
Type http://2.1.1.100/certsrv/mscep/mscep.dll as the URL for certificate request. (The RA URL given
here is just an example. Configure the RA URL as required.)
Type 2.1.1.102 as the IP address of the LDAP server, 389 as the port number, and select 2 as the
version number.
Click the expansion button before Advanced Configuration to display the advanced configuration
items.
Click Apply. When the system displays Fingerprint of the root certificate not specified. No root
certificate validation will occur. Continue?, click OK to confirm.
Select Certificate Management > Certificate from the navigation tree, and then click Create Key.
Select Certificate Management > Certificate from the navigation tree, and then click Retrieve Cert.
Click Apply.
Select Certificate Management > Certificate from the navigation tree, and then click Request Cert.
Click Apply. When the system displays Certificate request has been submitted, click OK to
confirm.
Select VPN > IPsec VPN from the navigation tree, and then click Add.
Select Certificate as the authentication method, and select CN=router-b for the certificate.
Click Apply.
447
Configuration guidelines
When you configure PKI, note the following guidelines:
1.
Make sure the clocks of entities and the CA are synchronous. Otherwise, the validity period of
certificates will be abnormal.
2.
The Windows 2000 CA server has some restrictions on the data length of a certificate request. If
the PKI entity identity information in a certificate request goes beyond a certain limit, the server will
not respond to the certificate request.
3.
The SCEP plug-in is required when you use the Windows Server as the CA. In this case, you need
to specify RA as the authority for certificate request when configuring the PKI domain.
4.
The SCEP plug-in is not required when you use the RSA Keon software as the CA. In this case, you
need to specify CA as the authority for certificate request when configuring the PKI domain.
448
System management
System management allows you to perform the following operations:
Configuration management
Reboot
Service management
User management
System time
TR-069 configuration
Configuration management
Save
The save configuration module provides the following two functions:
Saving the current configuration to the configuration file to be used at the next startup (including
the .cfg and .xml files).
Saving the current configuration as the factory default configuration, and the name of the
configuration file is init.cfg.
CAUTION:
Besides the following methods, the web management interface allows you to click the
the right of the title area to fast save the configuration.
button on
449
To save the current configuration to the configuration file to be used at the next startup, click Save
Current Settings.
To save the current configuration to both the configuration file to be used at the next startup and the
factory default configuration file, click Save As Factory-Default Settings.
Initialize
Initialization means to clear the current configuration file, and then restart the device with the factory
default configuration.
Select System Management > Configuration from the navigation tree, and click the Initialize tab to enter
the initialize configuration page, as shown in Figure 434.
Figure 434 Initialize
Backing up configuration
Configuration file backup allows you to:
View the configuration file for next startup (including .cfg and .xml files).
Back up the configuration file for next startup (including .cfg and .xml files) to the PC of the current user.
Select System > Maintenance > Backup from the navigation tree, and click Backup to enter the
configuration file backup configuration page, as shown in Figure 435.
450
When you click the upper Backup button in this figure, a file download dialog box appears. You
can select to view the .cfg file or to save the file locally.
When you click the lower Backup button in this figure, a file download dialog box appears. You
can select to view the .xml file or to save the file locally.
Restoring configuration
Configuration restoration allows you to:
Upload the .cfg file on the host of the current user to the device for the next startup
Upload the .xml file on the host of the current user to the device for the next startup, and delete the
previous .xml configuration file that was used for the next startup
Select System > Maintenance > Restore from the navigation tree, and click Restore to enter the restoring
configuration file page, as shown in Figure 436.
Figure 436 Restoring configuration file page
When you click the upper Browse button in this figure, the file upload dialog box appears. You can
select the .cfg file to be uploaded, and then click Apply.
When you click the lower Browse button in this figure, the file upload dialog box appears. You can
select the .xml file to be uploaded, and then click Apply.
451
Fast backup: It allows you to back up files on the device to the destination device through a universal
serial bus (USB) port.
Fast restoration: It allows you to transfer files from the device where the files are backed up to the
local device through a USB port. Whats more, the system allows you to choose whether to specify
the startup file or configuration file to be restored as the main startup file or configuration file of the
device.
NOTE:
The storage medium of a device has many types, such as flash cards, CF cards, and so on. The storage
medium type used by the device depends on the device model.
Select System Management > Configuration from the navigation tree, and click the Backup and Restore
tab to enter the fast backup and restoration page, as shown in Figure 437.
Figure 437 Back up and restore device files through the USB port
In the Device File(s) area, select the files to be backed up, and click the Backup button to backup the
selected files to the destination device.
452
In the USB File(s) area, select the files to be restored, and click the Restore button to transfer the
selected files to the device through the USB port.
CAUTION:
At a time, you can restore multiple files, but only one startup file or configuration file can be
included in these files for restoration.
Reboot
CAUTION:
Before rebooting the device, save the configuration; otherwise, all unsaved configuration will be lost after
reboot. After the device reboots, you need to re-log in to the Web interface.
Select System Management > Reboot from the navigation tree to enter the device reboot configuration
page, as shown in Figure 438. Click Apply to reboot the device.
Figure 438 Device reboot page
You can choose to check whether the current configuration has been saved to the configuration file to be
used at the next startup as needed.
If you select the Check whether the current configuration is saved in the next startup configuration
file option, the system will check the configuration before rebooting the device. If the check
succeeds, the system will reboot the device; if the check fails, the system will pop up a dialog box
to tell you that the current configuration and the saved configuration are inconsistent, and will not
reboot the device. In this case, you need to save the current configuration manually before you can
reboot the device.
If you do not select the option, the system will reboot the device directly.
Service management
Overview
The service management module provides six types of services: FTP, Telnet, SSH, SFTP, HTTP and HTTPS.
You can enable or disable the services as needed. In this way, the performance and security of the
system can be enhanced, thus secure management of the device can be achieved.
453
The service management module also provides the function to modify HTTP and HTTPS port numbers,
and the function to associate the FTP, HTTP, or HTTPS service with an ACL, thus reducing attacks of illegal
users on these services.
FTP service
The File Transfer Protocol (FTP) is an application layer protocol for sharing files between server and client
over a TCP/IP network.
Telnet service
The Telnet protocol is an application layer protocol that provides remote login and virtual terminal
functions on the network.
SSH service
Secure Shell (SSH) offers an approach to securely logging in to a remote device. By encryption and
strong authentication, it protects devices against attacks such as IP spoofing and plain text password
interception.
SFTP service
The secure file transfer protocol (SFTP) is a new feature in SSH2.0. SFTP uses the SSH connection to
provide secure data transfer. The device can serve as the SFTP server, allowing a remote user to log in to
the SFTP server for secure file management and transfer. The device can also serve as an SFTP client,
enabling a user to login from the device to a remote device for secure file transfer.
HTTP service
The Hypertext Transfer Protocol (HTTP) is used for transferring web page information across the Internet.
It is an application-layer protocol in the TCP/IP protocol suite.
You can log in to the device by using the HTTP protocol with HTTP service enabled, accessing and
controlling the device with Web-based network management.
HTTPS service
The Secure HTTP (HTTPS) refers to the HTTP protocol that supports the Security Socket Layer (SSL)
protocol.
The SSL protocol of HTTPS enhances the security of the device in the following ways:
Uses the SSL protocol to ensure the legal clients to access the device securely and prohibit the illegal
clients;
Encrypts the data exchanged between the HTTPS client and the device to ensure the data security
and integrity, thus realizing the security management of the device;
Defines certificate attribute-based access control policy for the device to control the access right of
the client, in order to further avoid attacks from illegal clients.
454
Description
Enable FTP
service
FTP
ACL
Telnet
Enable Telnet
service
SSH
Enable SSH
service
SFTP
Enable SFTP
service
Enable HTTP
service
HTTP
Port Number
You can view this configuration item by clicking the expanding button in
front of HTTP.
IMPORTANT:
When you modify a port, ensure that the port is not used by other service.
ACL
HTTPS
Enable HTTPS
service
Associate the HTTP service with an ACL. Only the clients that pass the ACL
filtering are permitted to use the HTTP service.
You can view this configuration item by clicking the expanding button in
front of HTTP.
Specify whether to enable the HTTPS service.
The HTTPS service is disabled by default.
455
Item
Description
Set the port number for HTTPS service.
Port Number
You can view this configuration item by clicking the expanding button in
front of HTTPS.
IMPORTANT:
When you modify a port, ensure that the port is not used by other service.
ACL
Associate the HTTPS service with an ACL. Only the clients that pass the ACL
filtering are permitted to use the HTTPS service.
You can view this configuration item by clicking the expanding button in
front of HTTPS.
Set the local certificate for the HTTPS service. What is displayed in the
drop-down list is the theme of the certificate.
Certificate
User management
The user management module provides these three functions:
Create a local user, and set the password, access level, and service type for the user.
Set the super password for switching the current Web user access level to the management level
Switch the current Web user access level to the management level.
Creating a user
Select System Management > Users from the navigation tree, and click the Create User tab to enter the
page for creating local users, as shown in Figure 440.
Figure 440 Create a user
456
Description
Username
Access Level
Monitor: Users of this level can only access the device data but cannot configure the
device.
Configure: Users of this level can access data from the device and configure the device,
but they cannot upgrade the host software, add/delete users, modify users, or back
up/restore the application file.
Management: Users of this level can perform any operations for the device.
IMPORTANT:
Only the web, FTP, and Telnet users support the access level setting.
Password
Confirm Password
Input the same password again. Otherwise, the system prompts that the two passwords
input are not consistent when you apply the configuration.
Service
Set the service type, including web, FTP, Telnet, and PPP services. You must select at least
one of them.
457
Description
Set the operation type:
Create/Remove
Password
Confirm Password
Input the same password again. Otherwise, the system prompts that the two passwords
input are not consistent when you apply the configuration.
Before switching, make sure that the super password is already configured. A user cannot switch to
the management level without a super password.
The access level switchover of a user is valid for the current login only. The access level configured
for the user is not changed. When the user re-logs in to the Web interface, the access level of the
user is still the original level.
Log in to the Web interface, and then select System Management > Users from the navigation tree, and
click the Switch to Management tab to enter the access level switching page, as shown in Figure 442.
Then, type the super password and click Login.
Figure 442 Access level switching page
System time
You need to configure a correct system time so that the device can work with other devices properly.
The device supports setting system time through manual configuration and automatic synchronization of
NTP server time.
An administrator can by no means keep time synchronized among all the devices within a network by
changing the system clock on each device, because this is a huge amount of workload and cannot
guarantee the clock precision. NTP, however, allows quick clock synchronization within the entire
network and ensures a high clock precision.
Defined in RFC 1305, the Network Time Protocol (NTP) synchronizes timekeeping among distributed
time servers and clients. NTP runs over the User Datagram Protocol (UDP), using UDP port 123.
The purpose of using NTP is to keep consistent timekeeping among all clock-dependent devices within
the network so that the devices can provide diverse applications based on the consistent time.
458
Description
NTP Server 1
Automatic
Synchronizat
ion
NTP Server 2
Manual Setup
You can type the system date and time in the text box, or select the date and
time in the calendar as follows:
Click Today. The date in the calendar becomes the local date, and the
time in the calendar does not change.
Select the year, month, date, and time, and then click OK.
459
TR-069 configuration
TR-069 protocol is a technology specification initiated and developed by the Digital Subscribers Line
(DSL) Forum. It defines the general frame, message format, management method, and data model for the
management and configuration of home network devices in the next-generation network.
TR-069 is mainly applied to DSL access networks. In a DSL access network, user devices are large in
number and deployed separately usually in the customer premise. Therefore device management and
maintenance is hard to perform. TR-069 is designed to solve the problem by the idea of remote central
management of the Customer Premise Equipment (CPE) through an Auto-Configuration Server (ACS).
460
CPE: Customer Premise Equipment, which is the managed device in the network.
DNS server: Domain Name System server. TR-069 defines that an ACS and a CPE use URLs to
identify and access each other. DNS is used to resolve the URLs.
DHCP server: Dynamic Host Configuration Protocol server, which assigns an IP address to an ACS
and a CPE, and uses the options filed in the DHCP packet to provide configuration parameters to
the CPE.
CPE startup. A CPE can find the corresponding ACS according to the acquired URL, and initiates a
connection to the ACS.
A CPE is configured to send Inform messages periodically. The CPE will automatically send an
Inform message at the configured interval (1 hour for example) to establish connections.
A CPE is configured to send Inform messages at a specific time. The CPE will automatically send an
Inform message at the configured time to establish a connection.
The current session is not finished but interrupted abnormally. In this case, if the number of CPE
auto-connection retries does not reach the limit, the CPE will automatically establish a connection.
An ACS can initiate a Connect Request to a CPE at any time, and can establish a connection with the
CPE after passing the CPE authentication.
Auto-configuration
When a CPE logs in to an ACS, the ACS can automatically apply some configurations to the CPE to
perform auto configuration of the CPE. Auto-configurable parameters supported by the device include
(but are not confined to) the following:
TR-069 configuration
The TR-069 parameters of CPE can be configured automatically through ACS remote management, and
also can be configured manually through Web, which is described in detail in this section.
Select System Management > TR-069 from the navigation tree to enter the TR-069 configuration page, as
shown in Figure 447.
462
Description
Enable or disable TR-069.
TR-069
TR-069 configurations can take effect only after you enable TR-069.
URL
Username
ACS
Username
Password
CPE
You can specify a username without a password that is used in the authentication.
If so, the configuration on the ACS and that on the CPE must be the same.
Configure the username used by the CPE to authenticate the connection sent from
the ACS.
Configure the password used by the CPE to authenticate the connection sent from
the ACS.
You can specify a username without a password that is used in the authentication.
If so, the configuration on the ACS and that on the CPE must be the same.
Sending
Inform
Interval
CPE Interface
Set the CPE connection interface. The CPE sends inform packets carrying the IP
address of this interface to make the ACS establish a connection with the CPE using
this IP address.
Configuration guidelines
TR-069 configuration through ACS is of higher priority than that through Web. You cannot use a
configuration mode to modify parameters configured through a configuration mode with a higher
priority.
463
To remove the configuration of a parameter, select the check box of the parameter, clear the value
you input, and click Apply.
Upgrading software
CAUTION:
Software upgrade takes a period of time. During software upgrade, do not perform any operation on the
Web interface; otherwise, software upgrade may be interrupted.
Select System Management > Software Upgrade from the navigation tree to enter the software upgrade
configuration page, as shown in Figure 448.
Figure 448 Software upgrade configuration page
File
Description
Specify the filename of the local application file, which must be suffixed with
the .app or .bin extension.
IMPORTANT:
The filename is main.bin when the file is saved on the device.
Specify whether to reboot the device to make the upgraded software take effect
after the application file is uploaded.
464
Upgrading software
CAUTION:
Software upgrade takes a period of time. During software upgrade, do not perform any operation on the
Web interface; otherwise, software upgrade may be interrupted.
Select System Management > Software Upgrade from the navigation tree to enter the software upgrade
configuration page, as shown in Figure 449.
Figure 449 Software upgrade configuration page
Description
File
Specify the filename of the local application file, which must be suffixed with
the .app or .bin extension.
Specify the type of the boot file for the next boot:
File Type
Main
Backup
Specify whether to reboot the device to make the upgraded software take effect
after the application file is uploaded.
If you do not select the option, when a file with the same name exists, the system
prompts The file has existed., and you cannot perform the upgrade operation.
465
SNMP overview
The Simple Network Management Protocol (SNMP) is an Internet standard protocol widely used for a
network management station (NMS) to access and operate the devices (SNMP agents) on a network,
regardless of their vendors, physical characteristics and interconnect technologies.
SNMP enables network administrators to read and set the variables on managed devices to monitor their
operating and health state, diagnose network problems, and collect statistics for management purposes.
H3C SNMP agents support three SNMP versions: SNMPv1, SNMPv2c, and SNMPv3.
SNMPv1 uses password authentication to control access to SNMP agents. SNMPv1 passwords fall
into read only passwords and read and write passwords.
A read password enables reading data from an SNMP agent.
A read and write password enables reading data and setting variables on an SNMP agent.
SNMPv2c also uses password authentication for SNMP agent access control. It is compatible with
SNMPv1, but supports more operation modes, data types, and error codes.
SNMPv3 uses a user-based security model (USM) to secure SNMP communication. You can
configure authentication and privacy mechanisms to authenticate access and encrypt SNMP
packets for integrity, authenticity, and confidentiality.
IMPORTANT:
An NMS and an SNMP agent must use the same SNMP version to communicate with each other.
NOTE:
For more information about SNMP, see the H3C MSR Series Routers Network Management and
466
Description
Enable or disable the SNMP agent.
SNMP
IMPORTANT:
When you disable the SNMP agent, all SNMP agent settings are removed.
Select the SNMP version run by the system.
SNMP Version
IMPORTANT:
Set the same SNMP version as on the NMS.
Contact Information
Sysname
Device Location
Security Username
IMPORTANT:
Set the same security username on the NMS.
467
Item
Description
Set the authentication password when the SNMP version is selected as SNMPv3.
Authentication Password
IMPORTANT:
Set the privacy password when the SNMP version is selected as SNMPv3.
Privacy Password
IMPORTANT:
Read Password
When the SNMP version is SNMPv1 & v2, set the read-only password with which
the NMS can perform only read operation to the agent.
IMPORTANT:
Set the same read password on the NMS.
When the SNMP version is SNMPv1 & v2, set the read and write password with
which the NMS can perform both read and write operations to the agent.
IMPORTANT:
Set the same read and write password on the NMS.
When the SNMP version is SNMPv1 & v2, set the authentication password
Trap Password
with which the agent can send traps to the NMS. The trap password must be
the same with either the read password or the read & write password.
The trap password defaults to the security username and is not configurable
when the SNMP version is SNMPv3.
Set the trusted IP address of the agent.
If the trusted host is specified, only the NMS with the specified source IP
Trusted Host
468
Agent
1.1.1.1/24
NMS
1.1.1.2/24
Configuration procedure
1.
Select System Management > SNMP from the navigation tree, and configure SNMP as shown in
Figure 452.
Type a read password, a read and write password, and a trap password.
Type the IP address of the trap destination, 1.1.1.2 in this example, in the Trap Target Host
Address/Domain text box.
Click Apply.
2.
NOTE:
The SNMP settings on the NMS and the agent must match.
Set the same SNMP version, read password, and read and write password as on the SNMP agent.
469
Configuration verification
Check that the NMS and the SNMP agent can set up SNMP sessions, and the NMS can query and
set MIB variables on the SNMP agent.
Execute the shutdown and undo shutdown commands on an idle interface on the SNMP agent,
and check that the NMS can receive linkUp and linkDown traps.
Configuration procedure
1.
Select System Management > SNMP from the navigation tree, and configure SNMP settings as
shown in Figure 454.
470
Click Apply.
2.
NOTE:
The configuration on the NMS must be consistent with that on the agent. Otherwise, you cannot perform
corresponding operations.
SNMPv3 adopts a security mechanism of authentication and privacy. You need to configure security
username, authentication protocol, authentication password, privacy protocol, privacy password, and so
on.
Besides, you need to configure the aging time and retry times. After the above configurations, you can
configure the device as needed through the NMS. For more inforamtion about NMS configuration, see
the manual provided for NMS.
Configuration verification
After the above configuration, an SNMP connection is established between the NMS and the agent.
The NMS can get and configure the values of some parameters on the agent through MIB nodes.
471
Disable or enable an idle interface on the device, and the NMS receives the corresponding trap.
472
Syslog
The web interface allows you to perform the following operations:
Displaying syslogs
System logs contain a large amount of network and device information, including running status and
configuration changes. System logs are an important way for network administrators to monitor network
and device running status. With system log information, network administrators can find network or
security problems, and take corresponding actions against them.
The system supports five information output destinations, including the console, monitor terminal
(terminal of users logged in through the AUX, VTY, or TTY user interface), log buffer, log host, and web
interface.
Configuring syslog
Displaying syslogs
The web interface provides rich search and sorting functions, and you can easily view system logs
through the web interface. Select Other > Syslog from the navigation tree to enter the syslog display page,
as shown in Figure 455.
473
TIP:
To clear all the system logs in the log cache of the web interface, click Reset.
To refresh the system logs displayed on the web page, click Refresh.
To make the syslog display page refresh automatically, set the refresh interval on the syslog configuration
page. For more information, see Setting buffer capacity and refresh interval.
Table 199 Syslog display items
Item
Description
Time/Date
Source
474
Item
Description
Displays the severity level of system logs. System logs are classified into eight levels
by severity. The severity levels in the descending order are emergency, alert, critical,
error, warning, notification, informational, and debugging.
Level
Digest
Description
475
Description
Set the IPv4 address or domain name of the loghost.
Description
Buffer Capacity
Set the number of logs that can be stored in the log buffer of the web interface.
Set the refresh interval of the log information displayed on the web interface.
You can select manual refresh or automatic refresh:
Refresh Interval
Manual: You need to click Refresh to refresh the web interface when displaying
log information.
Automatic: You can select to refresh the web interface every 1 minute, 5 minutes,
or 10 minutes.
476
Diagnostic tools
Overview
Trace route
By using the trace route command, you can display the Layer 3 devices involved in delivering a packet
from source to destination. This function is useful for identification of failed node(s) in the event of a
network failure.
A trace route operation involves the following steps:
1.
The source device sends a packet with a TTL value of 1 to the destination device.
2.
The first hop (the Layer 3 device that first receives the packet) responds with a TTL-expired ICMP
message to the source. In this way, the source device can get the address of the first Layer 3
device.
3.
The source device sends a packet with a TTL value of 2 to the destination device.
4.
The second hop responds with a TTL-expired ICMP message, which gives the source device the
address of the second Layer 3 device.
5.
The above process continues until the ultimate destination device is reached. In this way, the
source device can trace the addresses of all the Layer 3 devices involved to get to the destination
device.
You can trace route to an IP address or a host name. If the host name cannot be resolved, prompt
information is displayed on the source device.
Ping
You can use the ping function to check whether a device with a specified address is reachable, and to
examine network connectivity.
A successful execution of the ping command involves the following steps:
1.
The source device sends an ICMP echo request (ECHO-REQUEST) to the destination device.
2.
The destination device responds by sending an ICMP echo reply (ECHO-REPLY) to the source
device after receiving the ICMP echo request.
3.
The source device displays related statistics after receiving the reply.
You can use the ping command to ping an IP address or a host name. If the host name is unknown,
the prompt information is displayed on the source device.
If the source device does not receive an ICMP echo reply within the timeout time, it displays the
prompt information and the statistics during the ping operation. If the source device receives an
ICMP echo reply within the timeout time, it displays the number of bytes of the echo reply, the
message sequence number, Time to Live (TTL), the response time, and the statistics during the ping
operation.
477
Statistics during the ping operation include number of packets sent, number of echo reply messages
received, percentage of messages not received, and the minimum, average, and maximum response
time.
Tools operations
Trace route operation
NOTE:
The trace route function of the Web interface does not support IPv6 addresses.
Before executing a trace route operation, execute the ip ttl-expires enable command on the
intermediate device to enable the sending of ICMP timeout packets, and execute the ip unreachables
enable command on the destination device to enable the sending of ICMP destination unreachable
packets.
Log in to the Web interface, and then select Other > Diagnostic Tools from the navigation tree to enter the
trace route operation page, as shown in Figure 458.
Figure 458 Trace route configuration page
Type in the destination IP address or host name, and click Start to execute the trace route command, and
you can see the result in the Summary box.
Ping operation
NOTE:
The ping function of the Web interface does not support IPv6 addresses.
478
Select Other > Diagnostic Tools from the navigation tree, and click the Ping tab to enter the ping
operation page, as shown in Figure 459.
Figure 459 Ping configuration page
Type in the destination IP address or host name, and click Start to execute the ping command, and you
can see the result in the Summary box.
479
WiNet configuration
Overview
As networks expand, more access devices are deployed at network edges. To manage these devices is
a tedious and complicated job. In addition, although IP address resources become insufficient at present,
a large number of public IP addresses are required as each device needs to be configured with an IP
address. The Wisdom Network (WiNet) technology helps you manage a large number of scattered
network devices centrally.
WiNet has the following benefits:
Integration: WiNet is integrated in network devices as a function, and requires no special network
management device.
Easy to deploy: To build a WiNet, you only need to select a management device and complete
simple configurations through web pages on the management device.
User-friendly interface: WiNet provides the web interface for interaction, which facilitates
operations and management, and requires no special network management staff.
Plug-and-play: Based on an H3C proprietary technology, WiNet displays the device in the network
topology once it is connected to the network through an Ethernet interface, and allows you to
perform corresponding operations.
Easy and quick deployment of security authentication: WiNet allows you to configure a RADIUS
server on an administrator device through simple web configuration and to configure interfaces of
member devices for security authentication through the administrator device.
According to the status and functions, devices are classified into three roles in WiNet.
Administrator: Refers to the device serving as the WiNet management device. In a WiNet, only the
administrator is configured with a public IP address. You need to specify one administrator only in
each WiNet to configure, manage, and monitor other devices. The administrator collects
information to discover and add candidates.
Candidate: Refers to a WiNet-capable device that has not been added to the WiNet yet; however,
the topology information of the candidate is already collected by the administrator.
480
Configuring WiNet
Enabling WiNet
To build a WiNet, configure a candidate as the administrator and configure WiNet on it.
Select WiNet from the navigation tree. When WiNet is disabled, a dialog box Only the WiNet
administrator supports the function appears. Click OK to enter the Setup page, as shown in Figure 461.
You can build or close WiNet on the page.
Figure 461 WiNet setup page
Description
WiNet Name
481
Item
Description
Type a management VLAN ID in the WiNet. You can type an existing static
VLAN only.
The management VLAN is used by WiNet packets for communication. It
actually defines the WiNet management range and delivers the following
functions:
Management VLAN
Type an IP address and select a network mask for the administrator. After that,
each WiNet member is assigned with an IP address on the same subnet as the
administrator.
NOTE:
After a WiNet is built, you cannot configure items on the Setup page, and the Build WiNet button changes
to Close WiNet. To delete the WiNet, click the Close WiNet button.
Managing WiNet
To manage WiNet members, make sure the port that connects your host to the administrator permits
packets of the management VLAN. Select WiNet from the navigation tree to enter the default WiNet
Management page as shown in Figure 462.
482
Set the refresh period for automatic refreshing of the WiNet topology diagram. Or you can select
Manual for Refresh Period and click Refresh to display the latest WiNet topology diagram.
2.
Click Collect Topology. After that the administrator starts to collect topology information. Note that,
in addition to manual topology collection, the system automatically collects topology information
every minute.
3.
Click Network Snapshot to save the current WiNet topology as the baseline topology. The
baseline topology is used to show changes in network topology at different time points.
4.
Click Initialize Topology to clear the stored baseline topology and cookies.
5.
Click Open AuthN Center to configure a RADIUS server for security authentication on the
administrator device. Then this button changes to Close AuthN Center and you can click the button
to remove the RADIUS server.
6.
Drag the icon of a specific device in the WiNet topology and place it to a position as needed. If
the browser is configured to accept cookies, the latest position information of each device is stored
after you click Network Snapshot.
7.
Double click a device on the WiNet topology map to show details about the device, including the
hostname, MAC address, device model, IP address, version, number of hops, and WiNet
information, as shown in Figure 463.
483
8.
