configuration guide - basic configuration(v100r002c00_05).pdf
TRANSCRIPT
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
1/182
Quidway S9300 Terabit Routing Switch
V100R002C00
Configuration Guide - Basic Configuration
Issue 05
Date 2010-01-08
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
2/182
Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. For any
assistance, please contact our local office or company headquarters.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website: http://www.huawei.com
Email: [email protected]
Copyright Huawei Technologies Co., Ltd. 2010. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are the property of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, andrecommendations in this document do not constitute the warranty of any kind, express or implied.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
http://www.huawei.com/ -
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
3/182
Contents
About This Document.....................................................................................................................1
1 How to Use Interfaces...............................................................................................................1-1
1.1 Introduction to Interfaces................................................................................................................................1-2
1.2 Setting Parameters of an Interface...................................................................................................................1-51.2.1 Establishing the Configuration Task......................................................................................................1-5
1.2.2 Enteringthe Interface View...................................................................................................................1-6
1.2.3 Viewing All Commands in the Interface View......................................................................................1-6
1.2.4 Configuring the Description for an Interface.........................................................................................1-7
1.2.5 Starting and Shutting Down an Interface...............................................................................................1-7
1.2.6 Exiting from the Interface View.............................................................................................................1-8
1.2.7 Assigning an IP Address to an Interface................................................................................................1-8
1.2.8 Further Configuration an Interface.........................................................................................................1-9
1.2.9 Checking the Configuration.................................................................................................................1-10
1.3 Configuring the Loopback Interface.............................................................................................................1-10
1.3.1 Establishing the Configuration Task....................................................................................................1-10
1.3.2 Configuring IPv4 Parameters of the Loopback Interface.....................................................................1-11
1.3.3 Checking the Configuration.................................................................................................................1-12
1.4 Maintaining the Interface..............................................................................................................................1-12
1.4.1 ClearingStatistics Information on the Interface...................................................................................1-12
1.4.2 Debugging the Interface.......................................................................................................................1-12
2 User Login Management...........................................................................................................2-1
2.1 Overview of User Login..................................................................................................................................2-3
2.1.1 User Login Modes..................................................................................................................................2-3
2.1.2 User Interface.........................................................................................................................................2-7
2.1.3 UserAuthentication................................................................................................................................2-8
2.2 Logging In to the S9300 Through the Console Interface..............................................................................2-10
2.2.1 Establishing the Configuration Task....................................................................................................2-10
2.2.2 Logging In to the S9300 Through the Console Interface.....................................................................2-11
2.3 Configuring the Console Interface as the User Interface..............................................................................2-14
2.3.1 Establishing the Configuration Task....................................................................................................2-14
2.3.2 Setting Parameters of the User Interface..............................................................................................2-15
2.3.3 Configuring User Authentication.........................................................................................................2-16
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration Contents
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
i
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
4/182
2.3.4 Setting User Levels..............................................................................................................................2-17
2.3.5 Checking the Configuration.................................................................................................................2-18
2.4 Configuring the Telnet Interface...................................................................................................................2-18
2.4.1 Establishing the Configuration Task....................................................................................................2-19
2.4.2 (Optional) Setting Parameters of the VTY Interface............................................................................2-19
2.4.3 Configuring the VTY User Interface to Support the Telnet Service....................................................2-20
2.4.4 Configuring User Authentication.........................................................................................................2-21
2.4.5 Setting User Levels..............................................................................................................................2-23
2.4.6 Checking the Configuration.................................................................................................................2-24
2.5 Logging In tothe S9300 Locally Through Telnet.........................................................................................2-24
2.5.1 Establishing the Configuration Task....................................................................................................2-24
2.5.2 LoggingIn to the S9300 Through Telnet.............................................................................................2-25
2.5.3 Ending the Telnet Connection Periodically.........................................................................................2-26
2.5.4 Checking the Configuration.................................................................................................................2-27
2.6 Logging In to the S9300 Remotely Through Telnet.....................................................................................2-28
2.6.1 Establishing the Configuration Task....................................................................................................2-28
2.6.2 LoggingIn to the S9300 Remotely Through Telnet............................................................................2-28
2.7 Configuring the SSH Interface......................................................................................................................2-29
2.7.1 Establishing the Configuration Task....................................................................................................2-29
2.7.2 Creatingan SSH User..........................................................................................................................2-30
2.7.3 Configuring the VTY User Interface to Support the SSH Protocol.....................................................2-30
2.7.4 Creatinga Local Key Pair....................................................................................................................2-31
2.7.5 Configuring the Authentication Mode for the SSH User.....................................................................2-322.7.6 (Optional) Configuring Basic Authentication Information About the SSH User................................2-33
2.7.7 (Optional) Authorizing SSH Users Through Command Lines............................................................2-34
2.7.8 Configuring the Type of the Service for the SSH User........................................................................2-34
2.7.9 (Optional) Configuring the Authorized Directory of the SFTP Service for the SSH User..................2-34
2.7.10 Deleting an SSH User........................................................................................................................2-35
2.7.11 Checking the Configuration...............................................................................................................2-35
2.8 Logging In to the S9300 Through SSH.........................................................................................................2-36
2.8.1 Establishing the Configuration Task....................................................................................................2-36
2.8.2 LoggingIn to the S9300 Through SSH................................................................................................2-37
2.9 Configuring the FTP Interface......................................................................................................................2-37
2.9.1 Establishing the Configuration Task....................................................................................................2-37
2.9.2 Configuring User Authentication.........................................................................................................2-38
2.9.3 Checking the Configuration.................................................................................................................2-39
2.10 Logging In to the S9300 Through FTP.......................................................................................................2-39
2.10.1 Establishing the Configuration Task..................................................................................................2-39
2.10.2 Logging In to the S9300 Through FTP..............................................................................................2-40
2.11 S9300 Logging In to the TFTP Service Through TFTP.............................................................................2-41
2.11.1 Establishing the Configuration Task..................................................................................................2-41
