Huawei V200R001 Users Manual Configuration Guide Volume 3
V200R001 to the manual fb3dc65b-19d6-4639-a606-60815db547e8
2015-01-24
: Huawei Huawei-V200R001-Users-Manual-316571 huawei-v200r001-users-manual-316571 huawei pdf
Open the PDF directly: View PDF
.
Page Count: 258
| Download | |
| Open PDF In Browser | View PDF |
HUAWEI® 6. Security Configuration 7. VPN Configuration 8. Reliability Configuration 9. QoS Configuration 10. DDR Configuration 11. VoIP Configuration VRP User Manual – Configuration Guide Volume 3 V200R001 VRP User Manual – Configuration Guide Volume 3 Manual Version T2-080168-20011213-C-1.5 Product Version V200R001 BOM 31010868 Copyright © 2001 by Huawei Technologies Co., Ltd. All Rights Reserved No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks ® , HUAWEI®, C&C08, EAST8000, HONET, ViewPoint, INtess, ETS, DMC, SBS, TELLIN, InfoLink, Netkey, Quidway, SYNLOCK, Radium, , M900/M1800, TELESIGHT, Quidview, NETENGINE, Musa, OptiX, Airbridge, Tellwin, Inmedia, VRP, DOPRA, iTELLIN are trademarks of Huawei Technologies Co., Ltd. Notice The information in this document is subject to change without notice. Although every effort has been made to make this document as accurate, complete, and clear as possible, Huawei Technologies assumes no responsibility for any errors that may appear in this document. Huawei Technologies Co., Ltd. Address: Huawei Customer Service Building, Kefa Road, Science-based Industrial Park, Shenzhen, P. R. China Zip code: 518057 Tel: +86-755-6540036 Fax: +86-755-6540035 Website: http://www.huawei.com E-mail: support@huawei.com About This Manual Contents To help readers to better understand, use and maintain Quidway series routers, we publish the manual suit of Quidway series routers. This manual suit includes: VRP User Manual Configuration Guide (V1.5) -Volume 1 VRP User Manual Configuration Guide (V1.5) -Volume 2 VRP User Manual Configuration Guide (V1.5) -Volume 3 VRP User Manual Command Reference (V1.5) -Volume 1 VRP User Manual Command Reference (V1.5) -Volume 2 VRP User Manual Command Reference (V1.5) -Volume 3 Quidway R1602 Router Installation Manual Quidway R1603/1604 Routers Installation Manual Quidway R2501 Router Installation Manual Quidway R2501E Router Installation Manual Quidway R2509/2511 Routers Installation Manual Quidway R2509E/2511E Routers Installation Manual Quidway R4001 Router Installation Manual Quidway R4001E Router Installation Manual Quidway R26/36 Modular Router Installation Manual Among the manual suit, the first two manuals are applicable to all routers, and the other installation manuals are separately used for their own types of routers. In VRP User Manual follows: Configuration Guide (V1.5) -Volume 3, the modules are arranged as Module 6 Security Configuration (06SC) This module mainly introduces the principle and basic specific configuration of security features provided by VRP1.5, including AAA configuration, Radius protocol configuration, terminal access security configuration, firewall and packet filtering configuration, IPSec protocol configuration and IKE protocol configuration. Module 7 VPN Configuration (07VPN) This module mainly introduces the principle and specific configuration of VPN solutions provided by VRP1.5, including configuration of L2TP protocol and GRE protocol. Module 8 Reliability Configuration (08LC) This module mainly introduces the principle and specific configuration of backup center and HSRP protocol. Module 9 QoS Configuration (09QC) This module mainly introduces the principle and specific configuration of QoS service features supported by VRP1.5, including configuration of congestion management, priorityqueue and custom-queue. Module 10 DDR Configuration (10DC) This module mainly introduces the principle and specific configuration of dial solutions provided by VRP1.5, including Legacy DDR configuration, Dialer Profile configuration and modem management configuration. Module 11 VoIP Configuration (11VC) This module mainly introduces the principle and specific configuration of IP voice service features supported by VRP1.5, including configuration of VoIP, IP Fax, E1 voice, GK client and IPHC. Note: For questions regarding the product specifications, please confirm with the concerned personnel in Huawei's Enterprise Network Section as the software specifications are varied with the product of different type. Target Readers The manual is intended for the following readers: Network engineers Technical assistance engineers Network administrators Conventions Used in the Document Keyboard operation Format DescriptionPress the key with key name expressed with a pointed bracket, e.g. , , , or . Press the keys concurrently; e.g. means the three keys should be pressed concurrently. Press the keys in turn, e.g. means the two keys should be pressed in turn. [Menu Option] The item with a square bracket indicates the menu option, e.g. [System] option on the main menu. The item with a pointed bracket indicates the functional button option, e.g. button on some interface. [Menu 1/Menu 2/Menu 3] Multi-level menu options, e.g. [System/Option/Color setup] on the main menu indicates [Color Setup] on the menu option of [Option], which is on the menu option of [System]. Mouse operation Action Description Click Press the left button or right button quickly (left button by default). Double Click Press the left button twice continuously and quickly. Drag Press and hold the left button and drag it to a certain position. Symbol Some distinct symbols are employed in the manual to indicate the special notice that should be taken for the operation. The symbols are: Caution, Notice, Warning, Danger: Notify the special attention that should be given to the operation. Note, Prompt, Tip, Thought: Give further necessary supplement or explanation for the operation description. HUAWEI® VRP User Manual – Configuration Guide Volume 3 06 – Security Configuration (SC) Chapter 5 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of IKE Chapter 5 Configuration of IKE 5.1 Brief Introduction to IKE Protocol I. IKE IKE, an Internet key exchange protocol, implements hybrid protocol of both Oakley and SKEME key exchanges in ISAKMP network. This protocol defines standards for automatically authenticating IPSec peer end, negotiating security service and generating shared key, and provide services such as automatic key exchange negotiation and security association creation, thus simplifying the use and management of IPSec. IKE has a set of self-protection mechanism, which enables to securely deliver keys, authenticate ID and establish IPSec secure association in insecure network. IKE uses ISAKMP at two stages: z z The first stage is to negotiate to create a communication channel and authenticate it, as well as to provide confidentiality, message integrity and message source authentication services for further IKE communication between both parties. The second stage is to use the created IKE SA to create IPSec SA. The following figure shows the relationship between IKE and IPSec. SA negotiation IKE IKE Router B Router TCP/UDP SA SA TCP/UD P IPSec IPSec IP Encrypted IP message Figure SC-5-1 Diagram of relationship between IKE and IPSec II. IKE features z z z z z z Avoid specifying manually all IPSec security parameters in password mapping of both communication ends. Allow specifying the lifetime of IPSec SA Allow exchanging ciphering key during IPSec session Allow IPSec to provide anti-replay service Allow manageable and scalable IPSec to implement certificate authorization support. Allow dynamic end-to-end authentication. 5-1 Chapter 5 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of IKE 5.2 Configuring IKE 5.2.1 IKE Configuration Task List IKE configuration task list is as follows: z z z z z z z Create IKE security policy Select encryption algorithm Select authentication algorithm Configure pre-shared key Select hashing algorithm Select DH group ID Set IKE negotiation SA lifetime 5.2.2 Creating IKE Security Policy I. Why these policies should be created? IKE negotiation must be protected, so each IKE negotiation begins when each terminal comes to the public (shared) IKE policy, which describes which security parameter to use to protect subsequent IKE negotiation. When two terminals come to a policy, the security parameters of this policy are identified by SA established by each terminal, and these SAs apply to all subsequent IKE communication during negotiation. Multiple policies with priority must be created on each terminal so as to ensure that at least one policy can match that of the remote terminal. II. Parameters to be defined in policy z z z z z Encryption algorithm: at present, it includes only 56-bit DES-CBC (DES-Cipher Block Chaining) Hashing algorithm: SHA-1(HMAC anamorphosis) or MD5 (HMAC anamorphosis) algorithm Authentication method: RSA signature or RSA real-time encryption Diffie-Hellman group ID SA lifetime III. How to form matched policy When IKE negotiation begins, IKE looks for a kind of IKE policy, which is consistent at both terminals. The terminal that originates negotiation sends all its policies to the remote terminal, and the latter will try to find a matched policy by comparing its policies with highest priorities with those received from the former. When the policies from the two terminals include the same encryption, hashing, authentication and Diffie-Hellman parameters and when the specified lifetime of the policy from the remote terminal is shorter than or equal to the compared policy lifetime, the matching selection is made (if no lifetime is specified, the shorter one of the remote terminal policy will be used). If no acceptable matched policy is found, IKE refuses to negotiate and will not establish IPSec. If a matched policy is found, IKE will complete negotiation then create IPSec security tunnel. IV. Create IKE policy The following should be clear before IKE configuration: 5-2 Chapter 5 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of IKE z Determine the intensity of authentication algorithm, encryption algorithm and Diffie-Hellman algorithm (i.e., the calculation resources consumed and the security capability provided). Different algorithms are of different intensities, and the higher the algorithm intensity is, the more difficult it is to decode the protected data, but the more the consumed resources are. The longer key usually has higher algorithm intensity. z Determine the security protection intensity needed in IKE exchange (including hashing algorithm, encryption algorithm, ID authentication algorithm and DH algorithm). z Determine the authentication algorithm, encryption algorithm, hashing algorithm and Diffie-Hellman group. z Determine the pre-shared key of both parties. 1) Create IKE policy The user can create multiple IKE policies, but must allocate a unique priority value for each created policy. Both parties in negotiation must have at least one matched policy for successfully negotiation, that is to say, a policy and the one in the remote terminal must have the same encryption, hashing, authentication and Diffie-Hellman parameters (the lifetime parameters may be a little different). If it is found there are multiple matching policies after negotiation, the one with higher priority will be matched first. Please perform the following tasks in global configuration mode. Table SC-5-1 Create IKE policy Operation Command Create IKE policy and enter IKE policy configuration mode Delete IKE policy crypto ike policy priority no crypto ike policy priority No IKE security policy is created by default. 5.2.3 Select Encryption Algorithm There is only one encryption algorithm: 56-bit DES-Cipher Block Chaining (DES-CBC). Before being encrypted, each plain text block will perform exclusive-OR operation with an encryption block, thus the same plain text block will never map the same encryption and the security is enhanced. Please perform the following tasks in IKE policy configuration mode. Table SC-5-2 Select encryption algorithm Operation Command Select encryption algorithm Set the encryption algorithm to the default value encryption des-cbc no encryption By default, DES-CBC encryption algorithm (i.e. parameter des-cbc) is adopted. 5.2.4 Select Authentication Algorithm There is only one authentication algorithm: pre-share key Please perform the following tasks in IKE policy configuration mode. 5-3 Chapter 5 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of IKE Table SC-5-3 Select authentication method Operation Command Select authentication method Restore the authentication method to the default value authentication pre-share no authentication pre-share By default, pre share key (i.e., pre-share) algorithm is adopted. 5.2.5 Set Pre-shared Key If pre-shared key authentication method is selected, it is necessary to configure preshared key. Perform the following tasks in global configuration mode. Table SC-5-4 Configure pre-shared key Operation Command Configure pre-shared key Delete pre-shared key to restore its default value crypto ike key keystring address peer-address no crypto ike key keystring By default, both ends of the security channel have no pre-shared keys. 5.2.6 Select Hashing Algorithm Generally hashing algorithm uses HMAC framework to achieve its function. HMAC algorithm adopts encryption hashing function to authenticate message, providing frameworks to insert various hashing algorithm, such as SHA-1 and MD5. There are two hashing algorithm options: SHA-1 and MD5. Both algorithms provide data source authentication and integrity protection mechanism. MD5 has less digest information, so it is usually considered to be slightly faster than SHA-1. A kind of attack subject to MD5 is proved successful (but it is very difficult), but HMAC anamorphosis used by IKE can stop such attacks. Please perform the following tasks in IKE policy configuration mode. Table SC-5-5 Select hashing algorithm Operation Command Select hashing algorithm Set hashing algorithm to the default value hash { md5 | sha } no hash By default SHA-1 hashing algorithm (i.e., parameter sha) is adopted. 5.2.7 Select DH Group ID There are two DH (Diffie-Hellman) group ID options: 768-bit Diffie-Hellman group (Group 1) or 1024-bit Diffie-Hellman group (Group 2). The 1024-bit Diffie-Hellman group (Group 2) takes longer CPU time Please perform the following tasks in IKE policy configuration mode. 5-4 Chapter 5 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of IKE Table SC-5-6 Select DH group ID Operation Command Select DH group ID Restore the default value of DH group ID group {1 | 2} no group By default, 768-bit Diffie-Hellman group (Group 1) is selected. 5.2.8 Set Lifetime of IKE Association SA Lifetime means how long IKE exists before it becomes invalid. When IKE begins negotiation, the first thing for it to do is to make its security parameters of the two parties be consistent. SA quotes the consistent parameters at each terminal, and each terminal keeps SA until its lifetime expires. Before SA becomes invalid, it can be negotiated by the subsequent IKE to be reused. The new SA is negotiated before the current SA becomes invalid. The shorter the lifetime is (to a critical point), the more secure the IKE negotiation is. But to save time for setting IPSec, the longer IKE SA lifetime should be configured. If the policy lifetimes of two terminals are different, only when the lifetime of originating terminal must be greater than or equal to that of the peer end can IKE policy can be selected, and the shorter lifetime should be selected as IKE SA lifetime. Perform the following tasks in IKE policy configuration mode. Table SC-5-7 Set lifetime of IKE negotiation SA Operation Command Set lifetime of IKE SA Set lifetime as the default value lifetime seconds no lifetime By default, SA lifetime is 86400 seconds (a day). It is recommended that the configured seconds should be greater than 10 minutes. 5.3 Monitoring and Maintenance of IKE Please perform the monitoring and maintenance in privileged user mode. Table SC-5-8 Monitoring and maintenance of IKE Operation Command Show IKE security association parameter Show IKE security policy Clear an SA show crypto ike sa show crypto ike policy clear crypto ike sa connection-id 1) Show IKE SA parameter Quidway# show crypto ike sa conn-id peer 1 202.38.0.2 2 202.38.0.2 flags RD|ST RD|ST phase 1 2 5-5 doi IPSEC IPSEC Chapter 5 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of IKE Flag meaning: RD--Ready ST--Stayalive RT--Replaced FD--Fading Execute the following command to clear security association 1. Quidway# clear crypto ike sa 1 Then the SA will show the following information: Quidway# show crypto ike sa conn-id peer flags phase doi 2 202.38.0.2 RD|ST 2 IPSEC Flag meaning: RD--Ready ST--Stayalive RT--Replaced FD--Fading Table SC-5-9 Description about the command field show crypto ike sa Operation Command Security channel ID Peer IP address of this SA Show the status of this SA NONE means this SA is being established READY means this SA has been established successfully STAYALIVE means that lifetime is negotiated, and this SA will be refreshed in fixed interval. REPLACED means that a timeout has happened FADING means this SA has been replaced, and will be cleared automatically after some time Phase of SA Explanation domain of SA 2) conn-id peer Flags phase doi Show IKE security policy Quidway# show crypto ike policy Protection suite priority 15 encryption algorithm: DES - CBC hash algorithm: MD5 authentication method: Pre-Shared Key Diffie-Hellman Group: MODP1024 Lifetime: 5000 seconds, no volume limit Protection suite priority 20 encryption algorithm: DES - CBC hash algorithm: SHA authentication method: Pre-Shared Key Diffie-Hellman Group: MODP768 lifetime: 10000 seconds, no volume limit Default protection suite encryption algorithm: DES - CBC hash algorithm: SHA authentication method: Pre-Shared Key Diffie-Hellman Group: MODP768 Lifetime: 86400 seconds, no volume limit The information shows the protection priority, encryption algorithm, hashing algorithm, authentication algorithm, Diffie-Hellman group and IKE SA lifetime. 5.4 Typical Configuration of IKE I. Networking requirements z Hosts A and B communicates securely, and a security channel is established with IKE automatic negotiation between security gateways A and B. 5-6 Chapter 5 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform z z Configuration of IKE Configure an IKE policy on Gateway A, with Policy 10 is of highest priority and the default IKE policy is of the lowest priority. Pre-shared key authentication algorithm is adopted. II. Networking diagram Serial 0 171.69.224.33 Serial 0 202.38.160.1 Internet Security Gateway A Security Gateway B Host A Host B Figure SC-5-2 Networking diagram of IKE configuration example III. Configuration procedure Configuration on Security Gateway A. ! Configure a IKE Policy 10 Quidway (config)# crypto ike policy 10 ! Specify the hashing algorithm used by IKE policy as MD5 Quidway (config-crypto-ike-policy-10)# hash md5 ! Use pre-shared key authentication method Quidway (config-crypto-ike-policy-10)# authentication pre-share ! Configure “abcde” for peer 171.69.224.33 Quidway (config)# crypto ike key abcde address 171.69.224.33 ! Configure IKE SA lifetime to 5000 seconds Quidway (config-crypto-ike-policy-10)# lifetime 5000 Configuration on Security Gateway B. ! Use default IKE policy on Gateway B and configure the peer authentication word. Quidway (config)# crypto ike key abcde address 202.38.160.1 The above are IKE negotiation configurations. To establish IPSec security channel for secure communication, it is necessary to configure IPSec correspondingly. For detailed contents, please refer to the configuration samples in the chapter IPSec Configuration. 