View the WiNet topology information, including the role of each device and connection status
between devices. The connection status can be:
Normal link: Indicates a connection existing in the baseline topology and the current topology.
New link: Indicates a connection not existing in the baseline topology but in the current topology.
Blocked loops: Indicate connections blocked by STP. Note that if a normal link is blocked, it is
displayed as a black broken line; if a new link is blocked, it is displayed as a blue broken line.
Down link: Indicates a connection existing in the baseline topology but not in the current topology.
9.
Click a device in the topology diagram to view its panel diagram. You can manage the device as
follows:
NOTE:
Only MIM-FSW modules, MSR 30-11E routers, and MSR 30-11F routers support displaying of the device
panel, device renaming, and Layer 2 Portal authentication on interfaces.
Click Rename Device and enter a new system name for the device, as shown in Figure 464.
Select one or multiple Layer 2 Ethernet interfaces on the panel diagram of the device, and click Port
Guard to enable Layer 2 Portal authentication on the interfaces.
CAUTION:
You cannot enable Layer 2 Portal authentication on an interface that connects the management device to
a member/candidate device, connects the management device to an external network, or connects the
administrator to the management device.
484
If a member is selected, click Manage Device to log in to the web page of the member. You can
configure and manage the member through the web page. Note that the username and password
are required before you can log in to the member. If the current user and password are consistent
with those of the member, you can directly log in to the member.
If a member is selected, click Initialize to restore the configuration to factory defaults and restart the
member.
Description
Username
Password
Confirm Password
Item
Description
Type an authorized VLAN ID for the user.
VLAN
IMPORTANT:
If the access device does not support authorized VLANs, users with the authorized
VLAN ID specified cannot pass authentication.
Type an authorized ACL number for the user.
ACL
IMPORTANT:
If the access device does not support authorized ACL properties, users with the
authorized ACL specified cannot pass authentication.
Expire Time
Description
Set the time when the user becomes invalid, in the format of
HH:MM:SS-YYYY/MM/DD.
A user whose system time is later than the preset expire time cannot pass
authentication.
Type the user information.
The administrator is connected to the external network through Ethernet 0/1, and is connected to
the members through Ethernet 0/2 and Ethernet 0/3 respectively.
486
Configuration procedure
1.
# Configure Ethernet 0/1 on each device to permit VLAN 10 traffic respectively. (Omitted)
2.
Configure Device B
Select Interface Setup > LAN Interface Setup from the navigation tree to enter the default VLAN
Setup page, as shown in Figure 468.
Click Apply.
# Assign Ethernet 0/1, Ethernet 0/2, and Ethernet 0/3 to VLAN 10.
487
On the VLAN Setup page, select 10 in the VLAN Config field, as shown in Figure 469.
Click Add. The configuration progress dialog box appears, as shown in Figure 470.
Click the VLAN Interface Setup tab to enter the page, as shown in Figure 471.
488
Click Apply.
# Enable WiNet.
Select WiNet from the navigation tree. When WiNet is disabled, a dialog box Only the WiNet
administrator supports the function appears. Click OK to enter the Setup page, as shown in Figure
472.
489
Verification
After the preceding configuration is complete, log in to Device B via Ethernet 0/1, select WiNet from the
navigation tree to enter the WiNet Management page. You can view a WiNet topology diagram
comprising an administrator (Device B) and two members (Device A and Device C), and manage the
devices, as shown in Figure 473.
490
491
Configuration procedure
1.
Establish a WiNet
Log in to Device B through Ethernet 0/1. Select WiNet from the navigation tree on Device B, click the
User Management tab, and then click Add to enter the page, as shown in Figure 475.
Click Apply.
493
494
Configuration wizard
Overview
The configuration wizard guides you to establish a basic call, and configure local numbers and
connection properties.
Selecting a country
In the wizard homepage, click Start to enter the country selection page, as shown in Figure 479.
495
Description
Configure the device to play the call progress tones of a specified country or region.
Description
Line
Number
Username
Password
496
Description
497
Basic settings
To implement a basic voice call, you need to complete local number and call route configurations.
Local number configuration includes setting a local telephone number and authentication
information used for registration.
Call route configuration includes setting a destination telephone number and call route type. You
can select either SIP routing or trunk routing as the call route type. SIP routing includes proxy server
mode, IP routing mode, and server group binding mode.
For more information about basic settings of local number and call route, see Basic settings.
Call services
Call services contains various new functions on the basis of voice basic call to meet the application
requirements of VoIP users.
For more information about call services configuration, see Call services.
Some call services require the involvement of a voice server. For the configuration of the voice server, see
the chapter Call connection configuration.
Advanced settings
The advanced settings include the following parts:
Coding parameters: This part includes the configuration of codec priorities and packet assembly
intervals. The voice codec affects the voice bandwidth and voice quality, and you need to select a
proper codec according to the actual network. The packet assembly interval depends on the
network bandwidth and network architecture, and affects codec delay time.
Others: This part includes the configuration of number selection priority, dial prefix, called number
sending mode, DTMF transmission mode, DSCP field value, and so on.
498
Basic settings
Introduction to basic settings
Local number
Local number configuration includes setting a local telephone number and authentication information
used for registration.
Call route
Call route configuration includes setting a destination telephone number and call route type. The call
route type can be either SIP routing or trunk routing.
SIP routing
SIP routing includes proxy server mode, IP routing mode, and server group binding mode. If you select
IP routing, the called parties can be found through static IP addresses or domain names. The network
diagram for IP routing mode is shown in Figure 482.
Figure 482 Network diagram for IP routing
Proxy server mode and server group binding mode need the SIP server to complete routing, as shown in
Figure 483
Figure 483 Network diagram for proxy server/server group binding modes
SIP server
IP network
Router A
Router B
Trunk routing
You can connect devices to the private branch exchanges (PBX) on the PSTN network through FXO, E&M,
VE1, VT1, and BSV trunk lines. Among them, VE1 and VT1 trunk routing enables the device to provide
more voice communication channels, and thus greatly increases device utilization and broaden the
service range.
499
See Configuring trunking mode calling for the configuration example of using the trunking routing as the
call route type.
Basic settings
Configuring a local number
Select Voice Management > Local Number from the navigation tree, and Configuring trunking mode
calling click Add to enter the page for creating a local number, as shown in Figure 484.
Figure 484 Local number configuration page
Description
Number ID
Number
Local number
Bound Line
This drop-down list displays all FXS voice subscriber lines. Select a voice subscriber
line to be bound with the local number.
Description
Enable. After the Enable radio button is selected, the authentication related options
Register Function
can be configured.
Disable.
Register Username
Register Password
Item
Description
Cnonce Name
Realm Name
If a realm name is configured on the SIP UA, ensure that it is the same as that configured
on the registrar. Otherwise, the SIP UA will fail the authentication due to mismatch. If no
realm name is configured on a SIP UA, the SIP UA will perform no realm name match
and consider that the realm name configured on the registrar is trusted.
Status
CAUTION:
If it is necessary to configure authentication information for a local number, the same authentication
information is recommended for the same telephone number.
In the case of authentication, it is forbidden to modify the authentication information after the register
function is enabled because this operation may result in registration update failures.
501
Description
Call Route ID
Destination
Number
Description
IP Routing
Binding Server
Group
SIP
Call Route Type
Trunk
502
Required
to use one
approach
Item
Description
Select one of the following transport layer protocols.
Transport Layer
Protocol for Call
Route
UDP
TCP
TLS
By default, UDP is selected.
Enable. After the Enable radio button is selected, the authentication related options
can be configured.
Register Function
Disable.
IMPORTANT:
The trunk routing mode supports register function. Authentication related options and their
meanings are the same as those of local number and thus are omitted here.
Status
Configuratin procedure
1.
Configure Router A
503
Select Voice Management > Local Number from the navigation tree, and then click Add to enter the page
for creating a local number.
Figure 487 Create local number 1111
Click Apply.
504
Select IP Routing for SIP Routing, and type 192.168.2.2 for Destination Address.
Click Apply.
2.
Configure Router B
Select Voice Management > Local Number from the navigation tree, and then click Add to enter the page
for creating a local number.
Figure 489 Create local number 2222
505
Click Apply.
506
Select IP Routing for SIP Routing, and type 192.168.2.1 for Destination Address.
Click Apply.
Configuration verification
After the above configuration, you can use telephone 1111 to call telephone 2222, or use telephone
2222 to call telephone 1111.
Select Voice Management > States and Statistics > Call Statistics from the navigation tree to enter
the Active Call Summary page, which displays the statistics of ongoing calls.
Configuring direct calling for SIP UAs through the SIP protocol
(configuring domain name)
Network requirements
As shown in Figure 491, acting as SIP UAs, Router A and Router B can first query destination addresses
through a DNS server and then make calls using the SIP protocol.
Figure 491 Network diagram for calling between SIP UAs through DNS
507
Configuration procedure
NOTE:
Before the following configurations, configure domain name resolution. For more information about DNS,
see the chapter DNS configuration.
1.
Configure Router A
Click Apply.
508
Select IP Routing for SIP Routing, and type cc.news.com for Destination Address.
Click Apply.
2.
Configure Router B
Select Voice Management > Local Number from the navigation tree, and then click Add to enter the page
for creating a local number.
Figure 494 Create local number 2222
509
Click Apply.
510
Select IP Routing for SIP Routing, and type 192.168.2.1 for Destination Address.
Click Apply.
Configuration verification
After the above configuration, you can use telephone 1111 to call telephone 2222 by using the DNS
server to get the destination address, and you can use telephone 2222 to call telephone 1111 by
querying the static IP address of the called party.
Select Voice Management > States and Statistics > Call Statistics from the navigation tree to enter
the Active Call Summary page, which displays the statistics of ongoing calls.
511
Eth2/1
192.168.2.1/24
Router A
Internet
FXS 8/0
Telephone A
1111
Eth2/1
192.168.2.2/24
Eth2/1
192.168.2.3/24
Router B
FXS 8/0
Telephone B
2222
SIP server
Configuration procedure
1.
Configure Router A
Click Apply.
512
Click Apply.
513
Click Apply.
2.
Configure Router B
Select Voice Management > Local Number from the navigation tree, and then click Add to enter the page
for creating a local number.
Figure 500 Create local number 2222
514
Click Apply.
515
Click Apply.
516
Click Apply.
Configuration verification
After the local numbers of the two sides are registered on the registrar successfully, telephone 1111
and telephone 2222 can call each other through the proxy server.
Select Voice Management > States and Statistics > Call Statistics from the navigation tree to enter
the Active Call Summary page, which displays the statistics of ongoing calls.
Select Voice Management > States and Statistics > Connection Status from the navigation tree, and
then click the Register Status tab to view the SIP register status.
517
Configuration procedure
1.
Configure Router A
Click Apply.
Select subscriber-line 1/0 from the Trunk Route Line drop-down list.
Click Apply.
519
Select Send All Digits of a Called Number for Called Number Sending Mode.
Click Apply.
2.
Configure Router B
Select Voice Management > Local Number from the navigation tree, and then click Add to enter the page
for creating a local number.
Figure 507 Create local number 2222
Click Apply.
520
Configuration verification
Telephone 1111 can call telephone 2222 over the trunk line.
Select Voice Management > States and Statistics > Call Statistics from the navigation tree to enter
the Active Call Summary page, which displays the statistics of ongoing calls.
521
T.30 protocol is about file and fax transmission over PSTN. It describes and regulates the
communication traffic of G3 fax machines over common telephone networks, signal format, control
signaling, and error correction to the full extent.
T.4 protocol is a standard protocol involving the G3 fax terminals for file transmission. It provides a
standard regulation for the G3 fax terminals on image encoding/decoding scheme, signal
modulation and speed, transmission duration, error correction, and file transmission mode.
T.38 protocol is about the real-time G3 fax over IP networks. It describes and regulates the
communication mode, packet format, error correction and some communication flows of real-time
G3 fax over IP networks.
Fax flow
In FoIP, the call setup, handshake, rate training, packet transfer, and call release are always realtime.
From the perspective of users, FoIP has no difference from faxing over PSTN.
522
Signals that a G3 fax machine receives and sends are modulated analog signals. Therefore the router
processes fax signals in a different way it processes telephone signals. The router needs to perform A/D
or D/A conversion for fax signals (that is, the router demodulates analog signals from PSTN into digital
signals, or modulates digital signals from the IP network into analog signals), but does not need to
compress fax signals.
A real-time fax process consists of five phases:
1.
Fax call setup phase. This phase is similar to the process of a telephone call setup. The difference
is that the fax tones identifying the sending/receiving terminals are included.
2.
Prior-messaging phase. During this phase, fax faculty negotiation and training are performed.
3.
Messaging phase. During this phase, fax packets are transmitted in accordance with the T.4
procedure, and packet transmission is controlled (including packets synchronization, error
detection and correction, and line monitoring).
4.
Post-messaging phase. During this phase, control operations such as packet authentication,
messaging completion, and multi-page continuous transmission are performed.
5.
Fax call release phase. During this phase, the fax call is released.
Pass-through fax
The fax pass-through technology was developed primarily for the purpose of compressing and
transmitting T.30 fax packets that cannot be demodulated through packet switched networks. With this
technology, the devices on two sides can directly communicate over a transparent IP link, and the voice
gateways do not distinguish fax calls from voice calls. After detecting a fax tone in an established VoIP
call, the voice gateway checks whether the voice codec protocol is G.711. If not, the voice gateway
switches the codec to G.711. Then fax data is transmitted as voice data in the pass-through mode.
In the pass-through mode, fax information is in the format of uncompressed G.711 codes and is
encapsulated in RTP packets between gateways, and a fixed bandwidth of 64 Kbps is occupied.
Although the packet redundancy mechanism can reduce the packet loss ratio, the pass-through mode is
subject to factors such as packet loss ratio, jitter, and delay. Therefore, it is necessary to ensure
synchronization of the clocks on both sides. Fax pass-through is called voice band data (VBD) by ITU-T.
That is, fax or modem signals are transmitted over a voice channel using a proper coding method. So far,
the codecs supported are only G.711 A-law and G.711 -law. In addition, when the fax pass-through
function is enabled, the voice activity detection (VAD) function must be disabled to avoid fax failures.
You can implement the fax pass-through function on the voice gateway in two ways:
Negotiate the codec as G.711 and disable fax forwarding. Then, disable the VAD function to avoid
fax failures. This method is used for the voice gateway to interwork with other devices in the
pass-through mode.
523
Description
Enable. Only when the fax function is enabled, the fax parameters can be
Fax Function
configured.
Disable
Configure the protocol used for fax communication with other devices.
Fax Protocol
524
Item
Description
Configure the fax pass-through mode.
G.711 A-law
G.711 -law
The pass-through mode is subject to such factors as loss of packet, jitter and
delay, so the clocks on both communication sides must be kept synchronized. At
present, only G.711 A-law and G.711 -law are supported, and the VAD
function should be disabled.
Number of Redundant
Low-speed T.38 Packets
Number of Redundant
High-speed T.38 Packets
IMPORTANT:
Increasing the number of redundant
packets will improve reliability of
network transmission and reduce
packet loss ratio. A great amount of
redundant packets, however, can
increase bandwidth consumption to a
great extent and thereby, in the case of
low bandwidth, affect the fax quality
seriously. Therefore, the number of
redundant packets should be selected
properly according to the network
bandwidth.
If G.711 is adopted, the maximum fax transmission rate is 14,400 bps and the
fax protocol is V.17.
If G.726 is adopted, the maximum fax transmission rate is 14,400 bps and
the fax protocol is V.17.
By default, the Allowed Max Voice Speed of the Codec Protocol option is
adopted.
If G.729 is adopted, the maximum fax transmission rate is 7,200 bps and the
fax protocol is V.29.
IMPORTANT:
Note that if an option other than the default option is adopted, the maximum rate is
negotiated first in accordance with the corresponding fax protocol.
525
Item
Description
Specify the fax training mode, which can be
Local: Indicates that the gateways participate in the rate training between fax
When the percentage of all-ones or all-zeros TCF data to the total number of TCP
data is less than the local training threshold, the current rate training succeeds.
Otherwise, the current rate training fails and you need to drop the rate for a local
training operation again.
By default, the threshold is 10.
IMPORTANT:
When the local training mode is adopted, use this option to configure the threshold
in percentage. When the Point-to-Point training mode is adopted, the gateway
does not participate in rate training and the threshold of local training is not
applicable.
In common fax applications, the participating fax terminals negotiate with the
standard faculty (such as V.17 and V.29 rate) by default. It means that they do
not send each other non-standard facilities (NSF) message frames. In some cases
such as encrypted fax, both fax terminals adopt a nonstandard faculty (NSF) to
negotiate.
At the start of negotiation, both terminals first exchange NSF message frames,
and then negotiate the subsequent fax faculty for communication. NSF messages
are standard T.30 messages and carry private information.
In order to use a nonstandard faculty for negotiation, the following conditions
must be satisfied:
1. Fax terminals must support nonstandard transmission mode.
2. The transmission mode must be set to a nonstandard mode in the POTS and
VoIP entities for both fax terminals.
By default, a standard faculty mode is adopted for fax faculty transmission.
Usually, the default transmit energy level of the gateway carrier is acceptable. If
the fax cannot be set up yet on the premise that other configurations are correct,
you can attempt to adjust the transmit energy level of the gateway carrier
(namely, transmit energy level attenuation). A greater level indicates greater
energy. A smaller level indicates greater attenuation.
526
Item
Description
As defined in ITU-T, the error correction mode (ECM) is required for a half duplex
and fax message transmission using the half-duplex and half-modulation system
of ITU-T V.34 protocol. Besides, the G3 fax terminals working in full duplex mode
are required to support half-duplex mode, namely, ECM.
ECM Fax
The fax machines using ECM can correct errors, provide the automatic repeat
request (ARQ) function, and transmit fax packets in the format of HDLC frames.
On the contrary, the fax machines using non-ECM cannot correct errors and they
transmit fax packets in the format of binary strings.
The calling tone (CNG) fax switchover is mainly used to implement the fax
mailbox service through communication with the VCX. When the local fax
machine A originates a fax call to the peer fax machine B, if B is busy or is
unattended, A can send the originated fax to the fax mailbox of the VCX. With
CNG fax switchover enabled, the voice gateway can switch to the fax mode
once it receives a CNG from A.
Enable
Disable
The function is disabled by default.
Configure the codec type and switching mode for SIP Modem pass-through
function.
Standard G.711 A-law: Adopt G.711 A-law as the codec type and use
Codec Type and Switching
Mode for SIP Modem
Pass-through
Standard G.711 -law: Adopt G.711 -law as the codec type and use
Re-Invite switching for SIP Modem pass-through.
NTE Compatible G.711 A-law: Adopt G.711 A-law as the codec type and use
NTE-compatible switching for SIP Modem pass-through.
NTE Compatible G.711 -law: Adopt G.711 -law as the codec type and use
NTE-compatible switching for SIP Modem pass-through.
Configure the value of NTE payload type for the NTE-compatible switching
mode.
NTE Payload Type Field
This option is configurable only when NTE Compatible G.711 A-law or NTE
Compatible G.711 -law is selected from the Codec Type and Switching Mode
for SIP Modem Pass-through drop-down list.
By default, the value of the NTE payload type is 100.
527
For call route fax and Modem configuration items, see Table 209 for details.
528
Call services
Introduction to call services
More and more VoIP-based services are demanded as voice application environments expand. On basis
of basic calls, new features are implemented to meet different application requirements of VoIP
subscribers. So far, the new features include:
Call waiting
Call hold
Call forwarding
Call transfer
Call backup
Hunt group
Call barring
Message waiting indication (For information about message waiting indication, see the chapter
Call connection configuration.)
Three-party conference
Call waiting
When subscriber C calls subscriber A who is already engaged in a call with subscriber B, the call will
not be rejected if call waiting is enabled. Just like a normal call, subscriber C will hear ringback tones,
while subscriber A will hear call waiting tones which remind that a call is waiting on the line.
Subscriber A can answer the new call by pressing the flash hook or hanging up to end the call with
subscriber B. In the former case, subscriber B is held. In the latter case, subscriber A is immediately
alerted and can pick up the phone to answer the call originated by subscriber C (the waiting call).
Call hold
If subscriber A in a conversation with subscriber B presses the flash hook, the media session of subscriber
B is temporarily cut through and is held (in the silent state or listening to the waiting tones). The system
plays silent tones or dial tones to subscriber A, depending on the configuration. (The system first plays
dial tones and waits for the subscriber to dial. If the subscriber fails to dial within a period of time, the
system stops playing dial tones and the line stays on hold.). Subscriber A can resume the call with
subscriber B by pressing the flash hook again.
529
After pressing the flash hook, subscriber A hears dial tones and can initiate a new call. The setup flow
for the new call is completely the same as the one for ordinary calls.
Call forwarding
After receiving a session request, the called party cannot answer the call for some reason. In this case,
the called party notifies in a response the calling party of the forwarded-to number so that the calling
party can re-initiate a session request to the new destination. This is call forwarding.
Currently, the system supports four different types of call forwarding:
Call forwarding unconditional: With this feature enabled on a voice subscriber line, incoming calls
will be forwarded to the predetermined destination, no matter whether the voice subscriber line is
available.
Call forwarding busy: With this feature enabled on a voice subscriber line, an incoming call will be
forwarded to the predetermined destination when the voice subscriber line is busy.
Call forwarding no reply: With this feature enabled on a voice subscriber line, an incoming call will
be forwarded to the predetermined destination when the voice subscriber line is not answered
within a period of time, which is configured by specifying Max Duration of Playing Ringback Tones
on the FXS, FXS or E&M line configuration page and defaults to 60 seconds.
Call forwarding unavailable: With this feature enabled on a voice subscriber line, an incoming call
will be forwarded to the predetermined destination when the voice subscriber line is shut down.
Call transfer
Subscriber A (originator) and subscriber B (recipient) are in a conversation. Subscriber A presses the
flash hook and the call is put on hold. Subscriber A dials another number to originate a call to subscriber
C (final recipient); after Subscriber A hangs up, the call between subscriber B and subscriber C is
established. This is call transfer.
To perfect the call transfer feature, the device supports the call recovery function after the call transfer fails,
that is, if subscriber C in the above example is in a conversation with another subscriber and cannot
establish a conversation with subscriber B, the call between subscriber A and subscriber B is recovered.
Call backup
After initiating a call to the called party, the calling party is unable to receive a response. In this case, if
there is another link (PSTN link or VoIP link) to the called party, the calling party re-initiates a call to the
called party over the new route. This is call backup.
Currently, the system supports two types of call backup:
Hunt group
Multiple voice subscriber lines are configured with the same called number to form a hunt group. If the
voice subscriber line with the first priority is unavailable when a call setup request to the called party is
received, the call will still be established through another voice subscriber line in the hunt group.
530
Call barring
Call barring includes incoming call barring and outgoing call barring.
Incoming call barring usually refers to the Do Not Disturb (DND) service. When incoming call barring is
enabled on a voice subscribe line, calls originated to the attached phone will fail.
When outgoing call barring is enabled on a voice subscriber line, calls originated from the attached
phone will fail, too.
Three-party conference
When subscriber A has a call with subscriber B and holds a call with subscriber C, A can make C join
the current conversation to implement a three-party conference.
During a three-party conference, a passive participant can initiate a new call to create another
conversation. In this way, conference chaining is implemented, and each conference initiator serves as
a conference bridge.
If the entered password is correct (the password matches the door opening control password
configured for the voice subscriber line), the door control relay opens the door. After a predefined
door open duration, the door control relay locks the door automatically.
Date and time when the voice call occurs (MM DD hh:mm)
O if the terminating private branch exchange (PBX) fails to obtain the calling number (for example,
the originating PBX end does not send it)
Date and time when the voice call occurs (MM DD hh:mm)
Two Ps for the calling number and the calling name respectively if CID is disabled on the device
O if the terminating PBX fails to obtain the calling number (for example, the originating PBX end
does not send it)
O if the terminating PBX fails to obtain the calling name (for example, the originating PBX end does
not send it)
The FXS voice subscriber line sends the calling identity information to the called telephone. The calling
identity information is sent to the called telephone through frequency shift keying (FSK) modulation
between first and second rings. Therefore, the called user must pick up the telephone after the second
ring to ensure that the calling identity information is sent and received correctly. Otherwise, the calling
identity information may fail to be displayed.
the parity check succeeds. If the function is enabled, the calling identity information (indicating that the
calling identity information is received) is sent; otherwise, the character P or O is sent.
Description
The Forwarded-to Number for Call Forwarding no Reply: Input the forwarded-to number
for call forwarding no reply.
Call Forwarding
The Forwarded-to Number for Call Forwarding Busy: Input the forwarded-to number for
call forwarding busy.
Call Forwarding Unconditional: Input the forwarded-to number for forwarding
unconditional.
The Forwarded-to Number for Call Forwarding Unavailable: Input the forwarded-to
number for call forwarding unavailable.
533
Item
Description
After call waiting is enabled, you can configure the following parameters according to
your needs:
Call Waiting
Call Hold
Call Transfer
After call transfer is enabled, you can set the Call Transfer Start Delay parameter
according to your needs.
Three-Party
Conference
The three-party conference function depends on the call hold function. Therefore, you
need to enable the call hold function before configuring three-party conference.
534
Calling Name
Description
Set the calling name, a string of case sensitive characters including numbers 0 through
9, letters A through Z or a through z, underlines (_), hyphens (-),dots (.), exclamation
point (!), percent sign (%), asterisk (*), plus sign (+), grave accent (`), single quotation
mark (), and tilde (~).
By default, no calling name is configured.
The calling name in the calling identity information can only be transmitted in MDMF
format. Therefore, if the calling information delivery is enabled, you need to select the
Complex Delivery radio button in the Calling Information Delivery area.
Configure the format of calling information
Calling Information
Delivery
Call Identity
Delivery
Incoming Call
Barring
Password for
Outgoing Call
Barring
Enable
Disable
The calling identity is delivered by default.
Enable
Disable
By default, incoming call barring is disabled.
Set a password to lock your telephone when you do not want others to use your
telephone.
Door Opening
Password
Enable the door opening control service and set a password for
opening the door and the door open duration before the door
control relay locks the door.
By default, the door opening service is disabled.
IMPORTANT:
Door Open
Duration
Feature Service
Enable
Disable
By default, feature service is disabled.
535
Item
Description
Enable
Disable
Hunt Group
Enable
Disable
By default, MWI is disabled.
Message Waiting
Indicator
After MWI is enabled, you can configure the Duration of Playing the Message Waiting
Tone parameter according to your needs.
IMPORTANT:
Generally, the voice gateway sends a SUBSCRIBE to the server, and receives a NOTIFY
from the server if the subscription is successful, and gets the status of the voice mailbox
afterwards.
Hotline Numbers
On-hook Delay
Time of the Called
Party
Processing Priority
When the Line is
Busy
Configure the private line auto ring-down (PLAR) function. The number is the E.164
telephone number of the terminating end.
Enable calling party control and set the on-hook delay time of the called party. If the
delay time is set to 0, this indicates that the call party control is disabled.
By default, calling party control is disabled, that is, the on-hook delay of the called party
is set to 0.
Specify the processing sequence of services when the line is busy.
536
Description
After call waiting is enabled, you can configure the following parameters according to
your needs:
Call Waiting
Incoming Call
Barring
Password for
Outgoing Call
Barring
Enable
Disable
By default, incoming call barring is disabled.