2.11.2 Downloading Files Through TFTP....................................................................................................2-42
Contents
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration
ii Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-01-08)
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
5/182
2.11.3 Uploading Files Through TFTP.........................................................................................................2-42
2.12 Limiting the Access to the TFTP Server.....................................................................................................2-42
2.12.1 Establishing the Configuration Task..................................................................................................2-43
2.12.2 Configuring the Basic ACL................................................................................................................2-43
2.12.3 Configuring the Basic TFTP ACL.....................................................................................................2-44
2.13 Logging In to the S9300 Through SFTP.....................................................................................................2-44
2.13.1 Establishing the Configuration Task..................................................................................................2-44
2.13.2 Logging In to the S9300 Through SFTP............................................................................................2-45
2.14 Logging In to the S9300 Through STelnet..................................................................................................2-45
2.14.1 Establishing the Configuration Task..................................................................................................2-45
2.14.2 Logging In to the S9300 Through STelnet.........................................................................................2-46
2.15 Configuring the NMS User to Log In to the S9300 Through the VTY Interface.......................................2-47
2.15.1 Establishing the Configuration Task..................................................................................................2-47
2.15.2 Configuring the NMS User................................................................................................................2-47
2.15.3 Configuring the AAA Authentication Mode for the NMS User........................................................2-48
2.15.4 Checking the Configuration...............................................................................................................2-48
2.16 Maintaining Telnet......................................................................................................................................2-49
2.16.1 Debugging Telnet Terminal Services.................................................................................................2-49
2.17 Configuration Examples..............................................................................................................................2-49
2.17.1 Example for Configuring the Telnet Terminal Service......................................................................2-49
2.17.2 Example for Configuring the TFTP Client........................................................................................2-51
3 How to Use Command Lines...................................................................................................3-1
3.1 Overview of Command Lines.........................................................................................................................3-2
3.2 CommandViews.............................................................................................................................................3-2
3.2.1 Hierarchical Structure of Command Views...........................................................................................3-2
3.2.2 Common Views......................................................................................................................................3-4
3.3 Command Levels.............................................................................................................................................3-6
3.3.1 Introduction to Command Levels...........................................................................................................3-6
3.3.2 Relations Between Command Levels and User Levels..........................................................................3-7
3.4 Using the Online Help of Command Lines.....................................................................................................3-8
3.4.1 Providing the Help for a Complete Command Word.............................................................................3-9
3.4.2 Providing the Help for an Incomplete Command Word........................................................................3-93.5 Editing Command Lines................................................................................................................................3-10
3.6 Displaying Features of Command Lines.......................................................................................................3-11
3.7 History Commands........................................................................................................................................3-11
3.8 Hotkeys..........................................................................................................................................................3-12
3.8.1 Classification of Hotkeys.....................................................................................................................3-12
3.8.2 DefiningHotkeys.................................................................................................................................3-14
3.8.3 Using Hotkeys......................................................................................................................................3-14
3.9 ConfigurationExamples................................................................................................................................3-15
3.9.1 Examplefor Defining Hotkeys............................................................................................................3-15
3.9.2 Example for Copying a Command by Using Hotkeys.........................................................................3-16
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration Contents
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
iii
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
6/182
3.9.3 Example for Using the Tab Key...........................................................................................................3-16
4 Common Operations and Configurations.............................................................................4-1
4.1 Overview of Common Operations and Configurations...................................................................................4-2
4.1.1 Introduction to Common Operations......................................................................................................4-24.1.2 Introduction to Common Configurations...............................................................................................4-2
4.2 Common Operations....................................................................................................................................... 4-2
4.2.1 Enteringthe System View......................................................................................................................4-2
4.2.2 Quittinga Command View.................................................................................................................... 4-3
4.2.3 Switching the Language Mode...............................................................................................................4-3
4.2.4 Displaying Information About the System Status..................................................................................4-3
4.2.5 Lockinga Login Interface......................................................................................................................4-5
4.2.6 SendingInformation from One User Interface to Another User Interface.............................................4-5
4.2.7 Closing the Connection on a Specified User Interface...........................................................................4-6
4.2.8 Setting the Header Text..........................................................................................................................4-6
4.3 Common Configurations.................................................................................................................................4-7
4.3.1 Setting aSystem Name.......................................................................................................................... 4-7
4.3.2 Setting the System Time........................................................................................................................ 4-7
4.4 Switching Levels of Users and Commands.....................................................................................................4-8
4.4.1 Extending Levels of Commands............................................................................................................4-8
4.4.2 Extending Levels of Users..................................................................................................................... 4-9
4.4.3 Setting the Password for Switching Levels of Users............................................................................. 4-9
4.4.4 Switching the User Level.....................................................................................................................4-10
5 Configuration of the SSH Server and Client........................................................................5-1
5.1 Overview of SSH............................................................................................................................................ 5-2
5.2 Configuring the SSH Server............................................................................................................................5-3
5.2.1 Establishing the Configuration Task......................................................................................................5-3
5.2.2 Enabling the STelnet Service.................................................................................................................5-4
5.2.3 Enabling the SFTP Service.................................................................................................................... 5-4
5.2.4 (Optional) Enabling the Later Version to Be Compatible with the Earlier Version..............................5-5
5.2.5 (Optional) Setting the Listening Port Number on the SSH Server........................................................ 5-5
5.2.6 (Optional) Enabling the S9300 to Send Trap Messages........................................................................ 5-6
5.2.7 (Optional) Setting the Interval for Updating the Key Pair.....................................................................5-65.2.8 Checking the Configuration...................................................................................................................5-7
5.3 Configuring the STelnet Client.......................................................................................................................5-7
5.3.1 Establishing the Configuration Task......................................................................................................5-8