5.5 IKE Fault Diagnosis and Troubleshooting When configuring parameters to establish IPSec security channel, you can use the debug ike error command to enable the Error debugging of IKE to help us find configuration problems. The command is as follows: 5-7 Chapter 5 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of IKE Problem 1: Invalid user ID information Troubleshooting: please follow the steps below. User ID information is the data for the user originating IPSec communication to identify itself. In practical applications we can use user ID to establish different security path for protecting different data streams. At present we use the user IP address to identify the user. got NOTIFY of type INVALID_ID_INFORMATION or drop message from A.B.C.D due to notification type INVALID_ID_INFORMATION Check whether ACL contents in cryptomap configured at interfaces of both ends are compatible. It is recommended for the user to configure ACL of both ends to mirror each other. Problem 2: Unmatched policy Troubleshooting: please follow the steps below. Enable the debug ike error command, you can see the debugging information. got NOTIFY of type NO_PROPOSAL_CHOSEN or drop message from A.B.C.D due to notification type NO_PROPOSAL_CHOSEN Both parties of negotiation have no matched policy. Check the protocol used by cryptomap configured on interfaces of both parties to see whether the encryption algorithm and authentication algorithm are the same. Problem 3: Unable to establish security channel Troubleshooting: please follow the steps below. Check whether the network is stable and the security channel is established correctly. Sometimes there is a security channel but there is no way to communicate, and ACL of both parties are checked to be configured correctly, and there is also matched policy. In this case, the problem is usually cased by the restart of one router after the security channel is established. Solution: 1) 2) 3) Use the command show crypto ike sa to check whether both parties have established SA of Phase 1. Use the command show crypto ipsec sa map to check whether the cryptomap on interface has established IPSec SA. If the above two results show that one party has SA but the other does not, then use the command clear crypto ike sa to clear SA with error and re-originate negotiation. 5-8 HUAWEI® VRP User Manual – Configuration Guide Volume 3 07 – VPN Configuration (VPN) User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Table of Contents Table of Contents Chapter 1 Overview of VPN ......................................................................................................... 1-1 1.1 VPN features..................................................................................................................... 1-1 1.2 Classification of IP VPN.................................................................................................... 1-2 Chapter 2 Configuration of L2TP ................................................................................................ 2-1 2.1 Brief Introduction to L2TP Protocol................................................................................... 2-1 2.1.1 Overview of VPDN ................................................................................................. 2-1 2.1.2 L2TP Protocol......................................................................................................... 2-2 2.2 Configuring L2TP .............................................................................................................. 2-6 2.2.1 L2TP Configuration Task List................................................................................. 2-6 2.2.2 Configuring at LAC Side......................................................................................... 2-6 2.2.3 Configuring at LNS Side......................................................................................... 2-8 2.2.4 Optional configuration .......................................................................................... 2-10 2.3 Monitoring and Maintenance of L2TP ........................................................................ 2-13 2.4 Typical Configuration of L2TP ........................................................................................ 2-14 2.4.1 NAS-Initialized VPN ............................................................................................. 2-14 2.4.2 Client-Initialized VPN ........................................................................................... 2-16 2.4.3 Single User Interconnects Headquarters via Router............................................ 2-17 2.5 Fault Diagnosis of L2TP ................................................................................................. 2-19 Chapter 3 Configuration of GRE ................................................................................................. 3-1 3.1 Brief Introduction to GRE Protocol.................................................................................... 3-1 3.2 Configuring GRE............................................................................................................... 3-3 3.2.1 GRE Configuration Task List.................................................................................. 3-3 3.2.2 Creating Virtual Tunnel Interface ........................................................................... 3-4 3.2.3 Setting the Source Address of Tunnel Interface .................................................... 3-4 3.2.4 Setting the Destination Address of Tunnel Interface ............................................. 3-4 3.2.5 Setting the Network Address of Tunnel Interface .................................................. 3-5 3.2.6 Setting the Encapsulation Mode of Tunnel Interface Message ............................. 3-5 3.2.7 Setting the Identification Key Word of Tunnel Interface......................................... 3-5 3.2.8 Setting Tunnel Interface to Check with Check Sum .............................................. 3-5 3.2.9 Setting Tunnel Interface to Synchronize Datagram Serial Number ....................... 3-6 3.3 Monitoring and Maintenance of GRE ........................................................................... 3-6 3.4 Typical Configuration of GRE ........................................................................................... 3-7 3.5 Troubleshooting GRE ....................................................................................................... 3-9 i Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VPN Overview Chapter 1 VPN Overview Virtual Private Network, VPN for short, is one of the rapidly developing technologies along with the development of Internet in recent years. In the wake of enterprise expansion, widely located clients and increasing partners, modern enterprises make more and more use of Internet resources to conduct such activities as promotion, marketing, after-sale service, training and cooperation. Many enterprises tend to replace their private data network with Internet. Like the current private networks of enterprises, VPN established on the public network is safe, reliable and manageable. This kind of logic network, which uses Internet to transmit private information, is called VPN. 1.1 VPN features VPN features the following: 1) 2) 3) Different from conventional networks, VPN does not actually exist; it is a virtual network formed by resource configuration of the existing network .So the carriers can make use of their spare network resources to provide VPN service and profit from the network resources to the maximum extent. VPN is specially used for specific enterprises or user groups. It makes no difference to VPN users in using VPN and conventional private networks. However, VPN is actually established on the public network or on the networks of other carriers. In order to meet the requirements of private networks, some technical means must be adopted to ensure the resource independence between VPN and the public network or its bearing network. That is, the resources of a VPN are not usually allowed to be used by other VPNs on the bearing network or network members not belonging to the VPN. Another point is that VPN should be safe enough, that is, the information from VPN users should not go out of VPN and the external users can not generally access the information in VPN. The above mentioned two problems are the main problems to be solved in VPN protocol. VPN is not a simple higher-level service. Network interconnection between the users of private networks is required for VPN service, including creation of VPN internal network topology, route calculation, access and exit of members. So VPN technology is much more complicated compared with the mechanism of various ordinary point-to-point applications. VPN has the following advantages: 1) 2) 3) 4) With VPN, reliable and safe connection can be established between remote users, branches of companies and commercial partners, and between suppliers and companies. And security of data output can be ensured. The advantage is especially significant in the integration of E-commerce or financial network with the communication network. With VPN, IP network of lower cost can be used to transmit data stream so as to downsize the cost to establish Intranet and to make effective use of the currently idle network resources. VPN users can be added and deleted with only relative configurations and without changing hardware, making VPN applications highly flexible. With VPN, a great amount of maintenance personnel of private network of the enterprises can engage in more important services, leaving the VPN management and maintenance of ISP or other network companies. 1-1 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform 5) 6) VPN Overview With VPN, users can make mobile access at any time and place, meeting the increasing mobile service requirements. VPN with service quality guarantee, e.g. MPLS VPN, can provide different levels of service quality guarantees for users in exchange for different service charges, harvesting surplus profit. In addition, in terms of implementing the same functions, the networks can be used more effectively when these services are provided by specialized public networks rather than the networks established by the enterprises themselves. Take an enterprise for example. The Intranet established with VPN is shown in the following figure. Remote users PSTN / ISDN PC POP Internet POP Partner POP Headquarter Internal server Figure VPN-1-1 Schematic diagram of VPN networking It can be found in the above figure that the users of internal resources of enterprises access the POP (Point of Presence) server of local ISP via PSTN network, and thus they can communicate with each other. Conventional WAN construction technique can only score the same goal with the aid of leased line between them. After VPN is established, the remote users and the clients in other places can access internal resources of enterprises even if they do not have the Internet access authority of local ISP. This means a lot to clerks who travel a lot and geographically widely distributed clients. VPN services of enterprises only require a server supporting VPN at resource sharing location (a Windows NT server or a router supporting VPN). After accessing local POP server via PSTN, resource users directly call the remoter servers of enterprises (VPN servers). The call mode is the same as that with PSTN connection, with the rest of work completed by Access Server of ISP. 1.2 Classification of IP VPN IP VPN means the simulation of leased line services of private WAN equipment performed with IP facilities (including public Internet or private IP backbone network). IP VPN has the following classification methods: I. According to operation mode 1) CPE-based VPN The users not only install expensive equipment and private authentication tools, but also are engaged in multifarious VPN maintenance (e.g. channel maintenance and bandwidth management). The networking is complicated, but its service scalability is weak. 2) Network-based VPN NBIP-VPN 1-2 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VPN Overview The maintenance function of VPN is allocated to be completed by to ISP (the users are allowed to manage and control services to some extent) and VPN functions are mainly fulfilled on the equipment at network side. This practice reduces the investments of the users, increases the flexibility and scalability of services and brings new incomes to the operators. II. According to the layer where the tunnel is 1) Layer 2 tunneling protocol Layer 2 tunneling protocol starts from NAS (Network Access Server) and ends on the equipment at user side. All the PPP frames are encapsulated in the tunnel. The current layer 2 tunneling protocol mainly includes Point-to-Point Tunneling Protocol (PPTP) (supported by Microsoft, Ascend and 3COM, and also in Windows NT 4.0 above), Layer 2 Forwarding Protocol (L2F) (supported by Cisco and Nortel), and Layer 2 Tunneling Protocol (L2TP) (drafted by IETF and aided by Microsoft, integrating the advantages of the above two protocols, and thus accepted by the industry as standard RFC). L2TP can be used for not only dial-up VPN services but also VPN services of leased line. 2) Layer 3 tunneling protocol Layer 3 tunneling protocol starts from and ends in ISP. PPP session ends in NAS and only layer 3 messages are carried in the tunnel. The current layer 3 tunneling protocol mainly includes General Route Encapsulation Protocol (GRE) and IPSec. GRE and IPSec are mainly used for VPN services of leased line. Comparing with layer 2 tunnel, layer 3 tunnel is safe, scalable and reliable. In terms of security, as layer 2 tunnel usually ends on the equipment at user side, there exist great challenges for the security and firewall technical of user’s network. But layer 3 tunnel usually ends on ISP gateway and does not impose any threat to the security of user’s network. In terms of scalability, all the PPP frames are encapsulated in layer 2 IP tunnel and transmission efficiency may be degraded. And PPP session will be run through entire tunnel and end on nodes or servers of user’s network. So the gateway at user side must save a great deal of the status and information of PPP session, which will add to system load and affect scalability considerably. In addition, as LCP and NCP negotiations of PPP are very sensitive for time, the efficiency of IP tunnel will result in such a series of problems as PPP session timeout. As layer 3 tunnel ends in ISP gateway and PPP session ends in NAS, it is unnecessary for the gateway at user side to manage and maintain the status of respective PPP session, thus minimizing the system load. Generally, layer 2 and 3 tunneling protocols are independently used, however, reasonable combination of the two layers of protocols will provide better security for the users (e.g. use L2TP together with IPSec protocol). III. According to service purpose 1) Intranet VPN In Intranet VPN, respective locations of enterprises are interconnected through public network, which is the extension or alternative of traditional leased line networks or other enterprise networks. 2) Access VPN Access VPN has two structures: Client-initiated VPN connection and NAS-initiated VPN connection. 3) Extranet VPN 1-3 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VPN Overview Extranet VPN means that the VPN extends Intranet to partners and clients through VPN, so that different enterprises can build their VPNs through public networks. IV. According to networking model 1) Virtual Leased Line (VLL) VLL simulates the conventional leased line service, i.e., simulating the leased line with IP network and providing asymmetrical and inexpensive “DDN” service. For the users at both ends of VLL, the VLL is equivalent to the previous leased line. 2) Virtual Private Dial-up Network (VPDN) In VPDN, VPN is implemented with dial-up and access services (ISDN PSTN) of public network, which provides access service for enterprises, mini ISPs and mobile offices. 3) Virtual Private LAN Segment (VPLS) service In VPLS, LANs can interconnect through virtual private network segment, which is the extension of LAN across IP public network. 4) Virtual Private Route Network (VPRN) service There are two types: one is the VPRN, using with such conventional VPN protocols as IPSec and GRE, and the other is VPN in MPLS mode. 1-4 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP Chapter 2 Configuration of L2TP 2.1 Brief Introduction to L2TP Protocol 2.1.1 Overview of VPDN I. Brief induction to VPDN In VPDN, VPN is fulfilled with dial-up and access services (ISDN PSTN) of public network, which provides access service for enterprises, mini ISP and mobile offices. As telecom carriers and large ISPs have a lot of access equipment, facilities and management experiences, other enterprises can make full use of their existing equipment and facilities instead their own investment on access equipment, so that their services can be more specialized and systematic. VPDN adopts private network encryption and communication protocol, so enterprises can establish safe VPN on public networks. Enterprise personnel on business leave can connect with enterprise's remote internal network via virtual encryption channel, while other users on public networks can not access the Intranet resources via such virtual channel. VPDN is often used by the following users: z z z Those users whose branches are geographically distributed, with many mobile personnel, e.g. enterprise users and tele-education users. Those users whose are geographically distributed have to rely on toll calls or even international toll calls. Those who have specific requirements for line security and availability. II. Operation principle of VPDN The networking diagram of typical VPDN application is shown in the following figure. Remote users Internet backbone network NAS PC LNS PSTN/ISDN L2TP NAS Remote users Internal server Figure VPN-2-1 Networking diagram of typical VPDN application VDPN is composed of NAS, equipment at user side and management tool. 2-1 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform 1) 2) 3) Configuration of L2TP NAS is provided by telecom departments or large ISPs. As the access server of VPDN, NAS provides WAN interfaces, is in charge of connecting PSTN or ISDN, and supports various LAN protocols, security management and authentication, and supports tunnels and relative techniques. The user-side equipment is located in the headquarters of the user. According to different network functions, it may be the equipment, which provide such functions as NAS, router or firewall. LNS in the figure stands for L2TP Network Server. The management tool manages VPDN equipment and users, including NMS, authentication, authorization and accounting (AAA). Remote dial-up users dial up and access local ISP NAS via local PSTN or ISDN. With local ISP connection and proper tunneling protocol encapsulating higher-level protocol, a VPN is established between NAS and the gateway of opposite end. III. Method to realize VPDN There are two modes to realize VPDN: 1) 2) One mode is that NAS and VDPN gateway establish the channel with tunneling protocol. Directly connect PPP of clients to the gateways of enterprises. The current available protocols are L2F and L2TP.The advantage of the mode is its transparency to users. With one login, the users can access Intranet, which authenticates the users and distributes the addresses without occupying public addresses. The platform to access such network is not limited. In the mode, NAS should support VPDN protocol and the authentication system should support VPDN attributes. The gateway is usually router or VPN private gateway. The other mode is that the client and VPDN gateway establish the tunnel. The client first connects Internet, then establishes channel connection with the gateway through private client software (such as L2TP supported by Win2000). The advantage of the mode is that there is no mode and geographical limits for Internet access of users, depending on no ISP. The setback is that the users need to install special software (usually Windows2000 platform), instead of other platforms familiar with the users. VPDN tunneling protocol includes PPTP, L2F and L2TP. The most popular one is L2TP at present. 