Set a password to lock your telephone when you do not want others to use your
telephone.
Enable
Disable
Hunt Group
Hotline Numbers
Configure the private line auto ring-down (PLAR) function. The number is an E.164
telephone number of the terminating end.
537
1000
Telephone A
Router B
Eth1/1
10.1.1.1/24
Eth1/2
10.1.1.2/24
Eth1/1
20.1.1.2/24
Eth1/1
20.1.1.1/24
Router C
3000
Telephone C
2000
Telephone B
Configuration procedure
NOTE:
Before performing the following configuration, make sure Router A, Router B and Router C are reachable
to each other.
1.
538
Click Apply.
Configuration verification
Verify the two call waiting operation modes:
Operation 1: When the subscriber at Telephone C dials 1000 to call Telephone A which is already
engaged in a call with Telephone B, the subscriber at Telephone C will hear ringback tones, while the
subscriber at Telephone A will hear call waiting tones which remind that a call is waiting on the line. If
then the subscriber at Telephone A hangs up, the telephone will ring, the subscriber at Telephone A can
pick up the phone to start a conversation with Telephone C.
Operation 2: When the subscriber at Telephone C dials 1000 to call Telephone A who is already
engaged in a call with Telephone B, the subscriber at Telephone A can press the flash hook to start a
conversation with Telephone C, and thus Telephone B is held; the subscriber at Telephone A can press
the flash hook again to continue the talk with Telephone B, and then Telephone C is held. Note that, call
hold function must be enabled on the voice subscriber line connected to Telephone A.
539
Router A
Router B
Eth1/1
10.1.1.1/24
1000
Telephone A
Eth1/2
10.1.1.2/24
Eth1/1
20.1.1.2/24
Router C
Eth1/1
20.1.1.1/24
3000
Telephone C
2000
Telephone B
Configuration procedure
NOTE:
Before performing the following configuration, make sure Router A, Router B and Router C are reachable
to each other.
1.
Type 3000 for The Forwarded-to Number for Call Forwarding Busy.
Click Apply.
540
Configuration verification
Place a call from Telephone A to Telephone B. Router B forwards the call to Telephone C when Telephone
B is busy. Finally, Telephone A and Telephone C start a conversation
Call Telephone B from Telephone A, and then Telephone B and Telephone A are in a conversation.
2.
3.
4.
Hang up Telephone A.
5.
1000
Telephone A
Router B
Eth1/1
10.1.1.1/24
Eth1/2
10.1.1.2/24
Eth1/1
20.1.1.2/24
Eth1/1
20.1.1.1/24
Router C
3000
Telephone C
2000
Telephone B
Configuration procedure
NOTE:
Before performing the following configuration, make sure that Router A, Router B and Router C are
reachable to each other.
1.
541
Click Apply.
Configuration verification
The whole process is as follows:
1.
Call Telephone B from Telephone A, and then Telephone B and Telephone A are in a conversation.
2.
3.
4.
Hang up Telephone A.
5.
542
Eth1/1
10.1.1.2/24
Router B
1000
Telephone A1
Eth1/1
10.1.1.1/24
Router A
1000
Telephone A2
2000
Telephone B
Eth1/2
20.1.1.1/24
Eth1/1
20.1.1.2/24
3000
Telephone C
Router C
Configuration procedure
NOTE:
Before performing the following configuration, make sure that Router A, Router B and Router C are
routable to each other.
1.
# Configure a number selection priority for Telephone A2 on Router A. Keep the default priority 0 (the
highest priority) for Telephone A1.
Select Voice Management > Local Number from the navigation tree, click the
icon of local number
1000 in the local number list to enter the advanced settings configuration page.
Figure 521 Configure number selection priority of Telephone A2
543
Click Apply.
544
Click Apply.
Perform the same configuration for the local number 1000 of Telephone A2. The configuration procedure
is omitted here.
Configuration verification
Dial number 1000 from Telephone B (2000). Because Telephone A1 has a higher priority, Telephone B
is connected to Telephone A1. If you dial number 1000 from Telephone C (3000) when Telephone A1
and Telephone B are in a conversation, hunt group enables Telephone C to have a conversation with
Telephone A2.
545
Router A
Router B
Eth1/0
10.1.1.1/24
1000
Telephone A
Eth1/0
10.1.1.2/24
Eth1/0
20.1.1.2/24
Router C
Eth1/1
20.1.1.1/24
3000
Telephone C
2000
Telephone B
Configuration procedure
NOTE:
Before performing the following configuration, make sure that Router A, Router B and Router C are
routable to each other.
1.
Click Apply.
546
Click Apply.
Configuration verification
Now Telephone B, as the conference initiator, can establish a three-party conference with participants
Telephone A and Telephone C.
If you also enable three-party conference on the FXS lines of Telephone A and Telephone C on Router A
and Router C, then during the conference, a new call can be initiated from Telephone A or Telephone C
to invite another passive participant. In this way, conference chaining is implemented.
Configure silent monitor for Telephone C to monitor the conversation between Telephone A and
Telephone B. After configuration, when Telephone A and Telephone B is in a conversation, dialing
the feature code *425*Number of Telephone A# at Telephone C can monitor the conversation
between Telephone A and Telephone B.
Configure barge in for Telephone C to participate the conversation between Telephone A and
Telephone B. After configuration, dialing the feature code *428# at Telephone C can participate
the conversation between Telephone A and Telephone B.
547
Configuration procedure
1.
Open the web interface of the VCX and select Central Management Console. Configure the information
of Telephone A, Telephone B, and Telephone C. The following takes Telephone A as an example.
Figure 527 Telephone configuration page
548
Figure 528 Silent monitor and barge in feature configuration page (I)
Click Assign External Phones to specify that number 3000 has the authority to monitor number 1000.
After this configuration, the page as shown in Figure 529 appears.
Figure 529 Silent monitor and barge in feature configuration page (II)
After the above configuration, Telephone C with the number 3000 can monitor and barge in the
conversations of Telephone A with the number 1000.
2.
Configure Router A
Configure a local number: specify the local number ID as 1000 and the number as 1000, and bind
the number to line line 1/0 on the local number configuration page.
Configure the call route to Router B: specify the call route ID as 10000, the destination number as
3000, and the call route type as SIP, and use a SIP proxy server to complete calls on the call route
configuration page.
Configure the call route to Router C: specify the call route ID as 10001, the destination number as
3000, and the call route type as SIP, and use a proxy server to complete calls on the call route
configuration page.
Configure SIP registration: enable register function of the server on the connection properties
configuration page. Select Voice Management > Call Connection > SIP Connection from the
navigation tree to enter the connection properties configuration page, and configure the IP
addresses of both the main registrar and the proxy server as 100.1.1.101.
# Enable the feature service and the silent-monitor and barge-in function.
Select Voice Management > Local Number from the navigation tree, and click the
number 1000 to enter the call services page as shown in Figure 530.
549
icon of local
Figure 530 Enable the feature service and the silent monitor and barge in function
Click Apply.
3.
Configure Router B
Configure a local number: specify the local number ID as 2000 and the number as 2000, and bind
the number to line line 1/0 on the local number configuration page.
Configure the call route to Router A: specify the call route ID as 10000, the destination number as
1000, and the call route type as SIP, and use a SIP proxy server to complete calls on the call route
configuration page.
Configure the call route to Router C: specify the call route ID as 10001, the destination number as
3000, and the call route type as SIP, and use a proxy server to complete calls on the call route
configuration page.
Configure SIP registration: enable register function of the server on the connection properties
configuration page. Select Voice Management > Call Connection > SIP Connection from the
navigation tree to enter the connection properties configuration page, then configure the IP
addresses of both the main registrar and the proxy server as 100.1.1.101.
4.
Configure Router C
Configure a local number: specify the local number ID as 3000 and the number as 3000, and bind
the number to line line 1/0 on the local number configuration page.
Configure the call route to Router A: specify the call route ID as 10000, the destination number as
1000, and the call route type as SIP, and use a SIP proxy server to complete calls on the call route
configuration page.
Configure the call route to Router B: specify the call route ID as 10001, the destination number as
2000, and the call route type as SIP, and use a proxy server to complete calls on the call route
configuration page.
Configure SIP registration: enable register function of the server on the connection properties
configuration page. Select Voice Management > Call Connection > SIP Connection from the
navigation tree to enter the connection properties configuration page, then configure the IP
addresses of both the main registrar and the proxy server as 100.1.1.101.
551
Click Apply.
icon of local
Click Apply.
Configuration verification
After the above configuration, dial feature code *425*1000# at Telephone C, and you can monitor the
conversation between Telephone A and Telephone C. If you want to participate in the conversation, dial
*428# at Telephone C.
552
Advanced settings
Introduction to advanced settings
Coding parameters
The configuration of coding parameters includes specifying codec priorities and packet assembly
intervals.
The codecs include: g711alaw, g711ulaw, g723r53, g723r63, g726r16, g726r24, g726r32, g726r40,
g729a, g729br8, and g729r8.
The following are the characteristics of different codecs.
g711alaw and g711ulaw provide high-quality voice transmission, while requiring greater
bandwidth.
g723r53 and g723r63 provide silence suppression technology and comfortable noise, the
relatively higher speed output is based on multi-pulse multi-quantitative level technology and
provides relatively higher voice quality, and the relatively lower speed output is based on the
Algebraic-Code-Excited Linear-Prediction technology and provides greater flexibility for
application.
The voice quality provided by g729r8 and g729a is similar to the adaptive differential pulse code
modulation (ADPCM) of 32 kbps, having the quality of a toll, and also featuring low bandwidth,
lesser event delay and medium processing complexity; hence it has a wide field of application.
Bandwidth
Voice quality
Best
G.726
Good
G.729
8 kbps
Good
G.723 r63
6.3 kbps
Fair
G.723 r53
5.3 kbps
Fair
Actual network bandwidth is related to packet assembly interval and network structure. The longer the
packet assembly interval is, the closer the network bandwidth is to the media stream bandwidth. More
headers consume more bandwidth. A longer packet assembly interval results in a longer fixed coding
latency.
The following tables show the relevant packet assembly parameters without IP header compression
(IPHC), including packet assembly interval, bytes coded in a time unit, and network bandwidth. Thus,
you can choose a suitable codec algorithm according to idle and busy status of the line and network
situations more conveniently.
553
Bytes coded
in a time unit
Packet
length
(IP)
(bytes)
Network
bandwidth
(IP)
Packet length
(IP+PPP) (bytes)
Network
bandwidt
h (IP+PPP)
Coding
latency
10 ms
80
120
96 kbps
126
100.8
kbps
10 ms
20 ms
160
200
80 kbps
206
82.4 kbps
20 ms
30 ms
240
280
74.7 kbps
286
76.3 kbps
30 ms
G.711 algorithm (A-law and -law): media stream bandwidth 64 kbps, minimum packet assembly interval 10
ms.
Bytes
coded in a
time unit
Packet
length (IP)
(bytes)
Network
bandwidth
(IP)
Packet length
(IP+PPP)
(bytes)
Network
bandwidth
(IP+PPP)
Coding
latency
30 ms
24
64
16.8 kbps
70
18.4 kbps
30 ms
60 ms
48
88
11.6 kbps
94
12.3 kbps
60 ms
90 ms
72
112
9.8 kbps
118
10.3 kbps
90 ms
120 ms
96
136
9.1 kbps
142
9.5 kbps
120 ms
150 ms
120
160
8.5 kbps
166
8.9 kbps
150 ms
180 ms
144
184
8.2 kbps
190
8.4 kbps
180 ms
G.723 r63 algorithm: media stream bandwidth 6.3 kbps, minimum packet assembly interval 30 ms.
Bytes coded
in a time
unit
Packet
length (IP)
(bytes)
Network
bandwidth
(IP)
Packet length
(IP+PPP)
(bytes)
Network
bandwidth
(IP+PPP)
Coding
latency
30 ms
20
60
15.9 kbps
66
17.5 kbps
30 ms
60 ms
40
80
10.6 kbps
86
11.4 kbps
60 ms
90 ms
60
100
8.8 kbps
106
9.3 kbps
90 ms
120 ms
80
120
8 kbps
126
8.4 kbps
120 ms
150 ms
100
140
7.5 kbps
146
7.8 kbps
150 ms
180 ms
120
160
7.1 kbps
166
7.4 kbps
180 ms
G.723 r53 algorithm: media stream bandwidth 5.3 kbps, minimum packet assembly interval 30 ms.
Bytes coded
in a time
unit
Packet
length (IP)
(bytes)
Network
bandwidth
(IP)
Packet length
(IP+PPP)
(bytes)
Network
bandwidth
(IP+PPP)
Coding
latency
10 ms
20
60
48 kbps
66
52.8 kbps
10 ms
554
Packet
assembly
interval
Bytes coded
in a time
unit
Packet
length (IP)
(bytes)
Network
bandwidth
(IP)
Packet length
(IP+PPP)
(bytes)
Network
bandwidth
(IP+PPP)
Coding
latency
20 ms
40
80
32 kbps
86
34.4 kbps
20 ms
30 ms
60
100
26.7 kbps
106
28.3 kbps
30 ms
40 ms
80
120
24 kbps
126
22.1 kbps
40 ms
50 ms
100
140
22.4 kbps
146
23.4 kbps
50 ms
60 ms
120
160
21.3 kbps
166
11.4 kbps
60 ms
70 ms
140
180
20.6 kbps
186
21.3 kbps
70 ms
80 ms
160
200
20 kbps
206
20.6 kbps
80 ms
90 ms
180
220
19.5 kbps
226
20.1 kbps
90 ms
100 ms
200
240
19.2 kbps
246
19.7 kbps
100 ms
110 ms
220
260
18.9 kbps
266
19.3 kbps
110 ms
G.726 r16 algorithm: media stream bandwidth 16 kbps, minimum packet assembly interval 10 ms.
Bytes
coded in a
time unit
Packet
length (IP)
(bytes)
Network
bandwidth
(IP)
Packet length
(IP+PPP) (bytes)
Network
bandwidth
(IP+PPP)
Coding
latency
10 ms
30
70
56 kbps
76
60.8 kbps
10 ms
20 ms
60
100
40 kbps
106
42.4 kbps
20 ms
30 ms
90
130
34.7 kbps
136
36.3 kbps
30 ms
40 ms
120
160
32 kbps
166
33.2 kbps
40 ms
50 ms
150
190
30.4 kbps
196
31.2 kbps
50 ms
60 ms
180
220
29.3 kbps
226
30.1 kbps
60 ms
70 ms
210
250
28.6 kbps
256
29.3 kbps
70 ms
G.726 r24 algorithm: media stream bandwidth 24 kbps, minimum packet assembly interval 10 ms.
Bytes coded
in a time
unit
Packet
length (IP)
(bytes)
Network
bandwidth
(IP)
Packet length
(IP+PPP) (bytes)
Network
bandwidth
(IP+PPP)
Coding
latency
10 ms
40
80
64 kbps
86
68.8 kbps
10 ms
20 ms
80
120
48 kbps
126
50.4 kbps
20 ms
30 ms
120
160
42.7 kbps
166
44.3 kbps
30 ms
40 ms
160
200
40 kbps
206
41.2 kbps
40 ms
50 ms
200
240
38.4 kbps
246
39.4 kbps
50 ms
G.726 r32 algorithm: media stream bandwidth 32 kbps, minimum packet assembly interval 10 ms.
555
Bytes coded
in a time unit
Packet
length (IP)
(bytes)
Network
bandwidt
h (IP)
Packet length
(IP+PPP) (bytes)
Network
bandwidth
(IP+PPP)
Coding
latency
10 ms
50
90
72 kbps
96
76.8 kbps
10 ms
20 ms
100
140
56 kbps
146
58.4 kbps
20 ms
30 ms
150
190
50.7 kbps
196
52.3 kbps
30 ms
40 ms
200
240
48 kbps
246
49.2 kbps
40 ms
G.726 r40 algorithm: media stream bandwidth 40 kbps, minimum packet assembly interval 10 ms.
Bytes
coded in a
time unit
Packet
length (IP)
(bytes)
Network
bandwidth
(IP)
Packet length
(IP+PPP) (bytes)
Network
bandwidth
(IP+PPP)
Coding
latency
10 ms
10
50
40 kbps
56
44.8 kbps
10 ms
20 ms
20
60
24 kbps
66
26.4 kbps
20 ms
30 ms
30
70
18.7 kbps
76
20.3 kbps
30 ms
40 ms
40
80
16 kbps
86
17.2 kbps
40 ms
50 ms
50
90
14.4 kbps
96
15.4 kbps
50 ms
60 ms
60
100
13.3 kbps
106
14.1 kbps
60 ms
70 ms
70
110
12.6 kbps
116
13.3 kbps
70 ms
80 ms
80
120
12 kbps
126
12.6 kbps
80 ms
90 ms
90
130
11.6 kbps
136
12.1 kbps
90 ms
100 ms
100
140
11.2 kbps
146
11.7 kbps
100 ms
110 ms
110
150
10.9 kbps
156
11.3 kbps
110 ms
120 ms
120
160
10.7 kbps
166
11.1 kbps
120 ms
130 ms
130
170
10.5 kbps
176
10.8 kbps
130 ms
140 ms
140
180
10.3 kbps
186
10.6 kbps
140 ms
150 ms
150
190
10.1 kbps
196
10.5 kbps
150 ms
160 ms
160
200
10 kbps
206
10.3 kbps
160 ms
170 ms
170
210
9.9 kbps
216
10.2 kbps
170 ms
180 ms
180
220
9.8 kbps
226
10 kbps
180 ms
G.729 algorithm: media stream bandwidth 8 kbps, minimum packet assembly interval 10 ms.
556
NOTE:
The packet assembly interval is the duration to encapsulate information into a voice packet.
Bytes coded in a time unit = packet assembly interval media stream bandwidth.
Packet length (IP) = IP header + RTP header + UDP header + voice information length = 20+12+8+data.
Packet length (IP+PPP) = PPP header + IP header + RTP header + UDP header + voice information length
= 6+20+12+8+data.
Network bandwidth = Bandwidth of the media stream packet length/bytes coded in a time unit.
Because IPHC compression is affected significantly by network stability, it cannot achieve high efficiency
unless the line is of high quality, the network is very stable, and packet loss does not occur or seldom
occurs. When the network is unstable, IPHC efficiency drops drastically. With best IPHC performance,
the IP (RTP) header can be compressed to 2 bytes. If the PPP header is compressed at the same time, a
great deal of media stream bandwidth can be saved. The following table shows the best IPHC
compression efficiency of codec algorithms with a packet assembly interval of 30 milliseconds.
Table 222 Compression efficiency of IPHC+PPP header
Before compression
Codec
Bytes
coded in
a time
unit
Packet length
(IP+PPP) (bytes)
Network
bandwidth
(IP+PPP)
Packet length
(IP+PPP) (bytes)
Network
bandwidth
(IP+PPP)
G.729
30
76
20.3 kbps
34
9.1 kbps
G.723r63
24
70
18.4 kbps
28
7.4 kbps
G.723r53
20
66
17.5 kbps
24
6.4 kbps
G.726r16
60
106
28.3 kbps
64
17.1 kbps
G.726r24
90
136
17.5 kbps
94
25.1 kbps
G.726r32
120
166
44.3 kbps
124
33.1 kbps
G.726r40
150
196
52.3 kbps
154
41.1 kbps
Other parameters
Other parameters are some optional parameters, such as number selection priority, dial prefix, called
number sending mode, and DTMF transmission mode. For the description of these parameters, see
Configuring other parameters of a local number and Configuring other parameters for a call route.
557
icon of the
Description
Specify a codec
with the first
priority.
Specify a codec
with the second
priority.
Specify a codec
with the third
priority.
Specify a codec
with the lowest
priority.
558
Item
Description
NOTE:
Two communication parties can communicate normally only if they share some identical
coding/decoding algorithms. If the codec algorithm between two connected devices is inconsistent, or the
two devices share no common coding/decoding algorithms, the calling will fail.
icon of the
Description
Set the priority of the local number. The smaller the value, the higher the
priority.
Dial Prefix
Configure a dial prefix for the local number. For a trunk type call route, the
dial prefix is added to the called number to be sent out.
559
Item
Called Number
Sending Mode
DTMF
Transmission
Mode
VAD
Description
Send a
Truncated
Called
Number
Send All
Digits of a
Called
Number
Send
Certain
Number of
Digits
Send a certain number of digits (that are extracted from the end of a
number) of a called number. The specified value should be not greater
than the total number of digits of the called number.
In-band
Transmission
Out-of-band
Transmission
RFC2833
Adopt DTMF named telephone event (NTE) transmission mode. When you
adopt this transmission mode, you can configure the payload type field in
RTP packets.
Pre-defined
Set the DSCP value in the ToS field in the IP packets that carry the RTP
stream.
Customized
Enable
Disable
By default, VAD is disabled.
560
For coding parameters configuration items of the call route, see Table 224.
For the configuration items of other parameters of the call route, see Table 224 and Table 225.
Table 225 Configuration items
Item
Description
Set the priority of the call route. The smaller the value, the higher the
priority.
Enable
Disable
By default, the remote end instead of the local end plays ringback tones.
561
Configuration procedure
1.
For detailed configuration, see Configuring direct calling for SIP UAs through the SIP protocol
(configuring static IP address).
2.
# Configure the out-of-band DTMF transmission mode on Router A for the call route
Select Voice Management > Call Route from the navigation tree, find call route 2222 in the list, and click
its icon
to enter its advanced settings page.
Figure 538 Configure out-of-band DTMF transmission mode
Click Apply.
# Configure out-of-band DTMF transmission mode on Router B for the local number.
562
Select Voice Management > Local Number from the navigation tree, find local number 2222 in the list,
and click its icon
to enter the advanced settings page.
Figure 539 Configure out-of-band DTMF transmission mode
Click Apply.
Configuraion verification
After a call connection is established, if one side presses the telephone keys, the DTMF digits are
transmitted to the other side using out of band signaling, and the other side hears short DTMF tones from
the handset.
563
Description
Enable or disable codec transparent transmission.
If the SIP trunk device does not support the codecs supported by the calling
and called parties, you can enable codec transparent transmission so that
the SIP trunk device transparently transmits codec capability sets between
the two parties to complete codec negotiation.
Codec Transparent
564
Dial plan
Dial plan overview
More requirements on dial plans arise with the wide application of VoIP. A desired dial plan should be
flexible, reasonable and operable, and be able to help a voice gateway to manage numbers in a unified
way, making number management more convenient and reasonable..
The dial plan process on the calling side differs from that on the called side. The following discusses these
two dial plan processes respectively.
1.
The voice gateway on the calling side replaces the calling and called numbers according to the
number substitution rule on the receiving line.
2.
3.
The gateway selects proper numbers based on the local number or call route selection priority rules
and replaces the calling and called numbers.
565
4.
The gateway initiates a call to the called side and sends the calling and called numbers.
PSTN
Local number/call
route
Processing sequence
on called side
Number substitution
Local number/call
route
Number substitution
Global
Global
1.
After receiving a voice call (the called number), the voice gateway on the called side performs
global calling/called number substitution.
2.
The voice gateway on the called side selects proper local numbers or call routes based on the local
number or call route selection priority rules. (Number substitution may also be involved during the
local number or call route selection.) If the called party is a local number, the gateway directly
connects the line. If the called party is a PSTN subscriber, the gateway initiates a call and sends the
calling and called numbers to the PSTN. The PBX in the PSTN connects the call.
Regular expression
You will frequently use some regular expressions when configuring number substitution rules. Regular
expressions are a powerful and flexible tool for pattern matching and substitution. They are not restricted
to a language or system and have been widely accepted.
When using a regular expression, you need to construct a matching pattern according to certain rules,
and then compare the matching pattern with the target object. The simplest regular expressions do not
contain any meta-character. For example, you can specify a regular expression hello, which only
matches the string hello.
To help you construct matching patterns flexibly, regular expressions support some special characters,
called meta-characters, which define the way other characters appear in the target object.
566
Meaning
0-9
Digits 0 through 9.
# and *
Wildcard, which can match any valid digit. For example, 555. can match any
number beginning with 555 and ending in four additional characters.
Hyphen (connecting element), used to connect two numbers (The smaller comes before
the larger) to indicate a range of numbers, for example, 1-9 inclusive.
[]
Delimits a range for matching. It can be used together with signs such as !, %, and +.
For example, [235-9] indicates one number of 2, 3, and 5 through 9.
()
Indicates a sub-expression. For example, (086) indicates the character string 086. It is
usually used together with signs such as !, %, and +. For example, (086)!010 can
match two character strings 010 and 086010.
A control character, indicating that the sub-expression before it appears once or does
not appear. For example, (010)!12345678 can match 12345678 and
01012345678.
A control character, indicating that the sub-expression before it appears one or more
times. However, if a calling number starts with the plus sign, the sign itself does not
have special meanings, and only indicates that the following is an effective number
and the whole number is E.164-compliant. For example, 9876(54)+ can match
987654, 98765454, 9876545454, and so on, and +110022 is an
E.164-compliant number.
A control character, indicating that the sub-expression before it appears multiple times
or does not appear. For example, 9876(54)% can match 9876, 987654,
98765454, 9876545454, and so on.
NOTE:
The sub-expression (one digit or digit string) before a control character such as !, +, and % can appear
for the times indicated by the control character. For example, (100)+ can match 100, 100100,
100100100, and so on. Once any number of them is matched, the match is considered an exact match.
In the longest match mode, the voice gateway will ignore subsequent digits dialed by the subscriber after
an exact match. (For the case that the gateway needs to wait for subscribers to continue dialing after an
exact match, refer to the T mode.)
The characters (\) and (|) are mainly used in regular expressions and cannot be used as common
characters. The character (\) is an escape character. If you want a control character to represent itself,
you need to add the escape character (\) before it. For example, (\+) represents the character (+) itself
because (+) is a control character in regular expressions. The character (|) means that the current
character (string) is the character (string) on either the left or the right. For example, 0860108888|T
means that the current character string is either 0860108888 or T.
T mode: If the character T is in the number set in a local number or call route, it means that the voice
gateway should wait for more digits until the number exceeds the maximum length or the dial timer
expires.
If a number starts with the plus sign (+), note the following when you use it on a trunk: The E&M, R2, and
LGS signaling uses DTMF, and as the plus sign (+) does not have a corresponding audio, the number
cannot be transmitted to the called side successfully. While the DSS1 signaling uses ISDN, the above
problem does not exist. Therefore, you should avoid using a number that cannot be identified by the
signaling itself; otherwise, the call will fail.
567
Maximum number of local numbers or call routes found before a search process stops
This function enables you to define the maximum number of qualified local numbers or call routes to be
found before a search process stops. Even if the number of local numbers or call routes meeting call
requirements is greater than the defined maximum number, the system will match against the local
numbers or call routes that are found in the search according to the configured maximum number.
If the device is configured to use the shortest match mode, the dialed number will match 0106688.
Namely, the device will establish a call connection to 0106688 at the remote end, without
processing the last four digits 0011.
If the device is configured to use the longest match mode, the dialed number will match
01066880011. Namely, the device will establish a call connection to 01066880011 at the remote
end.
If the device is configured to use the shortest match mode, it will match 0106688.
If the device is configured to use the longest match mode, it will wait for further digits. After the dial
timer expires, the device will ignore the configured longest match mode and automatically use
shortest match mode to establish a call connection.