5.3.2 Enabling the Initial Authentication on the STelnet Client.....................................................................5-8
5.3.3 Assigning the RSA Public Key to the SSH Server by the STelnet Client.............................................5-9
5.3.4 Checking the Configuration.................................................................................................................5-10
5.4 Configuring the SFTP Client.........................................................................................................................5-10
5.4.1 Establishing the Configuration Task....................................................................................................5-10
5.4.2 Enabling the Initial Authentication on the SFTP Client......................................................................5-12
5.4.3 Assigning the RSA Public Key to the SSH Server by the SFTP Client...............................................5-12
Contents
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration
iv Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-01-08)
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
7/182
5.4.4 (Optional) Managing Directories.........................................................................................................5-13
5.4.5 (Optional) Managing Files...................................................................................................................5-13
5.4.6 (Optional) Displaying Command Help on the SFTP Client................................................................5-14
5.4.7 Checking the Configuration.................................................................................................................5-15
5.5 Maintaining SSH...........................................................................................................................................5-15
5.5.1 Debugging the SSH Terminal Service.................................................................................................5-15
5.6 ConfigurationExamples................................................................................................................................5-16
5.6.1 Examplefor Configuring the SSH Server to Support the Access from Another Port.........................5-16
5.6.2 Examplefor Connecting the STelnet Client and the SSH Server........................................................5-22
5.6.3 Example for Connecting the SFTP Clinet and the SSH Server...........................................................5-29
6 Configuration of the FTP Server and Client.........................................................................6-1
6.1 Overview of FTP.............................................................................................................................................6-2
6.2 Configuring the S9300 as the FTP Server.......................................................................................................6-2
6.2.1 Establishing the Configuration Task......................................................................................................6-2
6.2.2 Enabling the FTP Server........................................................................................................................6-3
6.2.3 (Optional) Setting the Timeout Interval for Disconnecting the FTP Server and the Client...................6-3
6.2.4 Setting the Local User Name and Password..........................................................................................6-3
6.2.5 Setting the Type of the Service and Directory for the FTP Login User.................................................6-4
6.2.6 Checking the Configuration...................................................................................................................6-4
6.3 Configuring the S9300 as the FTP Client.......................................................................................................6-5
6.3.1 Establishing the Configuration Task......................................................................................................6-5
6.3.2 LoggingIn to the FTP Server.................................................................................................................6-6
6.3.3 Setting the Type and Mode for Transmitting Files................................................................................6-66.3.4 Displaying the Online Help About FTP Commands..............................................................................6-7
6.3.5 Uploading or Downloading Files...........................................................................................................6-7
6.3.6 Managing Directories.............................................................................................................................6-8
6.3.7 Managing Files.......................................................................................................................................6-8
6.3.8 Changing the Login User.......................................................................................................................6-9
6.3.9 Ending an FTP Connection....................................................................................................................6-9
6.3.10 Checking the Configuration...............................................................................................................6-10
6.4 Maintaining FTP...........................................................................................................................................6-10
6.4.1 Debugging the FTP Server...................................................................................................................6-10
6.5 ConfigurationExamples................................................................................................................................6-11
6.5.1 Examplefor Configuring the FTP Server............................................................................................6-11
6.5.2 Example for Configuring the FTP Client.............................................................................................6-13
6.5.3 Example for Configuring an ACL of the FTP Server..........................................................................6-15
7 File System Management..........................................................................................................7-1
7.1 Overview of the File System...........................................................................................................................7-2
7.1.1 Basic Concepts of the File System.........................................................................................................7-2
7.1.2 Storage Device.......................................................................................................................................7-2
7.1.3 File..........................................................................................................................................................7-2
7.1.4 Directory.................................................................................................................................................7-2
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration Contents
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
v
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
8/182
7.2 Managing a Storage Device............................................................................................................................ 7-2
7.2.1 Establishing the Configuration Task......................................................................................................7-2
7.2.2 (Optional) Formatting a Storage Device................................................................................................7-3
7.3 Managing a File...............................................................................................................................................7-3
7.3.1 Establishing the Configuration Task......................................................................................................7-4
7.3.2 (Optional) Displaying the Status of the File System..............................................................................7-4
7.3.3 (Optional) Changing the Prompt Mode of the File System................................................................... 7-5
7.3.4 (Optional) Displaying the Contents of a File.........................................................................................7-5
7.3.5 (Optional) Copying a File...................................................................................................................... 7-5
7.3.6 (Optional) Moving a File........................................................................................................................7-6
7.3.7 (Optional) Renaming a File....................................................................................................................7-6
7.3.8 (Optional) Deleting a File...................................................................................................................... 7-6
7.3.9 (Optional) Deleting a File from the Recycle Bin...................................................................................7-7
7.3.10 (Optional) Restoring a Deleted File.....................................................................................................7-7
7.3.11 (Optional) Executing a Batch File........................................................................................................7-7
7.4 Managing a Directory......................................................................................................................................7-8
7.4.1 Establishing the Configuration Task......................................................................................................7-8
7.4.2 (Optional) Displaying the Current Working Directory..........................................................................7-9
7.4.3 (Optional) Creating a Directory............................................................................................................. 7-9
7.4.4 (Optional) Deleting a Directory............................................................................................................. 7-9
7.4.5 (Optional) Changing the Working Directory.........................................................................................7-9
7.5 Maintaining the File System.........................................................................................................................7-10
7.6 Configuration Examples................................................................................................................................7-107.6.1 Examplefor Copying Files..................................................................................................................7-10
8 Management of Configuration Files......................................................................................8-1
8.1 Overview of the Configuration File................................................................................................................8-2
8.1.1 Configuration File..................................................................................................................................8-2
8.1.2 Current Configurations...........................................................................................................................8-2
8.2 Displaying the Current Configurations and the Configurations Saved to a Configuration File..................... 8-2