2.1.2 L2TP Protocol L2TP (Layer 2 Tunneling Protocol) supports the tunneling transmission of the packets on PPP link layer. Integrating the respective advantages of L2F protocol of Cisco and PPTP protocol of Microsoft, it becomes the industrial standard of layer 2 tunneling protocol of IETF. I. Tunnel and session L2TP is a connection-based protocol.L2TP tunnel is established between LAC (L2TP Access Concentrator) and LNS (L2TP Network Server), which is composed of one control connection and n (n≧0) sessions. Only one L2TP tunnel can be established between a pair of LAC and LNS. Both control message and PPP data message are transmitted in the tunnel. The session is also established between LAC and LNS. But its establishment must follow the successful establishment of tunnel (including the exchange of such information as identity protection, L2TP version, frame type and hardware transmission type). One session connection corresponds to one PPP data stream between LAC and LNS. 2-2 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP L2TP header includes the information of Tunnel ID and Session ID, which are used to identify different tunnels and sessions. The messages with the same Tunnel ID and different Session ID will be multiplexed in one tunnel. Tunnel ID and Session ID are distributed by opposite end. L2TP uses HELLO message to detect the connectivity of a tunnel. When the tunnel is idle for some time, LAC and/or LNS begin to transmit HELLO message to opposite end. If not receiving a reply to HELLO message for some time, the tunnel will be cleared up. II. Control message and data message L2TP has two types of messages: control message and data message. The control message is used to establish, maintain and transmit the tunnel and session connection. And the data message is used to encapsulate PPP frame and transmit in the tunnel. The transmission of control message is reliable, while that of data message is not. If data message is lost, it will not be transmitted again. L2TP supports flow control and congestion control of control message instead of those of data message. L2TP is transmitted in the form of UDP message. L2TP registers UDP1701 port, which is only used for initial tunnel establishment. Originating side of L2TP tunnel randomly selects an idle port (it is unnecessarily 1701) and transmits a message to 1701 port of receiving side. After receiving the message, the receiving side randomly selects an idle port (it is unnecessarily 1701 and transmits a message back to the specified port of the originating side. By now, the selected ports of both sides are selected and remain unchanged during the time segment when the tunnel is connected. After being transmitted to L2TP and added with L2TP header, PPP frame is encapsulated into UDP message and transmitted on TCP/IP network. III. Two typical L2TP tunnel modes z z Originated by remote dial-up users. Remote system accesses LAC via PSTN/ISDN, then LAC originates the request of establishing channel connection to LNS via Internet. Dial-up user addresses are distributed by LNS. The authentication and charging of remote dial-up users can be completed by the agent at LAC side or completed at LNS side. Directly originated by LAC clients (the users who locally support L2TP protocol). Here, LAC clients directly originate the request of channel connection to LNS without separate LAC equipment. Here, the distribution of LAC client addresses and AAA authentication are completed by LNS. 2-3 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP LAC client Home LAN LAC Internet LNS PSTN/ISDN Remote client Home LAN LAC LNS Internet Figure VPN-2-2 Two typical L2TP tunnel modes IV. Call setup flow of L2TP tunnel Call setup flow of L2TP channel is shown in the following: 2-4 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP LAC RADIUS server LNS RADIUS server Access request (15)(20) (6)AV PairsTunnel message Access response Local name(LAC) Tunnel password (16)(21) (5)Request tunnel message user = domain Tunnel type LNS IP Address password = quidway (15) (16) (20) (21) WAN PSTN/ISDN LAC LNS Call setup (1) Tunnel establishment(7) PPP LCPSetup (2) Tunnel authentication CHAP challenge(8) user CHAP challenge(3) LNS CHAP response(9) user CHAP response(4) Authentication Passes (10) CHAP challenge(11) LAC CHAP response(12) Authentication passes (13) user CHAP response + response identifier + PPP consultation parameter (14) Pass (17) Optional second time CHAP challenge(18) CHAP response(19) Authentication passes (22) Figure VPN-2-3 Call setup flow of L2TP channel V. Features of L2TP protocol z Flexible identity authentication mechanism and high security L2TP protocol does not provide connection security, but it can depend on the authentication (e.g. CHAP and PAP) provided by PPP, so it has all security features of PPP. L2TP can integrate with IPsec to fulfill data security, so it is difficult to attack the data transmitted with L2TP. As required by specific network security, L2TP adopts channel encryption technique, end-to-end data encryption or application layer data encryption on it to improve data security. z Multi-protocol transmission L2TP transmits PPP packet. Thus multi-protocol can be encapsulated in PPP packet. z Support the authentication of RADIUS server LAC requires the authentication of RADIUS with user name and password. RADIUS server is in charging of receiving authentication request of the user, fulfilling the authentication and returning to LAC the configuration information for connection establishment. z Support internal address distribution 2-5 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP LNS can be put behind Intranet firewall. It can dynamically distribute and manage the addresses of remote users and support the application of private addresses (RFC1918). The distributed addresses for remote users are private addresses in enterprise instead of Internet addresses, thus the addresses can be easily managed and the security can also be improved. z Flexible network charging Charge in both LAC and LNS at the same time, that is, in ISP (to generate bills) and Intranet gateway (to pay for charge and audit). L2TP can provide such charging data as transmitted packet number, byte number, start time and end time of the connection. And it can easily perform network charging according to these data. z Reliability L2TP supports backup LNS. When an active LNS is inaccessible, LAC (access server) can reconnect the backup LNS to improve the reliability and fault tolerance of VPN service. 2.2 Configuring L2TP 2.2.1 L2TP Configuration Task List L2TP configuration task can be divided into the configurations at LAC and LNS sides. I. Configuration at LAC side z z z z Start/Disable VPDN. Create VPDN group. Set to originate L2TP connection request and LNS addresses. Set user name and password. II. Configuration at LNS side z z z z Start/Disable VPDN. Create VPDN group. Create or delete virtual interface template. Set the name of receiving channel opposite end. III. Optional configuration z z z z z z Set local name. Set channel authentication and password. Force local end to perform CHAP authentication. Force LCP to re-negotiation. Set domain name delimiter and search sequence. Force to disconnect channel. 2.2.2 Configuring at LAC Side I. Enable/disable VPDN Perform the following task in global configuration mode. 2-6 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP Table VPN-2-1 Enable/disable VPDN Operation Command Enable VPDN to run. Disable VPDN to run. vpdn enable no vpdn enable Disable VPDN to run by default. II. Create VPDN group The information of dial-up users will be loaded on specific VPDN group, so LAC and LNS can establish L2TP tunnel only on specific VPDN group. Perform the following task in global configuration mode. Table VPN-2-2 Create VPDN group Operation Command Create VPDN group and enter the configuration mode of VDPN group. Delete the existing VPDN group. vpdn-group group-number no vpdn-group group-number Do not create VPDN by default. group-number is an integer, ranging 1 to 3000. III. Set user name and password and configure user authentication LAC will authenticate remote dial-in user name and password to check whether he is a VPN user. Only after the authentication, can the request of establishing channel connection be generated, or the user will be turn to services of other types. As the authentication and charging at LAC side are performed via RADIUS server, the authentication function of RADIUS server on PPP users will be started. Table VPN-2-3 Set user name and password and configure user authentication Operation Command Set user name and password. Cancel the set user name and password. Configure to authenticate users. Cancel the operation to authenticate users. Enable AAA. Authentication method table of PPP user configuration. user username password { 0 | 7 } password no user username ppp authentication { pap | chap } no ppp authentication { pap | chap } aaa-enable aaa authentication ppp { default | list-name } { method1} [ method2 ... ] As L2TP is not the standard attribute of RADIUS protocol, it is necessary to add the definition of L2TP attribute table to RADIUS server attribute domain. 2-7 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP Table VPN-2-4 L2TP attribute table Attribute value 100 101 102 103 104 105 Name Tunnel-Type L2TP-Tunnel-Password Local-Name LNS-IP-Address Tunnel-Medium-Type Vpdn Group Number Meaning Tunnel type (L2TP=1). L2TP tunnel password. Local name of the channel. IP address of LNS. Medium type of the tunnel (IP=1). VPDN group number. IV. Set the connection request to originate L2TP channel. After dial-in users pass the authentication of VPN users, LAC is in charge of originating the channel establishment request to LNS and set the corresponding IP addresses of LNS side. In addition to specifying IP addresses of LNS side, LAC side provides three user authentication modes: according to “user-name”, the specific “domain-name” and the “dialed-number”. At most five LNS IP addresses can be set, which can be searched according to the sequence of the configured IP addresses of users. Perform the following task in the configuration mode of VPDN group. Table VPN-2-5 Set connection request to originate L2TP channel Operation Command Configure the connection request to originate the channel. Cancel the connection request to originate the channel. request dialin l2tp ip ip-address [ ip ip-address ... ] { domain domain-name | fullusername user-name } no request dialin l2tp [ ip ip-address ] By default, the channel connection request is originated according to the full “username”. 2.2.3 Configuring at LNS Side I. Enable/disable VPDN Perform the following task in global configuration mode. Table VPN-2-6 Enable/disable VPDN Operation Command Enable VPDN to run. Disable VPDN to run. vpdn enable no vpdn enable Disable VPDN running by default. 2-8 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP II. Create VPDN group LAC and LNS can establish L2TP tunnel only on specific VPDN group. Perform the following task in global configuration mode. Table VPN-2-7 Create VPDN group Operation Command Create VPDN group. Delete VPDN group. vpdn group group-number no vpdn group group-number No VPDN group is created by default. The value of “group-number” may be an integer between 1 and 3000. III. Create/delete virtual interface template Virtual template is mainly used to configure operational parameters of dynamically creating virtual interface in router operation. Perform the following task in global configuration mode. Table VPN2-8 Create/delete virtual interface template Operation Create virtual interface template. Delete virtual interface template. Command interface virtual-template virtual-template-number no interface virtual-template virtual-template-number By default, the value of virtual-template-number” is 1, which may be an integer between 1 and 25. After creating virtual template, designate IP address of virtual template and encapsulate PPP protocol, then the virtual template can work. The users can select to configure authentication on virtual template interface as required. IV. Set receiving the connection request to originate L2TP channel After receiving the channel establishment request originated at LAC side, channel establishment depends on LAC name. Perform the following task in the configuration mode of VPDN group. Table VPN-2-9 Set to receive the connection request to originate L2TP channel Operation Command Set to receive the connection request to originate L2TP channel. Delete the connection request to originate L2TP channel. accept dialin l2tp virtual-template virtualtemplate-number [remote remote-name ] no accept dialin When VPDN group 1 is used, it is not necessary to specify channel opposite end name “remote-name”. If the opposite end name is designated in the configuration mode of VPDN group 1, VPDN 1 will not be the default VPDN group. 2-9 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP 2.2.4 Optional configuration I. Set local name of channel After a channel is established, the users can respectively configure the local channel name at LAC side and LNS side. Perform the following task in the configuration mode of VPDN group. Table VPN-2-10 Set local name of channel Operation Command Set local channel name. Delete local channel name. local name name no local name name By default, the host name “hostname” of the router acts as the local channel name. II. Start channel authentication and set authentication password Before creating a channel connection, the users can decide as required whether to start channel authentication. There are the following three channel authentication modes: z z z LAC authenticates LNS. LNS authenticates LAC. LAC and LNS authenticate each other. It can be found that LAC or LNS can originate channel authentication request. However, if one side starts the channel authentication, the channel can be established only when the passwords on both ends of the channel are totally the same. If channel authentication is disabled on both ends of the channel, whether the channel authentication passwords are the same will be meaningless. In order to ensure channel security, users are recommended not to disable channel authentication. Perform the following task in the configuration mode of VPDN group. VPN-2-11 Start channel authentication and set authentication password Operation Command Start channel authentication Disable channel authentication. Set the password of channel authentication. Cancel the password of channel authentication. l2tp tunnel authentication no l2tp tunnel authentication l2tp tunnel password { 0 | 7 } password no l2tp tunnel password Start channel authentication by default. If no channel authentication password is configured, the “hostname” of the router will act as channel authentication password. III. Force local end to perform CHAP authentication In some cases (e.g. consider the security at LNS side), after LAC performs agent authentication on the users, LNS can authenticate the users again. Here, the users will be authenticated twice. The first authentication is at LAC side and the second one at 2-10 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP LNS side. Only after passing the two authentications can the channel be established. Only when configured at LNS side will it be valid to force local end to perform CHAP authentication. If CHAP authentication is forced to perform at LNS side, user name, password and user authentication need to be set in advance at LNS side and AAA must be started, before local end can be forced to perform CHAP authentication. Perform the following task in the configuration mode of VPDN group. Table VPN-2-12 Force local end to perform CHAP authentication Operation Command Force local end to perform CHAP authentication. Cancel the operation that local end performs CHAP authentication. force-local-chap no force-local-chap Local end does not perform CHAP authentication by default. IV. LNS forces LCP to renegotiate For NAS-Initialized VPN service request, at the beginning of PPP session, the users first perform PPP negotiation with NAS. If negotiation succeeds, NAS initiated channel will be connected and the user information will be transmitted to LNS that decides the legality based on the received agent authentication information. But in some specific cases (e.g. when it is necessary to authenticate and charge at LNS), the command “lcp renegotiation” can be used to force LNS to perform LCP negotiation with users again, neglecting agent authentication information at NAS side. Only when configured at LNS side, can it be valid to force LCP to renegotiate. Perform the following task in the configuration mode of VPDN group. Table VPN-2-13 Force LCP to renegotiate Operation Command Force LCP to renegotiate. Disable LCP to renegotiate. lcp renegotiation no lcp renegotiation LCP does not renegotiate by default. V. Set domain name delimiter and search sequence In the case of a lot of L2TP access users, it will waste time to search users in sequence. Here, set the necessary search tactics (e.g. prefix and suffix delimiters) to speed up the search. The delimiter includes prefix delimiter and suffix delimiter. The delimiter includes four special characters: @, # , & and /. The example of the user with prefix delimiter is “huawei.com# vpdnuser” and the example of the user with suffix delimiter is “vpdnuser@huawei.com”. In the search, separate user name from prefix/suffix delimiter. The search based on defined rules will greatly speed up search sequence. After setting prefix/suffix delimiter, four search orders are optional: z “dnisdomain” (First search according to called number, then according to domain name) 2-11 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform z z z Configuration of L2TP “dnisonly” (Search only according to called number) “domaindnis” (First search according to domain name, then according to called number) “domainonly” (Search only according to domain name) Perform the following task in global configuration mode. Table VPN-2-14 Set domain name delimiter and search sequence Operation Command Set prefix delimiter Cancel the set prefix delimiter Set suffix delimiter Cancel the set suffix delimiter Set search order Recover the default search order Vpdn domain-delimiter prefix prefix-delimiters no vpdn domain-delimiter prefix vpdn domain-delimiter suffix suffix-delimiters no vpdn domain-delimiter suffix vpdn search-order { dnisdomain | dnisonly | domaindnis | domainonly } no vpdn search-order By default, first search according to called number, then according of domain name. VI. Set the size of receiving window of channel flow control. L2TP has simple flow control function. The users can designate the size of channel receiving window to control the flow. Perform the following task in the configuration mode of VPDN group. Table VPN-2-15 Set the size of receiving window of channel flow control Operation Command Set the size of receiving window of channel flow control. Disable to use the function of receiving window of channel flow control. l2tp flow-control receive-window size no l2tp flow-control receive-window By default, the size of receiving window of channel flow control is 0 (no flow control). The value of “size” ranges between 0 and 100. VII. Enable/disable hiding AV pairs L2TP enables hiding AV pairs. The feature is very useful when PAP or agent authentication is used between LAC and LNS. When AV pairs are hidden, L2TP hiding algorithm will be executed so that AV pairs can encrypt user name and password transmitted in clear text during agent certification. Perform the following task in the configuration mode of VPDN group. Table VPN-2-16 Enable/disable hiding AV pairs Operation Command Enable hiding AV pairs Disable showing AV pairs l2tp hidden no l2tp hidden Disable hiding AV pairs by default. 2-12 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP VIII. Force to disconnect tunnel When the user number is 0, or faults occur to the network, or operators take the initiative to require disconnecting the channel, the tunnel will be cleared. LAC or LNS can originate the request to clear the tunnel. The end receiving the request to clear should transmit acknowledgement information (ACK) and wait for some time before clearing the tunnel so that the request transmitted again from opposite end can be properly received when ACK is lost. After forced channel disconnection, all control connections and session connections on the channel will also be cleared. After channel disconnection, when new users dial in, the channel can be established again. Perform the following task in privileged user mode. Table VPN-2-17 Force to disconnect channel Operation Command Forced to disconnect channel clear vpdn tunnel l2tp remote-name 2.3 Monitoring and Maintenance of L2TP Perform the following task in privileged user mode. Table VPN-2-18 Monitoring and maintenance of L2TP Operation Command Show the current L2TP channel information. show l2tp tunnel Show the current L2TP session information. show l2tp session Open all L2TP debug information switches. debug l2tp all Open the debug switch of message control. debug l2tp control Open the debug switch of PPP message content. debug l2tp dump Open the debug switch of L2TP error information. debug l2tp error Open the event debug information switch of L2TP. debug l2tp event Open the debug information switch of hidden AVP. debug l2tp hidden Open the data message debug switch of L2TP. debug l2tp payload Open the debug switch of L2TP receiving message content. debug l2tp raw-dump Open the information debug switch of L2TP time stamp. debug l2tp time-stamp 1) Show the current L2TP channel information. Quidway# show l2tp tunnel LocID RemID Remote Name 1 8 AS8010 Remote Address Port Sessions 172.168.10.2 Total tunnels = 1 2-13 1701 1 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP Table VPN-2-19 Description of “show l2tp tunnel” command domain Domain name Meaning Total tunnels LocID RemID Remote Name Remote Address Port Sessions 2) Tunnel number The unique value of local end to identify a channel. The unique value of opposite end to identify a channel. The name of opposite end. IP address of opposite end. Port number of opposite end. Sessions number on the tunnel. Show the current L2TP session information. Quidway# show l2tp session LocID 1 RemID 1 TunID 2 Total session = 1 Table VPN-2-20 Description of “show l2tp session” command domain Domain name Meaning Total sessions LocID RemID TunID The sum of sessions. The unique value of local end to identify a session. The unique value of opposite end to identify a session. Identification number of the channel. 