When a subscriber dials 0106688#, if you configure the longest match mode and a dial terminator of
# on the device, the device will as well ignore the configured longest match mode and use shortest
match mode to establish a call connection.
If there are multiple rules, the system first selects a local number or call route according to the first
rule.
If the first rule cannot decide which local number or call route should be selected, the system applies
the second rule. If the second rule still cannot decide a local number or call route, the system applies
the third rule.
If all the rules cannot decide which local number or call route should be selected, the system selects
a local number or call route with the smallest ID.
After the random selection rule is applied, there will be no local number or call route selection
conflict. Therefore, the random selection rule can only serve as a rule with the lowest priority or
serve as a unique rule separately.
Call control
Call authority control
To configure call authority control, you can assign subscriber numbers to a number group, and then bind
the group, which has authorities configured, to a local number or call route.
When a subscriber originates a call that matches the local number or call route that has bound with a
number group, the system compares the calling number with each number in the number group. If a
match is found, the calling is permitted; otherwise, the system finds the next matching local number or
call route until the calling is permitted or denied. For related configuration of this function, see
Configuring a number group.
Maximum-call-connection set
You can limit the total call connections for local numbers or call routes according to the network scale to
control communication traffic. You can bind a local number or call route to a maximum-call-connection
set, after that, the number of call connections of the local number or call route is restricted.
Number substitution
A number substitution rule list defines some number substitution methods. It can be used wherever
number substitution is necessary. There is no limitation on where and how many times it is used. Therefore,
a number substitution rule list may be bound globally and bound to different local numbers/call routes
and lines.
The characteristics of global calling/called number substitution or calling/called number substitution on
local numbers/call routes and lines are as follows:
Global number substitution: The voice gateway substitutes calling and called numbers of all
incoming and outgoing calls according to the number substitution rules configured in dial program
569
view. Multiple number substitution rule lists can be bound for global calling and called number
substitution of incoming and outgoing calls. If there is no match in the first number substitution rule
list, the voice gateway will match against other number substitution rule lists.
Number substitution on local numbers or call routes: The voice gateway substitutes the calling and
called numbers based on the number substitution rule lists bound to local numbers or call routes.
Number substitution on a specific line: The voice gateway substitutes the calling and called
numbers of incoming calls based on the number substitution rules configured on the receiving line.
Description
Configure a special character as the dial terminator for length-variable telephone
numbers.
Dial Terminator
Note that if you set the argument character to # or *, and if the first character of the
configured local number or call route is the same as the argument character (# or
*), the device will take this first character as a common number rather than a dial
terminator.
By default, no dial terminator is configured.
Set the maximum number of local numbers or call routes found before a search
process stops.
570
Item
Description
Service first
Number first
Select the Enable radio button, the sequence of the voice entities in the Selection
Sequence box determines the match order, and you can click the Up and Down
buttons to move a voice entity.
Selection Sequence
Exact match: The more digits of a digit string are matched from left to right, the
higher the precision is. The system stops using the rule once a digit cannot be
matched uniquely.
Priority: Number priorities are divided into 11 levels numbered from 0 to 10. The
smaller the value is, the higher the priority is. That means level 0 has the highest
priority.
Longest idle time: The longer the voice entity is idle, the higher the priority is.
You can select one to three rules to form a sequence. The voice gateway will first
select a number according to the first rule. If the voice gateway fails to decide
which number should be selected according to the first rule, it will apply the second
rule, and so on.
By default, the match order of rules for the number selection is exact match->
priority-> random selection.
Step2
Bind the local numbers, call routes, or IVR numbers to the number group.
2.
Select Voice Management > Dial Plan > Call Authority Control from the navigation tree to enter the
number group page, as shown in Figure 544.
Figure 544 Number group page
Click Add to enter the number group configuration page, as shown in Figure 545.
571
Description
Group ID
Description
Numbers in the
Group
Add
3.
Input subscriber numbers to be added into the group in the text box. You can add a
number by clicking Add.
Click Not Bound in the Local Numbers Bound column to enter the local call number binding page as
shown in Figure 546.
Figure 546 Local number binding page
Description
Binding Mode
Click the checkbox in front of the ID column, and then click Apply to complete local number binding.
572
NOTE:
A local number can be bound to multiple number groups in the same binding mode, that is, a local
number can either permit or deny the calls from bound number groups.
4.
Click Not Bound in the Call Routes Bound column to enter the call route binding page.
The configuration of call route binding is similar to that of local number binding, and thus omitted here.
NOTE:
A call route can be bound to multiple number groups in the same binding mode, that is, a call route can
either permit or deny the calls from bound number groups.
5.
Click Not Bound in the IVR Numbers Bound column to enter the IVR number binding page.
The configuration of IVR number binding is similar to that of local number binding, and thus omitted here.
Configure a max-call-connection set and specify the maximum number of call connections in this set.
Step2
Bind the local numbers, call routes, or IVR numbers to the max-call-connection set.
2.
Select Voice Management > Dial Plan > Call Authority Control from the navigation tree, and then click
the Max-Call-Connection Set tab to enter the max-call-connection set configuration page, as shown in
Figure 547.
Figure 547 Max-call-connection set page
Click Add to enter the Max-Call-Connection Set Configuration page as shown in Figure 548.
Figure 548 Max-call-connection set configuration page
573
Description
Connection Set ID
3.
Click Not Bound in the Local Numbers Bound column to enter the local call number binding page shown
in Figure 549.
Figure 549 Local number binding page
Click the checkbox in front of the ID column, and then click Apply to complete local number binding.
4.
Click Not Bound in the Call Routes Bound column to enter the call route binding page.
The configuration of call route binding is similar to that of local number binding, and thus omitted here.
5.
Click Not Bound in the IVR Numbers Bound column to enter the IVR number binding page.
The configuration of IVR number binding is similar to that of local number binding, and thus omitted here.
Step2
Bind a number substitution list to global, local numbers, call routes, or lines.
2.
Select Voice Management > Dial Plan > Number Substitution from the navigation tree to enter the
number substitution list page, as shown in Figure 550.
574
Description
Number Substitution
Rule List ID
575
Item
Description
End-Only: Reserves the digits to which all ending dots (.) in the input number
correspond.
Left-to-Right: Reserves from left to right the digits to which the dots in the input
number correspond.
Right-to-Left: Reserves from right to left the digits to which the dots in the input
Dot Match Rule
number correspond.
By default, the dot match rule is End-Only.
The dots here are virtual match digits. Virtual match digits refer to those matching the
variable part such as ., +, %, !, and [] in a regular expression. For example, when
1255 is matched with the regular expression 1[234]55, the virtual match digit is 2,
when matched with the regular expression 125+, the virtual match digit is 5, and
matched with the regular expression 1..5, the virtual match digits are 25.
Rule ID
^: Caret. The match begins with the first character of a number string. That is, the
device begins with the first character of the match string to match a user number.
Input Number
+: Plus sign. The sign itself does not have special meanings. It only indicates that the
following string is an effective number and the number is E.164-compliant.
$: Dollar sign. It indicates that the last character of the match string must be
matched. That is, the last digit of a user number must match the last character of the
match string.
In a voice call, the system first uses the preferred number substitution rule for number
substitution. If this rule fails to apply or is not configured, it will try to apply all other
rules in order until one or none of them applies.
During a number substitution process, there may be multiple rules, but only one of
them can be set as the preferred one. Moreover, the latest configuration will overwrite
the previous one.
By default, this function is disabled.
Add a Rule
3.
Bind a number substitution list to global, local numbers, call routes, or lines
Click Not Bound in the Global Binding, Local Numbers Bound, Call Routes Bound, or Bound Line column
to enter the corresponding binding page. The configurations of these bindings are similar to that of local
number binding in call control, and thus omitted here.
576
FX
S
1/
S
FX
1
1/
Configuration procedure
1.
Configure Router A.
# Add a local number: specify the number ID as 1000, the number as 10001234$, and the bound line
as line 1/0 on the local number configuration page.
# Add a call route: specify the call route ID as 2000, the destination number as 20001234$, and the
destination address as 1.1.1.2 on the call route configuration page.
# Add a call route: and specify the call route ID as 2001, the destination number as 200012341234$,
and the destination address as 1.1.1.2 on the call route configuration page.
Configure Router B.
# Add a local number: specify the number ID as 2000, the number as 20001234$, and the bound line
as 1/0 on the local number configuration page.
# Add a local number: specify the number ID as 2001, the number as 200012341234$, and the bound
line as 1/1 on the local number configuration page.
When you dial number 20001234 at Telephone A, the number 20001234 matches call route 2000, and
Telephone B is alerted because the device adopts the shortest match mode by default.
2.
# Configure Router A. Select Voice Management > Dial Plan > Number Match from the navigation tree
to enter the number match configuration page, as shown in Figure 553.
577
Click Apply.
After you dial number 20001234 at Telephone A and wait for some time (during this period, you can
continue dialing), the dialed number 20001234 matches call route 2000 and Telephone B is alerted.
If you continue to dial 1234 during that period, the dialed number 200012341234 matches call route
2001 and Telephone C is alerted.
3.
Dial terminator
# Configure Router A. Select Voice Management > Dial Plan > Number Match from the navigation tree
to enter the dial terminator configuration page, as shown in Figure 554.
Figure 554 Dial terminator configuration page
Click Apply.
After you dial 20001234# at Telephone A, the number immediately matches call route 2000 and
Telephone B is alerted.
578
Configuration procedure
1.
Configure Router A
# Add a local number: specify the number ID as 1000, the number as 10001234$, and the bound line
as 1/0 on the local number configuration page.
# Add a call route: specify the call route ID as 2000, the destination number as 20001234$, and the
destination address as 1.1.1.2 on the call route configuration page.
# Configure call route selection priority
Select Voice Management > Call Route from the navigation tree to enter the call route list page. Find the
call route with the ID of 2000 in the list, and click its corresponding icon
to enter the advanced setting
page.
Figure 556 Call route selection priority configuration page
Click Apply.
# Add a call route: specify the call route ID as 2001, the destination number as 2000123.$, and the
destination address as 1.1.1.2 on the call route configuration page.
579
Select Voice Management > Call Route from the navigation tree to enter the call route list page. Find the
call route with the ID of 2001 in the list, and click its corresponding icon
to enter the advanced setting
page.
Figure 557 Cal route selection priority configuration page
Click Apply.
# Add a call route: specify the call route ID as 2002, the destination number as 2000....$, and the
destination address as 1.1.1.2 on the call route configuration page.
2.
Configure Router B
# Add a local number: specify the number ID as 2000, the number as 20001234$, and the bound line
as 1/0 on the local number configuration page.
3.
Configure the match order of number selection rules: the first rule is exact match, the second rule
is priority, and the third rule is random selection.
Configure Router A. Select Voice Management > Dial Plan > Number Match from the navigation tree to
enter the page for configuring the match order of number selection rules, as shown in Figure 558.
580
Select Exact Match from the First Rule in the Match Order drop-down list.
Select Priority from the Second Rule in the Match Order drop-down list.
Select Random Selection from the Third Rule in the Match Order drop-down list.
Click Apply.
After you dial number 20001234 at Telephone A, the number matches call route 2000.
4.
Configure the match order of number selection rules as follows: the first rule is priority, the second
rule is exact match, and the third rule is random selection.
Configure Router A. Select Voice Management > Dial Plan > Number Match from the navigation tree to
enter the page for configuring the match order of number selection rules.
Figure 559 Match order of number selection rules configuration page
Select Priority from the First Rule in the Match Order drop-down list.
Select Exact Match from the Second Rule in the Match Order drop-down list.
581
Select Random Selection from the Third Rule in the Match Order drop-down list.
Click Apply.
After you dial number 20001234 at Telephone A, the number matches call route 2002.
5.
Configure Router A. Select Voice Management > Dial Plan > Number Match from the navigation tree to
enter the page for configuring the match order of number selection rules.
Figure 560 Match order of number selection rules configuration page
Select Random Selection from the First Rule in the Match Order drop-down list.
Click Apply.
After you dial number 20001234 at Telephone A, the number matches call route 2000, 2001, or 2002
at random.
Configuration procedure
1.
Configure Router A
Select Voice Management > Digital Link Management from the navigation tree to enter the digital link list
page. Find the digital link VE1 5/0 in the list, click its corresponding icon
to enter the E1 parameters
configuration page.
582
Select Internal for TDM Clock Source. (Internal is the default setting)
Click Apply.
# Add a local number: specify the number ID as 1000, the number as 10001234$, and the bound line
as 1/0 on the local number configuration page.
# Add a call route: specify the call route ID as 1001, the destination number as 20001234$, and the
trunk route line as 5/0:15 on the call route configuration page. In addition, you need to select the Send
All Digits of a Called Number radio button in the Called Number Sending Mode area when you
configure the advanced settings of this call route.
# Add a call route: specify the call route ID as 2000, the destination number as 20001234$, and the
destination address as 1.1.1.2 on the call route configuration page.
2.
Configure Router B
583
Select Voice Management > Digital Link Management from the navigation tree to enter the digital link list
page. Find the digital link VE1 5/0 in the list, click its corresponding icon
to enter the E1 parameters
configuration page.
Figure 563 E1 parameters configuration page
Select User Side Mode for ISDN Working Mode. (User Side Mode is the default setting)
Click Apply.
# Add a local number: specify the number ID as 2000, the number as 20001234$, and the bound line
as 1/0 on the local number configuration page.
3.
Configure Router A. Select Voice Management > Dial Plan > Number Match from the navigation tree to
enter the number match configuration page.
584
Figure 564 Entity type selection priority rule configuration page (I)
Configure the order of the voice entities in the Selection Sequence box: the first is VOIP, the second
is POTS, the third is VoFR, and the last is IVR.
Click Apply.
After you dial 20001234 at Telephone A, the number will match call route 2000 (VoIP entity).
4.
Configure Router A. Select Voice Management > Dial Plan > Number Match from the navigation tree to
enter the number match configuration page.
Figure 565 Entity type selection priority rule configuration page (II)
Configure the order of the voice entities in the Selection Sequence box: the first is POTS , the second
is VOIP, the third is VoFR, and the last is IVR.
Click Apply.
After you dial 20001234 at Telephone A, the number will match call route 1001 (POTS entity).
585
Place A
110000
Router B
2100
1100..
PBX
Router A
110099
IP
120000
PSTNs
central office
2200
PBX
Router C
1200..
3100
PSTNs
central office
PBX
120099
SIP server
3200
PSTNs
central office
Place C
Configuration procedure
1.
Configure Router A
586
Click Apply.
Enter the number group configuration page again to add another number group:
Click Apply.
# Add a call route for place B: specify the call route ID as 2000, the destination number as 2..., and use
a proxy server for SIP routing on the call route configuration page.
# Crete a call route for place C: specify the call route ID as 3000, the destination number as 3...,and use
a proxy server for SIP routing on the call route configuration page.
# Add a call route for place B: specify the call route ID as 2100, the destination number as 2, and trunk
route line as 5/0:15 on the call route configuration page. In addition, you need to select the Send All
Digits of a Called Number radio button in the Called Number Sending Mode area when you configure
the advanced settings of this call route.
# Add a call route 3 for place C: specify the call route ID as 3100, the destination number as 3..., and
the trunk route line as 5/1:15 on the call route configuration page. In addition, you need to select the
Send All Digits of a Called Number radio button in the Called Number Sending Mode area when you
configure the advanced settings of this call route.
# Bind a call route to number group 1 to allow that subscribers whose telephone numbers beginning with
1100 at place A can originate calls to place B.
Select Voice Management > Dial Plan > Call Authority Control from the navigation tree to enter the page
as shown in Figure 568.
Figure 568 Binding call route configuration page (I)
Click Not Bound in the Call Routes Bound column to enter the call route binding page of number group
1.
587
Select Permit the calls from the number group for Binding Mode.
Click Apply.
# Bind a call route to the number group 2 to allow that subscribers whose telephone number beginning
with 1200 can originate calls to both place B and place C.
Select Voice Management > Dial Plan > Call Authority Control from the navigation tree to enter the page
as shown in Figure 570.
Figure 570 Binding call route configuration page (II)
Click Not Bound in the Call Routes Bound column to enter the call route binding page of number group
2.
588
Select Permit the calls from the number group for Binding Mode.
Click Apply.
2.
Configure Router B
# Add a call route: specify the call route ID as 2100, the destination number as 2, and the trunk route
line as 1/0:15 on the call route configuration page. In addition, you need to select the Send All Digits of
a Called Number radio button in the Called Number Sending Mode area when you configure the
advanced settings of this call route.
3.
Configure Router C
# Add a call route: specify its call route ID as 3100, the destination number as 3..., and the trunk route
line as 1/0:15 on the call route configuration page. In addition, you need to select the Send All Digits of
a Called Number radio button in the Called Number Sending Mode area when you configure the
advanced settings of this call route.
These two local telephony networks communicate through two voice gateways. Subscribers in one
PBX network can make ordinary calls to remote subscribers in the other PBX network over a VoIP
network.
Configure two FXO trunk lines between each router and its PBX and enable hunt group to realize
trunk line backup.
There are a financial department, market department, and sales department at both place A (area
code 021) and place B (area code 010). A department at place A only needs to know the telephone
numbers of the local departments and the area code of place B when calling a department at place
B. For example, the financial department at place B can dial 3366 to call the local market
department. The financial department at place B can dial 0103366 to call the market department
at place A, and the caller ID displayed on the terminal at place A is 0211234, namely, area code
of place B + telephone number of the financial department at place B.
589
Configuration considerations
The PBX (calling side) at place B changes the called number to an intermediate number.
The PBX (called side) at place A changes the received intermediate number to a local number before
initiating the call.
Configuration procedure
NOTE:
The following configuration supports dial planbased calls from place B to place A only.
1.
Configure Router B
590
Click Apply.
# Add another number substitution rule list for calling numbers of outgoing calls.
Select Voice Management > Dial Plan > Number Substitution from the navigation tree, click Add to enter
the number substitution configuration page.
591
Click Apply.
# Enter the call route binding page of number substitution list 21101.
Figure 575 Call routing binding page of number substitution list 21101
Select Apply Call Routing Binding Rule to Called Numbers for Binding Mode.
Click Apply.
# Enter the call route binding page of number substitution list 21102.
592
Figure 576 Call routing binding page of number substitution list 21102
Select Apply Call Routing Binding Rule to Calling Numbers for Binding Mode.
Click Apply.
2.
Configure Router A
593
Click Apply.
# Add another number substitution rule list for calling numbers of incoming calls.
Select Voice Management > Dial Plan > Number Substitution from the navigation tree, click Add to enter
the number substitution configuration page.
594
Click Apply.
Click Apply.
595
Click Apply.
596
Call connection
Introduction to SIP
The Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify,
and terminate multimedia sessions such as IP phone calls, multimedia session and multimedia
conferences. It is the core component in the multimedia data and control architecture of the IETF (RFC
3261).
SIP is responsible for signaling control in IP networks and communication with soft switch platforms,
intending to build a next generation value-added service platform to deliver better value-added services
to telecom carriers, banks, and financial organizations.
SIP is used for initiating sessions. It sets up and terminates a multimedia session involving a group of
participants and dynamically adjusts and modifies session characteristics such as required session
bandwidth, media type (voice, video, or data), media encoding/decoding format, and
multicast/unicast. SIP is based on text encoding and constructed by taking HTTP, a quite mature protocol,
as a model. Easy to extend and implement, it is suitable for implementing Internet-based multimedia
conference systems.
Terminology
Multimedia session
According to RFC2327, a multimedia session is a set of multimedia senders and receivers and the data
streams flowing from senders to receivers. A multimedia conference is an example of a multimedia
session.
A session is identified by a set of username, session ID, network type, address type, and address.
User agent
A user agent (UA), or a SIP endpoint, is a SIP-enabled multimedia session endpoint. Usually, a
SIP-enabled router serves as a SIP UA.
There are two types of UAs: user agent client (UAC) and user agent server (UAS). To make a call, a SIP
endpoint needs to process the SIP request as a UAS and initiate the SIP request as a UAC.
A UAC is a device that initiates a session request. It can be a calling SIP endpoint or a proxy server
forwarding a request to a called endpoint for example.
A UAS is a device that generates a response to a SIP request. It can be a called SIP endpoint or a proxy
server receiving a request from a calling endpoint for example.
Proxy server
A proxy server is a device that forwards session requests to a called UA on behalf of a calling UA (a SIP
endpoint) and responds to the calling UA on behalf of the called UA.
When the proxy server receives a request from a calling UA, it first location server its registrar for
information on called UA location and call policies of calling UA and called UA. If the location
information of the called UA is available and the calling UA is allowed to make the call, the proxy server
then forwards the request to the called UA.
597
Redirect server
A redirect server sends a new connection address to a requesting client.
For example, when receiving a request from a calling UA, the redirect server searches for the location
information of the called UA and returns the location information to the UA. This location can be that of
the called UA or another proxy server, to which the UA can initiate the session request again. The
subsequent procedure is the same as that for calling a called UA directly or for calling a proxy server.
Location server
A location server is a device that provides UA information to proxy and redirect servers; it retains UA
information received by a registrar. The location server and registrar can locate on the same server as
two logical components or locate on different devices.
Registrar
A registrar receives UAs registrations. The registration information (for example, the local telephone
number) is usually stored on the location server for future retrieval. The location server and the registrar
are both logical components and are usually co-located.
Locating called SIP endpoints, the most powerful function of SIP. For this purpose, SIP can use the
registration information of SIP endpoints on the registrar. In addition, it can enhance its user
location service by using other location services provided by the domain name server (DNS) and
lightweight directory access protocol (LDAP).
Determining user availability, making sure whether a called endpoint can participate in a session.
SIP supports multiple address description and addressing styles, SIP-URI (for example, SIP:
123456@172.18.24.11), Tel-URL (for example, Tel: +1312000), and SIPS-URI (SIPS:
123456@172.18.24.11). Thus, a SIP caller can identify whether a callee is attached to a PSTN
network by callee's address, and then initiate and set up the call to the callee through the gateway
connected to the PSTN.
Determining user capabilities, that is, the media type and media parameters of a called endpoint.
In a message exchange process, each SIP endpoint sends such information in messages so that all
other participants can learn about its capabilities.
Setting up a session, or session parameters, at both callee and caller sides. Two parties can select
the appropriate capabilities for session setup through negotiation about media type and media
parameters to be used.
Features
The following are the features delivered by SIP:
Open standards. It can accommodate new functions, products, and services introduced by different
service providers.
Flexible configuration. It accommodates a wide range of dialup, wire, and wireless devices, allows
highly flexible configurations, and can work with other systems.
598
Support to remote users. With SIP, an enterprise network can extend to all its users, wherever they
are.
Quick launch. The system can be updated quickly to accommodate new branches and personnel,
as well as changes resulted from job rotation or relocation.
Easy to install and maintain. Even unprofessional individuals can install and maintain SIP systems.
SIP messages
SIP messages, falling into SIP request messages and SIP response messages, are encoded in text mode.
SIP request messages include INVITE, ACK, OPTIONS, BYE, CANCEL, REGISTER. RFC 3261 defines the
following six request messages:
SIP response messages, used to respond to SIP requests, indicate the status of a call or registration,
succeeded or failed. Response messages are distinguished by status codes. Each status code is a 3-digit
integer, where the first digit defines the class of a response, and the last two digits describe the response
message in more detail.
Table 233 Status codes of response messages
Code
Description
Class
100 199
Provisional
200 299
Success
300 399
Redirection
400 499
Client error
500 599
Server error
600 699
Global error
SIP fundamentals
Registration
In a complete SIP system, all SIP endpoints working as UAs should register with SIP registrars, providing
information such as location, session capabilities, and call policy.
Normally, a SIP UA sends its registrar a REGISTER request at startup or in response to an administratively
registration operation, carrying all the information that must be recorded. Upon receipt of the request, the
registrar sends back a response notifying receipt of the request, and a 200 OK (SUCCESS) message if
the registration is accepted. See the following figure.
599
Call setup
SIP operates in the Client/Server mode and sets up calls through communication between UA and proxy
server.
Figure 582 Network diagram for call setup involving a proxy server
In the above figure, Telephone A wants to call Telephone B; and Router A and Router B work as SIP
endpoints (UAs).
The following is the procedure for connecting a call from Telephone A to Telephone B:
1.
2.
Upon receipt of the call, Router A sends a session request (INVITE) to the proxy server.
3.
The proxy server consults its database for information corresponding to the number of Telephone
B. If such information is available, it forwards the request to Router B.
4.
Router B, after receiving the request, responds to the proxy server and makes Telephone B ring if
Telephone B is available.
5.
The proxy server forwards the response to Router A. The response discussed here includes two
provisional response messages (100 Trying and 180 Ringing) and one success response (200
OK).
600
This is a simplified scenario where only one proxy server is involved and no registrar is present. A
complex scenario, however, may involve multiple proxy servers and registrars.
Call redirection
When a SIP redirect server receives a session request, it sends back a response indicating the address of
the called SIP endpoint instead of forwarding the request. The calling and called endpoints thus can send
request and response to each other directly. See Figure 584.
Figure 584 Call redirection procedure for UAs
601
This is a common application. Fundamentally, a redirect server can respond with the address of a proxy
server as well. The subsequent call procedures are the same as the call procedures involving proxy
servers.
UDP: UDP is a connectionless protocol and does not provide reliability; therefore, SIP connections
established over UDP are unreliable.
TCP: Ensures transmission reliability for SIP messages. TCP provides connection-oriented and
reliable transmission for SIP-based VoIP communications. Using TCP, SIP need not consider packet
loss and retransmission issues.
Transport layer security (TLS): Ensures transmission security for SIP messages. For more information,
see Signaling encryption.
The above three transport layer protocols have their own benefits, and you can select a protocol based
on your network environment. At present, the system does not support transport layer protocol switchover
during communication.
SIP security
Signaling encryption
TLS runs over TCP and provides a complete set of authentication and encryption solutions for application
layer protocols. When establishing a TLS connection, both sides need to authenticate each other by
using their own digital certificates, and can communicate with each other only after passing
602
authentication. SIP messages are encrypted during SIP over TLS transmissions to prevent your data from
being sniffed and increases the security of voice communications.
Cryptographic attributes
Attribute
Description
Remarks
Tag
Required
Crypto-Suite
Required
Key Parameters
Required
Session
Parameters
Optional
Not supported at
present.
When SRTP is used to encrypt RTP/RTCP packets, the encryption engine, if enabled, encrypts and
authenticates RTP/RTCP packets. If the encryption engine is disabled, the CPU encrypts and
authenticates RTP/RTCP packets. For more information about the encryption engine, see the H3C MSR
Series Routers Security Configuration Guide.
NOTE:
At present, SRTP is available only for SIP calls. SIP trunk devices do not support SRTP. For information
about SIP trunk, see the chapter SIP trunk management.
603
TLS-SRTP combinations
TLS protects control signaling, and SRTP encrypts and authenticates voice media flows. You can use them
separately or together. The following table shows four combinations of TLS and SRTP.
1.
TLS
TLS-SRTP combinations
SRTP
Description
Signaling packets are secured. Personal information is protected.
On
On
Off
On
On
Off
Off
Off
Strict SIP routing is supported. In a complicated network environment where a request from SIP UAC
to SIP UAS needs to pass through multiple proxy servers, SIP uses the Route header field and the
Record-Route header field to ensure that requests in the dialog can be routed through these proxy
servers.