8.2.1 Displaying All Current Configurations..................................................................................................8-3
8.2.2 Displaying the Current Configurations in the Current View................................................................. 8-3
8.2.3 Displaying the Configurations Saved in a Configuration File...............................................................8-38.2.4 Displaying the System Software Used in the Startup of the S9300.......................................................8-4
8.3 Saving the Current Configurations..................................................................................................................8-4
8.4 Deleting a Configuration File..........................................................................................................................8-5
8.5 Loading a Configuration File..........................................................................................................................8-5
8.6 Comparing the Current Configurations with the Configuration File..............................................................8-6
Contents
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration
vi Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-01-08)
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
9/182
Figures
Figure 2-1Networking diagram of the S9300 acting as the Telnet server...........................................................2-5
Figure 2-2Networking diagram of the S9300 acting as the Telnet client............................................................2-6
Figure 2-3Networking diagram of the S9300 acting as the cascading Telnet server..........................................2-6
Figure 2-4Numbering of user interfaces on the S9300.......................................................................................2-8
Figure 2-5Logging in to the S9300 through the console interface....................................................................2-10
Figure 2-6Setting up a new connection.............................................................................................................2-11
Figure 2-7Setting the connection port...............................................................................................................2-12
Figure 2-8Setting communication parameters for the port................................................................................2-13
Figure 2-9Selecting a terminal type..................................................................................................................2-14
Figure 2-10Logging in to the locally through Telnet.................................................................. .....................2-25
Figure 2-11Logging in to the S9300 remotely through Telnet.........................................................................2-28
Figure 2-12Establishing a local SSH connection between the PC and the S9300............................................2-36
Figure 2-13Setting up an FTP connection between the PC and the S9300.......................................................2-39
Figure 2-14Setting up a connection between the S9300 and the TFTP server.................................................2-41Figure 2-15Networking diagram of the remote login of the Ethernet user.......................................................2-49
Figure 2-16Networking diagram for configuring TFTP...................................................................................2-52
Figure 3-1Hierarchical structure of command views..........................................................................................3-2
Figure 3-2Authority of users at four levels.........................................................................................................3-8
Figure 5-1Establishing a local SSH connection between the PC and the S9300................................................5-2
Figure 5-2Networking diagram for configuring the SSH server to support the access from another port.......5-17
Figure 5-3Networking diagram of connecting the STelnet client and the SSH server.....................................5-23
Figure 5-4Networking diagram for connecting the SFTP client and the SSH server.......................................5-29
Figure 6-1Networking diagram of the S9300 functioning as the FTP server...................................................6-11
Figure 6-2Networking diagram of the S9300 functioning as the FTP client....................................................6-13
Figure 6-3Networking diagram for configuring an ACL of the FTP server.....................................................6-15
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration Figures
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
vii
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
10/182
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
11/182
Tables
Table 1-1Description of management interfaces.................................................................................................1-2
Table 1-2Numbers of management interfaces.....................................................................................................1-2
Table 1-3Rules for numbering service interfaces................................................................................................1-3
Table 2-1User login modes..................................................................................................................................2-3
Table 2-2Types of user interfaces....................................................................................................................... 2-7
Table 2-3Types of login users.............................................................................................................................2-8
Table 2-4Authentication modes of login users..................................................................................................2-10
Table 2-5Communication parameters...............................................................................................................2-13
Table 3-1Types of command views.....................................................................................................................3-3
Table 3-2Levels of login users............................................................................................................................ 3-8
Table 3-3Matching relations of error messages and error causes......................................................................3-10
Table 3-4Accessing history commands.............................................................................................................3-12
Table 3-5System hotkeys...................................................................................................................................3-13
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration Tables
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
ix
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
12/182
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
13/182
About This Document
Purpose
This document describes features of theS9300 based on configuration procedures and examples.
This document covers the following topics:l Feature description
l Data preparation
l Pre-configuration tasks
l Configuration procedures
l Checking the configuration
l Configuration examples
This document guides you through the configuration and the applicable environment of basic
features of the S9300.
Related Versions
The following table lists the product versions related to this document.
Product Name Version
S9300 V100R002C00
Intended Audience
This document is intended for:
l Policy planning engineers
l Installation and commissioning engineers
l NM configuration engineers
l Technical support engineers
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration About This Document
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
14/182
Organization
This document is organized as follows.
Chapter Description
1 How to Use Interfaces Describes how to use the interface of the device.
2 User Login Management Describes user interface management and user login.
3 How to Use Command
Lines
Describes how to use command lines.
4 Common Operations and
Configurations
Describes common operations and configurations.
5 Configuration of the SSH
Server and Client
Describes how to configure the SSH server and client and
provides examples.
6 Configuration of the FTP
Server and Client
Describes how to configure the FTP server and client and
provides examples.
7 File System Management Describes the basic knowledge about the file system,
including the methods of managing files, directories, and
storage devices.
8 Management of
Configuration Files
Describes how to view, save, and load configuration files.
Conventions
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
DANGER
Indicates a hazard with a high level of risk, which if notavoided, will result in death or serious injury.
WARNING
Indicates a hazard with a medium or low level of risk, which
if not avoided, could result in minor or moderate injury.
CAUTION
Indicates a potentially hazardous situation, which if not
avoided, could result in equipment damage, data loss,
performance degradation, or unexpected results.
TIP Indicates a tip that may help you solve a problem or save
time.
About This Document
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration
2 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-01-08)
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
15/182
Symbol Description
NOTE Provides additional information to emphasize or supplement
important points of the main text.
General Conventions
The general conventions that may be found in this document are defined as follows.
Convention Description
Times New Roman Normal paragraphs are in Times New Roman.
Boldface Names of files, directories, folders, and users are in
boldface. For example, log in as user root.
Italic Book titles are in italics.
Courier New Examples of information displayed on the screen are in
Courier New.
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
Boldface The keywords of a command line are in boldface.
Italic Command arguments are in italics.
[ ] Items (keywords or arguments) in brackets [ ] are optional.
{ x | y | ... } Optional items are grouped in braces and separated by
vertical bars. One item is selected.
[ x | y | ... ] Optional items are grouped in brackets and separated by
vertical bars. One item is selected or no item is selected.
{ x | y | ... }* Optional items are grouped in braces and separated by
vertical bars. A minimum of one item or a maximum of all
items can be selected.
[ x | y | ... ]* Optional items are grouped in brackets and separated by
vertical bars. Several items or no item can be selected.
& The parameter before the & sign can be repeated 1 to n times.
# A line starting with the # sign is comments.
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration About This Document
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
3
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
16/182
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Boldface Buttons, menus, parameters, tabs, window, and dialog titles
are in boldface. For example, click OK.
> Multi-level menus are in boldfaceand separated by the ">"
signs. For example, choose File> Create> Folder.
Keyboard Operations
The keyboard operations that may be found in this document are defined as follows.
Format Description
Key Press the key. For example, press Enterand press Tab.
Key 1+Key 2 Press the keys concurrently. For example, pressing Ctrl+Alt
+Ameans the three keys should be pressed concurrently.