2.4 Typical Configuration of L2TP 2.4.1 NAS-Initialized VPN I. Networking requirement The users can access Intranet of the company through local dial-up access to the Internet. The tunnel is used to transmit data between NAS and LNS and authenticate the channel. II. Networking diagram Internet Headquarter of the corporation PSTN/IS Tunne VPN user NAS LNS l Figure VPN-2-4 Networking diagram of NAS-Initialized VPN 2-14 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP III. Configuration procedure 1) Configuration at user side: Set user name to “vpnuser”, password to “hello” (the user name and password have been registered in NAS or company) and dial-in number to”170” at the dial-up terminal. 2) z z z 3) Configuration at NAS side (Quidway A8010 NAS in the case serves as the equipment at LAC side): The dial-in number is usually configured as “170” on A8010. On RADIUS access server, set a VPN user with user name “vpnuser” and password “hello”, and set IP address of the corresponding equipment at LNS side (In the case, IP address of the port where LNS side and the channel are connected is 202.38.160.2). Define the name of the equipment of local end as A8010 and authenticate the channel. The channel password is “quidway”. Router configuration (at LNS side) ! Set a VPDN group and configure relative attributes Quidway(config)# vpdn enable Quidway(config)# vpdn-group 1 Quidway(config-vpdn1)# local name LNS Quidway(config-vpdn1)# accept dialin l2tp virtual-template 1 remote A8010 ! Set user name and password (consistent with the setting on A8010). Quidway(config)# user vpnuser password 0 hello ! Start channel authentication and set channel authentication password. Quidway(config-vpdn2)# l2tp tunnel authentication Quidway(config-vpdn2)# l2tp tunnel password 0 quidway ! Define an address pool to distribute addresses to dial-in users. Quidway(config)# ip local poo1 1 192.168.0.2 192.168.0.100 ! Configure Virtual-Template 1. Quidway(config)# interface virtual-template 1 Quidway(config-if-virtual-template1)# ip address 192.168.0.1 255.255.255.0 Quidway(config-if-virtual-template1)# ppp authentication chap Quidway(config-if-virtual-template1)# peer default ip address pool 1 ! Adopt AAA authentication. Quidway(config)# aaa-enable Quidway(config)# aaa authentication ppp default local 2-15 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP 2.4.2 Client-Initialized VPN I. Networking requirement VPN users first connect Internet, then originate tunnel connection request to LNS. After LNS has accepted the request, a tunnel channel is established between LNS and VPN users to fulfill data transmission between the users and the company headquarters. II. Networking diagram Cleck going on erramds Headquarter of the corportion Internet PSTN LNS NAS Tunnel Figure VPN-2-5 Networking diagram of Client-Initialized VPN III. Configuration procedure 1) z z z 2) Configuration at user side Set user name to “vpnuser” and password to “hello” at dial-up terminal (the user name and password have been registered in company). Set IP address of LNS to Internet interface address of the router (In the case, IP address of the port where LNS side and the channel are connected is 202.38.160.2). Modify connection attributes, set the adopted protocol to L2TP and encryption attribute to be self-defining. And select CHAP authentication to authenticate the channel whose password is “quidway”. Router configuration (at LNS side) ! Set a VPDN group and configure relative attributes Quidway (config)# vpdn enable Quidway (config)# vpdn-group 1 Quidway (config-vpdn1)# local name LNS Quidway (config-vpdn1)# force-local-chap Quidway (config-vpdn1)# accept dialin l2tp virtual-template 1 remote vpdnuser ! Set user name and password (consistent with the setting on A8010). Quidway (config)# user vpnuser password 0 hello ! Start channel authentication and set channel authentication password. Quidway (config-vpdn1)# l2tp tunnel authentication Quidway (config-vpdn1)# l2tp tunnel password 0 quidway ! Define an address pool to distribute addresses to dial-in users. Quidway (config)# ip local poo1 1 192.168.0.2 192.168.0.100 2-16 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP ! Configure Virtual-Template 1. Quidway (config)# interface virtual-template 1 Quidway (config-if-virtual-template1)# ip address 192.168.0.1 255.255.255.0 Quidway (config-if-virtual-template1)# ppp authentication chap Quidway (config-if-virtual-template1)# peer default ip address pool 1 ! Adopt AAA authentication. Quidway (config)# aaa-enable Quidway (config)# aaa authentication ppp default local 2.4.3 Single User Interconnects Headquarters via Router I. Networking requirement A user needs to communicate with headquarters, but the network address of headquarters is a private address, e.g. 10.8.0.0 network, so the user can not directly access internal server via Internet. With VPN, the user can access the data of internal network. II. Networking diagram Modem PSTN Internet Tunnel PC1 ISDN Quidway1 LAC WAN Quidway2 LNS 总部 PC2 Figure VPN-2-6 Networking diagram of single user interconnecting headquarters III. Configuration procedure 1) Configuration at user side Set user name to “vpnuser@huawei.com” and password to “hello” at dial-in terminal (the user name and password have been registered in LAC or company). Establish a dial-up network with access number “Quidway1”, which receives the addresses distributed by server. After dial-up window appears, input user name “vpnuser@huawei.com” and the password “hello”. 2) The configuration of the router Quidway1 (at LAC side) (In the case, IP address of the port where LNS side and the channel are connected is 202.38.160.2): ! Set a VPDN group and configure relative attributes Quidway(config)# vpdn enable Quidway(config)# vpdn-group 1 2-17 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP Quidway(config-vpdn1)# local name LAC Quidway(config-vpdn1)# request dialin l2tp ip 202.38.160.2 domain huawei.com Quidway(config-vpdn1)# ppp authentication pap ! Set user name and password. Quidway(config)# user vpnuser password 0 hello ! Start channel authentication and set channel authentication password. Quidway(config-vpdn1)# l2tp tunnel authentication Quidway(config-vpdn1)# l2tp tunnel password 0 quidway ! Set the suffix delimiter of a domain name to '@'. Quidway(config)# vpdn domain-delimiter suffix @ ! Search sequence: first search according to domain name, then according to called number. Quidway(config)# vpdn search-order domaindnis ! Adopt AAA authentication. Quidway(config)# aaa-enable Quidway(config)# aaa authentication ppp default local 3) The configuration of the router Quidway2 (at LNS side) ! Set a VPDN group and configure relative attributes Quidway(config)# vpdn enable Quidway(config)# vpdn-group 1 Quidway(config-vpdn1)# local name LNS Quidway(config-vpdn1)# force local chap Quidway(config-vpdn1)# accept dialin l2tp virtual-template 1 remote LAC ! Set user name and password (consistent with the user name and password at LAC side). Quidway(config)# user vpnuser@huawei.com password 0 hello ! Start channel authentication and set channel authentication password to “quidway”. Quidway(config-vpdn1)# l2tp tunnel authentication Quidway(config-vpdn1)# l2tp tunnel password 0 quidway ! Force local end to perform CHAP authentication Quidway(config-vpdn1)# force-local-chap ! Set an address pool 1 and the address ranges between 192.168.0.2 and 192.168.0.100. Quidway(config)# ip local poo1 1 192.168.0.2 192.168.0.100 ! Configure Virtual-Template 1. 2-18 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of L2TP Quidway(config)# interface virtual-template 1 Quidway(config-if-virtual-template1)# ip address 192.168.0.1 255.255.255.0 Quidway(config-if-virtual-template1)# ppp authentication chap Quidway(config-if-virtual-template1)# peer default ip address pool 1 ! Start AAA authentication. Quidway(config)# aaa-enable Quidway(config)# aaa authentication ppp default local 2.5 Fault Diagnosis of L2TP Before debugging VPN, please confirm that LAC and LNS are on public network. The connectivity between them can be tested with “ping”. Fault 1: The users fail to log in. Troubleshooting: Failure reasons are as follows: 1) z z z z 2) z z z Fail to establish the tunnel. The reasons are as follows: At LAC side, LNS addresses are improperly set. LNS (usually the router) end is not set to receive VPDN group of opposite end of the channel. For details, view the description of “accept dialin” command. Tunnel authentication does not pass. If the authentication is configured, make sure that channel passwords of both sides are consistent. If local end forcedly disconnects the connection and opposite end fails to receive the corresponding “Disconnect” message due to network transmission error, an immediately originated tunnel connection will fail. The reason is that both sides cannot detect the disconnected link within certain time, and the tunnel connections originated by two opposite ends with the same IP addresses are not allowed. PPP negotiation does not pass. The reasons may be: Errors occur to user name and password set at LAC end, or the corresponding users are not set at LNS end. LNS end can not distribute addresses, e.g. the address pool is set to small, or no address pool is set. The types of channel password authentication are inconsistent. The default authentication type of VPN connection created by Windows 2000 is MSCHAP. If opposite end does not support MSCHAP, CHAP is recommended. Fault 2: Fail to transmit data. After the connection is established, no data can be transmitted, e.g. cannot ping through opposite end. Troubleshooting: Possible reasons are as follows: z z The address set by LAC is wrong: Generally, LNS distributes addresses, but LAC can also designate its own address. If the designated address and the address to be distributed by LNS are not in the same network segment, this problem will occur. It is recommended that LNS distribute the addresses. Network congestion: Congestion occurs to Internet backbone network and packets are often lost. L2TP transmission is based on UDP (User Datagram Protocol). UDP does not control message errors. If L2TP is adopted when line quality is unstable, “Ping” opposite end may fail. 2-19 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of GRE Chapter 3 Configuration of GRE 3.1 Brief Introduction to GRE Protocol I. Brief introduction to the protocol GRE (Generic Routing Encapsulation) protocol can encapsulate the datagram of some network layer protocols (e.g. IP and IPX) and enable these encapsulated datagrams to transmit in another network layer protocol (e.g. IP). GRE is the layer 3 tunnel protocol of VPN (Virtual Private Network), that is, a technique called as Tunnel is adopted between protocol layers. The tunnel is a virtual point-to-point connection and can be regarded as virtual interface only supporting point-to-point connection in actual situation. The interface provides a channel where the encapsulated datagram can be transmitted. And it can also encapsulate and de-encapsulate the datagram at both ends of a tunnel. It's necessary to encapsulate and de-encapsulate it when a message is transmitted on the tunnel. 1) Encapsulation As shown in figure VPN-3-6, after receiving IPX datagram, the interface connecting “Novell group1” first delivers it to be processed by IPX protocol which checks the destination address domain in IPX header and determines how to route the packet. If it is found that the destination address of the message will route through the network with network number 1f (virtual network number of the tunnel), the message will be transmitted to the tunnel port with network number 1f. After receiving the packet, tunnel port will perform GRE and then, the packet will be processed by IP module. After IP header is encapsulated, the packet will be processed by the corresponding network interface according to destination address and router table. 2) De-encapsulation The de-encapsulation is opposite to the encapsulation. When an IP message is received at Tunnel interface, its destination address is checked and the destination is found to be this router, then the IP header will be removed and processed by GRE protocol (examine the key, check sum or message serial number). Then after GRE header is removed, it will be processed by IPX protocol in the same way as processing an ordinary datagram. The system receives a datagram to be encapsulated and routed, which is called a payload. The payload is first encapsulated in the form of GRE to become a GRE message. Then it is encapsulated in IP message. Thus the IP layer is in full charge of forwarding the message. The IP protocol which is in charge of the forwarded is often called delivery protocol or transport protocol. The form of an encapsulated message is shown in the following figure: 3-1 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of GRE Delivery Header (Transport Protocol) GRE Header (Encapsulation Protocol) Payload Packet (Passenger Protocol) Figure VPN-3-1 Encapsulated tunnel message format For example: The format of IPX transmission message encapsulated in IP Tunnel is as follows: IP GRE IPX Passager Protocol Carrier Protocol or Encapsulation Protocol Transport Protocol Figure VPN-3-2 Format of transmission message in the tunnel. II. Applicable range GRE can fulfill the following several services: 1) Multi-protocol local network transmits via single-protocol backbone network. Novell IPX Novell IPX Protocol Group1 Protocol Group2 INTERNET IP protocol Term 1 RouterB RouterA Tunnel A B IP protocol Term 2 Figure VPN-3-3 Multi-protocol local network transmits via single-protocol backbone network In the above figure, Group1 and Group2 are the local networks running Novell IPX protocol. Term1 and Term2 is the local network running IP protocol. The tunnel encapsulated with GRE protocol is adopted between Router A and Router B. Thus Group1and Group2 can communicate without affecting each other, so are Term1 and Term2. 2) Enlarge the operating range of the hop-limited network (e.g. IPX). 3-2 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Router Configuration of GRE Router Tunnel r r Router r Router Router r r Figure VPN-3-4 Enlarge network operating range When using RIP, if the hop count between two terminals in the above figure is more than 15, the two terminals can not communicate with each other. When the tunnel is used in the network, a part of hops can be hidden, enlarging the operating range of the network. 3) Connect some discontinuous sub-networks to establish VPN. RouterA novell Router novell group2 group 1 Tunnel Router RouterB Figure VPN-3-5 Tunnel connects discontinuous sub-networks The two sub-networks group1 and group2 running Novell IPX protocol are in different cities. With the tunnel available, the trans-WAN Virtual Private Network can be established. In addition, GRE also supports the users to select and record identification key word of tunnel interface, supports the check of encapsulated message, and supports the use of synchronous serial numbers to ensure channel safety and correctness of transmission data. Because of encapsulation and de-encapsulation on GRE receiving side and transmitting side and data volume increase caused by encapsulation, GRE will decrease the forwarding rate of router data to some extent. 3.2 Configuring GRE 3.2.1 GRE Configuration Task List GRE configuration task list is as follows: z z z z Create virtual tunnel interface. Set the source address of tunnel interface. Set the destination address of tunnel interface. Set the network address of tunnel interface. 3-3 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform z z z z Configuration of GRE Set the encapsulation mode of tunnel interface message. Set the key of tunnel interface. Set tunnel interface to check with check sum. Set tunnel interface to synchronize datagram serial numbers. 3.2.2 Creating Virtual Tunnel Interface Perform the following task in global configuration mode. Table VPN-3-1 Create virtual tunnel interface Operation Command Create virtual tunnel interface and enter tunnel configuration mode. Cancel virtual tunnel interface. interface tunnel number no interface tunnel By default, no virtual tunnel interface is created. The value of “number” is an integer between 0 and 4294967295. But tunnel number actually depends on interface sum and memory status. 3.2.3 Setting the Source Address of Tunnel Interface After tunnel interface is established, the source address of tunnel channel should be designated. The source address and destination address of tunnel interface uniquely identifies a channel. Perform the following setting in tunnel interface configuration mode. Table VPN-3-2 Designate the source address of tunnel interface Operation Command Designate the source address of tunnel interface. Cancel the source address of tunnel interface. tunnel source ip-address no tunnel source 3.2.4 Setting the Destination Address of Tunnel Interface After tunnel interface is established, the destination address of tunnel channel should be designated. The source address and destination address of tunnel interface uniquely identifies a channel. Perform the following setting in tunnel interface configuration mode. Table VPN-3-3 Designate the destination address of tunnel interface Operation Command Designate the destination address of tunnel interface. Cancel the destination address of tunnel interface. 3-4 tunnel destination ip-address no tunnel destination Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of GRE 3.2.5 Setting the Network Address of Tunnel Interface Configure network address of tunnel interface so that the channel supports dynamic routing protocol. The users are recommended to set the network addresses at both ends of the channel to be in the same network segment. Perform the following setting in tunnel interface configuration mode. Table VPN-3-4 Set the network address of tunnel interface Operation Command Set the IP address of tunnel interface. Delete the IP address of tunnel interface. Set the IPX address of tunnel interface. Delete the IPX address of tunnel interface. ip address ip-address mask no ip address ipx network network-number no ipx network 3.2.6 Setting the Encapsulation Mode of Tunnel Interface Message Please configure in tunnel interface configuration mode as below. Table VPN-3-5 Set the encapsulation mode of tunnel interface message Operation Command Set the encapsulation mode of tunnel interface message. tunnel mode gre ip The encapsulation mode of tunnel interface message is GRE IP by default. 3.2.7 Setting the Identification Key Word of Tunnel Interface It is stipulated in RFC 1701 that: if the KEY field of GRE header is set, the receiving side and transmitting side will check the identification key word of the channel. Only when the set identification key words at both ends of the tunnel are totally identical, can the check pass, or the message will be discarded. Perform the configuration in tunnel interface configuration mode. Table VPN-3-6 Set the identification key word of tunnel interface Operation Command Set the identification key word of tunnel interface. Cancel the identification key word of tunnel interface. tunnel key key-number no tunnel key By default, the tunnel does not use KEY, an integer ranging 0 to 4294967295. 