The new update method for SIP defined in RFC 3311 is supported. It is mainly used to update
parameters of a session, such as switching codecs, switching the voice to the media server, and
mute operation before the session is established, but has no impact on normal call procedures.
604
Description
Registrar State
605
Item
Description
UDP: Applies the UDP transport layer protocol when the device registers to the
main registrar.
TCP: Applies the TCP transport layer protocol when the device registers to the
main registrar.
TLS: Applies the TLS transport layer protocol when the device registers to the
main registrar.
By default, the UDP protocol is applied.
SIP: Specifies the SIP scheme as the URL scheme when the device registers to the
Main Registrar URL
Scheme
main registrar.
SIPS: Specifies the SIPS scheme as the URL scheme when the device registers to
the main registrar.
By default, the SIP scheme is applied.
UDP: Applies the UDP transport layer protocol when the device registers to the
backup registrar.
Backup Registrar
Transport Layer Protocol
TCP: Applies the TCP transport layer protocol when the device registers to the
backup registrar.
TLS: Applies the TLS transport layer protocol when the device registers to the
backup registrar.
By default, the UDP protocol is applied.
SIP: Specifies the SIP scheme as the URL scheme when the device registers to the
Backup Registrar URL
Scheme
backup registrar.
SIPS: Specifies the SIPS scheme as the URL scheme when the device registers to
the backup registrar.
By default, the SIP scheme is applied.
Username
Password
Authentication
Information Field for
Handshake
Authentication
Domain name used for handshake authentication between the registrar and the SIP
UA
606
Description
Click the checkbox and select a server group from the drop-down list as the proxy
server. You can add a server group on the page that can be accessed by selecting
Voice Management > Call Connection > SIP Server Group Management from the
navigation tree.
UDP: Applies the UDP transport layer protocol when the device initiates a call.
TCP: Applies the TCP transport layer protocol when the device initiates a call.
TLS: Applies the TLS transport layer protocol when the device initiates a call.
By default, the UDP protocol is applied.
URL Scheme
Static IPv4 address binding: The source IP address specified for SIP calls is the bound IP address.
607
Source address interface binding: In a large network, an interface obtains its IP address from a
DHCP or PPPoE server. In this scenario, you can use this function to configure an interface as the
source of SIP signaling and media streams to avoid manual IP address configuration, thus
facilitating network management.
Currently, source IP address binding is supported on the Layer 3 Ethernet interface, GigabitEthernet
interface, or dialer interface.
NOTE:
For information about DHCP, see the H3C MSR Series Routers Layer 3IP Services Configuration Guide.
Description
Configure media stream binding mode or disable media stream binding.
If IPv4 Address Binding is selected as the media stream binding mode, you need to
type the IPv4 address to be bound in this text box.
If Interface Binding is selected as the media stream binding mode, you need to
specify the interface to be bound from the drop-down list. At present, only the Layer
3 Ethernet interface, GE interface, and dialer interface are supported.
Configure the signaling stream binding mode or disable signaling stream binding.
If IPv4 Address Binding is selected as the signaling stream binding mode, you need
to type the IPv4 address to be bound in this text box.
If Interface Binding is selected as the signaling stream binding mode, you need to
specify the interface to be bound from the drop-down list. At present, only Layer 3
Ethernet interfaces, GE interfaces, and dialer interfaces are supported.
608
Table 237 Application of the source address binding settings in different states
Settings made when
Result
For SIP media streams, the source IP address binding settings
The source IP address binding settings will not take effect, and
the original sending mode of the signaling streams or media
streams is restored; after the interface is up, the source IP
address binding settings take effect immediately.
The source IP address binding settings never take effect and the
gateway automatically gets an IP address to send packets.
609
Description
UDP: Specifies UDP as the transport layer protocol for incoming SIP calls and
enables UDP listening port 5060.
TCP: Specifies TCP as the transport layer protocol for incoming SIP calls and
enables TCP listening port 5060.
TLS: Specifies TLS as the transport layer protocol for incoming SIP calls and
enables TLS listening port 5061. If you select this option, you must select a
certificate from the Certificate drop-down list.
SIP Listening Transport
Layer Protocol
By default, both the UDP and TCP listening ports are enabled, and the TLS listening
port is disabled.
Configure this item in either of the following two scenarios:
If the device is the call receiver, you need to enable the listening port of the
transport layer protocol used by the incoming calls.
If TCP or TLS is selected as the transport layer protocol when the device initiates
a call, you must specify it as the SIP listening transport layer protocol in this item.
Otherwise, no register request can be initiated.
Note that reset the setting for this item deletes the currently established connections.
Description
RTP: Specifies the Real-time Transport Protocol (RTP) as the media flow protocol
for SIP calls.
SRTP: Specifies the Secure Real-time Transport Protocol (SRTP) as the media flow
protocol for SIP calls.
By default, the RTP protocol is applied.
Media Protocol
When both the RTP and SRTP protocols are specified as the media flow protocols
for SIP calls:
If the device is the call initiator, both two media flow protocols are carried in the
INVITE message for the receiver to select.
If the device is the call receiver, the SRTP protocol is first used for media flow
negotiation. If the negotiation fails, the RTP protocol is used.
610
Description
None: Neither the P-Preferred-Identity header field
nor the P-Asserted-Identity header field is added.
Caller Identity
Presentation
Restriction Mode
Add the
Remote-Party-ID
Header Field
611
Session-Expires: Conveys the maximum session duration, that is, if no refresh request is received
during this time, the session is considered ended.
Min-SE: Conveys the minimum session duration, which is used to avoid frequent refresh requests
from occupying network bandwidth.
Session Expiration
Description
Enable: Enables SIP session refresh.
Disable: Disables SIP session refresh.
You can configure Session Expiration and Min Session Refresh Interval only after
the SIP session refresh function is enabled.
Maximum and minimum session durations of SIP sessions.
By default,
periodic refresh of SIP sessions is disabled on the called party but enabled on
the calling party, the called party will enable periodic refresh of SIP sessions
after negotiation.
Configuring compatibility
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and click the
Session Properties tab to enter the compatibility configuration page as shown in Figure 592.
612
Description
The devices of some vendors do not strictly follow the SIP protocol. To interoperate with such devices, you need
to configure the SIP compatibility options.
Enable: Configures the device to use the address (IP address or DNS domain
Use the address in the To
header field as the
address in the From
header field
name) in the To header field as the address in the From header field when
sending a SIP request.
Disable: Does not use the address in the To header field as the address in the
From header field. That is, the From header field contains the source address
and the To header field contains the destination address.
By default, the SIP compatibility function is disabled.
Configure the source of the called number.
Request-Line Header Field: Obtains the called number from the Request-Line
Source of the Called
Number
field.
To Header Field: Obtains the called number from the To header field.
By default, the called number is obtained from the request-line, which is the start
line in an SIP request message.
5. When the device initiates a fax pass-through operation, the a=X-fax field is
carried in the re-INVITE request. When the device initiates a modem
pass-through operation, the a=X-modem field is carried in the re-INVITE
request.
Compatible with T.38 fax: the device can recognize T.38-specific description
fields, and fax parameters T38FaxTranscodingJBIG, T38FaxTranscodingMMR,
and T38FaxFillBitRemoval, which are in the SDP fields of the re-INVITE requests
and 200 OK responses, do not contain :0.
By default, the compatibility options are not carried in re-INVITE requests.
UAC Product Name
613
Item
Description
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and click the
Advanced Settings tab to enter the configuration page as shown in Figure 593.
Figure 593 Configure advanced settings
Description
Re-registration Interval
Set the interval for the local number or SIP trunk account to re-register with the
registrar after a registration failure.
Registration Expiration
Time
Set the registration expiration time. A local number or an SIP trunk account expires
after it has registered with the registrar for a specified period of time, which is the
registration expiration interval.
Registration Percentage
614
Item
Description
account on the registrar, the local number or SIP trunk account must re-register with
the registrar at a specified time before the registration expiration interval is
reached. You can set the registration percentage or lead time before registration to
set the time when the local number or SIP trunk account re-registers with the
registrar.
percentage, is reached, the local number or SIP trunk account re-registers with
the registrar.
When the time, which is registration expiration interval minus lead time before
expiration, is reached, the local number or SIP trunk account re-registers with
the registrar.
You can configure both timers. In this case, the actual re-registration time is
decided by the timer that expires first. In other words, the local number or SIP trunk
account tries to re-register with the registrar when any one of the two timers
expires.
Parking: The SIP trunk device sends the OPTIONS or REGISTER message to the
current server. When the current server is not available, the SIP trunk device
selects the member server with the second highest priority in the SIP server
group as the current server even if the original current server recovers. Before the
parking mode is applied, you need to set OPTIONS or REGISTER as the
keep-alive mode on the page that can be accessed by selecting Voice
Management > Call Connection > SIP Server Group Management from the
navigation tree.
Homing: The SIP trunk device sends the OPTIONS messages to both the current
Redundancy Mode
server and the member server with the second highest priority in the SIP server
group. When the current server is not available, the SIP trunk device selects the
member server with the second highest priority as the current server. Once the
original current server recovers or a server with a higher priority than the current
server is available in the SIP server group, the SIP trunk device selects the
original current server or the server with the highest priority as the current server.
Before the homing mode is applied, you need to set OPTIONS as the keep-alive
mode on the page that can be accessed by selecting Voice Management > Call
Connection > SIP Server Group Management from the navigation tree.
By default, parking mode is applied.
contain the dt parameter. This option is used when the device communicates
with a VCX device.
Disable: Configures the Contact header fields of the REGISTER messages not to
contain the dt parameter.
By default, the Contact header fields of the REGISTER messages do not contain the
dt parameter.
615
Item
Description
Fuzzy telephone number registration refers to the use of a wildcard (including the
dot . and the character T), rather than a standard E.164 number in the match
template of a POTS entity.
After enabling fuzzy telephone number registration, the voice gateway (router)
retains dots and substitutes asterisks (*) for Ts when sending REGISTER messages.
Step2
616
Description
UDP: Specifies UDP as the transport layer protocol to be used during the
subscription.
TCP: Specifies TCP as the transport layer protocol to be used during the
Transport Layer Protocol
subscription.
TLS: Specifies TLS as the transport layer protocol to be used during the
subscription.
By default, UDP is adopted.
URL Scheme
Server Address
The voice mailbox server address, which can be either an IP address or a domain
name.
Port Number
Re-subscription Time
Binding Mode
7. Non-binding Mode: Indicates that the voice mailbox server does not set up
subscription information for the UA automatically, so the UA has to send a
SUBSCRIBE to the server and after that it can get NOTIFY messages from the
server. Non-binding mode falls into two categories:
Loose Match: Indicates that strict consistency check is not needed, so the call ID
that the NOTIFY is sent to can be different from the call ID that proposed the
subscription.
Strict Match: Indicates that strict consistency check is needed, so the call ID that
the NOTIFY is sent to must be the same as the call ID that proposed the
subscription.
NOTE:
Generally, the voice gateway sends a SUBSCRIBE to the server, and receives a NOTIFY from the server if
the subscription is successful, and gets the status of the voice mailbox afterwards.
617
Description
TCP Connection
Aging Time
Sets the aging time for TCP connections. If the idle time of an established TCP
connection reaches the specified aging time, the connection will be closed.
Sets the aging time for TLS connections. If the idle time of an established TLS
connection reaches the specified aging time, the connection will be closed.
618
You can input the SIP status code into the corresponding SIP Status Code (400-699) text box. Because the
PSTN release cause code 16 corresponds to a SIP request message, instead of a SIP status code, you can
configure no SIP status code for 16. You can click Load Default Value to restore the default mappings
between PSTN release cause codes and SIP status codes.
619
You can select the values in the PSTN Release Cause Code text boxes. You can also click Load Default
Value to restore the default mappings between PSTN release cause codes and SIP status codes.
For how to implement direct SIP calling through static IP addressing, see the chapter Basic
settings.
For how to configure domain name involved SIP calling, see the chapter Basic settings.
For how to configure proxy server involved SIP calling, see the chapter Basic settings.
620
Configuration procedure
1.
Configure a local number: specify the local number ID as 1111 and the number as 1111, and bind the
number to line line 1/0 on the local number configuration page.
Configure the call route to Router B: specify the call route ID as 2222, the destination number as
2222, the call route type as SIP, the SIP routing as IP routing, and the destination address as
192.168.2.2 on the call route configuration page.
2.
Click Apply.
621
Click Apply.
Configuration verification
After the above configuration, when you use telephone 1111 to call telephone 2222, the calling number
1111 will not be displayed on telephone 2222.
Router A
Internet
Eth2/1
192.168.2.2/24
Router B
2222
1111
Configuration procedure
1.
# Specify SRTP as the media flow protocol for SIP calls on Router A and Router B.
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and click the
Session Properties tab to enter the media security configuration page as shown in Figure 602.
Figure 602 Configure media security
Click Apply.
Configuration verification
SIP calls use the SRTP protocol to encrypt and authenticate media flows, and call conversations are well
protected.
622
Router A
Internet
Eth2/1
192.168.2.2/24
Router B
2222
1111
Configuration procedure
1.
# Specify TCP as the transport layer protocol for outgoing calls on Router A.
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and click the
Session Properties tab to enter the transport layer protocol configuration page as shown in Figure 604.
Figure 604 Specify transport layer protocol for outgoing calls
Click Apply.
# Specify TCP as the transport layer protocol for incoming SIP calls. (Optional, because the TCP listening
port is enabled by default.)
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and click the
Session Properties tab to enter the transport layer protocol configuration page as shown in Figure 605.
Figure 605 Specify listening transport layer protocol
623
Click Apply.
Configuration verification
SIP calls from telephone 1111 to telephone 2222 are carried over TCP. You can view information about
TCP connections on the TCP Connection Information tab page by selecting Voice Management > States
and Statistics > SIP UA States from the navigation tree and clicking the TCP Connection Information tab.
Configuration procedure
NOTE:
The certification authority (CA) server runs RSA Keon in this configuration example.
CAUTION:
To ensure that the certificate on the device can be used, be sure that the device system time falls within the
validity time of the certificate.
1.
For more information about how to retrieve the CA certificate from the certificate issuing server, see the
chapter Certificate management.
2.
# Specify TLS as the transport layer protocol for outgoing calls on Router A.
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and click the
Session Properties tab to enter the transport layer protocol configuration page as shown in Figure 607.
624
Click Apply.
# Specify TLS as the transport layer protocol for incoming SIP calls.
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and click the
Session Properties tab to enter the transport layer protocol configuration page as shown in Figure 608.
Figure 608 Specify listening transport layer protocol
Click Apply.
4.
Configuration verification
SIP calls from telephone 1111 to telephone 2222 are carried over TLS. You can view information about TLS
connections on the TLS Connection Information tab page by selecting Voice Management > States and
Statistics > SIP UA States from the navigation tree and clicking the TLS Connection Information tab.
625
Description
Server Group ID
The name of a SIP server group identifies the SIP server group. The domain name
of the carrier server is usually used as the name of a SIP server group. If the name
of a SIP server group is not configured, the host name specified on the account
management page (which can be accessed by selecting Voice Management > SIP
Trunk Management > Account Management from the navigation tree) is used to
identify the group, if any; otherwise, the IP address or domain name of the current
server in the SIP server group is used to identify the group.
626
Item
Description
Description
With the real-time switching function enabled, if the SIP trunk device receives no
Real-Time Switching
With the real-time switching function enabled, if the SIP trunk device receives no
response message or receives response message 403, 408 or 5XX (excluding
502, 504, 505, and 513) after initiating a call, the SIP trunk device tries to
connect to the member server with the second highest priority value in the SIP
server group, and so on, until it successfully connects to a SIP server or have
tried all the servers in the group.
The keep-alive function is used to detect whether the SIP servers in a SIP server
group are reachable. The SIP trunk device selects the current server according to
the detect result and the redundancy mode. If the keep-alive function is disabled,
the current server is always the one with the highest priority in the SIP server group.
Keep-Alive Mode
Register: The REGISTER message can be used to detect the SIP servers. If the SIP
trunk device receives response message 408 or 5XX (excluding 502, 504, 505,
and 513) from a SIP server after sending a REGISTER message, it considers the
SIP server unreachable.
Interval for Sending
OPTIONS Messages
Set the interval for sending OPTIONS messages to the SIP servers when the
keep-alive mode is set to Options.
Server ID
Set server ID. A SIP server group can be configured with up to five member servers.
An index represents the priority of a member server in the SIP server group. The
smaller the index value, the higher the priority.
UDP: Specify UDP as the transport layer protocol for the connection between
the SIP trunk device and the SIP server.
TCP: Specify TCP as the transport layer protocol for the connection between the
Transport Layer Protocol
TLS: Specify TLS as the transport layer protocol for the connection between the
SIP trunk device and the SIP server.
By default, the UDP protocol is adopted.
URL Scheme
Server Address
Port Number
NOTE:
For more configuration examples of SIP server group, see the chapter SIP trunk management.
627
With the development of IP technology, many enterprises have deployed SIP-based IP-PBX networks as
shown in Figure 611. Internal calls of the enterprise are made by using the SIP protocol, and external calls
are still placed over a PSTN trunk. The problem is that the enterprises have to maintain both the SIP
network and PSTN trunk, which increases the difficulty of network management.
Figure 611 SIP+PSTN network
SIP + PSTN network
Enterprise
intranet
SIP
PSTN trunk
PSTN
Router
IP-PBX
Router
As more enterprise IP-PBX networks run SIP and more Internet Telephone Service Providers (ITSPs) use SIP
to provide basic voice communication structures, enterprises urgently need a technology that uses SIP to
connect the enterprise IP-PBX network to the ITSP, thus to realize an all IP-based network. This technology
is called SIP trunk. A typical SIP trunk network is shown in Figure 612.
628
The SIP trunk function can be embedded into the voice gateway or the firewall deployed at the edge of
an enterprise private network. The device providing the SIP trunk function is called the SIP trunk device,
or the SIP trunk gateway.
Figure 612 All IP-based network
All IP-based network
ITSP
Enterprise
intranet
SIP
SIP
SIP trunk
Router
IP-PBX
SIP server
SIP server
Features
SIP trunk has the following features:
1.
Only one secure and QoS guaranteed SIP trunk link is required between a SIP trunk device and the
ITSP. The SIP trunk link can carry multiple concurrent calls, and the carrier only authenticates the
link instead of each SIP call carried on this link.
2.
The internal calls of the enterprise are placed by the enterprise IP-PBX. The outbound calls of the
enterprise are forwarded by the SIP trunk device to the ITSP, and are finally routed to the PSTN by
the device in the ITSP. Enterprises do not need to maintain the PSTN trunk and thus save the costs
of hardware and maintenance.
3.
By setting destination addresses, the enterprise can select to connect to multiple ITSPs, to make full
use of the ITSPs all over the world, and save call costs.
4.
With the SIP trunk device deployed, the entire network can use the SIP protocol to better support
IP communication services, like voice, conference, and instant messaging.
5.
A SIP trunk device differs from a SIP proxy server. The SIP trunk device initiates a new call request
to the ITSP on behalf of the user after receiving a call request from the user, and both the user and
the ITSP communicate only with the SIP trunk device. During the forwarding process, the SIP trunk
device forwards both signaling messages and RTP media messages.
Typical applications
The SIP trunk device is deployed between the enterprise IP-PBX and the ITSP. All internal calls are placed
by the enterprise IP-PBX. All outbound calls are forwarded by the SIP trunk device to the ITSP through the
SIP trunk link. Figure 613 shows a typical SIP trunk network.
629
IP
SIP trunk
Router
SIP server
SIP server
RFC 3261
RFC 3515
Remarks
Required
Configuring a SIP
server group
Required
Required
Optional
Required
Optional
Optional
630
Task
Remarks
Required
Description
Enable the SIP trunk function before you can use other SIP trunk functions. H3C
recommends you to not use a device enabled with the SIP trunk function as a SIP
UA.
Enable
Disable
By default, the SIP trunk function is disabled.
Select Voice Management > Call Connection > SIP Server Group Management from the navigation
tree. On the server group configuration page that appears, configure the real-time switching and
keep-alive functions.
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and click
the Advanced Settings tab, where you can specify the redundancy mode.
For more information about how to configure a SIP server group, real-time switching, and keep-alive
function, see the chapter SIP server group management.
For more information about how to configure the redundancy function, see the chapter SIP connection
configuration.
631
Description
Account ID
Select the SIP server group used by the SIP trunk account for registration. SIP server groups
can be configured in Voice Management > Call Connection > SIP Server Group
Management.
By default, a SIP trunk account has no SIP server group specified for registration.
Registration
Aging Time
Set the registration aging time. If you do not configure this item, the system uses the
registration aging time configured in Voice Management > Call Connection > SIP
Connection.
Host Username
Type the host username allocated by the ITSP to the SIP trunk account.
Host Name
Type the host name allocated by the ITSP to the SIP trunk account.
632
Item
Description
Enable
Disable
Account Status
Enable
Disable
Registration
Function
Authentication
Username
Authentication
Password
To perform registration, you also need to provide the host username or associate the
account with a SIP server group.
Specify IP routing
Select Voice Management > SIP Trunk Management > Call Route from the navigation tree, and click
Add.
633
Description
Call Route ID
Destination Number
Bound Account
Description
Proxy
Server
Use a SIP proxy server to complete calling. If you select this option, you need
to configure the proxy server beforehand in Voice Management > Call
Connection > SIP Connection.
Select one of the following transport layer protocols.
Transport
Layer
Protocol
UDP
TCP
TLS
By default, UDP is selected.
IP
Routing
SIP URL
Scheme
Destinati
on
Address
Port
Number
634
Item
Description
Bind to
server
group
Status
Server
Group
Select a server group. You can create a SIP server group in Voice
Management > Call Connection > SIP Server Management.
Enable
Disable
Description
You can control call route selection by configuring the prefix of source host name, prefix of destination host
name, or the source IP address as the call match rules. If you select several call match rules, only the calls that
match all rules are permitted.
635
Item
Description
Specify the prefix of a source host name as a call match rule. The specified source
host name prefix is used to match against the source host names of calls. If the
INVITE message received by the SIP trunk device carries the Remote-Party-ID
header, the source host name is abstracted from this header field; if the INVITE
message received by the SIP trunk device carries the Privacy header, the source
host name is abstracted from the P-Asserted-Identity or P-Preferred-Identity header
field; if the INVITE message received by the SIP trunk device does not carry any of
the above mentioned three header fields, the host name in the From header field
of the INVITE message is used as the source host name.
The prefix of a source host name consists of 1 to 31 characters, which are not
case-sensitive and can include letters, digits, underlines (_), hyphens (-), asterisk
(*), and dots (.). An asterisk represents a character string of any length, for
example, t*m can match the source host names tom, tim, and so on.
Specify the prefix of a destination host name as a call match rule. The specified
Match a Destination
Host Name Prefix
destination host name prefix is used to match against the destination host names
of calls. The host name in the To header field of an INVITE message received by
the SIP trunk device is used as the destination host name.
The prefix of a destination host name consists of 1 to 31 characters, which are not
case-sensitive and can include letters, digits, underlines (_), hyphens (-), asterisk
(*), and dots (.). An asterisk represents a character string of any length, for
example, b*y can match the destination host names boy, boundary, and so on.
IPv4
address
DNS
Server
Group
Match a Source
Address
Description
Enable or disable codec transparent transmission.
If the SIP trunk device does not support the codecs supported by the calling
and called parties, you can enable codec transparent transmission so that
the SIP trunk device transparently transmits codec capability sets between
the two parties to complete codec negotiation.
Codec Transparent
Figure 619 Network diagram for configuring a SIP server group with only one member server
Configuration procedure
1.
Configure Router A
Click Apply.
Select Voice Management > Call Route from the navigation tree and click Add.
Figure 621 Configure a call route
Click Apply.
2.
Click Apply.
# Create SIP server group 1. Add a SIP server into the server group: the ID and the IPv4 address of the
server are 1 and 10.1.1.2 respectively.
Select Voice Management > Call Connection > SIP Server Group Management from the navigation tree
and click Add.
639
Click Apply.
# Create SIP trunk account 1 with the host user name 2000, and associate the account with SIP server
group 1.
Select Voice Management > SIP Trunk Management > Account Management from the navigation tree,
and click Add.
640
Select server-group-1 from the SIP Server Group for Registration drop-down list.
Click Apply.
# Configure the call route for the outbound calls from private network user 2000 to public network user
1000 by binding SIP server group 1 to the VoIP voice entity.
Select Voice Management > SIP Trunk Management > Call Route from the navigation tree, and click
Add.
641
Figure 625 Configure a call route for the SIP trunk account
Click Apply.
# Configure the call route for the inbound calls from public network user 1000 to private network user
2000. Configure the IP address of the peer end as 1.1.1.1, which is the address of the interface on Router
A.
Select Voice Management > Call Route from the navigation tree and click Add.
Figure 626 Configure a call route
Click Apply.
3.
Configure Router B
# Configure a local call number.
Select Voice Management > Local Number from the navigation tree and click Add.
Figure 627 Configure a local number
Click Apply.
Click Apply.
# Configure the IPv4 address of the registrar as 10.1.1.2 and enable the registrar.
Select Voice Management > Call Connection > SIP Connection from the navigation tree and click the
Connection Properties tab.
Figure 629 Configure connection properties
Click Apply.
Configuration verification
1.
Select Voice Management > States and Statistics > SIP Trunk Account States from the navigation tree.
You can see that the private network account 2000 has registered with the server at 10.1.1.2.
2.
All calls between the private network and public network are made through the SIP trunk device.
On the SIP trunk device, you can see in Voice Management > States and Statistics > Call Statistics that
all calls between the private network and public network are made through the SIP trunk device.
3.
On the SIP server of the carrier, you can view only the interface address of the SIP trunk device,
which means that the SIP trunk device can filter the information of the enterprise private network
users.
644
Figure 630 Network diagram for configuring a SIP server group with multiple member servers
ITSP-A
SIP server
10.1.1.3/24
2000
Router A
IP
SIP trunk
2.1.1.2/24
Router B
1000
SIP server
10.1.1.2/24
Configuration procedure
# Enable the SIP trunk function. (Procedure omitted)
# Create SIP server group 1. Add two SIP servers into the server group: the IP addresses are 10.1.1.2 and
10.1.1.3, and the server with the address 10.1.1.2 has a higher priority. Enable the real-time switching
function of SIP server group 1. Set the keep-alive mode for SIP server group 1 to Options.
Select Voice Management > Call Connection > SIP Server Group Management from the navigation tree
and click Add.
645
Click Apply.
# Set the redundancy mode for SIP server group 1 to parking. (Optional. The redundancy mode for a SIP
server group is parking by default.)
Select Voice Management > Call Connection > SIP Connection from the navigation tree and click the
Advanced Settings tab.
646
Click Apply.
Other configurations on the SIP trunk device and on other devices are the same as those described in
Configuration procedure.
Configuration verification
1.
When the SIP server with IP address 10.1.1.2 fails, the SIP server with IP address 10.1.1.3 takes
over communications between the enterprise private network and public network. After that, the
communications recover.
2.
When the SIP server with IP address 10.1.1.2 recovers, it does not take over call processing and
the SIP server with IP address 10.1.1.3 keeps working.
Users connected to Router A2 are not allowed to call public network users.