Key 1, Key 2 Press the keys in turn. For example, pressing Alt, Ameans
the two keys should be pressed in turn.
Mouse Operations
The mouse operations that may be found in this document are defined as follows.
Action Description
Click Select and release the primary mouse button without moving
the pointer.
Double-click Press the primary mouse button twice continuously and
quickly without moving the pointer.
Drag Press and hold the primary mouse button and move the
pointer to a certain position.
Update History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
Updates in Issue 05 (2010-01-08)
Based on issue 04 (2009-11-10), the document is updated as follows:
About This Document
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration
4 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-01-08)
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
17/182
The following contents are updated:
l The descriptions about the user level and the command level are updated.
Updates in Issue 04 (2009-11-10)
Based on issue 03 (2009-09-30), the document is updated as follows:
The following contents are updated:
l Some names of reference document are updated.
Updates in Issue 03 (2009-09-30)
Based on issue 02 (2009-08-15), the document is updated as follows:
The following contents are deleted:
l 8.4 Deleting a Configuration File: The system supports hot swap.
Updates in Issue 02 (2009-08-15)
Based on issue 01 (2009-07-29), the document is updated as follows:
The following information is added:
Managing User Login: 2.12 Limiting the Access to the TFTP Server.
Updates in Issue 01 (2009-07-29)
Initial commercial release.
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration About This Document
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
5
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
18/182
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
19/182
1How to Use InterfacesAbout This Chapter
This chapter describes how to use interfaces of the device.
1.1 Introduction to Interfaces
This section describes the concepts of interfaces.
1.2 Setting Parameters of an Interface
This section describes how to set parameters of an interface.
1.3 Configuring the Loopback Interface
This section describes how to configure the loopback interface.
1.4 Maintaining the Interface
This section describes how to maintain the interface.
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration 1 How to Use Interfaces
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-1
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
20/182
1.1 Introduction to Interfaces
This section describes the concepts of interfaces.
The interfaces are provided by the S9300 to receive and send data.
Interfaces are classified into management interfaces and service interfaces based on their
functions; interfaces are classified into physical interfaces and logical interfaces based on their
physical forms.
NOTE
A physical interface is sometimes called a port. Both physical interfaces and logical interfaces are called
interfaces in this document.
Management Interface
Management interfaces are used for managing and configuring the device. That is, you can log
in to the S9300 through a management interface to configure and manage the S9300.
Management interfaces do not transmit services.
The S9300 provides the following management interfaces:
l Console interfaces
l Ethernet interfaces
Table 1-1Description of management interfaces
Name Usage
Console interface It is connected to the COM port of a configuration terminal and used
to set up a on-site configuration environment.
Ethernet interface The Ethernet interface is connected to the network interface of the
configuration terminal or the network management workstation. The
configuration environment thus can be established on site or remotely.
The S9300s provide three models: S9303, S9306, and S9312. Console and Ethernet interfacesare configured on the main control board.
The rules for numbering management interfaces are as follows:
Table 1-2Numbers of management interfaces
Name Number
Console interface It is a user interface that is numbered console 0.
Ethernet interface It is numbered Ethernet 0/0/0.
1 How to Use Interfaces
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration
1-2 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-01-08)
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
21/182
Classification of Service Interfaces
Service interfaces are used to transmit services. They are classified into 1-Gbit/s interfaces and
10-Gbit/s interfaces according to the rates of the interfaces; they are classified into electrical
interfaces and optical interfaces according to their electrical properties.
On the S9300, all the service interfaces are located on the Line Processing Units (LPUs).
The rules for numbering service interfaces are as follows:
The interfaces of the S9300 are numbered in the rule of slot number/sub-card number/interface
sequence number.
l Slot number: indicates the number of the slot where the LPU is located.
l Sub-card number: indicates the number of a sub-card. The value is 0 or 1.
l Interface sequence number: indicates the sequence numbers of the interfaces that are
located on an LPU.
Table 1-3Rules for numbering service interfaces
RowNo. oftheInterface
Figure Showing Interface Numbering Description
1 0 1 2...
An LPU has two rows of
interfaces, which are numbered
from top to bottom and then from
left to right. The leftmost interfacein the upper row is numbered 0.
20
1
2
3
4
5
...
...
...
The LPU has two rows of
interfaces with the upper-left
interface numbered 0. The other
interfaces are numbered in
ascending order from up to bottom,
and then from left to right.
For example:
If an LPU is installed in slot 3 of the S9300, the fifth interface on the LPU from bottom to up
and from left to right is numbered GE 3/0/4.
Physical Interfaces
Physical interfaces exist on the S9300.
Physical interfaces include management interfaces and service interfaces.
The S9300 supports the following physical interfaces:
l Console interfaces
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration 1 How to Use Interfaces
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-3
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
22/182
l Eth interface
l Fast Ethernet interfaces
l Gigabit Ethernet interfaces
l
10-Gigabit Ethernet interfaces
Physical interfaces are located on the main control board and LPU of the S9300.
Logical Interfaces
Logical interfaces do not exist and are set up through configurations.
The S9300 supports the following logical interfaces:
l Eth-Trunks
An Eth-Trunk comprises only Ethernet links.
The Eth-Trunk technology has the following advantages:
Increased bandwidth: The bandwidth of an Eth-Trunk is the total bandwidth of all
member interfaces.
Improved reliability: When a link fails, traffic is automatically switched to other
available links. This ensures the reliability of the connection.
For details about the configuration, see the chapter "Configuring the Eth-Trunk" in the
Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet.
l Loopback interfaces
A loopback interface is a virtual interface. The TCP/IP protocol suite defines that the IP
address 127.0.0.0 is a loopback address. When the system starts, it automatically creates
an interface using the loopback address 127.0.0.1 to receive all data packets sent to the
local host. Some applications such as mutual access between Virtual Private Networks
(VPNs), however, need to be configured with a local interface with a specified IP address
when the configuration of a physical interface is not affected. In this case, the IP address
of the local interface is 32-bit mask, which saves IP addresses; the IP address can be
advertised by routing protocols.
The status of the loopback interface is always Up; therefore, the IP address of the loopback
interface can be used as the router ID, the label switching router (LSR) ID, or the tunnel.