3.2.8 Setting Tunnel Interface to Check with Check Sum It is stipulated in RFC 1701 that: if the “Checksum” place of GRE header is set, the check sum is valid. The transmitting side calculates the check sums of GRE header and payload. The receiving side calculates the check sum of the received message and 3-5 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of GRE compares it with the check sum in the message. If the two check sums are identical, the message will be further processed, or it will be discarded. If only one end of the tunnel is configured to check with the check sum, the message will not be checked with check sum. Only when both ends of the tunnel are configured to check with the check sum, can the message be checked with the check sum. Perform the following task in tunnel interface configuration mode. Table VPN-3-7 Set tunnel interface to check with check sum Operation Command Set tunnel interface to check with check sum. Disable tunnel interface to check with check sum. tunnel checksum no tunnel checksum Disable tunnel interface to check with check sum by default. 3.2.9 Setting Tunnel Interface to Synchronize Datagram Serial Number It is stipulated in RFC 1701 that: if “sequence-datagram” in GRE header is set, both receiving side and transmitting side will synchronize serial numbers. The synchronized message should be further processed, or it is discarded. With the serial numbers, the message is unreliable but in order. The receiving end establishes serial numbers for the message which is received by local end and successfully de-encapsulated (The serial numbers are integers between 0 and 232–1 and the serial number of the first packet is 0). After the channel is established, the serial numbers will be accumulated and cyclically counted. If the receiving end receives a message whose serial number is less than or equal to that of the message received last time, the packet will be considered as illegal. If the receiving end receives an orderless message, the packet will be automatically discarded. Only when the synchronization mechanism to set/disable serial numbers is established at both ends of the tunnel, can the channel be established. Perform the following task in tunnel interface configuration mode. Table VPN-3-8 Set the tunnel to synchronize datagram serial numbers Operation Command Set tunnel interface to synchronize serial numbers. Disable tunnel interface to synchronize serial numbers. tunnel sequence-datagrams no tunnel sequence-datagrams Disable tunnel interface to synchronize datagram serial numbers by default. 3.3 Monitoring and Maintenance of GRE Perform the following task in privileged user mode. Table VPN-3-9 Monitoring and maintenance of GRE Operation Command Show the working status of tunnel interface. show interface tunnel [tunnel-number] 3-6 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform 1) Configuration of GRE Show the status of designated tunnel interface. Quidway# show interface tunnel 1 Tunnel1 is up, line protocol is up Internet address is 3.1.1.1 255.255.255.0 10 packets input, 640 bytes 0 input errors, 0 broadcast, 0 drops 10 packets output, 640 bytes 0 output errors, 0 broadcast, 0 no protocol The above information means that: The network address of “Tunnel1” is 3.1.1.1. 0 message is received. The number of received error message and broadcast message is 0. There is no discarded message. The number of transmitted messages is 0. There is no the message with error output, the broadcast message and the message with unknown protocol type 2) Show router table of the system. Quidway(config)# show ip route Routing Tables: Destination/Mask 3.1.1.0/24 10.10.1.0/24 10.10.1.3/32 10.110.1.0/24 20.20.1.0/24 20.110.1.0/24 Proto Pref Direct 0 Direct 0 Direct 0 Direct 0 Static 60 Static 60 Metric 0 0 0 0 0 0 Nexthop Interface 3.1.1.1 Tunnel1 10.10.1.3 Serial0 10.10.1.3 Serial0 10.110.1.100 Ethernet0 10.10.1.3 Serial0 3.1.1.2 Tunnel1 The above information shows that the router table of the system includes the route of the interface Tunnel1. 3.4 Typical Configuration of GRE I. Networking requirement VPN should be built across WAN for the operation of Novell IPX’s two subnets group1 and group2. It can be implemented by using GRE. II. Networking diagram IPX protocol Group1 INTERNET Router A Router B Tunnel Figure VPN-3-6 Networking diagram of GRE application III. Configuration procedure Configure router A: ! Activate IPX. RouterA(config)# ipx routing a.a.a ! Configure interface “Ethernet0”. RouterA(config)# interface ethernet 0 3-7 IPX protocol Group2 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of GRE RouterA(config-if-Ethernet0)# ip address 10.1.1.1 255.255.255.0 RouterA(config-if-Ethernet0)# ipx network 1e ! Enter tunnel source interface. RouterA(config)# interface serial 0 RouterA(config-if-Serial0)# ip address 192.13.2.1 255.255.255.0 ! Create virtual tunnel interface and configure tunnel interface RouterA(config)# interface tunnel 0 RouterA(config-if-tunnel0)# ip address 10.1.2.1 255.255.255.0 RouterA(config-if-tunnel0)# ipx network 1f ! Designate that tunnel working mode is GRE and transmission protocol is IP. RouterA(config-if-tunnel0)# tunnel mode gre ip ! Configure the source address of tunnel interface (It should be IP address of Serial0 of RouterA). RouterA(config-if-tunnel0)# tunnel source 192.13.2.1 ! Configure the opposite end IP address of tunnel interface (It should be IP address of Serial0 of RouterB). RouterA(config-if-tunnel0)# tunnel destination 131.108.5.2 ! Configure a static route to Group2. RouterA(config)# ipx route 31 1f.a.a.a 30000 15 The configurations of Router B are as follows: ! Activate IPX. RouterB(config)# ipx routing b.b.b ! Configure interface “Ethernet0”. RouterB(config)# interface ethernet 0 RouterB(config-if-Ethernet0)# ip address 10.1.3.1 255.255.255.0 RouterB(config-if-Ethernet0)# ipx network 31 ! Enter tunnel source interface. RouterB(config)# interface serial 0 RouterB(config-if-Serial0)# ip address 131.108.5.2 255.255.255.0 ! Create and enter “Tunnel0” interface configuration mode. RouterB(config)# interface tunnel 0 RouterB(config-if-tunnel0)# ip address 10.1.2.2 255.255.255.0 RouterB(config-if-tunnel0)# ipx network 1f ! Designate that tunnel working mode is GRE and transmission protocol is IP. RouterB(config-if-tunnel0)# tunnel mode gre ip ! Configure the source address of Tunnel0 interface (It should be IP address of Serial0 of RouterB). RouterB(config-if-tunnel0)# tunnel source 131.108.5.2 ! Explain the opposite end address of Tunnel0 interface (It should be IP address of Serial0 of RouterA). 3-8 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of GRE RouterB(config-if-tunnel0)# tunnel destination 192.13.2.1 ! Configure a static route to Group1. RouterB(config)# ipx route 1e 1f.b.b.b 30000 15 3.5 Troubleshooting GRE As GRE configuration is relatively simple, only the consistency of the configuration needs to be noted. Here, analyze a relative error, as shown in the following figure: Fault 1: The interfaces at both ends of the tunnel are properly configured and both ends of the tunnel can be “pinged” through, but PC A and PC B can not be “pinged” through. Troubleshooting: In this case, mainly check whether there is a route passing through tunnel interface. That is, at RouterA, a route to 10.2.0.0/16 passes through Tunnel0 interface; at RouterB, a route to 10.1.0.0/16 passes through Tunnel0 interface (fulfilled by adding static route). Router A PC A 10.1.1.1 Router C Serial0 Router B Serial1 PC B 10.2.1.1 tunnel Figure VPN-3-7 Networking group of GRE troubleshooting example 3-9 HUAWEI® VRP User Manual – Configuration Guide Volume 3 08 – Reliability Configuration (LC) User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Table of Contents Table of Contents Chapter 1 Configuration of Backup Center ............................................................................... 1-1 1.1 Backup Center Overview .................................................................................................. 1-1 1.2 Configuring the Backup Center......................................................................................... 1-1 1.2.1 Configuration Task List .......................................................................................... 1-1 1.2.2 Entering the Configuration Mode of the Main Interface to be Backed Up.............. 1-1 1.2.3 Specifying Backup Interface and Priority Used by the Main Interface ................... 1-2 1.2.4 Setting Delay Time for Switchover Between Main and Backup Interface.............. 1-3 1.2.5 Setting State-Judging Conditions for Logic-Channel Main Interface ..................... 1-3 1.2.6 Setting State-Judging Conditions for Logic-Channel Backup Interface ................. 1-4 1.2.7 Configuring Routes for Main and Backup Interfaces ............................................. 1-4 1.3 Monitoring and Maintaining of Backup Center.................................................................. 1-5 1.4 Typical Configuration of Backup Center ........................................................................... 1-5 1.4.1 An example of Backup Between Interfaces ........................................................... 1-5 1.4.2 An Example of Multiple Backup Interfaces ............................................................ 1-5 1.4.3 An Example of Logical Channel Backup Interface................................................. 1-5 1.4.4 An Example of Multiple Backup Interfaces with a Logical Channel ....................... 1-6 Chapter 2 Configuration of HSRP............................................................................................... 2-1 2.1 HSRP Overview ................................................................................................................ 2-1 2.2 Configuring HSRP............................................................................................................. 2-2 2.2.1 Configuration Task List .......................................................................................... 2-2 2.2.2 Starting HSRP Function ......................................................................................... 2-2 2.2.3 Setting Router’s Priority in HSRP Hot Standby Group........................................... 2-3 2.2.4 Setting Router’s Preemption Mode in HSRP Standby Group................................ 2-3 2.2.5 Setting HSRP Authorization Word ......................................................................... 2-3 2.2.6 Setting HSRP Timer............................................................................................... 2-4 2.2.7 Monitoring the Specified Interface ......................................................................... 2-4 2.2.8 Using Actual Interface MAC Address..................................................................... 2-5 2.2.9 Modifying Virtual MAC Address ............................................................................. 2-5 2.3 Monitoring and Maintaining HSRP.................................................................................... 2-6 2.4 Typical Configurations of HSRP ....................................................................................... 2-6 2.4.1 An example for single hot standby group configuration ......................................... 2-6 2.4.2 An example for setting HSRP to monitor a specified interface .............................. 2-8 2.4.3 An example for multiple hot standby groups configuration .................................... 2-9 2.5 Fault Diagnosis and Troubleshooting of HSRP .............................................................. 2-10 i Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Backup Center Chapter 1 Configuration of Backup Center 1.1 Backup Center Overview To enhance network’s reliability, VRP provides perfect backup functions through the use of Backup Center. z z z z Interfaces that can be backed up are called main interfaces. Every physical interface or sub-interface on a router can serve as a main interface. A logical channel such as X.25 on any interface or a virtual circuit of a frame relay can also serve as a main interface. Any physical interface, virtual interface template, or a logical channel on an interface other than the Ethernet interface of a router can serve as the backup interface of aother interface or logical channel. A main interface can be provided with multiple backup interfaces; when the main interface gets faulty, backup interfaces can take over the main interface’s work in an order based on their priority. Interfaces (such as ISDN BRI and ISDN PRI interfaces) that have multiple physical channels can provide backups to multiple main interfaces by using Dialer Map. 1.2 Configuring the Backup Center 1.2.1 Configuration Task List Follow the steps below to configure VRP backup center. z z z z z z Enter the configuration mode of the main interface to be backed up. Specify the backup interface and priority used by the main interface. Set the delay time for the switchover between main and backup interfaces. Set state-judging conditions when the main interface is a logical channel. Set the state-judging conditions when the backup interface is a logical channel. Configure routes for main and backup interfaces. 1.2.2 Entering the Configuration Mode of the Main Interface to be Backed Up On a Quidway router, not only every physical interface or sub-interfaces of the router, but every virtual circuit of X.25 or frame relay can work as a main interface. If the main interface is a physical interface or sub-interface, please use the following commands in global configuration mode to enter the configuration mode of the interface. Table LC-1-1 Enter the configuration mode of the main interface Operation Command Enter the configuration mode of the main interface interface interface-type interface-number Here, interface-type specifies the interface type of the physical interface or subinterface, interface-number specifies the interface number of the physical interface or sub-interface. Combined, they specify a physical interface or sub-interface. 1-1 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Backup Center If the main interface is a virtual circuit, it should be treated differently depending on the type of the virtual circuit: firstly, specify its logical channel number in the configuration mode of the physical interface to which it’s subordinate; then enter corresponding logical channel configuration mode. logic-channel-number ranges between 0 to 255. Please use following commands in corresponding configuration modes. Table LC-1-2 Enter the logical channel configuration mode Operation Command Specify logical channel number for X.25 virtual circuit. Specify logical channel number for frame relay virtual circuit Enter corresponding logical channel configuration mode. x25 map protocol address x.121-address lin logicchannel-number [ lin logic-channel-number ... ] frame-relay map protocol address dlci lin logicchannel-number [ lin logic-channel-number ... ] logic-channel logic-channel-number 1.2.3 Specifying Backup Interface and Priority Used by the Main Interface Except Ethernet interface, any physical interface or virtual interface template, or a certain logical channel (including virtual circuit or Dialer Map) can work as a backup interface of the main interface. Please use the following commands in the configuration mode of the main interface backed up. Table LC-1-3 Specify backup interface and priority used by the main interface Operation Command Specify a physical interface or virtual interface template, except Ethernet interface, to back up the main interface; its priority can also be set here. Specify a logical channel to back up the main interface, its priority can also be set here. backup interface interface-type interfacenumber [priority] backup logic-channel logic-channelnumber [priority] Here, interface-type interface-number specifies a physical interface or virtual interface template; the value range of logic-channel-number is 1~255; the value range of priority of the backup interface is 0~255, with 0 as default. The larger the value, the higher the priority, i.e., when the main interface gets faulty, its work will be first taken over by an interface with the highest priority. If the main interface has multiple backup interfaces, simply repeat the above operations. In addition, if the backup interface is a logical channel, the logical channel should be made to correspond to the actual virtual circuit or Dialer Map. Please use the commands below to specify corresponding logical channel numbers for these virtual circuits or Dialer Map in the configuration mode of the physical interface to which they are subordinate. 1-2 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Backup Center Table LC-1-4 Establish a corresponding relation between logical channel and virtual circuit or Dialer Map Operation Command Specify a logical channel number for X.25 virtual circuit Specify a logical channel number for frame relay virtual circuit Specify a logical channel number for Dialer Map x25 map protocol address x.121-address lin logicchannel-number frame-relay map protocol address dlci lin logicchannel-number dialer map protocol next-hop-address dialer-string lin logic-channel-number 1.2.4 Setting Delay Time for Switchover Between Main and Backup Interface When the state of the main interface changes from up to down, the system doesn’t switch to backup interface right away, but wait for a preset time delay instead. The system will switch to the backup interface only if the state of the main interface remains down after the delay time runs out; if the main interface recovers within the delay time, the system will not switch to the backup interface. When the state of the main interface changes from down to up, the system doesn’t switch to the main interface right away, but wait for a preset time delay instead. The system will switch back to the main interface only if the state of the main interface remains ‘up’ after the delay time runs out; if the main interface restores its down state again within the delay time, the system will not switch to the main interface To run following commands normally, user should run those commands firstly, which specify a physical interface or virtual interface template, or a certain logical channel, except Ethernet interface, to backup main interface (backup interface/logicchannel). Please use the following command in the configuration mode of the main interface backed up. Table LC-1-5 Set the delay time for the switchover between main and backup interfaces Operation Command Set the delay time for switchover between main and backup interfaces Restore to the default value of the delay time for switchover between main and the backup interfaces backup delay enable-delay disable-delay no backup delay Here, enable-delay is the delay time for the main interface to switch over to backup interface, the value ranges from 0 to 65535 seconds, and the default value is 0, indicating an immediate switchover. disable-delay is the delay time for backup interface to switch over to the main interface, the value ranges from 0 to 65535 seconds, and the default value is 0, indicating an immediate switchover. 1.2.5 Setting State-Judging Conditions for Logic-Channel Main Interface When the main interface is a logical channel, the logical channel is regarded as down after a specified number of unsuccessful calls. After it switches over to the backup interface, regular inspections at specified time interval must be made on the state of the logical channel to check if it’s recovered its up state or not. 1-3 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Backup Center To run following commands normally, user should run those commands firstly, which specify a physical interface or virtual interface template, or a certain logical channel, except Ethernet interface, to backup main interface (backup interface/logicchannel). Please use the following command in the configuration mode of the logical channel Table LC-1-6 Set the state-judging conditions when the main interface is a logical channel Operation Command Set the condition for judging the logical channel as down: the logical channel is regarded as down after the specified number of unsuccessful calls. After system switches to backup interface, interval-time is set to make regular inspections so as to check whether the original logical channel has recovered its “up” state. backup state-down number backup state-up interval-time By default, the number of call and state checking interval-time are not configured. 