All calls between the enterprise private network and public network are made through the SIP trunk
device.
647
Configuration procedure
# Configurations on the SIP trunk device and on other devices are the same as those described in
Configuration procedure.
# Configure Router A2: Configure a local number 2001 and a call route to Router B. For the
configuration procedure, see Configure Router A.
# Configure Router B: Configure a call route to Router A2. For the configuration procedure, see
Configure Router B.
# Configure the SIP trunk device: Select Voice Management > Call Route from the navigation tree and
click Add to configure the call route for calls from the number 1000 to 2001. Type the 3.3.3.1 (the IP
address of the interface on Router A2) as the Destination Number.
# Configure call match rules on the SIP trunk device: specify that calls with source IP address 1.1.1.1 are
permitted.
Select Voice Management > SIP Trunk Management > Call Route from the navigation tree, and click the
icon of the call route to be configured to enter the advanced settings configuration page.
Figure 634 Advanced settings
648
Select IPv4 Address from the Match a Source Address drop-down list.
Click Apply.
Configuration verification
1.
Enterprise private network users connected to Router A1 can call public network users, but private
network users connected to Router A2 cannot call public network users.
2.
649
Each PCM primary frame of E1 contains 32 timeslots but that of T1 contains 24 timeslots. Each PCM
primary frame of E1 contains 256 bits but that of T1 contains 193 bits. Therefore, E1 provides
2.048 Mbps bandwidth and T1 provides 1.544 Mbps bandwidth.
E1/T1 voice transmission allows a router to provide more channels of voice communication, greatly
improving router utilization and broadening service range.
650
E1 and T1 interfaces
E1 interface
An E1 interface is logically divided into timeslots (TSs) with TS16 being a signaling channel.
On E1 interfaces, you may create PRI groups or TS sets.
You may use an E1 interface as an ISDN PRI or CE1 interface:
1.
As an ISDN PRI interface, the E1 interface adopts DSS1 or QSIG signaling. As TS0 is used to
transfer synchronization information and TS16 is used as a D channel to transfer signaling, you
may arbitrarily bind any timeslots other than TS0 and TS16 as a logical interface, which is
equivalent to an ISDN PRI interface.
2.
As a CE1 interface with a signaling channel, the E1 interface can adopt R2 signaling, digital E&M
signaling, or digital LGS signaling.
When R2 signaling is adopted, every 32 timeslots form a primary frame (PCM30 for example),
where TS0 is used for frame synchronization, TS16 for digital line signaling, and other 30 timeslots
for voice transmission. Every 16 primary frames form one multiframe. In each multiframe, TS0 in
even primary frames conveys frame alignment signal (FAS) and TS0 in odd primary frames conveys
nonFAS (NFAS) about link status information. NFAS provides control signaling for primary rate
multiplexing. In the first primary frame, frame 0, the high-order four bits in TS16 convey multiframe
FAS (MFAS) and the lower-order four bits convey non-multiframe FAS (NMFAS); TS16 in each of
other 15 primary frames conveys line status information for two timeslots. For example, TS16 in
frame 1 conveys the digital line signaling status of TS1 and TS17 while that in frame 2 conveys the
digital line signaling status of TS2 and TS18, and so on.
When digital E&M signaling is adopted, the E1 interface functions as a digital E&M interface. On
the interface, timeslot division and functions are the same as those with R2 signaling.
When digital LGS signaling is adopted, the E1 interface functions as a digital FXO or FXS interface.
On the interface, timeslot division and functions are the same as those with R2 signaling.
NOTE:
After you create a TS set and configure signaling on an E1 voice interface card, the system can
automatically create the voice subscriber line for the TS set.
After TSs of an E1 interface are bound to form a PRI group, the system will automatically generate the
corresponding voice subscriber line.
At present, the Web interface supports only the PRI trunk signaling.
T1 interface
A T1 interface can be physically divided into 24 timeslots numbered TS1 through TS24.
You may use a T1 interface as an ISDN PRI interface. The interface adopts DSS1 or QSIG signaling. On
the interface, except TS24 used as D channel for signaling, you may arbitrarily bundle other timeslots
into an interface logically equivalent to an ISDN PRI interface.
In addition to DSS1 and QSIG signaling, T1 interfaces support R2 signaling, digital E&M signaling, and
LGS signaling. Configured with digital E&M signaling, a T1 interface is used as a digital E&M interface;
with digital LGS signaling, a digital FXO or FXS interface.
651
NOTE:
Like E1 voice interface cards, T1 voice interface cards also have the features of voice subscriber lines.
At present, the Web interface supports only the PRI trunk signaling.
Features of E1 and T1
E1 and T1 are characterized by the following:
Signaling modes
Fax function
Signaling modes
E1/T1 interfaces support these types of signaling:
DSS1/QSIG user signaling, adopted on the D channel between ISDN user and network interface
(UNI). It comprises a data link layer protocol and a Layer 3 protocol used for basic call control.
ITU-T R2 signaling, which falls into digital line signaling and interregister signaling. Digital line
signaling is transmitted in TS16 (ABCD bits) of E1 trunk. It conveys status information about E1
trunks to describe whether the trunks are occupied, released, or blocked. Interregister signaling
conveys information about address, language and discriminating digits for internal calls, echo
suppressor, caller properties and callee properties in multi-frequency compelled approach (forward
and backward) in each timeslot.
Digital E&M signaling, similar to R2 signaling. It transmits E (recEive) and M (transMit) call control
signals similar to analog E&M signaling in TS16, alignment signals in TS0, and voice signals in
other timeslots. In digital E&M signaling, when an E1 trunk detects and sends connection signaling,
it looks at the signal in TS16. Digital E&M signaling provides three start modes, immediate, wink,
and delay, to adapt to different devices for more reliable connection.
Digital loop-start and ground-start signaling (LGS). Digital loop start signaling is used between
telephones and switches to identify the off-hook/on-hook state, while ground-start signaling is used
between switches. They differ in that the two parties in conversation must check grounding state
before closing the line in the ground-start approach.
Fax function
The fax function is available on E1/T1 voice interfaces to set up fax channels and transmit/receive fax
data.
E1 Voice
T1 Voice
Framing format
Line coding
format
652
Description
Bound Timeslot
Number
653
Item
Description
Line Coding
the TDM clock source on the E1 interface. After that, the E1 interface obtains clock
from the crystal oscillator on the main board. If it fails to do that, the interface
obtains clock from the crystal oscillator on its E1 card. Because SIC cards are not
available with crystal oscillator clocks, E1 interfaces on SIC cards can only obtain
clock from the main board. The internal clock source is also referred to as master
clock mode in some features.
Line: Set the line TDM clock as the TDM clock source on the E1 interface. After
that, the E1 interface obtains clock from the remote device through the line. The
line clock source is also referred to as slave clock mode in some features.
Line primary: Set the E1 interface to preferably use the line TDM clock as the TDM
clock source. After that, the E1 interface always attempts to use the line TDM clock
prior to any other clock sources.
By default, the TDM clock source for an E1 interface is the internal clock.
TDM Clock Source
When digital voice E1 interfaces perform TDM timeslot interchange, it is important for
them to achieve clock synchronization to prevent frame slips and bit errors.
Depending on your configurations on E1 interfaces at the CLI, the system adopts
different clocking approaches. When there is a subcard VCPM on the main board,
the clock distribution principle is as follows:
If the line keyword is specified for all interfaces, the clock on the interface with the
lowest number is adopted. In case the interface goes down, the clock on the
interface with the second lowest number is adopted.
If line primary is specified for interface X and line or internal is specified for other
interfaces, the clock on interface X is adopted.
If line is specified for interface X and internal is specified for other interfaces, the
clock on interface X is adopted.
Normally, you cannot set the clock source for all interfaces in a system as internal
to prevent frame slips and bit errors. You can do this however if the remote E1
interfaces adopt the line clock source.
When there is no VCPM on the main board, the configuration of each MIM/FIC is
independent but only one interface can be set as line primary.
Status
If you select the PRI Trunk Signaling radio button, the page as shown in Figure 637 appears.
654
NOTE:
You are not allowed to configure the following parameters on an ISDN interface if there is still a call on it:
ISDN Overlap-Sending, Switch to ACTIVE State Without Receiving a Connect-Ack Message, Carry High
Layer Compatibility Information, Carry Low Layer Compatibility Information, or ISDN Call Reference
Length. These parameters can take effect only if it is configured when there is no call on the interface.
Alternatively you can manually disable the ISDN interface, configure the parameters, and then enable the
interface again. The operations, however, will lead to the disconnection of calls existing on the interface.
Table 255 Configuration items
Item
Description
Set the ISDN protocol to be run on an ISDN interface, including DSS1, QSIG,
and ETSI.
By default, an ISDN interface runs DSS1.
655
Item
Description
ISDN working mode to be set, which can be network side mode or user side
mode.
By default, an ISDN interface operates in user side mode.
Configure local ISDN B channel management.
ISDN Overlap-Sending
Enable: Set the ISDN interface to send the called number in overlap mode.
In this mode, the digits of each called number will be sent separately and
the maximum number of the digits sent each time can be set.
Disable: Set the ISDN interface to send the called number in full-sending
mode. In this mode, all the digits of each called number will be collected
and sent at a time.
656
Item
Description
Enable for outgoing direction: Configure the ISDN protocol to switch to the
ACTIVE state after receiving a Connect message without having to send a
Connect-Ack message.
Enable for incoming direction: Configure the ISDN protocol to switch to the
ACTIVE state to start Connect and voice service communications after
sending a Connect message without having to wait for a Connect-Ack
message.
Connect-Ack messages, that is, the ISDN protocol must wait for the
Connect-Ack message in response to the Connect message before it can
switch to the ACTIVE state to start data and voice service communications.
By default, in the event that the device is communicating with an ISDN switch:
The ISDN protocol must wait for the Connect-Ack message in response to
the Connect message before it can switch to the ACTIVE state to start data
and voice service communications.
In the event that the device is communicating with an ISDN switch, its
settings must be the same as those on the switch.
You are not allowed to configure this drop-down list on an ISDN interface
if there is still a call on it. Configuration of this drop-down list can take
effect only if it is configured when there is no call on the interface.
Alternatively, you can manually disable the interface, configure this
drop-down list, and then enable the interface. The operations, however,
will lead to the disconnection of the calls existing on the interface.
Disable: Disable ISDN from carrying the HLC information element in the
Setup messages when placing voice calls.
By default, the HLC information element is carried in Setup messages when
ISDN places voice calls.
Disable: Disable ISDN from carrying the LLC information element in the
Setup messages when placing voice calls.
By default, the LLC information element is carried in Setup messages when
ISDN places voice calls.
657
Item
Description
Enable for outgoing direction: Configure the ISDN protocol to send Setup
messages without the Sending-Complete Information Element when
placing a call.
Enable for incoming direction: Configure the ISDN protocol to ignore the
The call reference is equal to the sequence number that the protocol assigns to
each call. It is one or two bytes in length and can be used cyclically.
When the device receives a call from a remote device, it can automatically
identify the length of the call reference. However, some devices on the
network do not have this capability. In the event that the device is required to
place calls to such a device connected to it, you must configure the device to
use the same call reference length configured on the connected device.
658
Description
Bound Timeslot
Number
Line Coding
659
Item
Description
Internal: Set the internal crystal oscillator TDM clock as the TDM clock source on
the T1 interface. After that, the T1 interface obtains clock from the crystal oscillator
on the main board. If it fails to do that, the interface obtains clock from the crystal
oscillator on its T1 card. Because SIC cards are not available with crystal
oscillator clocks, T1 interfaces on SIC cards can only obtain clock from the main
board. The internal clock source is also referred to as master clock mode in some
features.
Line: Set the line TDM clock as the TDM clock source on the T1 interface. After
that, the T1 interface obtains clock from the remote device through the line. The
line clock source is also referred to as slave clock mode in some features.
Line primary: Set the T1 interface to preferably use the line TDM clock as the TDM
clock source. After that, the T1 interface always attempts to use the line TDM clock
prior to any other clock sources.
By default, the TDM clock source for an T1 interface is the internal clock.
TDM Clock Source
When digital voice T1 interfaces perform TDM timeslot interchange, it is important for
them to achieve clock synchronization to prevent frame slips and bit errors.
Depending on your configurations on T1 interfaces at the CLI, the system adopts
different clocking approaches. When there is a subcard VCPM on the main board,
the clock distribution principle is as follows:
If the line keyword is specified for all interfaces, the clock on the interface with the
lowest number is adopted. In case the interface goes down, the clock on the
interface with the next second number is adopted.
If line primary is specified for interface X and line or internal is specified for other
interfaces, the clock on interface X is adopted.
If line is specified for interface X and internal is specified for other interfaces, the
clock on interface X is adopted.
Normally, you cannot set the clock source for all interfaces in a system as internal
to prevent frame slips and bit errors. You can do this however if the remote T1
interfaces adopt the line clock source.
When there is no VCPM on the main board, the configuration of each MIM/FIC is
independent but only one interface can be set as line primary.
Status
If you select the PRI Trunk Signaling radio button, the page as shown in Figure 639 appears.
660
ISDN protocol types supported by VT1 are DSS1, ATT, ANSI, ETSI, NTT, QSIG, NI2, and 5ESS. Table
255 describes the ISDN parameters configuration items.
661
Description
Set the ISDN protocol to be run on an ISDN interface, including DSS1, ANSI,
NI, NTT, and ETSI.
By default, an ISDN interface runs DSS1.
ISDN working mode to be set, which can be network side mode or user side
mode.
By default, an ISDN interface operates in user side mode.
662
Item
Description
Configure local ISDN B channel management.
ISDN Overlap-Sending
Enable: Set the ISDN interface to send the called number in overlap mode.
In this mode, the digits of each called number will be sent separately and
the maximum number of the digits sent each time can be set.
Disable: Set the ISDN interface to send the called number in full-sending
mode. In this mode, all the digits of each called number will be collected
and sent at a time.
663
Item
Description
Enable for outgoing direction: Configure the ISDN protocol to switch to the
ACTIVE state after receiving a Connect message without having to send a
Connect-Ack message.
Enable for incoming direction: Configure the ISDN protocol to switch to the
ACTIVE state to start Connect and voice service communications after
sending a Connect message without having to wait for a Connect-Ack
message.
Connect-Ack messages, that is, the ISDN protocol must wait for the
Connect-Ack message in response to the Connect message before it can
switch to the ACTIVE state to start data and voice service communications.
By default, in the event that the device is communicating with an ISDN switch:
The ISDN protocol must wait for the Connect-Ack message in response to
the Connect message before it can switch to the ACTIVE state to start data
and voice service communications.
In the event that the device is communicating with an ISDN switch, its
settings must be the same as those on the switch.
You are not allowed to configure this drop-down list on an ISDN interface
if there is still a call on it. Configuration of this drop-down list can take
effect only if it is configured when there is no call on the interface.
Alternatively, you can manually disable the interface, configure this
drop-down list, and then enable the interface. The operations, however,
will lead to the disconnection of the call existing on the interface.
Disable: Disable ISDN from carrying the HLC information element in the
Setup messages when placing voice calls.
By default, the HLC information element is carried in Setup messages when
ISDN places voice calls.
Disable: Disable ISDN from carrying the LLC information element in the
Setup messages when placing voice calls.
By default, LLC information element is carried in Setup messages when ISND
places voice calls.
664
Item
Description
Enable for outgoing direction: Configure the ISDN protocol to send Setup
messages without the Sending-Complete Information Element when
placing a call.
Enable for incoming direction: Configure the ISDN protocol to ignore the
Enable: The BRI interface sets up a data link connection automatically and
Q.921 Permanent Link
maintain the connection even when no calls are received from the network
layer. If the two-tei mode is also enabled on the interface, two such
connections will be present.
Disable: Disable the Q.921 permanent link function on the BRI interface.
This parameter is available only when the User Side Mode radio button in the
ISDN Working Mode area is selected.
ISDN two-tei
Disable: The BRI interfaces operating on the network side are not in the
permanent active state at the physical layer.
This parameter is available only when the Network Side Mode radio button in
the ISDN Working Mode area is selected.
665
Item
Description
Set length of the call reference used when a call is placed on an ISDN
interface.
The call reference is equal to the sequence number that the protocol assigns to
each call. It is one or two bytes in length and can be used cyclically.
Status
When the device receives a call from a remote device, it can automatically
identify the length of the call reference. However, some devices on the
network do not have this capability. In the event that the device is required to
place calls to such a device connected to it, you must configure the device to
use the same call reference length configured on the connected device.
Router A is connected to a PBX through an E1 voice subscriber line, and to the telephone at
0101003 through an FXS voice subscriber line.
666
The two routers communicate with their respective PBX by exchanging DSS1 user signaling through an
ISDN interface. The one-stage dialing mode is configured on the two routers.
Figure 642 Network diagram for using DSS1 signaling on E1 interfaces
Router A
FXS: line 3/0
010-1003
Eth2/1
1.1.1.1/24
WAN
Line 1/1:15
Eth2/1
2.2.2.2/24
Router B
Line 1/1:15
E1
E1
010-1001
0755-2001
PBX
PBX
010-1002
0755-2002
Configuration procedure
1.
Configure Router A
Select the PRI Trunk Signaling radio button. For other options, use the default settings.
Click Apply.
Configure a local number in the local number configuration page: The number ID is 1003, the
number is 0101003, and the bound line is 3/0.
Configure a call route in the call route configuration page: The call route ID is 1001, the destination
number is 0101001, and the trunk route line is 1/1:15. In addition, to select the Send All Digits of a
Called Number radio button in the Called Number Sending Mode area when you configure the
advanced settings of this call route.
Configure a call route in the call route configuration page: The call route ID is 1002, the destination
number is 0101002, and the trunk route line is 1/1:15. In addition, select the Send All Digits of a
667
Called Number radio button in the Called Number Sending Mode area when you configure the
advanced settings of this call route.
Configure a call route in the call route configuration page: The call route ID is 0755, the destination
number is 0755...., and the call route type is SIP, the SIP routing type is IP routing, and the
destination address is 2.2.2.2.
2.
Configure Router B.
Select the PRI Trunk Signaling radio button. For other options, use the default settings.
Click Apply.
Configure a call route in the call route configuration page: The call route ID is 2001, the destination
number is 07552001, and the trunk route line is 1/1:15. In addition, select the Send All Digits of a
Called Number radio button in the Called Number Sending Mode area if you configure the
advanced settings of this call route.
Configure a call route in the call route configuration page: The call route ID is 2002, the destination
number is 07552002, and the trunk route line is 1/1:15. In addition, select the Send All Digits of a
Called Number radio button in the Called Number Sending Mode area when you configure the
advanced settings of this call route.
Configure a call route in the call route configuration page: The call route ID is 010, the destination
number is 010...., the call route type is SIP, the SIP routing mode is IP routing, and the destination
address is 1.1.1.1.
Configuration verification
Select Voice Management > Statistics > Call Statistics from the navigation tree to enter the Active
Call Summary page, and you can view the statistics of active calls.
Select Voice Management > Digital Link Management from the navigation tree, and then click the
name of the target digital link line 1/1:15 to enter the page displaying the link state.
668
Line management
Line management overview
FXS voice subscriber line
A foreign exchange station (FXS) interface uses a standard RJ-11 connector and a telephone cable to
directly connect with an ordinary telephone or a fax machine. An FXS interface accomplishes signaling
exchange based on the level changes on the Tip/Ring line and provides ring, voltage, and dial tone.
Immediate start: In this mode, the caller picks up the phone, and some time later, the dialed number
is sent to the called side. During this period, whether the called side has been ready for receiving
the called number is not checked. After the called information is received, the callee can pick up the
phone to answer the call.
669
Delay start. In this mode, the caller first picks up the phone to seize the trunk line, and the called side
(such as the peer PBX) also enters the off-hook state in response to the off-hook action of the caller.
The called side (PBX) will be in the off-hook state until it is ready for receiving the address
information. After it is ready, it will enter the on-hook state and this interval is the so-called dial
delay. The calling side sends the address information, and the called side (PBX) connects the call to
the callee. Thus, the two parties can begin the communication.
Wink start. In this mode, the caller first picks up the phone to seize the trunk line, and the called side
(such as the peer PBX) is in the on-hook state until receiving a connection signal from the calling side.
Then, the called side will send a wink signal to make an acknowledgement and enter the ready
state. Upon receiving the wink signal, the calling side begins to send the address information and
the called side connects the call to the callee. Thus, the two parties can begin the communication.
subscriber lines is required. That is, dedicated FXO voice subscriber lines can be used for communication
over PSTN when the IP network is unavailable. The one-to-one binding between FXS voice subscriber
lines and FXO voice subscriber lines can meet this requirement.
The one-to-one binding between FXS voice subscriber lines and FXO voice subscriber lines provides the
following functions:
Dedicated FXO voice subscriber lines: The dedicated FXO voice subscriber lines can be used only
for the bound FXS voice subscriber lines and PSTN-originated calls received over dedicated FXO
voice subscriber lines are directly connected to the bound FXS voice subscriber lines.
Consistent state between bound FXS and FXO voice subscriber lines: The on-hook/off-hook state of
the bound FXS and FXO voice subscriber lines is consistent. If an FXO subscriber line receives a
PSTN-originated call when the corresponding FXS voice subscriber line goes off-hook, the calling
party will hear busy tones.
Reason
Adjustment method
Parameters adjusted
Effect
671
Symptom
Parameters adjusted
Effect
672
Description
Basic Configurations
Description
This timer will restart each time the user dials a digit and will work in this way
until all the digits of the number are dialed. If the timer expires before the
dialing is completed, the user will be prompted to hook up and the call is
terminated.
Maximum interval in seconds between off-hook and dialing the first digit
Upon the expiration of the timer, the user will be prompted to hook up and the
call is terminated.
Maximum duration in seconds of playing ringback tones.
673
Item
Description
Status
Enable
Disable
Advanced Settings
Dial Delay Time
The time range for the duration of an on-hook condition that will be detected
as a hookflash. That is, if an on-hook condition that lasts for a period that falls
within the hookflash duration range (namely, the period is longer than the
lower limit and shorter than the upper limit) is considered a hookflash.
Electrical Impedance
IMPORTANT:
Gain adjustment may lead to call
failures. H3C recommends that you do
not adjust the gain. If necessary, do it
with the guidance of technical
personnel.
You can specify either of the following packet loss compensation algorithms:
Enable
Disable
By default, the comfortable noise function is enabled.
Enable
Disable
Echo Duration
After enabling this function, you can set the echo duration, that is, the time that
elapses from when a user speaks to when he hears the echo.
Enable
Disable
Set the DTMF detection sensitivity level.
Low: In this mode, the reliability is high, but DTMF tones may fail to be
detected.
DTMF Detection Sensitivity
Level
Medium: In this mode, the reliability is medium. If you select this option,
you can specify the Frequency Tolerance of Medium DTMF Detection
Sensitivity Level. The greater the value, the higher the probability of false
detection. Support for this option varies with installed cards.
High: In this mode, the reliability is low and detection errors may occur.
674
Description
Basic Configurations
Description
675
Item
Description
Maximum interval for the user to dial the next digit
This timer will restart each time the user dials a digit and will work in this way until all
the digits of the number are dialed. If the timer expires before the dialing is
completed, the user will be prompted to hook up and the call is terminated.
Maximum interval in seconds between off-hook and dialing the first digit
Upon the expiration of the timer, the user will be prompted to hook up and the call is
terminated.
Max Duration of
Playing Ringback Tones
Status
Enable
Disable
Advanced Settings
Delay off-hook: In this mode, you need to configure a dedicated line number,
Off-hook Mode
which the system uses to connect the call to the callee automatically. The
communication can be performed over the FXO subscriber line only after the
callee picks up the telephone.
Immediate off-hook: In this mode, when a call arrives, the FXO interface goes
off-hook immediately and then the caller performs the second stage dialing.
Bind an FXS voice subscriber line to the FXO voice subscriber line. This drop-down list
is available only when you select the Delay Off-hook radio button in the Off-hook
Mode area.
Binding FXS Line
To keep the consistent off-hook/on-hook state between the bound FXS and FXO lines,
the specified FXS line must be the one to which the dedicated line number points. In
addition, only the bound FXS line is allowed to originate calls to the FXO line by
restricting incoming calls.
Delay Ring
Immediate Ring
Ring Mode
Duration before a
Forced On-hook
You can select the Delay Ring option to quicken ringing synchronization between the
FXO voice subscriber line and its bound FXS voice subscriber line. However, for the
telephone supporting calling identification display, the calling number will be
displayed after the second ringing tone.
In some countries, PBXs do not play busy tones, or the busy tones played by them
only last for a short period of time. When noise is present on a transmission link, the
configuration of silence threshold and silence duration for automatic on-hook cannot
solve the problem that the resource of the FXO interface cannot be released. In this
case, you can specify the duration before a forced on-hook to solve the problem.
No duration is configured by default.
IMPORTANT:
Once the duration before a forced on-hook is configured, the call will be automatically
disconnected when the duration expires, even if the call is currently going on.
676
Item
Description
Set the silence threshold.
VAD Threshold
In the delay off-hook mode, the on-hook/off-hook state of FXS and FXO lines is
consistent. When an FXS line goes off-hook, the FXO line to which the FXS line is
bound goes off-hook, too. When the FXS line in the off-hook state needs to connect
the FXO line to originate a call over PSTN, the FXO line must first perform an on-hook
operation, and then perform an off-hook operation to send the called number. This
task is to set the interval between the on-hook and off-hook operations.
Electrical Impedance
Packet Loss
Compensation Mode
Comfortable Noise
Function
IMPORTANT:
Gain adjustment may lead to call
failures. H3C recommends that you
do not adjust the gain. If necessary,
do it with the guidance of technical
personnel.
By default, CID check is performed
between the first and the second
rings, and the FXO line goes
off-hook as soon as the check
completes.
You can specify either of the following packet loss compensation algorithms:
Enable
Disable
By default, the comfortable noise function is enabled.
677
Item
Busy Tone Sending
Duration of Busy Tone
Description
Enable
Disable
With the busy-tone sending function enabled, you can set the duration of busy tones.
Echo Cancellation
Function
Enable
Disable
Echo Duration
After enabling this function, you can set the echo duration, that is, the time that
elapses from when a user speaks to when he hears the echo.
Nonlinear Function of
Echo Cancellation
Enable
Disable
Set the DTMF detection sensitivity level.
DTMF Detection
Sensitivity Level
Low: In this mode, the reliability is high, but DTMF tones may fail to be detected.
Medium: In this mode, the reliability is medium. If you select this option, you can
specify the Frequency Tolerance of Medium DTMF Detection Sensitivity Level. The
greater the value, the higher the probability of false detection. Support for this
option varies with installed cards.
High: In this mode, the reliability is low and detection errors may occur.
678
Description
Basic Configurations
Description
Cable Type
When configuring the cable type, make sure that the cable type is
the same as that of the peer device; otherwise, only unidirectional
voice service is available.
The configuration will be applied to all E&M interfaces of the card.
679
Item
Description
Types 1, 2, 3, and 5 are the four signal types (that is, types I, II, III,
and V) of the analog E&M subscriber line.
When configuring the signal type, make sure that the signal type is
the same as that of the peer device.
Signal Type
This timer will restart each time the user dials a digit and will work in
this way until all the digits of the number are dialed. If the timer
expires before the dialing is completed, the user will be prompted to
hook up and the call is terminated.