For details, see 1.3 Configuring the Loopback Interface.
l Null interfaces
Null interfaces are similar to null devices supported by certain operating systems. Any data
packets sent to this interface are discarded. Null interfaces are mainly used for routeselection and policy-based routing (PBR). For example, if no route is matched during route
selection, the packet is sent to the null interface.
l Tunnel interfaces
A tunnel interface is a logical interface. It can be used as the backup interface of other
interfaces and used to set up Generic Routing Encapsulation (GRE) tunnels or
Multiprotocol Label Switching (MPLS) Traffic Engineering (TE) tunnels.
For details about the configuration, see the chapter "Configuring the Tunnel Interface" in
the Quidway S9300 Terabit Routing Switch Configuration Guide - VPN.
l sub-interface
The sub-interface supports multiple logical interfaces or network interconnections on aphysical port. That is, several logical interfaces are associated with a physical port and use
1 How to Use Interfaces
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration
1-4 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-01-08)
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
23/182
the same parameter values. The link-layer parameters and network-layer parameters of the
logical interfaces are different.For the configuration of sub-interfaces, see "Configuring the
sub-interface" in the Quidway S9300 Terabit Routing Switch Configuration Guide -
Ethernet.
l VLANIF interfacesWhen the S9300 needs to communicate with devices at the network layer, you can create
a logical interface of the Virtual Local Area Network (VLAN) on the S9300, namely, a
VLANIF interface. You can assign IP addresses to VLANIF interfaces because VLANIF
interfaces work at the network layer. The S9300 then communicates with devices at the
network layer through VLANIF interfaces.
For details about the configuration, see the chapter "Configuring the VLANIF Interface"
in the Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet.
1.2 Setting Parameters of an Interface
This section describes how to set parameters of an interface.
1.2.1 Establishing the Configuration Task
1.2.2 Entering the Interface View
1.2.3 Viewing All Commands in the Interface View
1.2.4 Configuring the Description for an Interface
1.2.5 Startingand Shutting Down an Interface
1.2.6 Exiting from the Interface View
1.2.7 Assigning an IP Address to an Interface
1.2.8 Further Configuration an Interface
1.2.9 Checking the Configuration
1.2.1 Establishing the Configuration Task
Applicable Environment
To facilitate the configuration and maintenance of an interface, the S9300 provides interface
views. The commands related to the interface are valid only in the interface views.
Pre-configuration Tasks
Before setting parameters of an interface, complete the following task:
Installing the LPU on the S9300
Data Preparation
To set parameters of an interface, you need the following data.
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration 1 How to Use Interfaces
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-5
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
24/182
No. Data
1 Type and number of the interface to be configured
2 Description of the interface
1.2.2 Entering the Interface View
Context
Do as follows on the S9300.
Procedure
Step 1 Run:system-view
The system view is displayed.
Step 2 Run:interfaceinterface-type interface-number
The view of a specified interface is displayed.
interface-typespecifies the type of the interface and interface-numberspecifies the number of
the interface.
----End
1.2.3 Viewing All Commands in the Interface View
Context
Do as follows on the S9300.
Procedure
Step 1 Run:system-view
The system view is displayed.
Step 2 Run:interfaceinterface-typeinterface number
The view of a specified interface is displayed.
Step 3 Run:?
All the commands in the view of the specified interface are displayed.
----End
1 How to Use Interfaces
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration
1-6 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-01-08)
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
25/182
1.2.4 Configuring the Description for an Interface
Context
Do as follows on the S9300.
Procedure
Step 1 Run:
system-view
The system view is displayed.
Step 2 Run:
interfaceinterface-type interface-number
The view of a specified interface is displayed.
Step 3 Run:
descriptiondescription
The description is configured for the interface.
The description configured for an interface on the S9300 helps you identify and memorize the
usage of the interface, which facilitates the management.
----End
1.2.5 Starting and Shutting Down an Interface
Procedure
l Shutting down the interface
Do as follows on the S9300.
1. Run:
system-view
The system view is displayed.
2. Run:
interfaceinterface-type interface-number
The view of a specified interface is displayed.
3. Run:
shutdown
The interface is shut down.
NOTE
By default, an interface is enabled.
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration 1 How to Use Interfaces
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-7
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
26/182
CAUTION
When a physical interface is idle and is not connected to a cable, shut down this interface
by using the shutdowncommand to protect the interface against interference.
l Starting an interface
Do as follows on the S9300.
1. Run:
system-view
The system view is displayed.
2. Run:
interfaceinterface-type interface-number
The view of a specified interface is displayed.
3. Run:
undo shutdown
The interface is started.
----End
1.2.6 Exiting from the Interface View
ContextDo as follows on the S9300.
Procedure
l Run the quitcommand in the interface view to exit form the interface view.
l Run the returncommand in the interface view to return the user view from the interface
view.
----End
1.2.7 Assigning an IP Address to an Interface
Context
You need to assign IP addresses to the following interfaces on the S9300:
l Ethernet interfaces on the main control board
The interfaces work at the network layer, and do not need to be assigned with IP addresses
through VLANIF interfaces.
l VLANIF interfaces
You can assign IP addresses to the VLANIF interfaces that are bound to Layer 2 physicalinterfaces.
1 How to Use Interfaces
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration
1-8 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-01-08)
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
27/182
Procedure
l Assigning an IP address to the Ethernet interface
Do as follows on the S9300.
1. Run:system-view
The system view is displayed.
2. Run:
interface Ethernet 0/0/0
The interface view is displayed.
3. Run:
ip addressip-address { mask| mask-length}
An IP address is assigned to the Ethernet interface.
l Assigning an IP address to the VLANIF interface
Do as follows on the S9300.
1. Run:
system-view
The system view is displayed.
2. Run:
vlanvlan-id
The VLAN view is displayed.
3. Run:
port gigabitethernetinterface-number
The Layer 2 GE interface is added to the VLAN.
4. Run:
quit
Return to the system view.
5. Run:
interface vlanifvlan-id
The VLANIF interface view is displayed.
6. Run:
ip address ip-address { mask| mask-length}
An IP address is assigned to the interface.