1.2.6 Setting State-Judging Conditions for Logic-Channel Backup Interface If the main interface has multiple backup interfaces of which one is a logical channel, it’s necessary to judge whether the logical channel is down or up before opening it. If it is down, open the hypo-higher priority backup interface in an order of priority; after the logical channel changes to up, it’s required to switch from the hypo-higher priority backup interface of a low priority to this logical channel. To run following commands normally, the command that specifies logical channel backup main interface (backup logic-channel) must be ran at first. Please use the following commands in the configuration mode of the logical channel Table LC-1-7 Set the state-judging conditions when the backup interface is a logical channel Operation Command Set the condition for judging the backup logical channel as down: the backup logical channel is regarded as down after the specified number of unsuccessful calls. Interval-time is set to make regular inspections so as to check if the backup logical channel has restored to the up state or not. backup state-down number backup state-up interval-time By default, the number of call and state checking interval-time are not configured. 1.2.7 Configuring Routes for Main and Backup Interfaces By using command ip route in the global configuration mode, it is possible to configure routes to the destination network segment through the main interface and all the backup interfaces. Please refer to relevant chapters of “Network Protocol Configuration” in this manual for details about the command ip route. 1-4 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Backup Center 1.3 Monitoring and Maintaining of Backup Center Table LC-1-8 monitoring and maintenance of backup center Operation Command Turn on the backup debug debug backup { event | packet } 1.4 Typical Configuration of Backup Center 1.4.1 An example of Backup Between Interfaces I. Networking requirements Take interface Serial 2 as the backup interface for interface Serial 1. II. Configuration procedure ! Enter the configuration mode of Serial 1. Quidway(config)# interface serial 1 ! Set Serial 2 as its backup interface. Quidway(config-if-Serial1)# backup interface serial 2 ! Set the time for switchover between main and backup interfaces as 10 seconds. Quidway(config-if-Serial1)# backup delay 10 10 1.4.2 An Example of Multiple Backup Interfaces I. Networking requirements Take both interfaces Serial 1 and Serial 2 as the backup interface of interface Serial 0, and use interface Serial 1 as a preference. II. Configuration procedure ! Enter the configuration mode of Serial 0. Quidway(config)# interface serial 0 ! Set interfaces Serial 1 and Serial 2 as the backup interfaces, their priorities being 30 and 20 respectively. Quidway(config-if-Serial0)# backup interface serial 1 30 Quidway(config-if-Serial0)# backup interface serial 2 20 1.4.3 An Example of Logical Channel Backup Interface I. Configuration requirements 1-5 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Backup Center Set interface Serial 1 as the backup interface for an X.25 virtual circuit on interface Serial 0. II. Configuration procedure ! Configure that interface Serial 0 encapsulates X.25 virtual circuit and specify its IP address and X.121 address. Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# encapsulation x25 Quidway(config-if-Serial0)# ip address 1.1.1.2 255.0.0.0 Quidway(config-if-Serial0)# x25 address 1 ! Match an X.25 virtual circuit on interface Serial 0 with logical channel 10. Quidway(config-if-Serial0)# x25 map ip 2.2.2.3 2 lin 10 ! Enter the configuration mode of logical channel 10. Quidway(config-if-Serial0)# logic-channel 10 ! Specify interface Serial 1 as the backup interface of this logical channel. Quidway(config-logic-channel10)# backup interface serial 1 ! Set the time interval as 10 seconds for judging the logical channel as up. Quidway(config-logic-channel10)# backup state-up 10 1.4.4 An Example of Multiple Backup Interfaces with a Logical Channel I. Configuration requirements Take both logical channel 3 on interface Serial 1 and interface Serial 2 as the backup interfaces of logical channel 5 on interface Serial 0. II. Configuration procedure ! Configure that interface Serial 0 encapsulates X.25 virtual circuit and specify its IP address and X.121 address. Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# encapsulation x25 Quidway(config-if-Serial0)# ip address 1.1.1.2 255.0.0.0 Quidway(config-if-Serial0)# x25 address 1 ! Match an X.25 virtual circuit on interface Serial 0 with logical channel 5. Quidway(config-if-Serial0)# x25 map ip 2.2.2.3 2 lin 5 ! Configure that interface Serial 1 encapsulates X.25 virtual circuit and specify its IP address and X.121 address. Quidway(config-if-Serial0)# interface serial 1 Quidway(config-if-Serial1)# encapsulation x25 Quidway(config-if-Serial1)# ip address 3.3.3.4 255.0.0.0 1-6 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Backup Center Quidway(config-if-Serial1)# x25 address 3 ! Match logical channel 3 with an X.25 virtual circuit on interface Serial 1. Quidway(config-if-Serial1)# x25 map 4.4.4.5 4 lin 3 ! Enter the configuration mode of logical channel 5 and set logical channel 3 and interface Serial 1 as its backup interfaces, their priorities being 50 and 20 respectively. Quidway(config-if-Serial1)# logic-channel 5 Quidway(config-logic-channel5)# backup logic-channel 3 50 Quidway(config-logic-channel5)# backup interface serial 2 20 1-7 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of HSRP Chapter 2 Configuration of HSRP 2.1 HSRP Overview HSRP (Hot Standby Router Protocol), is a reliability protocol based on hot standby mechanism. It aims, when using a router as the gateway, to enhance the connection reliability between the network and the outside through hot standby mechanism. It will be suffice to configure HSRP on a router, which does not affect the local host and there is no need to make configuration on the local host. Put two or more routers into a hot standby group to implement HSRP: from the local host’s point of view, this hot standby group is a virtual router itself, with its own IP address (a virtual IP address), and the local hosts use this virtual router as a gateway. In the hot standby group, there is one active Router. It does the work of a virtual router such as forwarding the local host’s data and messages to the virtual router. And there is a router in the standby state that is ready to switch over to the active state at any time when it is necessary. The other routers (if any) in the group are in a listen state. The state of non-active routers (standby or listen) are determined by their own priority, i.e., the router with the highest priority will be in standby state, which leaves the other routers to be in a listen state. If they have the same priority, then the one with a bigger Ethernet interface IP address will be in a standby state, leaving the rest ones to be in a listen state. When fault occurs, a standby router will take over the work of the active router, and one of the rest routers (if any) with the highest priority will be selected as the standby router. Thus, the local host can keep using this virtual router gateway without any modifications. IP address: 202.38.160.1 Workstation Gateway IP address: 202.38.160.10 Ethernet Router A (Active) Virtual IP address: 202.38.160.10 Virtual MAC address: 00-E0-FC-00-5F-01 Virtual router Router B (Standby) IP address: 202.38.160.2 Figure LC-2-1 Schematic diagram of HSRP application In this figure, Router A and Router B form a hot standby group, which has the following workflow: A certain local host takes the IP address 202.38.160.10 of the hot standby group— virtual router as its own gateway address. Before transmitting messages through gateway, it sends out an ARP request in the hope of obtaining a virtual MAC address 2-1 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of HSRP corresponding to this IP address; and as Router A is active now, it will respond to this ARP request by informing the host that this MAC address is 00-E0-FC-00-5F-01. In this way all the messages sent by the host to the gateway will use this MAC address as a destination MAC address. Router A will receive these messages, forward them, or process them in some other ways. At the same time, Router A will send out Hello messages periodically to keep its state informed to Router B. If Router B doesn’t receive the messages sent by Router A in the set time, it will conclude that Router A isn’t usable anymore. Thus Router B changes to the active state and receives all the messages sent by the local host to virtual router gateways (i.e., to IP address 202.38.160.10 or MAC address 00-E0-FC-00-5F-01), forwards them, processes them in some other ways. And the local host can still use gateway as usual (i.e., use 202.38.160.10 as its own gateway IP address). 2.2 Configuring HSRP 2.2.1 Configuration Task List HSRP protocol is designed to support multicast or broadcast LAN such as Ethernet. Therefore HSRP configuration is performed in the configuration mode of the Ethernet interface. The HSRP configuration tasks of VRP include: z z z z z z z z Start HSRP function Set router’s priority in HSRP Hot Standby group Set Router’s preemption working mode in HSRP Hot Standby group Set HSRP authorization word Set HSRP timer Set to monitor the specified interface. Set to use the actual interface MAC address. Modify virtual MAC address 2.2.2 Starting HSRP Function Start Ethernet interface’s HSRP function in the router to add a Hot Standby group to a specified LAN segment. It is necessary to specify a Hot Standby group number and virtual IP address. Please use the following commands in the configuration mode of Ethernet interface. Table LC-2-1 Start HSRP function Operation Command Start HSRP function Prohibit HSRP function Standby [group-number] ip [virtual-ip-address] No standby [group-number] ip [virtual-ip-address] Group-number is the number of the Standby group, with a value range of 0~255 and a default value of 0.virtual-ip-address is the virtual IP address. If the virtual IP address is not specified, the router will not participate in the backup process until it receives the virtual IP address from among the messages sent by an active router in the Hot Standby group. Note that the virtual-ip-address should be at the same network segment as the interface’s IP address. 2-2 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of HSRP Note: 1) Please note that if some Ethernet interface configured with HSRP has its IP address changed, its HSRP will become disabled. 2) If a route is configured with several HSRP Hot Standby Group, then there can be at most one Hot Standby Group without specified virtual IP address. 2.2.3 Setting Router’s Priority in HSRP Hot Standby Group HSRP determines the state of every router in Hot Standby group according to their priority parameters, i.e., a router with both the highest priority and a virtual IP address will be an active router, leaving others in the standby or listen state. Please use the following command in the Ethernet interface configuration mode. Table LC-2-2 Set router’s priority in HSRP Hot Standby group Operation Command Set router’s priority in HSRP Hot Standby group. standby [group-number] priority [priority-value] Priority-value is its priority, the larger the value, the higher the priority, and it has a value range of 0~255 and a default value of 100. 2.2.4 Setting Router’s Preemption Mode in HSRP Standby Group Once a Router in the Standby group becomes an active Router, as long as the active Router does not break down, other Routers will not become active even if they have a higher priority level later on, except that they are set in a preemption working mode. If a router is set in a preemption mode in an HSRP hot standby group, once it finds out that it has a higher priority than the present active router, it will ‘preempt ’ to become an active router. The previous active router will therefore exit its active state to become a ‘standby’ or ‘listen’ router. Please use the following commands in Ethernet interface configuration mode. Table LC-2-3 Set router’s priority in HSRP hot standby group Operation Command Set router’s preemption working mode in HSRP hot standby group. Forbid router’s preemption working mode in HSRP hot standby group. standby [group-number] preempt no standby [group-number] preempt By default it means no router is set in a preemption mode in any HSRP hot standby group. 2.2.5 Setting HSRP Authorization Word HSRP authorization word is used to check other routers’ validity in the same hot standby group. Please use the following commands in the Ethernet interface configuration mode. 2-3 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of HSRP Table LC-2-4 Set HSRP authorization word Operation Command Set HSRP authorization word standby [group-number] authentication [string] By default, the value of group-number is 0 and the authorization word string is “quidway”. The length of the authorization word should not exceed 8 characters. Note: The same authorization word must be set in the same hot standby group. 2.2.6 Setting HSRP Timer Routers in the same HSRP hot standby group check each other’s state through hellotime packets sent among each other: if no hello-packet is received from a router during a hold-time, this router is then considered as being turned off or some fault has occurred. By setting HSRP timer hello-time and hold-time are adjusted for sending hello-packets. Please use the following commands in the Ethernet interface configuration mode. Table LC-2-5 Set HSRP timer Operation Set HSRP timer Command standby [group-number] timers [hello-time] [hold-time] Both hello-time and hold-time have a value range of 1~255 and have second as their unit, their default values are 3 and 10 seconds respectively. Note: The same hello-time and hold-time must be set in the same hot standby group and hold-time must be longer than hold-time. 2.2.7 Monitoring the Specified Interface The interface monitoring function of HSRP expands backup function satisfactorily: backups are available not only for a router when it goes wrong but for an interface of a router in case it’s not usable. After the interface monitoring function is set, the router’s priority will be adjusted dynamically according to the state of the interface that is under monitoring. Once the monitored interface becomes unavailable, the priority value of this router will be reduced, so that another router with a more stable interface state in the same backup group can become the active one, or preempt to be the active one. Please use the following commands in the Ethernet interface configuration mode. 2-4 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of HSRP Table LC-2-6 Monitor the specified interface Operation Command Monitor the specified interface Cancel the monitoring of the specified interface standby [group-number] track interface-type interfacenumber [priority-reduced] no standby [group-number] track interface-type interfacenumber [priority-reduced] This command is used to monitor the interface specified by interface-type interfacenumber, of which interface-type specifies the type of a physical interface or subinterface, while interface-number specifies the number of a physical interface or subinterface. If the state of the interface turns unavailable, its priority will be reduced by a value specified by priority-reduced. The value range of priority-reduced is 1~255, with 10 as default. 2.2.8 Using Actual Interface MAC Address When the host uses HSRP virtual router, it uses both virtual IP address and virtual MAC address of the HSRP virtual router. By default, each HSRP hot standby group takes the reserved special MAC address as virtual MAC address in order to guarantee that the hot standby group is transparent to the host. However, users can also set HSRP hot standby group to use actual MAC address (Burned in Address BIA) of the active router. Please use the following commands in the Ethernet interface configuration mode. Table LC-2-7 Set to use the actual interface MAC address Operation Command Use the actual MAC address. Use the virtual MAC address. standby use-bia No standby use-bia Note: 1. When BIA is used, the same Ethernet interface must not participate in multiple hot standby groups. 2. The use of BIA might lead to a change in the state of HSRP. 2.2.9 Modifying Virtual MAC Address Virtual MAC addresses of HSRP hot standby group are different with different manufacturers. Virtual MAC addresses can be modified to achieve interworking with routers from different manufacturers. Please use the following commands in the Ethernet interface configuration mode. Table LC-2-8 Modify virtual MAC address Operation Command Set to use other virtual MAC addresses. Reuse default virtual MAC address standby use-ovmac [ xx-xx-xx-xx-xx ] no standby use-ovmac 2-5 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of HSRP xx-xx-xx-xx-xx indicates the first 5 bytes of other virtual MAC addresses, the last byte being the hot standby group’s number. The setting is valid for all HSRP hot standby groups on the configured Ethernet interface. 2.3 Monitoring and Maintaining HSRP After the configuration, the following commands can be used to turn on the debug switch of HSRP or display relevant information of HSRP so as to monitor and maintain HSRP. Table LC-2-9 Monitoring and maintenance of HSRP Operation Command Debug HSRP(in the mode of privileged users) Display relevant information of HSRP (in any configuration mode) z debug standby show standby Show relevant HSRP information Quidway# show standby Ethernet0 |Group Number : 1 State : Init Hot Standby IP : 103.1.1.5 Priority : 100 Preempt : no Hold Time : 10 Hello Time: 3 Use Virtual Mac Address : 00-e0-fc-00-5f-01 The above information includes the standby group that the interface belongs to, state, virtual IP address, priority, preemption, hold-time, hello-time, and virtual MAC address. Note: As output of the debugging information affects router’s running efficiency, please don’t turn on the debug switch unless necessary; and please turn it off after debugging. 2.4 Typical Configurations of HSRP 2.4.1 An example for single hot standby group configuration I. Networking requirements As shown in the following diagram, hosts A and B take the hot standby group, which consists of Routers A and B, as its default gateway (i.e., specify virtual IP address 202.38.160.111 as its gateway IP address), and they access host C on Internet through this gateway. Normally, it is Router A that fulfils the tasks of the gateway as an active router, if Router A switches off or breaks down, Router B will take over its tasks. Specific parameters of HSRP hot standby group: standby group number is 0, virtual IP address is 202.38.160.111. Router A is an active router with a priority of 120, and its HSRP is set as preemption so that it can go on with the gateway’s task as an active router after it restores. Router B is a backup router, set as preempted without a priority (i.e., its priority has a default value of 100). 