Maximum duration for the system to wait for the first digit of a
number
Status
Enable
Disable
Advanced Settings
Start
Mode
Immediate
Start
Delay
Start
Wink
Start
Delay Time
before the Calling
Party Sends
DTMF Signals in
Immediate Start
Mode
Delay time before the calling party sends DTMF signals in the
immediate start mode
Delay Signal
Duration in Delay
Start Mode
Delay Time
before the Called
Party Sends a
Delay Signal in
Delay Start Mode
Delay time from when the called party detects a seizure signal to
when it sends a delay signal in the delay start mode
Delay Time
before the Called
Party Sends a
Wink Signal in
Wink Start Mode
Delay time from when the called party receives a seizure signal to
when it sends a wink signal in the wink start mode
Duration of a
Wink Signal
Send by the
Called Party in
Wink Start Mode
Time duration the called party sends wink signals in the wink start
mode
680
Item
Description
Max Time the
Calling Party
Waits for a Wink
Signal in Wink
Start Mode
The maximum amount of time the calling party waits for a wink
signal after sending a seizure signal in the wink start mode
IMPORTANT:
Gain adjustment may lead to a
call failure. H3C recommends
that you do not adjust the gain. If
necessary, do it with the
guidance of technical personnel.
Configure the output gain of the SLIC chip. The bottom layer tunes
the signal gain through the SLIC chip.
By default, the output gain of the SLIC chip is 0.8 dB.
Enable
Disable
By default, the comfortable noise function is enabled.
Enable
Disable
Echo Duration
After enabling this function, you can set the echo duration, that is, the
time that elapses from when a user speaks to when he hears the
echo.
Enable
Disable
681
Description
Description
You can use this function to generate some comfortable background noise to
replace the toneless intervals during a conversation. If no comfortable noise is
generated, the toneless intervals will make both parties in conversation feel
uncomfortable.
Enable
Disable
By default, the comfortable noise function is enabled.
Enable
Disable
Echo Duration
After enabling this function, you can set the echo duration, that is, the time that
elapses from when a user speaks to when he hears the echo.
Enable
Disable
682
IMPORTANT:
Gain adjustment may lead to call
failures. H3C recommends that you
do not adjust the gain. If necessary,
do it with the guidance of technical
personnel.
Item
Description
Configure a companding law used for quantizing signals.
Companding Law
IMPORTANT:
A BRI interface does not support this configuration item.
Set the DTMF detection sensitivity level.
Low: In this mode, the reliability is high, but DTMF tones may fail to be
detected.
High: In this mode, the reliability is low and detection errors may occur.
Enable
Disable
Status
Description
Line Description
When a relatively small voice signal power is needed on the output line, increase the
voice output gain value.
IMPORTANT:
Gain adjustment may lead to call failures. H3C recommends that you do not adjust
the gain. If necessary, do it with the guidance of technical personnel.
Enable
Disable
Silent Mode
683
Item
Description
Set the value of the audio input gain, in the range of -24.0 to 12.0 with a step of 1.
When a relatively small voice signal power is needed on the output line, increase the
voice output gain value.
IMPORTANT:
Gain adjustment may lead to call failures. H3C recommends that you do not adjust
the gain. If necessary, do it with the guidance of technical personnel.
Description
Line Description
When a relatively small voice signal power is needed on the output line, increase the
voice output gain value.
IMPORTANT:
Gain adjustment may lead to call failures. H3C recommends that you do not adjust
the gain. If necessary, do it with the guidance of technical personnel.
Enable
Disable
Silent Mode
Set the value of the audio input gain, in the range of -19.5 to 41.5 with a step of 2.
When a relatively small voice signal power is needed on the output line, increase the
voice output gain value.
IMPORTANT:
Gain adjustment may lead to call failures. H3C recommends that you do not adjust
the gain. If necessary, do it with the guidance of technical personnel.
684
Configuration procedure
1.
Configure Router A
Configure a call route in the call route configuration page: The call route ID is 10000, the
destination number is 0755...., and the destination address is 2.2.2.2.
Create a local number in the local number configuration page: The number ID is 1001, the number
is 0101001, and the bound line is 1/0.
2.
Configure Router B
Create a call route in the call route configuration page: The call route ID is 10000, the destination
number is 010.., and the destination address is 1.1.1.1.
Create a call route in the call route configuration page: The call route ID is 10001, the destination
number is 07552001, the call route type is Trunk, and the trunk route line is 1/0. In addition, select
the Send All Digits of a Called Number radio button in the Called Number Sending Mode area
when you configure the advanced settings of this call route.
685
Click Apply.
Configuration verification
If you dial the number 0755-2003 on phone 0755-2001, a connection is established to number 010-1001
at Router A.
Router A and Router B are connected over an IP network and a PSTN. Telephone A attached to
Router A can make calls to Telephone B attached to Router B over the IP network or the PSTN.
Usually, Telephone A makes calls to Telephone B over the IP network. In the case that the IP network
is unavailable, Router A sends calls from Telephone A through the bound FXO interface to
Telephone B over PSTN.
Figure 657 Network diagram for one-to-one binding between FXS and FXO
686
Configuration considerations
Configure one-to-one binding between FXS and FXO voice subscriber lines.
When the IP network is available, the VoIP entity is preferably used to make calls over the IP
network.
When the IP network is unavailable, the POTS entity is used to make calls through the bound FXO
voice subscriber line over the PSTN.
Configuration procedure
NOTE:
Router A and Router B are routable to each other.
The configuration of interface IP addresses is omitted.
1.
Configure Router A
Configure a call route in the call route configuration page: The call route ID is 10000, the
destination number is 210., and the destination address is 192.168.0.76.
Configure a local number in the local number configuration page: The number ID is 0101001, the
number is 0101001, and the bound line is 3/0.
Configure the backup call route 10001 for the FXO line in the call route configuration page: The
destination address is .T, call route type is Trunk, and the trunk route line is 4/0. In addition, select
the Send All Digits of a Called Number radio button in the Called Number Sending Mode area
when you configure the advanced settings of this call route.
687
Type 0101001 in the Numbers in the Group text box and click Add.
Click Apply.
Select Voice Management > Dial Plan > Call Authority Control from the navigation tree, and then click
Not Bound to enter the call route binding page of permitted call number group 1.
Figure 659 Call route binding page
Select the Permit the calls from the number group radio button.
Click Apply.
688
Click Apply.
Select subscriber-line 3/0 from the Binding FXS Line drop-down list.
Click Apply.
icon of
Select Voice Management > Dial Plan > Number Match from the navigation tree to enter the number
match configuration page.
Figure 662 Entity type selection sequence configuration page
Configure the order of the voice entities in the Selection Sequence box: the first is VOIP, the second
is POTS, the third is VoFR, and the last is IVR.
Click Apply.
2.
Configure Router B
Configure a call route in the call route configuration page: The call route ID is 10000, the
destination number is 010., and the destination address is 192.168.0.71.
Configure a local number in the local number configuration page: The number ID is 2101002, the
number ID is 2101002, and the bound line is 3/0.
Configure the backup call route 10001 for the FXO line in the call route configuration page: The
destination address is .T, call route type is Trunk, and the trunk route line is 4/0. In addition, select
the Send All Digits of a Called Number radio button in the Called Number Sending Mode area
when you configure the advanced settings of this call route.
690
Type 2101002 in the Numbers in the Group text box and click Add.
Click Apply.
Select Voice Management > Dial Plan > Call Authority Control from the navigation tree, and then click
Not Bound to enter the call route binding page of permitted call number group 1.
Figure 664 211 Call route binding page
Select the Permit the calls from the number group radio button.
Click Apply.
691
Click Apply.
icon of the
Select subscriber-line 3/0 from the Binding FXS Line drop-down list.
Click Apply.
Configure the order of the voice entities in the Selection Sequence box: the first is VoIP, the second
is POTS, the third is VoFR, and the last is IVR.
Click Apply.
Configuration verification
In the case that the IP network is unavailable, calls can be made over PSTN.
693
When the WAN link from a branch to the headquarters is normal, all IP phones at the branch are
registered with the headquarters voice server and the headquarters voice server processes calls
originated by branch IP phones.
2.
When the WAN link to the headquarters or the primary server fails:
The branch voice router can accept registrations from its attached IP phones.
The branch voice router ensures the normal call services between its IP phones, between its IP
phones and FXS interfaces, and between its FXS interfaces.
IP phone users at the branch can place or receive PSTN calls through FXS interfaces on the voice
router.
3.
When the WAN link or the primary server recovers, the branch voice router rejects registrations
from IP phones and the headquarters voice server takes over call processing.
694
Description
Type the IP address of the local server, which can be a local interfaces IP address,
or a loopback address such as 127.0.0.1. The IP address of a local interface is
recommended because a loopback address cannot accept registrations from
remote users.
When the local SIP server is enabled, the IP address of the local server must be
provided.
695
Item
Description
Alone: The local SIP server in alone mode acts as a small voice server.
Alive: The local SIP server in alive mode supports the local survival feature. That
is, when the communication with the remote server fails, the local SIP server
accepts registrations and calls; when the communication resumes, the remote
server accepts registrations and calls again and the local SIP server rejects
registrations and calls. In the alive mode, Options messages will periodically be
sent to the remote server.
When the alive mode is selected, the IP address of the remote SIP server must be
provided.
User management
Select Voice Management > SIP Local Survival > User Management from the navigation tree, and click
Add to enter the page as shown in Figure 670.
Figure 670 Configure user
Description
User ID
Telephone Number
Authentication Username
Authentication Password
696
Trusted nodes
Select Voice Management > SIP Local Survival > Trusted Nodes from the navigation tree to enter the
page as shown in Figure 671.
Figure 671 Configure a trusted node
Description
Type the IP address of the trusted node.
IP address
Port
Call-out route
The local SIP server uses a static routing table to forward outgoing calls. If the called number of a call
matches a static route, the local SIP server forwards the call to the specified destination. The called
number does not need to register on the local SIP server. For example, as an external number, 5552000
does not need to register on the local SIP server. Configure a static route entry with the area prefix of 333
and called number of 5552000 on the local SIP server. Upon receiving a call from local number 1000
to external number 5552000, the local SIP server adds the area prefix 333 to the calling number, and
forwards the call to the destination specified in the static route entry.
Select Voice Management > SIP Local Survival > Call-Out Route from the navigation tree, and click Add
to enter the page as shown in Figure 672.
697
Description
ID
Destination
Number Prefix
Type the destination number prefix and length. Suppose the destination number prefix is
4100, and the number length is 6. This configuration matches destination numbers that
are 6-digit long and start with 4100.
Number length
A dot can be used after a number to represent a character. Currently, this configuration
does not support other characters.
Destination IP
address
Port Number
Area Prefix
Type the area prefix added before the calling numbers of outgoing calls.
Area prefix
When the local SIP server is connected to the extranet, external users can originate calls to internal users
registered with the local SIP server. For calls from external users to internal users, the local SIP server
removes the configured area prefix from each called number to converts it to an internal short number.
For example, if an external user dials number 01050009999, the local SIP server checks whether any
area prefix matches the called number. If the area prefix 0105000 is available, the local SIP server
removes the prefix 0105000 from the called number and sends the call to 9999.
Select Voice Management > SIP Local Survival > Area Prefix from the navigation tree to enter the page
as shown in Figure 673.
Figure 673 Configure a call-in number prefix
Up to eight call-in number prefixes can be configured. The local SIP server adopts longest match to deal
with a called number.
Description
Rule Set ID
Rule
Rule ID
Call Direction
Call Authority
Number Pattern
699
Description
Rule Set ID
Applied Globally
In the Register users bound to the rule set text box, select registered users and
click >> to unbind them.
Users in the Available register users text box are added in User management.
700
Figure 676 Network diagram for the local SIP server in alone mode
Configuration procedure
1.
Configure Router C
Click Apply.
701
Click Apply.
Configure Router A
Configure a local number in the local number configuration page: The ID is 1000, the number is
1000, the bound line is line2/0, the user name is 1000, and the password is 1000.
Configure a call route to Router B in the call route configuration page: The ID is 5000, the
destination number is 5000, the routing type is SIP, and the SIP routing method is proxy server.
Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrars IP address as 2.1.1.2.
3.
Configure Router B
Configure a local number in the local number configuration page: The ID is 5000, the number is
5000, the bound line is line2/0, the user name is 5000, and the password is 5000.
Configure a call route to Router A in the call route configuration page: The ID is 1000, the
destination number is 1000, the routing type is SIP, and the SIP routing method is proxy server.
Configure SIP registration in the connection properties configuration page: Enable registration, and
configure the main registrars IP address as 2.1.1.2.
Select Voice Management > States and Statistics > Local Survival Service States from the
navigation tree. You can find that numbers 1000 and 5000 have been registered with the local SIP
server on Router C.
Phones 1000 and 5000 can call each other through the local SIP server.
702
Configuration procedure
1.
Configure Router A
# Configure the IP address of Ethernet 1/1 as 1.1.1.2, and the IP address of the sub interface as 2.1.1.2.
(Omitted)
Click Apply.
Click Apply.
Configure Router A
Configure a local number in the local number configuration page: The ID is 1000, the number is
1000, and the bound line is line2/0.
Configure a call route to Router B in the call route configuration page: The ID is 5000, the
destination number is 5000, the routing type is SIP, and the SIP routing method is proxy server.
Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrars IP address as 3.1.1.2, and the backup registrars IP address as
2.1.1.2.
3.
Configure Router B
Configure a local number in the local number configuration page: The ID is 5000, the number is
5000, and the bound line is line2/0.
Configure a call route to Router A in the call route configuration page: The ID is 1000, the
destination number is 1000, the routing type is SIP, and the SIP routing method is proxy server.
Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrars IP address as 3.1.1.2, and the backup registrars IP address as
2.1.1.2
704
When the VCX fails, the local SIP server on Router A starts to accept registrations from phones,
which then can call each other through Router A. Select Voice Management > States and Statistics
> Local Survival Service States from the navigation tree. You can find that numbers 1000 and 5000
have been registered with the local SIP server on Router A.
When the VCX recovers, Router A disables the local SIP server, and the phones register with the
VCX again.
1000
Eth1/1
Eth1/1
1.1.1.1/24 1.1.1.2/24
Router A
Eth1/2
2.1.1.2/24
5000
Eth1/1
2.1.1.1/24
Router C
1111
Router B
5555
Configuration procedure
1.
705
Click Apply.
Click Apply.
706
# Configure users with phone numbers 1111, 5000, and 5555 in the similar way.
Click Apply.
707
Click Apply.
708
Click Apply.
Click 5000 in Available register users, and then click << to add it to Register users bound to the
rule set.
Click Apply.
2.
Configure Router A
Configure a local number in the local number configuration page: The ID is 1000, the number is
1000, the bound line is line2/0, the user name is 1000, and the password is 1000.
Configure a local number in the local number configuration page: The ID is 1111, the number is 1111,
the bound line is line2/1, the user name is 1111, and the password is 1111.
Configure a call route to Router B in the call route configuration page: The ID is 5000, the
destination number is 5, the routing type is SIP, and the SIP routing method is proxy server.
Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrars IP address as 2.1.1.2.
3.
Configure Router B
709
Configure a local number in the local number configuration page: The ID is 5000, the number is
5000, the bound line is line2/0, the user name is 5000, and the password is 5000.
Configure a local number in the local number configuration page: The ID is 5555, the number is
5555, the bound line is line2/1, the user name is 5555, and the password is 5555.
Configure a call route to Router A in the call route configuration page: The ID is 1000, the
destination number is 1, the routing type is SIP, and the SIP routing method is proxy server.
Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrars IP address as 2.1.1.2.
Select Voice Management > States and Statistics > Local Survival Service States from the
navigation tree. You can find that numbers 1000, 1111, 5000, and 5000 have been registered with
the local SIP server on Router C.
The four phones cannot call external numbers, and phone 5000 cannot call phone 1000.
Configuration procedure
1.
710
Click Apply.
Click Apply.
711
Click Apply.
Click Apply.
2.
Configure Router A
Configure a local number in the local number configuration page: The ID is 55661000, the number
is 55661000, and the bound line is line2/0.
Configure a call route to Router B in the call route configuration page: The ID is 88995000, the
destination number is 88995000, the routing type is SIP, and the destination address is 2.1.1.2.
3.
Configure Router B
Configure a local number in the local number configuration page: The ID is 5000, the number is
5000, the bound line is line2/0, the user name is 5000, and the password is 5000.
Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrars IP address as 2.1.1.2.
712
Select Voice Management > States and Statistics > Local Survival Service States from the
navigation tree. You can find that number 5000 has been registered with the local SIP server on
Router C.
Place a call from phone 55661000 to phone 88995000. The local SIP server on Router C removes
the area prefix 8899 from the called number, and alerts internal phone 5000. Pick up phone 5000.
The call is established.
Configuration procedure
1.
Click Apply.
Type 55665000 for Destination Number Prefix, and 8 for Number Length.
Click Apply.
Click Apply.
2.
Configure Router A
Configure a local number in the local number configuration page: The ID is 1000, the number is
1000, the bound line is line2/0, the user name is 1000, and the password is 1000.
Configure a call route to Router B in the call route configuration page: The ID is 55665000, the
destination number is 55665000, the routing type is SIP, and the routing method is proxy server.
3.
Configure Router B
Configure a local number in the local number configuration page: The ID is 55665000, the number
is 55665000, and the bound line is line2/0.
Configure a call route to Router A in the call route configuration page: The ID is 1000, the
destination number is 1000, the routing type is SIP, and the routing method is proxy server.
Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrars IP address as 2.1.1.2.
Select Voice Management > States and Statistics > Local Survival Service States from the
navigation tree. You can find that number 1000 has been registered with the local SIP server on
Router C.
Place a call from phone 1000 to phone 55665000. The local SIP server on Router C adds prefix
8899 before the calling number, and sends the call to phone 55665000. Pick up phone
55665000. The call is established.
715
IVR
Overview
Interactive voice response (IVR) is extensively used in voice communications. You can use the IVR system
to customize interactive operations and humanize other services. If a subscriber dials an IVR access
number, the IVR system plays the prerecorded voice prompts to direct the subscriber on how to proceed,
for example, dial a number.
Advantages
A conventional interactive voice system uses fixed audio files and operations. IVR enables you to
customize your own interactive system by adding, modifying, and removing audio files. IVR has the
following advantages.
Various codecs
The IVR system supports four codecs for voice prompts: G.711alaw, G.711ulaw, G.723r5, and G.729r8.
The converter provided by H3C can transcode among these four codecs. Each kind of codec has its
advantages and disadvantages: G.711alaw and G.711ulaw provide high quality of voice, while
requiring greater memory space; G.723r53 and G.729r8 provide relatively low quality of voice, while
requiring less memory space.
jump node: Jumps to another node according to the input of the subscriber.
service node: Executes various operations, such as executing an immediate secondary call, auto
jumping, terminating a call, and playing an audio file.
Customizable process
You can customize the interactive process easily. For example, configure custom IVR access numbers,
voice prompts, and combinations of keys and voice prompts.
716
Successive jumping
The IVR process can realize successive jumping at most eight times from node to node.
A subscriber makes an immediate secondary call without the need of dialing the number of the
called party. Immediate secondary calls are executed by service nodes.
A subscriber makes a normal secondary call by dialing the number of the called party. Normal
secondary calls are executed by call nodes. You can configure a node to match the length of a
number, matching the terminator, or matching the number.
A subscriber makes an extension secondary call by dialing the extension number of the called
party. Extension secondary calls are executed by call nodes.
Configuring IVR
Uploading media resource files
Select Voice Management > IVR Services > Media Resources Management from the navigation tree to
enter the following page.
Figure 698 Media file list
717
Description
Media Resource ID
Upload media resource files for g729r8, g711alaw, g711ulaw, and g723r53.
Click
718
Description
Media resource ID
Description
Item
Description
Enable
Disable
Not enabled by default.
Voice Prompts
Select a voice prompt file. You can configure voice prompt files in Voice
Management > IVR Services > Media Resources Management.
Timeout Time
Enable
Disable
Not enabled by default.
Voice Prompts
Select a voice prompt file. You can configure voice prompt files in Voice
Management > IVR Services > Media Resources Management.
Several nodes form a loop. The subscriber has no other options except jumping around these
nodes.
The IVR process jumps from node to node for more than eight times.
720
Description
Node ID
Description
Item
Description
Enable
Disable
Disabled by default.
Mandatory play: Only after the voice prompts end can the subscriber press keys
effectively.
Voice prompts: Select a voice prompt file. Voice prompt files can be configured
in Voice Management > IVR Services > Media Resources Management.
Specify A Node
Specify the node to which the subscriber is directed when the number of input
errors reaches the maximum.
Enable
Disable
Not enabled by default.
Voice Prompts
Select a voice prompt file. Voice prompt files can be configured in Voice
Management > IVR Services > Media Resources Management.
Play Count
Specify A Node
Specify the node to which the subscriber is directed when the number of input
timeouts reaches the maximum.
Timeout Time
Timeout time
Enable
Disable
Not enabled by default.
Voice Prompts
Select a voice prompt file. You can configure voice prompt files in Voice
Management > IVR Services > Media Resources Management.
Play Count
722
Item
Description
Secondary-Call
Length of Numbers
Terminator
Extension Secondary-Call
Extension Number
Corresponding Number
Associate the extension number with the corresponding number. You can click
Add a Rule to configure a rule for executing the secondary call.
By default, no extension secondary call is configured.
723
724
Description
Node ID
Description
Key mapping
725
Description
Node ID
Description
Description
Number ID
Item
Description
Number
Bind to Menu
Bind a node in the dropdown list to the access number. You can configure the
nodes in Voice Management > IVR Services > Advanced Settings.
Description
selected. .
Disable
Register Username
Register Password
Cnonce Name
Realm Name
Status
IMPORTANT:
The realm name must be consistent with that configured on the server. Otherwise,
authentication will fail. If no realm name is configured, the device trusts the realm
name from the server.
For information about advanced settings, see the chapter Advanced settings.
727
After the subscriber dials 300 (the IVR access number) from Telephone A, Router B plays the audio
file welcome.wav.
The subscriber dials 50# at Telephone A to originate a secondary call and then Telephone B1 rings.
If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav.
If no number is dialed at Telephone A within the timeout time, Router B plays the audio file
timeout.wav.
Figure 708 Network diagram for secondary call configuration (terminator match)
Configuration procedure
1.
Configure Router A
Configure a local number in the local number configuration page: The number ID is 100; the
number is 100; the bound line is line 1/0.
Configure a route to Router B in the call route configuration page: The route ID is 300; the
destination number is 300; the SIP routing method is IP routing; the destination IP address is 1.1.1.2;
the DTMF transmission mode is out-of-band.
2.
Configure Router B
Local number 500: The number ID is 500; the number is 500; the bound line is line 1/0.
Local number 50: The number ID is 50; the number is 50; the bound line is line 1/1.
Click the Browse button of g729r8 codec to select the target file.
Click Apply.
Use the same method to upload other g729r8 media resource files timeout, input_error, and bye.
# Configure global error and timeout processing methods to achieve the following purposes:
If no number is dialed at Telephone A within the timeout time, Router B plays audio file timeout.wav;
if number of timeouts reaches four, Router B terminates the call.
If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav; if the number of input errors reaches three, Router B terminates the call.
Select Voice Management > IVR Services > Advanced Settngs from the navigation tree, and select the
Global Key Policy tab.
729
Select Enable for Play Voice Prompts for Input Errors, and select input_error from the Voice Prompts
dropdown list.
Type 4 for Max Count of Input Timeouts, and 5 for Timeout Time; select Enable for Play Voice
Prompts for Input Timeout; select timeout from the Voice Prompts dropdown list.
Click Apply.
The subscriber dials the number 300 at Telephone A, and hears the voice prompts of audio file
welcome.wav. After that, the subscriber dials 50# at Telephone A, and Telephone B1 rings.
Select Voice Management > IVR Services > Advanced Settngs from the navigation tree, select the
Configure Call Node tab, and click Add to enter the following page.
730
Select Enable for Play Voice Prompts; select welcome from the Voice Prompts dropdown list.
Select Match the terminator of the numbers from the Number Match Mode dropdown list; type #
for Terminator.
Click Apply.
731
Click Apply.
Verification
Dial the number 300 at Telephone A, and the call node plays audio file welcome.wav.Then, dial 50# at
Telephone A, and Telephone B1 rings.
After the subscriber dials 300 (the IVR access number) from Telephone A, Router B plays the audio
file welcome.wav. Configure the number match length as 3, that is, when the subscriber dials 500
that matches number length 3, Telephone B2 rings.
If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav.
If no number is dialed at Telephone A within the timeout time, Router B plays the audio file
timeout.wav.
732
Figure 713 Network diagram for secondary call configuration (number length match)
Configuration procedure
1.
Configure Router A
See 1.
2.
Configure Router B
733
Select Enable for Play Voice Prompts; select welcome from the Voice Prompts dropdown list.
Select Match the length of the numbers from the Number Match Mode dropdown list; type 3 for
Length of Numbers.
Click Apply.
Verification
Dial 300 at Telephone A, and Router B plays the audio file welcome.wav. Then dial 500, and Telephone
B2 rings.
734
After the subscriber dials 300 (the IVR access number) from Telephone A, Router B plays the audio
file welcome.wav. Configure number match so that when the subscriber dials 50, Telephone B1
rings.
If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav.
If no number is dialed at Telephone A within the timeout time, Router B plays the audio file
timeout.wav.
Figure 715 Network diagram for secondary call configuration (match the number)
Configuration procedure
1.
Configure Router A
See 1.
2.
Configure Router B
735
Select Enable for Play Voice Prompts; select welcome from the Voice Prompts dropdown list.
Select Match the local number and route from the Number Match Mode dropdown list.
Click Apply.
Verification
Dial 300 at Telephone A, and Router B plays the audio file welcome.wav. Then dial 50, and Telephone
B1 rings.
736
After the subscriber dials 300 (the IVR access number) from Telephone A, Router B plays the audio
file welcome.wav. Then the subscriber dials 0, and Router B makes an extension secondary call so
that Telephone B rings.
If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav.
If no number is dialed at Telephone A within the timeout time, Router B plays the audio file
timeout.wav.
Configuration procedure
1.
Configure Router A
See 1.
2.
Configure Router B
737
Select Enable for Play Voice Prompts; select welcome from the Voice Prompts dropdown list.
Click Apply.
Verification
Dial 300 at Telephone A, and Router B plays the audio file welcome.wav. Then dial 0, and Telephone
B rings.
After the subscriber dials 300 (the IVR access number) from Telephone A, Router B plays the audio
file welcome.wav. Then if the subscriber dials #, Router B terminates the call.
If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav.
If no number is dialed at Telephone A within the timeout time, Router B plays the audio file
timeout.wav.
Configuration procedure
1.
Configure Router A
See 1.
2.
Configure Router B
739
740
Select Enable for Play Voice Prompts; select welcome from the Voice Prompts dropdown list.
Click Apply.
Verification
Dial 300 at Telephone A, and Router B plays the audio file welcome.wav. Then dial #, and the call is
terminated.
After the subscriber dials 300 (the IVR access number) from Telephone A, Telephone B rings.
If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav.
If no number is dialed at Telephone A within the timeout time, Router B plays the audio file
timeout.wav.
Configuration procedure
1.
Configure Router A
See 1.
2.