----End
1.2.8 Further Configuration an Interface
Context
When you access a network through an interface, you need to further setting multiple parameters
of the interface based on the networking requirements in addition to performing basicconfigurations on the interface.
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration 1 How to Use Interfaces
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-9
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
28/182
Further configurations of an interface include:
l Configuring the operation mode of an interface
l Configuring routes
For the detailed Configuration, please see the other configuration manuals of S9300.
1.2.9 Checking the Configuration
Prerequisite
The configurations of parameters on the interface are complete.
Procedure
Step 1 Run the displayinterface[ interface-type[ interface-number] ] [ | { begin| exclude|
include} regular-expression] command to check the running status of the interface and thestatistics on the interface.
Step 2 Run the displayinterface briefcommand to check the brief information about the interface
Step 3 Run the display interface descriptioncommand to check the description of the interface.
Step 4 Run the display ip interface[ interface-typeinterface-number] commandto check the mainconfigurations of the interface.
Step 5 Run the display ip interface brief[ interface-typeinterface-number] command to check thebrief state of the interface.
----End
1.3 Configuring the Loopback Interface
This section describes how to configure the loopback interface.
1.3.1 Establishing the Configuration Task
1.3.2 Configuring IPv4 Parameters of the Loopback Interface
1.3.3 Checking the Configuration
1.3.1 Establishing the Configuration Task
Applicable Environment
Some applications such as mutual access between VPNs need to be configured with a local
interface with a specified IP address when the configuration of a physical interface is not affected.
In this case, the IP address of the local interface needs to be advertised by routing protocols.
Loopback interfaces are used to improve the reliability of the configuration.
Pre-configuration Tasks
Before configuring the loopback interface, complete the following task:
1 How to Use Interfaces
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration
1-10 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-01-08)
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
29/182
l Switching on the S9300
Data Preparation
To configure the loopback interface, you need the following data.
No. Data
1 Number of the loopback interface
2 IP address of the loopback interface
1.3.2 Configuring IPv4 Parameters of the Loopback Interface
Context
Do as follows on the S9300.
Procedure
Step 1 Run:system-view
The system view is displayed.
Step 2 Run:interfaceloopbackinterface-number
A loopback interface is created.
The value of interface-numberranges from 0 to 1023. A maximum of 1024 loopback interfaces
can be created.
Step 3 (Optional) Run:ipbindingvpn-instancevpn-instance-name
The loopback interface is bound to the VPN instance.
Step 4 Run:ipaddressip-addressip-address-mask[ sub]
An IPv4 address is assigned to the loopback interface.
Step 5 Run:ipverifysource-address
The loopback interface is configured to check the source IPv4 address.
NOTE
You can create or delete a loopback interface. When being created, the loopback interface remains in the
Up state until you delete it.
----End
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration 1 How to Use Interfaces
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-11
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
30/182
1.3.3 Checking the Configuration
Prerequisite
The configurations of the loopback interface are complete.
Procedure
Step 1 Run the display interface loopback [ loopback-number] [ | { begin| exclude| include}regular-expression] command to check the status of the loopback interface.
Step 2 Run the display ip interface[ interface-typeinterface-number] command to check the mainconfigurations of the interface.
----End
1.4 Maintaining the Interface
This section describes how to maintain the interface.
1.4.1 Clearing Statistics Information on the Interface
1.4.2 Debugging the Interface
1.4.1 Clearing Statistics Information on the Interface
Context
CAUTION
The statistics on the interface cannot be restored after you clear them. So, confirm the action
before you use the command.
Procedure
Step 1 Run the resetcountersinterface[ interface-type[ interface-number] ] command in the userview to clear the statistics on the interface.
----End
1.4.2 Debugging the Interface
1 How to Use Interfaces
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration
1-12 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-01-08)
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
31/182
Context
CAUTION
Debugging affects the performance of the system. So, after debugging, run the undo debugging
allcommand to disable it immediately.
For the description about debugging commands, see the Quidway S9300 Terabit Routing
Switch Debugging Reference.
For details about debugging commands on the interface, see the following chapters.
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration 1 How to Use Interfaces
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-13
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
32/182
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
33/182
2User Login ManagementAbout This Chapter
This chapter describes how to log in to the S9300 and configure the user interface.
2.1 Overview of User Login
This section describes the modes of user login and application scenarios.
2.2 Logging In to the S9300 Through the Console Interface
This section describes how to log in to the S9300 through the console interface.
2.3 Configuring the Console Interface as the User Interface
This section describes how to configure the console interface as the user interface.
2.4 Configuring the Telnet Interface
This section describes how to configure the Telnet interface.
2.5 Logging In to the S9300 Locally Through Telnet
This section describes how to log in to the S9300 locally through Telnet.
2.6 Logging In to the S9300 Remotely Through Telnet
This section describes how to log in to the S9300 remotely through Telnet.
2.7 Configuring the SSH Interface
This section describes how to configure the SSH interface.
2.8 Logging In to the S9300 Through SSH
This section describes how to log in to the S9300 through SSH.
2.9 Configuring the FTP Interface
This section describes how to configure the FTP interface.
2.10 Logging In to the S9300 Through FTP
This section describes how to log in to the S9300 through FTP.
2.11 S9300 Logging In to the TFTP Service Through TFTP
This section describes how S9300 logs in to the TFTP service through TFTP.
2.12 Limiting the Access to the TFTP Server
This section describes how to limit the access to the client to log in to the TFTP server.
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration 2 User Login Management
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2-1
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
34/182
2.13 Logging In to the S9300 Through SFTP
This section describes how to log in to the S9300 through SFTP.
2.14 Logging In to the S9300 Through STelnet
This section describes how to log in to the S9300 through STelnet.
2.15 Configuring the NMS User to Log In to the S9300 Through the VTY Interface
This section describes how to configure the NMS user to log in to the S9300 through the VTY
interface.
2.16 Maintaining Telnet
This section describes how to maintain Telnet.
2.17 Configuration Examples
This section provides several configuration examples of Telnet.
2 User Login Management
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration
2-2 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-01-08)
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
35/182
2.1 Overview of User Login
This section describes the modes of user login and application scenarios.