2-6 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of HSRP II. Networking diagram Workstation C 129.20.3.1 Ethernet Router C Serial Internet Serial RouterA 202.38.160.1 Serial Router B Virtual IP address 202.38.160.2 202.38.160.111 Etherne t WorkstationA WorkstationB 202.38.160.3 202.38.160.4 Figure LC-2-2 HSRP single hot standby group configuration—an application of HSRP III. Configuration procedure z Configure Router A: ! Start HSRP function and set its working virtual IP address as 202.38.160.111. Quidway(config-if-Ethernet0)# standby ip 202.38.160.111 ! Set this router to be in the preemption mode. Quidway(config-if-Ethernet0)# standby preempt ! Set this router’s priority to 120. Quidway(config-if-Ethernet0)# standby priority 120 z Configure Router B: ! Start HSRP function and set its working virtual IP address as 202.38.160.111. Quidway(config-if-Ethernet0)# standby ip 202.38.160.111 ! Set this router to work in preemption mode. Quidway(config-if-Ethernet0)# standby preempt 2-7 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of HSRP 2.4.2 An example for setting HSRP to monitor a specified interface I. Networking requirements As shown in the above diagram, even if Router A can still work normally, once its interface that connects Internet fails, Router B will take over its work. And this can be achieved by configuring a monitoring interface. Normally, Router A shall fulfil the tasks of the gateway. Once the WAN interface Serial 0 of Router A becomes disabled, the priority of Router A will be reduced by 30, which is lower than that of Router B. Therefore Router B preempts to become the active router and starts working as the gateway. Once interface Serial 0 of Router A recovers, Router A can go on with the work of the gateway as an active router. In this example, the number of the hot standby group is 1, and configurations of authorization word and timer are added (they aren’t a must in this application, though.) II. Networking diagram It’s the same as the networking diagram in “HSRP single hot standby group configuration”. z Configure Router A: ! Start HSRP function and set it to be in No. 1 HSRP hot standby group, its virtual IP address is 202.38.160.111. Quidway(config-if-Ethernet0)# standby 1 ip 202.38.160.111 ! Set this router to work in preemption mode in No. 1 HSRP hot standby group. Quidway(config-if-Ethernet0)# standby 1 preempt ! Set this router to have a priority of 120 in No. 1 HSRP hot standby group. Quidway(config-if-Ethernet0)# standby 1 priority 120 ! Set the authentication word of No. 1 HSRP hot standby group to be “quidway”. Quidway(config-if-Ethernet0)# standby 1 authentication quidway ! Set hello-time of No. 1 HSRP hot standby group to 5 seconds, and hold-time to 15 seconds. Quidway(config-if-Ethernet0)# standby 1 timers 5 15 ! Set the priority of this router to reduce by 30 once HSRP monitoring interface Serial 0 turns disabled. Quidway(config-if-Ethernet0)# standby 1 track serial0 30 z Configure Router B: ! Start HSRP function and set it to be in No. 1 HSRP standby group, its virtual IP address being 202.38.160.111. Quidway(config-if-Ethernet0)# standby 1 ip 202.38.160.111 ! Set this router to be in the preemption mode in No. 1 HSRP hot standby group. Quidway(config-if-Ethernet0)# standby 1 preempt ! Set the authentication word of No. 1 HSRP hot standby group to be “quidway”. Quidway(config-if-Ethernet0)# standby 1 authentication quidway 2-8 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of HSRP ! Set hello-time of No. 1 HSRP standby group to be 5 seconds, and hold-time be 15 seconds. Quidway(config-if-Ethernet0)# standby 1 timers 5 15 2.4.3 An example for multiple hot standby groups configuration I. Networking requirements One Quidway router may make backups for multiple standby groups. Load sharing can be achieved by configuring multiple standby groups. For example, Router A can work both as an active router for hot standby group 1 and a backup router for hot standby group 2 at the same time. On the contrary, Router B can work as an active router for hot standby group 2 and a backup router for hot standby group 1 at the same time. Some hosts (like host A) use hot standby group 1 as their gateways, some other hosts (like host B) use hot standby group 2 as their gateways. In this way, both load sharing of network data stream and cross backup among routers can be achieved. II. Networking diagram It’s the same as the networking diagram in “HSRP single hot standby group configuration”. III. Configuration procedure z Configure Router A: ! Start HSRP function and set it to be in No. 1 HSRP hot standby group, its virtual IP address being 202.38.160.111. Quidway(config-if-Ethernet0)# standby 1 ip 202.38.160.111 ! Set this router to work in preemption mode in No. 1 HSRP hot standby group. Quidway(config-if-Ethernet0)# standby 1 preempt ! Set this router to have a priority of 120 in No. 1 HSRP hot standby group. Quidway(config-if-Ethernet0)# standby 1 priority 120 ! Set this router to belong to number 2 HSRP standby group at the same time, its virtual IP address being 202.38.160.112. Quidway(config-if-Ethernet0)# standby 2 ip 202.38.160.112 ! Set this router to work in preemption mode in number 2 HSRP hot standby group. Quidway(config-if-Ethernet0)# standby 2 preempt z Configure Router B: ! Start HSRP function and set it to be in No. 1 HSRP standby group, its virtual IP address being 202.38.160.111. Quidway(config-if-Ethernet0)# standby 1 ip 202.38.160.111 ! Set this router to work in preemption mode in No. 1 HSRP hot standby group. Quidway(config-if-Ethernet0)# standby 1 preempt 2-9 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of HSRP ! Set this router to belong to number 2 HSRP hot standby group at the same time, its virtual IP address being 202.38.160.112. Quidway(config-if-Ethernet0)# standby 2 ip 202.38.160.112 ! Set this router to work in preemption mode in number 2 HSRP hot standby group. Quidway(config-if-Ethernet0)# standby 2 preempt ! Set this router to have a priority of 120 in number 2 HSRP hot standby group. Quidway(config-if-Ethernet0)# standby 2 priority 120 2.5 Fault Diagnosis and Troubleshooting of HSRP Configuration of HSRP is not very complicated. Generally, fault can be located by viewing the configuration and debugging information: Fault 1: impossible to ping virtual IP address. It is normal that virtual IP address cannot be pinged on an active router, for virtual IP address is visible only from outside. If virtual IP address cannot be pinged on other network equipment, check as follows. z z z As state conversion of HSRP requires a little time, command show standby can be used to view HSRP information to confirm that at least one router in hot standby group is in the active state. If this equipment is in the same network segment as the virtual router, see if there is an ARP item of the virtual IP address in this equipment’s ARP table. If not, please check network line. If this equipment is in a different network segment, it must be confirmed if the equipment has any route to the virtual IP address or not. Fault 2: Multiple active routers exist in the same hot standby group. Check whether the authorization word and the timer configured on the Ethernet interface of the routers in the hot standby group are consistent. 2-10 HUAWEI® VRP User Manual – Configuration Guide Volume 3 09 – QoS Configuration (QC) User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Table of Contents Table of Contents Chapter 1 QoS Overview ............................................................................................................. 1-1 1.1 About QoS ........................................................................................................................ 1-1 1.2 Three service types of QoS .............................................................................................. 1-1 1.3 Functions of QoS .............................................................................................................. 1-2 Chapter 2 Traffic Classification and Policing ............................................................................ 2-1 2.1 Traffic Classification and Policing ..................................................................................... 2-1 2.1.1 Introduction to Traffic Classification ....................................................................... 2-1 2.1.2 Introduction to Traffic Policing................................................................................ 2-2 2.1.3 Introduction to CAR................................................................................................ 2-3 2.2 CAR Configuration ............................................................................................................ 2-4 2.2.1 CAR Configuration Task List.................................................................................. 2-4 2.2.2 Specify CAR rules .................................................................................................. 2-4 2.2.3 Apply the CAR Rule on the Interface ..................................................................... 2-5 2.2.4 Monitoring and Maintenance of CAR ..................................................................... 2-5 2.3 CAR Configuration Example............................................................................................. 2-6 2.3.1 Applying CAR Rules to All Packets........................................................................ 2-6 2.3.2 Apply CAR Rules to Packets Which is Matched the ACL ...................................... 2-7 2.3.3 Configure CAR Rules Based on the Priority Level................................................. 2-8 2.3.4 Configure CAR Rules Based on the MAC Address ............................................... 2-8 Chapter 3 Congestion Management ........................................................................................... 3-1 3.1 Congestion and Congestion Management ....................................................................... 3-1 3.1.1 About Congestion................................................................................................... 3-1 3.1.2 Congestion Management Policy ............................................................................ 3-1 3.1.3 Selecting Congestion Management Policy ............................................................ 3-3 3.1.4 Working Principle of Congestion Management Policy ........................................... 3-4 3.2 Configuration of Congestion Management ....................................................................... 3-7 3.2.1 Configuring PQ....................................................................................................... 3-7 3.2.2 Configuring CQ..................................................................................................... 3-11 3.2.3 Configuring WFQ ................................................................................................. 3-14 3.3 Configuration Example of Congestion Management ...................................................... 3-15 3.3.1 PQ Configuration Example................................................................................... 3-15 3.3.2 CQ Configuration Example .................................................................................. 3-15 3.4 Troubleshooting of Congestion Management................................................................. 3-18 i Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform QoS overview Chapter 1 QoS Overview 1.1 About QoS In traditional IP networks, all packets are processed equally. Each router processes the packets with first-in first-out (FIFO) policy. It sends the packet to the destination in the mode of best-effort, but the throughput, delay, delay jitter and packet discarding rate cannot be predicted. The situation can be very perfect, or be very bad, and it can only be determined by the state of the network. However, people raise higher demand for the network along with the rapid development of computer network. As more and more voice, image and important data are transmitted over the network, which are sensitive to bandwidth, delay, jitter and real-time features, network resources now become increasingly diversified. At the same time, the service quality also becomes an important issue. People expect that they can get enough guarantee in the aspects of the throughput, delay, delay jitter and discarding rate of packets, so that their special requirements on the special services can be satisfied. People also expect that they could obtain customized service quality according to the client types. One way to solve this problem is to increase the bandwidth. But bandwidth increase is limited and costs a lot. The problem can only be solved to a certain extent. QoS (Quality of Service) indicates the integration of a series of technologies that permit users to get predictable service quality in the aspects of throughput, delay jitter, delay, and packet discarding rate. QoS (Quality of Service) provides network service function with different service quality according to different demands. It can be said that the capability of providing QoS is the basic requirement for future IP networks. 1.2 Three service types of QoS Usually, the service of QoS is classified into the following three types: I. Best-effort Service Best-effort Service indicates to work with “the best effort”, but it cannot guarantee the service quality. II.Integrated Service This service type uses signaling mechanism to inform the data flow passing route to obligate resource, so it can implement quality guarantee very well. Bur when the size of the network is large, the cost is high, and then the integrated service is usually applicable for the edge of network. The signaling used to transfer QoS request is RSVP (Resource ReSerVation Protocol), which informs the QoS request of application to the router. The integrated service provides the following two types of services: 1) 2) Guarantee: i.e., to provide guaranteed bandwidth and delay limit to satisfy the application request Load control: to guarantee that it would provides the packets services almost the same as those when the network is not overloaded even if the network is 1-1 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform QoS overview overloaded. When the network is congested, it can also guarantee the low delay high pass of some types of packets. III. Differentiated Service Differentiated service is to classify services with the same requirement, and to provide different service quality according to the different classification. It does not need the support of special signaling, but implements the packets classification, traffic shaping, traffic policing and queuing through some features of the IP packet. It can also adopt different working modes to assort with the edge network or the core network. Differentiated Service adopts the following technology as an important application to provide point-to-point QoS guarantee: z z z CAR: to police the traffic of one flow, several or all the flows. GTS: to shape the traffic of one flow, several or all the flows. Queuing technology: such queuing debugging technologies as First-In First-Out Queuing, Priority Queuing, Custom Queuing, Weighted fair queuing, Class Based Weighted Fair Queuing operate congestion management on interfaces. Differentiated Service implements VRP QoS, its specific performances are as follows: z Packets classification At the edge of the network, classify operations with different service quality into different types. In the core network, execute the operation of corresponding service quality level according to the classification. z Congestion Management When there is congestion on the interface, provide diversified queuing mechanism to cache and allocate the congested packets. z Congestion Avoidance Avoid congestion through predicting the congestion state of the network. Congestion Avoidance can decrease the packet loss rate and improve the efficiency of using network. z Traffic Policing Control the traffic of single flow, several flows and all the packets, and make the service quality customized. z Traffic Shaping Shape the traffic that does not accord with the predefined traffic features so as to facilitate the bandwidth matching. It also can shape every flow or all the packets on the interface. z Interface Speed Restriction Tailor the bandwidth of the physical interface to enrich the managing methods of network bandwidth. 1.3 Functions of QoS The features of QoS enable the network to provide controllable and predicable services for different network applications and network traffic types. With QoS applied to the network, the followings can be implemented: z z Network resource control. Users can control the network resources being used. For example, the user can restrict the bandwidth resource to be consumed for FTP transmission in a specific connection, or provide higher priority for a more important data access. Providing trimmed network service. If the user is an ISP, QoS can be used to provide trimmed network service with different priorities for different customers. 1-2 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform z QoS overview Ensuring network service for the specified data flow. For example, it enables multimedia data flow and voice flow that are sensitive to delay to receive the service in time. Quidway series routers can realize multiple congestion management policies, and can meet different service quality demands for different users. 1-3 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Traffic Classification and Policing Chapter 2 Traffic Classification and Policing 2.1 Traffic Classification and Policing 2.1.1 Introduction to Traffic Classification Packets can be classified into multiple types of different precedence levels and services. For example, the user can sort IP packets into 6 types (2 types reserved for other purposes) according to the ToS (Type of Service) field in IP header. After the classification, other QoS features, such as congestion management and bandwidth distribution can be applied to different types. Network administrator can set the classification policy, which includes physical interface, source address, destination address, MAC address, IP protocol and the port number of the application program. Common classification algorithms are limited to IP packet header, link layer, network layer and transport layer. The content of packet is rarely used as classification criterion. The range of the classification result is not limited. The result can be the flow defined by a quin-tuple (source address, source port number, protocol code, destination address and destination port number), or all the packets in a network segment. When classifying packets on network vorder, ToS field in IP header should be set as the IP precedence which will be used as classification criterion within the network. Queuing techniques such as WFQ can also handle the packets according to IP precedence. The classification feature of CAR in QoS can be used to classify the traffic. Downstream network can select and receive the classification result from Upstream network or reclassify the traffic according to its own criterion. I. IP Precedence The user can specify the service type of the packet with 3 precedence-identifying bits of ToS field in the IP header. These bits can be used in other features configured in the network to handle the packets according to the committed services. For example, other queuing methods such as WFQ can sort the priority order of the traffic according to the set IP precedence, though IP precedence is not a queuing method. II. CAR (Committed Access Rate) CAR is the main feature to support packet classification. CAR performs classification by using the ToS field in IP header. The user can use CAR classification command to classify or reclassify the packets. The following examples show the packet classification rules: z z z z The packets received via all the interfaces are set to the highest precedence. All the HTTP traffic is classified to medium-level precedence (application classification). Video traffic from specified IP address is classified to medium-level precedence. Traffic to the specified destination address is classified to high-level precedence. 