Configure Router B
741
Click Apply.
742
Click Apply.
Verification
Dial 300 at Telephone A. Telephone B rings.
After the subscriber dials 300 (the IVR access number) from Telephone A, Router B plays the audio
file bye.wav, and then terminates the call.
If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav.
If no number is dialed at Telephone A within the timeout time, Router B plays the audio file
timeout.wav.
743
Configuration procedure
1.
Configure Router A
See 1.
2.
Configure Router B
Click Apply.
744
Click Apply.
Verification
Dial number 300 at Telephone A. Router B plays the audio file bye.wav, and then terminates the call.
If the subscriber presses the * key at Telephone A, the call jumps to the service node and the
subscriber hears voice prompts of the audio file bye.wav. After that, the service node releases the
call;
If the subscriber presses the # key at Telephone A, the call jumps to the call node and the subscriber
hears the voice prompts of the audio file call.wav. After that, if the subscriber dials 1, Telephone B
rings.
745
Figure 727 Network diagram for call, jump and service nodes configuration
Configuration procedure
1.
Configure Router A
See 1.
2.
Configure Router B
Click the Browse button of g729r8 codec to select the target file.
Click Apply.
Use the same method to upload other g729r8 media resource files timeout, input_error, and bye.
# Configure global error and timeout processing methods to achieve the following purposes:
If no number is dialed at Telephone A within the timeout time, Router B plays audio file timeout.wav;
if number of timeouts reaches four, Router B terminates the call.
746
If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav; if the number of input errors reaches three, Router B terminates the call.
Select Voice Management > IVR Services > Advanced Settngs from the navigation tree, and select the
Global Key Policy tab.
Figure 729 Configure the global key policy
Select Enable for Play Voice Prompts for Input Errors, and select input_error from the Voice Prompts
dropdown list.
Type 4 for Max Count of Input Timeouts, and 5 for Timeout Time; select Enable for Play Voice
Prompts for Input Timeout; select timeout from the Voice Prompts dropdown list.
Click Apply.
747
Select Enable for Play Voice Prompts; select Enable for Mandatory Play; select call from the Voice
Prompts dropdown list.
Type 1 for Extension Number; type 500 for Corresponding Number; click Add a Rule.
748
Click Apply.
Click Apply.
749
Select Enable for both Play Voice Prompts and Mandatory Play.
Select Jump to a specified node from the Key* dropdown list, and reject-all from its Specify a node
dropdown list.
Select Jump to a specified node from the Key# dropdown list, and play-all from its Specify a node
dropdown list.
Click Apply.
Click Apply.
Verification
Dial 300 at Telephone A. Router B plays the audio file welcome.wav. Then,
If you press the * key at Telephone A, the call jumps to service node 20 and you hear voice prompts
of the audio file bye.wav. After that, the service node releases the call;
If you press the # key at Telephone A, the call jumps to call node 10 and you hears the voice
prompts of the audio file call.wav. After that, if you dial 1, Telephone B rings.
Create a menu
Select Voice Management > IVR Services > Processing Methods Customization from the navigation tree,
and click Add to create a menu. The following describes settings for different types of menus, including
jump, terminate the call, enter the next menu, return to the previous menu, dial immediately, and
secondary call.
Description
Menu Node ID
Menu Name
752
Item
Menu Type
Play Voice Prompts
When the User Enters
the Menu
Description
Select Jump.
By default, Jump is selected.
Select an audio file.
No audio file is selected by default.
Select one of the following methods.
Specify A Menu
Input Error Prompts
Input Timeout
Processing Method
Specify A Menu
Timeout Prompts
Key Mapping
753
Description
Menu Node ID
Menu Name
Menu Type
Play Voice Prompts
When the User Enters the
Menu
Description
Menu Node ID
Menu Name
Menu Type
754
Item
Description
Description
Menu Node ID
Menu Name
Menu Type
Play Voice Prompts
When the User Enters the
Menu
755
Description
Menu Node ID
Menu Name
Menu Type
Call immediately
Description
Menu Node ID
Item
Description
Menu Name
Menu Type
Play Voice Prompts
When the User Enters the
Menu
Select Secondary-call.
By default, Jump is selected.
Select an audio file.
No audio file is selected by default.
Select one of the following methods.
Specify A Menu
Input Error Prompts
Specify A Menu
Timeout Prompts
Normal Secondary-Call
Number Matching Policy
Match Number
Terminator
Type an extension number and the corresponding number, and click Add to
associate them.
By default, no extension secondary call is configured.
Select the check box of the target access number, and click Apply.
758
Add a submenu
Select Add A New Node from the Jump to submenu dropdown list of Key 0. Click OK on the popup
dialog box to enter the following page.
Figure 742 Add a submenu
You can configure the type of the new menu as jump, terminate the call, enter the next menu, return to the
previous menu, dial immediately, or secondary-call. For information about the menu configuration, see
Create a menu.
NOTE:
If new settings are made on the page, click Apply to save them first before you select Add a new menu.
Otherwise, the new settings may get lost.
Delete a menu
Enter the Customize IVR Services page, click the target menu, and click Delete the menu. On the popup
page, click OK.
NOTE:
If you delete a menu that is referenced by another menu, the operation deletes the reference relation in
the menu but not the menu.
If you delete a menu that is referenced within itself, the delete operation deletes both the reference
relation and the menu.
759
1.
When a user dials the access number 300, the system plays the audio file Hello.wav. Then,
If the user dials 0, the system jumps to the marketing and sales department menu.
If the user dials 1, the system jumps to the telecom product sales department menu.
If the user dials 2, the system jumps to the government product sales department menu. If the user dials
#, the system terminates the call.
2.
If the user dials 0, the system dials the number 500 to call the attendant.
If the user dials 1, the system jumps to the major financial customer department menu.
If the user dials 2, the system jumps to the carrier customer department menu.
If the user dials 3, the system jumps to the SME department menu.
If the user dials 0, the system dials the number 500 to call the attendant.
If the user dials 1, the system plays the audio file that introduces product A.
If the user dials 2, the system plays the audio file that introduces product B.
If the user dials 3, the system plays the audio file that introduces product C.
If the user dials 0, the system dials the number 500 to call the attendant.
If the user dials 1, the system plays the audio file that introduces product D.
If the user dials 2, the system plays the audio file that introduces product E.
If the user dials 3, the system plays the audio file that introduces product F.
Configuration procedure
1.
760
Click the Browse button of g729r8 codec to select the target file.
Click Apply.
Use the same method to upload other g729r8 media resource files. You can see these uploaded files in
Voice Management > IVR Services > Media Resources Management, as shown in Figure 744
Figure 744 Media file list
2.
761
Select Voice Management > IVR Services > Access Number Management from the navigation tree, and
click Add to enter the following page.
Figure 745 Configure an access number
Click Apply.
# Create a menu.
Select Voice Management > IVR Services > Processing Methods Customization from the navigation tree,
and click Add to create a menu.
Figure 746 Configure a menu
Select Jump from the Menu Type dropdown list, and Hello from the Play Voice Prompts When the
User Enters the Menu dropdown list.
Click Next.
# Bind the access number.
762
Select the checkbox of the access number 30000, and click Apply.
3.
763
# Add submenus for the marketing and sales department, telecom product sales department, and
government product sales department.
Select the voice menu system of Company A from the navigation tree to enter the following page.
Figure 750 Voice menu system of Company A
Select Add A New Node from the Jump to submenu dropdown list of key 0.
764
Figure 751 Create a submenu for the marketing and sales department
Select Jump from the Menu Type dropdown list, and welcome1 from the Player Voice Prompts When
the User Enters the Menu dropdown list.
Click Apply.
Configure submenus for the telecom product department and government product department as per
Figure 752 and Figure 753.
Figure 752 Add a submenu for the telecom product sales department
Figure 753 Add a submenu for the government product sales department
765
Select Terminate the call from the Operation dropdown list of key #.
Click Apply.
4.
Select Jump from the Operation dropdown list, and Add A New Node from the Jump to submenu
dropdown list for key 0.
Select Dial immediately from the Menu Type dropdown list, and type 500 for Call immediately.
Click Apply.
Use the same method to add submenus for the major financial customer department, carrier customer
department, and SMB department.
Figure 757 Marketing and sales department submenu
Select Return to the previous node from the Operation dropdown list of key *.
Click Apply.
After the configuration, the marketing and sales department submenu is as shown in Figure 757.
5.
767
Select Jump from the Operation dropdown list, and Attendant from the Jump to submenu dropdown
list of key 0.
Select Jump from the Operation dropdown list, and Add A New Node from the Jump to submenu
dropdown list of key 1.
Select Return to the previous node from the Menu Type dropdown list, and ProductA from the Play
Voice Prompts When the User Enters the Menu dropdown list.
Click Apply.
Use the same method to add submenus for introductions to Products B and C. After that, return to the
Customize IVR Services page.
768
Select Return to the previous node from the Operation dropdown list of key *.
Click Apply.
After the configuration, the telecom product sales department submenu is as shown in Figure 760.
6.
Select Government Product Sales Dept from the navigation tree. Configure the submenu as shown in
Figure 761. The configuration procedure is identical with the configuration of the telecom product sales
department submenu.
769
After all the configuration, the Customize IVR Services page is as shown in Figure 761.
770
Advanced configuration
Global configuration
Select Voice Management > Advanced Configuration > Global Configuration from the navigation tree to
enter the global configuration page, as shown in Figure 762.
Figure 762 Global configuration page
Description
Silent: The calling party does not play any tones to the called party during call
hold.
Playing music: The calling party plays the specified tones to the called party
during call hold.
By default, the tone playing mode is the silent mode.
Media Resource
Call Progress Tones
Country Mode
Select the media resource if you select the Playing Music option. You can upload
media resource files in Voice Management > IVR Services > Media Resources
Management.
Configure the device to play the call progress tones of a specified country or region.
By default, the call progress tones of China are specified.
771
Item
Description
Backup rule:
8. StrictOne of the following three conditions will trigger strict call backup:
The device does not receive any reply from the peer after sending out a call
request.
Backup Rule
Specifies the time duration in seconds for switching from the current VoIP link to
another VoIP link or a PSTN link (that is, the call backup switching time) in case of a
VoIP call failure.
Set the maximum number of call history records that can be stored.
Related Time
Parameters of DTMF
Set the DSCP value in the ToS field in the IP packets that carry the RTP stream
globally.
Set the DSCP value in the ToS field in the IP packets that carry the voice signaling
globally.
Batch configuration
Local number
Creating numbers in batch
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree,
and then click the Create Numbers in Batch link in the Local Number area to enter the page for creating
numbers in batch, as shown in Figure 763.
772
Description
Start Number
Specify the start number, and then a serial of consecutive numbers starting with the start
number will be bound to the selected voice subscriber lines. For example, if you specify
the start number as 3000 and select lines 3/0 and line 3/1, then line 3/0 is bound to
number 3000, and line 3/1 is bound to number 3001.
You can set the register username and password in one of the following three ways:
Register Mode
Register Username
Register Password
Select an FXS voice subscriber line in the Selected FXS Lines box, click > to remove the
line from the box.
Click << to add all FXS voice subscriber lines in the Available FXS Lines box in to the
Selected FXS Lines box; click >> to remove all FXS voice subscriber lines from the
Selected FXS Lines box.
773
Description
Configure the protocol used for fax communication with other devices.
T.38: Use T.38 fax protocol. With this protocol, a fax connection can be set up
quickly.
Standard T.38: Use the standard T38 protocol of H323 or SIP. The fax negotiation
mode depends on the protocol used (H323 or SIP).
Fax Protocol
G.711 A-law
G.711 -law
The pass-through mode is subject to such factors as packet loss, jitter and delay, so the
clocks on both communication sides must be kept synchronized. At present, only
G.711 A-law and G.711 law are supported, and the VAD function should be
disabled.
As defined in ITU-T, the error correction mode (ECM) is required by the half-duplex and
half-modulation system running ITU-T V.34 protocol for fax message transmission.
Besides, the G3 fax terminals working in full duplex mode are required to support
half-duplex mode, namely, ECM.
ECM Fax
The fax machines using ECM can correct errors, provide the automatic repeat request
(ARQ) function, and transmit fax packets in the format of HDLC frames. On the
contrary, the fax machines using non-ECM cannot correct errors and they transmit fax
packets in the format of binary strings.
774
Item
Description
The calling tone (CNG) fax switchover is used to implement the fax mailbox service
through communication with the VCX. When the local fax machine A originates a fax
call to the peer fax machine B, if B is busy or is unattended, A can send the fax call to
the fax mailbox of the VCX. With CNG fax switchover enabled, the voice gateway can
switch to the fax mode once it receives a CNG from A.
Enable
Disable
The function is disabled by default.
Configure the codec type and switching mode for SIP Modem pass-through function.
Standard G.711 A-law: Adopt G.711 A-law as the codec type and use Re-Invite
Codec Type and
Switching mode for
SIP Modem
Pass-through
Standard G.711 -law: Adopt the G.711 -law codec type and Re-Invite switching
mode.
NTE Compatible G.711 A-law: Adopt the G.711 A-law codec type and
NTE-compatible switching mode.
NTE Compatible G.711 -law: Adopt the G.711 -law codec type and
NTE-compatible switching mode.
Configure the value of NTE payload type for the NTE-compatible switching mode.
NET Payload Type
Field
This option is configurable only when NTE Compatible G.711 A-law or NTE Compatible
G.711 -law is selected in the Codec Type and Switching Mode for SIP Modem
Pass-through drop-down list.
By default, the value of the NTE payload type is 100.
Select the checkboxes of specific local numbers and then click the Apply to Selected
Number(s) button to apply the above fax and Modem settings to the selected local
numbers.
Call services
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree,
and then click the Call Services link in the Local Number area to enter the local number call services
configuration page, as shown in Figure 765.
775
Description
Configure call forwarding:
Enable
Disable
By default, call forwarding is disabled.
Call Forwarding
After a call forwarding function is enabled, you can input the corresponding
forwarded-to number:
The Forwarded-to Number for Call Forwarding no Reply: Input the forwarded-to
number.
The Forwarded-to Number for Call Forwarding Busy: Input the forwarded-to number.
The Forwarding Unconditional: Input the forwarded-to number.
The Forwarded-to Number for Call Forwarding Unavailable: Input the forwarded-to
number.
776
Item
Description
Configure call hold:
Enable
Disable
By default, call hold is disabled.
Call Hold
After call hold is enabled, you can set the Max Time Length the Held Party Can Wait
parameter as needed.
IMPORTANT:
The Max Time Length the Held Party Can Wait is only applied to the held party of a call,
that is, the receiver of call hold.
Configure call transfer:
Enable
Disable
Call Transfer
Three-Party
Conference
Enable
Disable
By default, three-party conference is disabled.
The three-party conference function depends on the call hold function. Therefore, you
need to enable the call hold function before configuring three-party conference.
Configure call waiting:
Enable
Disable
By default, call waiting is disabled.
Call Waiting
After call waiting is enabled, you can configure the following parameters as needed:
Hunt Group
Enable
Disable
By default, hunt group is disabled.
Configure Feature service:
Feature Service
Enable
Disable
By default, Feature service is disabled.
777
Item
Description
Configure message waiting indicator (MWI):
Enable
Disable
Message Waiting
Indicator
Processing Priority
When the Line is
Busy
Select the check boxes of desired local numbers, and then click the Apply to Selected
Number(s) button to apply the above call services settings to the selected local numbers.
Advanced settings
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree,
and then click the Advanced Settings link in the Local Number area to enter the local number advanced
settings page, as shown in Figure 766.
Figure 766 Local number advanced settings page
778
Description
Codec with the First Priority
DTMF Transmission
Mode
In-band Transmission
Out-of-band Transmission
RFC2833: Adopt DTMF named telephone event (NTE) transmission mode. When
you adopt this transmission mode, you can configure the payload type field in RTP
packets.
Specify number sending mode:
Number Sending
Mode
Number Selection
Priority
Set the priority of the local number. The smaller the value, the higher the priority.
Configure a dial prefix for the local number. For a trunk type call route, the dial prefix
is added to the called number to be sent out.
Dial Prefix
Enable
Disable: Remove the configured dial prefix.
If you select to enable the function, you need to input the dial prefix.
VAD
The voice activity detection (VAD) discriminates between silence and speech on a voice
connection according to their energies. VAD reduces the bandwidth requirements of a
voice connection by not generating traffic during periods of silence in an active voice
connection. Speech signals are generated and transmitted only when an active voice
segment is detected. Researches show that VAD can save the transmission bandwidth
by 50%.
Enable
Disable
By default, VAD is disabled.
Select the Number(s)
Select the check boxes of desired local numbers, and then click the Apply to Selected
Number(s) button to apply the above advanced settings to the selected local numbers.
Call route
Fax and Modem
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree,
and then click the Fax and Modem link in the Call Route area to enter the call route fax and modem
configuration page, as shown in Figure 767.
779
Description
Specify the protocol used for fax communication with other devices.
T.38: Use T.38 fax protocol. With this protocol, a fax connection can be set up
quickly.
Standard T.38: Use the standard T38 protocol of H323 or SIP. The fax negotiation
mode depends on the protocol used (H323 or SIP).
Fax Protocol
G.711 A-law
G.711 -law
The pass-through mode is subject to such factors as packet loss, jitter and delay, so the
clocks on both communication sides must be kept synchronized. At present, only
G.711 A-law and G.711 law are supported, and the VAD function should be
disabled.
As defined in ITU-T, the error correction mode (ECM) is required by the half-duplex and
half-modulation system running ITU-T V.34 protocol for fax message transmission.
Besides, the G3 fax terminals working in full duplex mode are required to support
half-duplex mode, namely, ECM.
ECM Fax
The fax machines using ECM can correct errors, provide the automatic repeat request
(ARQ) function, and transmit fax packets in the format of HDLC frames. On the
contrary, the fax machines using non-ECM cannot correct errors and they transmit fax
packets in the format of binary strings.
780
Item
Description
The calling tone (CNG) fax switchover is used to implement the fax mailbox service
through communication with the VCX. When the local fax machine A originates a fax
call to the peer fax machine B, if B is busy or is unattended, A can send fax call to the
fax mailbox of the VCX. With CNG fax switchover enabled, the voice gateway can
switch to the fax mode once it receives a CNG from A.
Enable
Disable
The function is disabled by default.
Configure the codec type and switching mode for SIP Modem pass-through function.
Standard G.711 A-law: Adopt the G.711 A-law codec type and Re-Invite switching
Codec Type and
Switching mode for
SIP Modem
Pass-through
mode.
Standard G.711 -law: Adopt the G.711 -law codec type and Re-Invite switching
mode.
NTE Compatible G.711 A-law: Adopt the G.711 A-law codec type and
NTE-compatible switching mode.
NTE Compatible G.711 -law: Adopt the G.711 -law codec type and
NTE-compatible switching mode.
Configure the value of the NTE payload type for the NTE-compatible switching mode.
NET Payload Type
Field
This option is configurable only when NTE Compatible G.711 A-law or NTE Compatible
G.711 -law is selected in the Codec Type and Switching Mode for SIP Modem
Pass-through drop-down list.
By default, the value of the NTE payload type is 100.
Select the check boxes of call routes, and then click the Apply to Selected Route(s)
button to apply the above fax and Modem settings to the selected call routes.
Advanced settings
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree,
and then click the Advanced Settings link in the Call Route area to enter the call route advanced settings
page, as shown in Figure 768.
Figure 768 Call route advanced settings page
781
Description
Codec with the First Priority
DTMF Transmission
Mode
In-band Transmission
Out-of-band Transmission
RFC2833: Adopt DTMF named telephone event (NTE) transmission mode. When
you adopt this transmission mode, you can configure the payload type field in RTP
packets.
By default, the value of the NTE payload type field is 101.
Route Selection
Priority
VAD
Set the priority of the call route. The smaller the value, the higher the priority.
The VAD discriminates between silence and speech on a voice connection according
to their energies. VAD reduces the bandwidth requirements of a voice connection by
not generating traffic during periods of silence in an active voice connection. Speech
signals are generated and transmitted only when an active voice segment is detected.
Researches show that VAD can save the transmission bandwidth by 50%.
Enable
Disable
By default, VAD is disabled.
Select the Route(s)
Select the check boxes of desired call routes, and then click the Apply to Selected
Route(s) button to apply the above advanced settings to the selected call routes.
Line management
FXS line configuration
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree,
and then click the FXS Line Configuration link in the Line Management area to enter the FXS line
configuration page, as shown in Figure 769.
782
Description
Maximum interval for the user to dial the next digit
This timer will restart each time the user dials a digit and will work in this way until all
the digits of the number are dialed. If the timer expires before the dialing is completed,
the user will be prompted to hook up and the call is terminated.
Maximum interval in seconds between off-hook and dialing the first digit
Upon the expiration of the timer, the user will be prompted to hook up and the call is
terminated.
Configure dial delay time.
By default, the dial delay time is 1 second.
IMPORTANT:
Gain adjustment may lead to call failures.
You are not recommended to adjust the
gain. If necessary, do it with the guidance
of technical personnel.
Low: In this mode, the reliability is high, but DTMF tones may fail to be detected.
Medium: In this mode, the reliability is medium. If you select this option, you can
specify the Frequency Tolerance of Medium DTMF Detection Sensitivity Level. The
greater the value, the higher the probability of false detection. Support for this
option varies with installed cards.
High: In this mode, the reliability is low and detection errors may occur.
783
Item
Description
Select the check boxes of desire lines, and then click the Apply to Selected Line(s) button
to apply the above settings to the selected FXS lines.
Description
Maximum interval for the user to dial the next digit
This timer will restart each time the user dials a digit and will work in this way until all
the digits of the number are dialed. If the timer expires before the dialing is completed,
the user will be prompted to hook up and the call is terminated.
Maximum interval in seconds between off-hook and dialing the first digit
Upon the expiration of the timer, the user will be prompted to hook up and the call is
terminated.
Configure dial delay time.
By default, the dial delay time is 1 second.
When the voice signals on the line
attenuate to a relatively great extent,
increase the voice input gain value.
784
IMPORTANT:
Gain adjustment may lead to call failures.
Item
Description
Low: In this mode, the reliability is high, but DTMF tones may fail to be detected.
Medium: In this mode, the reliability is medium. If you select this option, you can
specify the Frequency Tolerance of Medium DTMF Detection Sensitivity Level. The
greater the value, the higher the probability of false detection. Support for this
option varies with installed cards.
High: In this mode, the reliability is low and detection errors may occur.
Select the Line(s)
Select the check boxes of desired lines, and then click the Apply to Selected Line(s)
button to apply the above settings to the selected FXO lines.
Description
Maximum interval for the user to dial the next digit
This timer will restart each time the user dials a digit and will work in this way until all
the digits of the number are dialed. If the timer expires before the dialing is completed,
the user will be prompted to hook up and the call is terminated.
When the voice signals on the line
attenuate to a relatively great extent,
increase the voice input gain value.
785
IMPORTANT:
Gain adjustment may lead to call failures.
Item
Description
Select the check boxes of desired lines, and then click the Apply to Selected Line(s)
button to apply the above settings to the selected E&M lines.
Description
Select the check boxes of desired line, and then click the Apply to Selected Line(s) button
to apply the above settings to the selected ISDN lines.
IMPORTANT:
Gain adjustment may lead to call failures.
You are not recommended to adjust the
gain. If necessary, do it with the guidance
of technical personnel.
786
Description
Start Number
Authentication
Username
Authentication
Password
787
Analog voice subscriber linesFXS, FXO, paging, music on hold (MoH), and E&M.
Description
Name
Type
Description
BRI
PRI
FXS
FXO
EM
PAGE
MOH
ISDN PRI
ISDN BRI
788
Item
Description
Physical Down: The voice subscriber line is physically down. (Possibly because
789
You can click a timeslot (TS) link to view the details about the TS.
Figure 777 Timeslot details
Call statistics
The following pages display call statistics.
790
Description
Call type
At present, only Speech and Fax are supported.
Call status
Status
791
SIP UA states
The following pages show SIP UA states.
TCP Connection Information pageDisplays information about all TCP-based call connections.
TLS Connection Information pageDisplays information about all TLS-based call connections.
Number Register Status pageDisplays number register information when you use SIP servers to
manage SIP calls.
Description
Connection ID
Local Address
Local Port
Remote Address
Remote Port
Connection State
Idle
Connecting
Established
792
Description
Number
Registrar
Address of the registrar, in the format of IP address plus port number or domain
name
Remaining aging time of a number, that is, the remaining time before the next
registration
Status of the number, including
Status
offlineNot registered
onlineRegistered
loginBeing registered
logoutBeing deregistered
dnsinDNS query is being performed before registration.
dnsoutDNS query is being performed before deregistration.
Description
Number
Phone number
Subscription Server
MWI server address, in the format of IP address plus port number or domain
name
Remaining aging time of the subscription, that is, the remaining time before
the next subscription
Subscription status, including
Status
offlineNot subscribed
onlineSubscribed
loginThe subscription is being proposed.
logoutThe subscription is being canceled.
Description
Alone
Alive
794
Field
Description
Server Status
Enabled
Disabled
User ID
User ID
Phone Number
State
Description
Aging Time
Aging time
Registration status of the SIP trunk account:
Status
DisabledNot in use.
OfflineNot registered.
OnlineRegistered.
LoginBeing registered.
LogoutBeing deregistered.
DnsinDNS query is being performed before registration.
DnsoutDNS query is being performed before deregistration.
795
This page displays the configuration information of server groups. For how to configure server groups,
see the chapter SIP server group management.
IVR information
The following pages show IVR information.
Description
State
796
Description
Play Count
Play State
Playing
Not playing
Play Type
797
Index
ABCDEFGILMNOPQRSTUVW
Configuration management,449
Configuration prerequisites,226
Configuration procedure,226
ACL overview,255
Advanced settings,498
Advantages,716
Basic settings,500
Basic settings,498
Configuring an ACL,256
Batch configuration,772
Configuring an SA interface,47
Call services,498
Configuring bridging,307
Call statistics,790
Configuration guidelines,254
Configuring DHCP,231
Configuration guidelines,448
Configuration guidelines,22
Configuration guidelines,366
Configuring DNS,216
Configuration guidelines,264
Configuration guidelines,62
Configuration guidelines,352
Configuration guidelines,395
798
Configuring IVR,717
Configuring L2TP,398
Configuring MSTP,341
Configuring NAT,158
FoIP overview,522
G
Global configuration,771
Configuring PKI,422
Configuring QoS,266
GRE overview,411
Configuring syslog,473
Introduction,694
Introduction to DHCP,230
Introduction to PKI,421
Introduction to RADIUS,354
Configuring WiNet,481
Introduction to SIP,597
IVR information,796
DDNS overview,225
L2TP overview,397
Line states,788
Displaying radio,130
District code,151
DNS overview,216
Service management,453
SIP security,602
SIP UA states,792
Overview,211
Overview,480
Overview,213
Overview,204
SNMP overview,466
Overview,63
SNMP overview,283
Overview,202
Overview,495
Overview,307
Overview,313
Overview,328
Overview,265
Overview,477
Overview,384
System time,458
Overview,380
Overview,154
Overview,158
Tools operations,478
Overview,58
TR-069 configuration,460
Overview,628
Overview,716
Precautions,209
User isolation,136
User level,4
User management,456
Reboot,453
Removing ARP entries,372
Route configuration,204
800