2.1.1 User Login Modes
2.1.2 User Interface
2.1.3 User Authentication
2.1.1 User Login Modes
To configure, monitor, and maintain the local or remote S9300, you need to log in to the
S9300 to configure:
l User interface where users can control the S9300
l Authentication mode that ensures the secure login
l Terminal services that provide various protocols
NOTE
You must log in to the S9300 from the console interface for the first time.
The S9300 supports the following login modes:
l Login from the console interface
l Login through Telnet
l Login through SSH
l Login through STelnet
l Login through SFTP
l Login through FTP
l Login through TFTP
For details, see Table 2-1.
Table 2-1User login modes
LoginMode
Applicable Scenario User Type Description
2.2
Logging
In to the
S9300
Through
the
Console
Interface
l Logging in to the
S9300 for the first time
l Local maintenance
2.3 Configuring the
Console Interface as
the User Interface
You must log in to the
S9300 for the first time.
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration 2 User Login Management
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2-3
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
36/182
LoginMode
Applicable Scenario User Type Description
2.5
Logging
In to the
S9300
Locally
Through
Telnet
Logging in to the S9300
locally and remotely
2.4 Configuring the
Telnet Interface
You can log in to the
S9300 from any host.
You can configure
Telnet users and Telnet
terminal services on the
S9300 that functions as
the Telnet server.
2.8
Logging
In to the
S9300
Through
SSH
Providing local and
remote login with high
security
2.7 Configuring the
SSH Interface
You need to use the SSH
client software when
you log in to the route
switching devices such
as the S9300 from the
host.You can configure
Secure Shell (SSH)
users on the S9300 that
functions as the server.
2.10
Logging
In to the
S9300
Through
FTP
Providing flexible and
reliable file transfer
channels
2.9 Configuring the
FTP Interface
You need to enable the
File Transfer Protocol
(FTP) function and
configure FTP users on
the S9300 that functions
as the FTP server.
2.11
S9300
Logging
In to the
TFTP
Service
Through
TFTP
Providing simple file
transfer channels
Trivial File Transfer
Protocol (TFTP) users
You do not need to
configure the user
interface.
The S9300 acts as only a
TFTP client.
2.13
Logging
In to the
S9300
Through
SFTP
Providing file transfer
channels with SSH as the
authentication mode
2.7 Configuring the
SSH Interface
You need to adopt the
authentication mode of
SSH users, without
using the SSH client
software.
You must log in to the
SSH server through this
mode on the device that
is configured with 5.4
Configuring the SFTP
Client.
2 User Login Management
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration
2-4 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-01-08)
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
37/182
LoginMode
Applicable Scenario User Type Description
2.14
Logging
In to the
S9300
Through
STelnet
Login through Telnet
with SSH as the
authentication mode
2.7 Configuring the
SSH Interface
You need to adopt the
authentication mode of
SSH users, without
using the SSH client
software.
You must log in to the
SSH server through this
mode on the device that
is configured with 5.3
Configuring the
STelnet Client.
You need to manage users and control user authority properly and ensure the security of the
information transmitted.
Telnet Terminal Services
The Telnet protocol is an application layer protocol in the TCP/IP protocol suite. It supports
remote login and virtual terminal services through the TCP connection. The S9300 provides the
following Telnet services.
l Telnet server
By default, the S9300 functions as the Telnet server. The Telnet client program runs on theuser terminal.
Figure 2-1Networking diagram of the S9300 acting as the Telnet server
PC
Telnet
ClientTelnet
Server
S9300
Telnet Session
VLAN1
Ethernet EthernetL2 Switch
You can log in to the S9300 on the PC through Telnet to configure and manage the
S9300. A reachable route must exist between the PC and the S9300.
NOTE
To configure the remote S9300, you must set the attributes of the Telnet terminal service, including:
l Character entry mode
l No echo at the local end
l Terminal type of VT100
Telnetworks normally only when the attributes of the client and server are the same.
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration 2 User Login Management
Issue 05 (2010-01-08) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2-5
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
38/182
l Telnet client
The S9300 functions as the Telnet client to initiate a connection, and a router or an
application server functions as the Telnet server, as shown in Figure 2-2.
Figure 2-2Networking diagram of the S9300 acting as the Telnet client
IP network
S9300
Telnet
Client
Router
TelnetServer
Server
Telnet Sess ion1TelnetServer
Telnet Sess ion2
Ethernet
The S9300 logs in to the router or the application server through Telnet to perform
configuration and management. A route be reachable must exist between the S9300 and
the router or the application server.
l Cascading Telnet server
As shown in Figure 2-3, the S9300 can function as both the client and the server.
Figure 2-3Networking diagram of the S9300 acting as the cascading Telnet server
TelnetClient TelnetServer
S9300-CS9300-A S9300-BEthernet
Telnet Session2
VLAN1 VLAN2
Ethernet
Telnet Session1
S9300-A logs in to S9300-B through Telnet. Then, S9300-B logs in to S9300-C through
Telnet. In this manner, the three S9300s form a cascading login structure. In this case,
S9300-A functions as the client of S9300-B and S9300-B functions as the client of
S9300-C.
It is required that routes be reachable between S9300-A, S9300-B, and S9300-C.
TFTP
Compared with FTP, TFTP is based on UDP. It excludes the interfaces for complicated
interactions or access and authentication control. Thus, TFTP is applicable to the environment
without complicated interactions between a client and a server. For example, you can obtain
memory mapping of the system through TFTP when the system is started.
The client initiates the TFTP transfer. To download files, the client sends a Write Request (WRQ)to the server. The server then sends data packets to the client. After receiving the data packets,
2 User Login Management
Quidway S9300 Terabit Routing Switch
Configuration Guide - Basic Configuration
2-6 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 05 (2010-01-08)
-
7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf
39/182
the client sends an ACK packet to the server. To upload files, the client sends a Read Request
(RRQ) to the server. After the server receives the request, the client sends a data packet to the
server and waits for an ACK packet from the server.
TFTP supports the following file types:
l Binary type: is used to transfer program files.
l ASCII type: is used to transfer text files.
NOTE
Cur