2-1 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Traffic Classification and Policing 2.1.2 Introduction to Traffic Policing For ISP (Internet Service Provider), it is necessary to control the load and traffic imported into the network by the user. For the Intranet, traffic controlling of some applications will also prove an effective means to control the network state. The typical function of the Traffic Policing is to supervise the specification of the imported traffic and confine it to a committed range. If the packet traffic is oversized on a connection point, under the Traffic Policing, some packets will be dropped or precedence of the packets will be reset (i.e., confine HTTP packet to less than 50% of the network bandwidth). Therefore, the network resource and carrier’s interest is protected from damage. One example of Traffic Policing is CAR (Committed Access Rate). CAR is widely used for monitoring and classifying the traffic entering the network of ISP (CAR is so well known as to be the second name for Traffic Policing). CAR predefines monitoring actions according to the different evaluation results of the traffic. These actions include: z z z z Forward. Forward the packet with the evaluation “conforming”. Drop. Drop the packet that does not conform to the traffic rule. Lower the precedence level and forward. Mark the packet evaluated as “partly conforming” with lower precedence and forward it. Enter the monitoring of next level. Traffic Policing can be divided into multiple levels and each level focuses on more specific objects. Traffic Policing adopts Token Bucket algorithm, as shown in Figure QC-2-1.each type of service has a corresponding number of Tokens. The Token is sent out at the specified speed. If the user service arriving speed is greater than the Token sending speed, actions need to be taken towards these service data which exceed the prescribed speed (for example, these data can be marked and forwarded only when there is no congestion. When congestion occurs in the network, these data will be dropped first.). these packets can also be dropped at the beginning. The specific method depends on the protocols and rules adopted between the carrier and the user. I. Features of Token Bucket Token Bucket can be seen as a vessel with limited capacity containing Tokens. The system puts Tokens into Token Bucket at a specified speed. when the Bucket is full, extra Token will overflow and the number of Tokens inside the Bucket will stop increasing. Put Token into Token Bucket at specified speed Classify Packet to be transmitted Token Bucket Drop Figure QC-2-1 Packet classification and traffic policing 2-2 Forward Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Traffic Classification and Policing II. Traffic Measuring with Token Bucket Whether the total number of Tokens in Token Bucket meet the packet forwarding requirement is the basis to evaluate the traffic size. If there are enough Token to forward the packets (usually one Token is associated with the forwarding authority of one bit), the traffic does not exceed the specification; otherwise, the traffic exceeds the specification. There are main three parameters to evaluate the traffic: z z z Average speed: the speed of Token put into Token Bucket. It is usually set to CIR (Committed Information Rate), that is, allowed average flow speed. Burst size: the capacity of the Token Bucket. It is usually set to CBS (Committed Burst Size), that is, the allowed maximum traffic during the evaluation time interval. Burst size must be greater than the longest packet. Time Interval: evaluate the traffic every other cycle. It is set by the system. If there are enough Tokens for the packets, it is evaluated as “confirming”. If there are not enough Tokens, it is “not conforming”. “Conforming” indicates that the traffic does not exceed the specification and corresponding number of Tokens that conform to packet forwarding authority will be taken out from the Bucket; “not conforming” indicates that the traffic exceeds the specification and too many Tokens have been consumed. III Complicacy Evaluation If there is only one Token Bucket, the evaluation result falls into two types: conforming and not conforming. In order to evaluate more complicated situation and implement more flexible control policy, two Token Buckets will be set. For example, there are 3 parameters in CAR. CIR(Committed Information Rate) CBS(Committed Burst Size) EBS(Excess Burst Size) The two Token Buckets used transceives Tokens at the same speed of CIR, but with different size--CBS and EBS respectively (CBS is less than EBS. The two Buckets are called C and B.) CBS and EBS are different burst level allowed. The evaluation results in the three cases (that is, sufficient Tokens in C, insufficient Tokens in C but sufficient in D, and sufficient Tokens in neither C nor D), the results are “conforming, partly conforming and not conforming” respectively. 2.1.3 Introduction to CAR CAR provides classification service and traffic policing by limiting the speed. The user can set IP precedence of the packets coming into the network with CAR classification in order to divide the traffic into multiple precedence levels and service types. The other network equipment can process the data according to the modified IP precedence. The user can be defined as 6 types of services according to the precedence field of ToS segment in IP packet header. The rule to define the type of packets can be based on multiple criterion, including physical port, source IP address, source MAC address, destination IP address, destination MAC address, application port, IP protocol type or other criterion which can perform classification by using access list or extended access list. Packets can also be classified according to the situation outside the network (i.e., the client type). The network can accept or ignore the classification or reclassify the packets according to a certain rule. 2-3 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Traffic Classification and Policing Set the corresponding CAR based on one of the following features: z IP z IP precedence z MAC address z IP Access Control List (including Standard Access Control List or Extended Access Control list) Multiple CAR rules can be applied on an interface to process different types of packets (i.e., restrict the speed of low precedence communication to lower than that of high precedence communication). The router will check the CAR rules in configuration order until the packet matches a certain rule. If the matched rule is not found, the transmission will be performed in the default way. CAR rules can be independent(different CAR rules process different types of packets) or overlapped(one packet can match multiple CAR rules). 2.2 CAR Configuration 2.2.1 CAR Configuration Task List CAR configuration task include: z z z Set up CAR rules Apply CAR rules on the interface Monitoring and maintenance of CAR 2.2.2 Specify CAR rules Classification of the packets is needed on the network border. The classification criterion can be designed for the packets received on a specified interface or a group of packets defined by the access-list command. The packets will be set to different precedence levels on the interface that will serve as classification criterion within the network. The packets exceeding the traffic limit in the unit time can be processed differently with those which do not exceed the limit. Perform the following configuration in global configuration mode. Table QC-2-1 Specify the CAR rules Operation Command Specify the CAR rule based on precedence level Delete the CAR rule based on precedence level Specify the CAR rule based on MAC address Delete the CAR rule based on MAC address rate-limit-list precedence-rate-limit-number { precedence | mask prec-mask } no rate-limit-list precedence-rate-limit-number { precedence | mask prec-mask ] rate-limit-list macaddress-rate-limit-number mac-address no rate-limit-list macaddress-rate-limit-number mac-address No CAR rule is specified by default. Notes: For one precedence-rate-limit-number or macaddress-rate-limit-number, only one CAR rule can be defined. The subsequent CAR rule will cover the original one. But for 2-4 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Traffic Classification and Policing different precedence-rate-limit-number or macaddress-rate-limit-number, two or more CAR rules can be defined. 2.2.3 Apply the CAR Rule on the Interface When CAR rule is applied to an interface, only the speed of the packets meeting the requirement will be limited. The speed limit will not be performed to the packets that do not meet the requirement. Perform the following configuration in the interface configuration mode. Table QC-2-2 Apply the CAR rules on an interface Operation Apply the CAR rule on an interface Delete the CAR rule on an interface Command rate-limit { input | output } [ access-group access-list-number | rate-limit-group rate-limit-number ] bps normal-burst-size maximum-burst-size conform-action action exceed-action action no rate-limit { input | output } [ access-group access-list-number| rate-limit-group rate-limit-number ] bps normal-burst-size maximum-burst-size conform-action action exceed-action action No CAR rule is applied on an interface by default. Notes: 1) In the input and output directions of the interface, multiple CAR rules can be applied. The total number of the CAR rules applied in the two directions of an interface is 100. 2) When neither access-group nor rate-limit-group is configured, the interface will limit the speed of all the IP packets. 3) When the CAR rule is applied, the interface will not support fast-forwarding. 4) Quidway series of routers support the application of CAR rules on Ethernet interface encapsulated with PPP, FR and HDLC, and sync/async serial port (including subinterface). 5) If the CAR rule based on access-list-number is to be applied on an interface, the access-list-number configured by access-list command must be permitted. Otherwise, the application of CAR rule on an interface will fail. 2.2.4 Monitoring and Maintenance of CAR Table QC-2-3 Monitoring and maintenance of CAR Operation Command Show the CAR statistics information Show the CAR rule Delete the CAR rule Enable the CAR debugging packets switches show car { all | interface type number } show rate-limit-list [ rate-limit-number ] clear car { all | interface type number } debug car { in | out } 1) show CAR statistics Quidway# show car interface serial 0 Interface name: Serial0 2-5 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Traffic Classification and Policing < Input > Matched: rate-limit-group 1 Params: rate 8000 bps, normal burst 8000 bytes, maximum burst 8000 bytes From 2-00-00 0:00:00 to 257--50-07 8477:06:00 Conformed 0 packets, 0 bytes; action: continue Exceeded 0 packets, 0 bytes; action: continue Matched: rate-limit-group 1 Params: rate 8000 bps, normal burst 8000 bytes, maximum burst 8000 bytes From 19-00-00 19:00:00 to 257--50-07 8477:06:00 Conformed 0 packets, 0 bytes; action: continue Exceeded 0 packets, 0 bytes; action: drop Matched: none 0 packets, 0 bytes; action: transmit < Output > Matched: none 0 packets, 0 bytes; action: transmit 2) Show the first CAR rule Quidway# show rate-limit-list 1 Rate-limit access list 1 mask 3D 3) Show all of the access rules in CAR Quidway# show rate-limit-list Rate-limit access list 1 mask 3D Rate-limit access list 100 7777.9999.1111 2.3 CAR Configuration Example 2.3.1 Applying CAR Rules to All Packets I. Requirements z z Apply CAR to all the packets entering Ethernet interface 0 of router A, forwarding the packets according with the qualification, discarding those unqualified ones. Apply CAR to all the packets outing Ethernet interface 1 of router A, forwarding the packets according with the qualification, discarding those unqualified ones. II. Networking diagram E0 190.0.0.2 Router C E0 190.0.0.1 E1 191.0.0.1 Router A E0 191.0.0.2 Router B Figure QC-2-2 Networking diagram of applying CAR rules to all packets II.Configuration Configure router A: ! Apply CAR to all the packets entering Ethernet interface 0 of router A. 2-6 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Traffic Classification and Policing Quidway(config-if-Ethernet0)# ip address 190.0.0.1 255.255.255.0 Quidway(config-if-Ethernet0)# rate-limit input 8000 8000 8000 conform transmit exceed drop ! Apply CAR to all the packets outing Ethernet interface 1 of router A. Quidway(config-if-Ethernet1)# ip address 191.0.0.1 255.255.255.0 Quidway(config-if-Ethernet1)# rate-limit output 8000 8000 8000 conform transmit exceed drop 2.3.2 Apply CAR Rules to Packets Which is Matched the ACL I. Requirements z z Apply CAR to packets entering serial 0 of router A and matching the specified ACL, forwarding the packets according with the qualification, discarding those unqualified ones. Apply CAR to packets outing serial 0 of router A and matching the specified ACL, forwarding the packets according with the qualification, discarding those unqualified ones. II. Networking diagram S0 10.0.0.2 Router C S0 10.0.0.1 S1 11.0.0.1 Router A S0 11.0.0.2 Router B Figure QC-2-3 Networking diagram of apply CAR rules to packets which is matched the ACL III. Configuration Configure router A: ! Apply CAR to packets entering serial 0 of router A and matching the specified ACL. Quidway(config)# access-list 1 permit 10.0.0.2 Quidway(config-if-Serial0)# ip address 10.0.0.1 255.255.255.0 Quidway(config-if-Serial0)# rate-limit input access-group 1 8000 8000 8000 conform transmit exceed drop ! Apply CAR to packets outing serial 0 of router A and matching the specified ACL. Quidway(config)# access-list 1 permit 10.0.0.2 Quidway(config-if-Serial0)# ip address 11.0.0.1 255.255.255.0 Quidway(config-if-Serial0)# rate-limit output access-group 1 8000 8000 8000 conform transmit exceed drop 2-7 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Traffic Classification and Policing 2.3.3 Configure CAR Rules Based on the Priority Level I. Requirements z z Matching CAR based on the priority level to the packets entering serial 0 of router A, forwarding the packets according with the qualification, discarding those unqualified ones. Matching CAR based on the priority level to the packets outing serial 1 of router A, forwarding the packets according with the qualification, discarding those unqualified ones. II.Networking diagram S0 10.0.0.2 Router C S0 10.0.0.1 S1 11.0.0.1 Router A S0 11.0.0.2 Router B Figure QC-2-4 Networking diagram of configuring CAR rules based on the priority level III. Configuration Configure router A: ! Matching CAR based on the priority level to the packets entering serial 0 of router A. Quidway(config)# rate-limit-list 1 1 Quidway(config-if-Serial0)# ip address 10.0.0.1 255.255.255.0 Quidway(config-if-Serial0)# rate-limit input rate-limit-group 1 8000 8000 8000 conform transmit exceed drop ! Matching CAR based on the priority level to the packets outing serial 1 of router A. Quidway(config)# rate-limit-list 1 2 Quidway(config-if-Serial0)# ip address 11.0.0.1 255.255.255.0 Quidway(config-if-Serial0)# rate-limit output rate-limit-group 1 8000 8000 8000 conform transmit exceed drop 2.3.4 Configure CAR Rules Based on the MAC Address I. Requirements z Matching CAR based on MAC address to the packets entering serial 0 of router A (packets from source address 00e0.34b0.7676), modify the priority level value of the packet according with the qualification into 7, discarding those unqualified packets. 2-8 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Traffic Classification and Policing II. Networking diagram S0 10.0.0.2 Router C S0 10.0.0.1 S1 11.0.0.1 Router A S0 11.0.0.2 Router B Figure QC-2-5 Networking diagram of configuring CAR based on the MAC address III. Configuration Configure router A ! Matching CAR based on MAC address to the packets entering serial 0 of router A. Quidway(config)# rate-limit-list 1 100 00e0.34b0.7676 Quidway(config-if-Serial0)# ip address 10.0.0.1 255.255.255.0 Quidway(config-if-Serial0)# rate-limit input rate-limit-group 1 8000 8000 8000 conform transmit exceed drop 2-9 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management Chapter 3 Congestion Management 3.1 Congestion and Congestion Management 3.1.1 About Congestion For a network unit, if data packets reach the interface at a speed faster than that the interface can transmit the data packets, congestion will occur at this interface. And some packets may be lost if there is no enough space to store them. The loss of data packets will in turn cause the same host or router to redirect the data packets due to timeout, as a result, a vicious circle will happen. There are many factors to cause congestion. For example, if the packet flow enters the router from a high-speed link and is sent out from a low-speed link, congestion will occur. And if packet flows enter the router from several interfaces at the same time while they are sent out from one interface or the processor speed is slow, congestion will also occur. As shown in the figure below, two LANs of an enterprise is interconnected through a low-speed link. When a user in LAN1 sends data packets to a user in LAN 2, congestion may occur at the interface that connects the router of LAN 1 with the lowspeed link. If an important application is running between the servers of the two LANs, while an unimportant application is running between the two PCs, the important application will be affected. Quidway router DDN/FR/ISDN/PSTN PC Ethernet 10 M Congestion occurs PC Company’s LAN 2 Server Quidway router Ethernet 10 M Company’s LAN 1 Server Figure QC-3-1 Example of congested network 3.1.2 Congestion Management Policy When congestion occurs, some packets may be discarded if there is no enough buffer to store them. The loss of data packets will in turn cause the same host or router to 3-1 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management resend the data packets due to timeout, and congestion happens again, and then the packets are sent again, a vicious circle happens. To manage the congestion of network, people adopt some policies. When congestion occurs, the router can adopt a specific policy to dispatch the data packets, and decide which packets to be sent with priority, and which packets to be discarded. The policy adopted by the router to deal with congestion is called congestion management policy. Usually Queuing technology is adopted to manage the congestion. When congestion occurs, data packets queue up at the sending interface of the router following a certain policy. When the packets are dispatched, the sending sequence of the packets is determined following a certain policy. I. FIFO Queuing In FIFO (First-In First-Out) queuing, communication priority and classification is not concerned. In FIFO application, the sequence of sending out data packets from the interface depends on the arriving sequence of the data packets at this interface. FIFO provides basic capability of storage and forwarding. In some cases, FIFO is the default queuing algorithm, which should not be modified. II. PQ (Priority Queuing) In PQ (Priority Queuing), packets with a specific communication priority will be forwarded earlier than all other packets with lower priorities, thus ensuring that the packets with higher priority can be sent out in time. PQ is used to provide strict priority for important network data. PQ can flexibly specify priority sequence according to network protocol (IP protocol for example), data inflow interface, length of the packet, source address/destination address, etc. It ensures that the most important data in the network unit using PQ can be processed as fast as possible. III. CQ (Custom Queuing) In CQ (Custom Queuing), a specific proportion of the available bandwidth of the interface is reserved for each specified traffic type. When the reserved bandwidth is not used by its type of traffic, it can be used by other types of traffic. That is, in CQ mode, bandwidth is allocated in proportion, and CQ permits to specify the total number of byte/packet to be extracted from the queue. For interfaces with a low rate, the data flow passing through this interface can also receive network service to some extent when the queue is customized for the interface. IV. WFQ (Weighted Fair Queuing) WFQ (Weighted Fair Queuing) provides a dynamic and fair queuing mode, in which the traffic is distinguished based on priority/weight, and according to the different sessions. The occupation of bandwidth is determined for each session, thus ensuring a fair treatment to all communications according to their weight. The traffic is classified by WFQ in the light of source address, destination address, source port number, destination port number and protocol type, etc. 3-2 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management 3.1.3 Selecting Congestion Management Policy Quidway series routers implement the above four congestion management policies (FIFO, PQ, CQ and WFQ) at the Ethernet port and serial port (PPP, FR and HDLC encapsulation), meeting different QoS demands of different services. FIFO implements non-priority policy of the packets in user data communication. In this mode, the priority and type of the communication is not necessary to be specified. But in the application of FIFO policy, some data that run abnormally may consume most of the available bandwidth, and occupy the full queue, which will lead to delay of the burst data source and some important communication data being discarded. PQ provides strict priority. It ensures that a specific type of communication can be sent, but all other types of packets may be sacrificed at this time. In terms of PQ, a queue with lower priority is placed in an unfavorable status. Moreover, the packets in the queues with lower priority may have no chance to be sent out in the worst circumstance (available bandwidth is limited, and the transmission frequency of the emergent communications is very high). CQ ensures all communications to get service of respective levels by allocating different bandwidths for them. And it determines the queue size by specifying the total number of packets configured in the queue, so as to control the access to the bandwidth. WFQ dynamically divides the communication into packets by fair queuing algorithm. Packet is one part of the session. WFQ allocates the bandwidths fairly for smallcapacity and interactive communications just as large-capacity communications (for example, file transmission). Comparison for these four policies is shown in the table below: 3-3 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management Table QC-3-1 Comparison table of congestion management policies No. of queue FIFO PQ CQ WFQ 1 Advantages 1.No configuration is needed, and easy to use. 2. Simple processing with less processing delay It provides absolute priority for the data of different services, and delay is ensured for real-time applications (for example, 4 VoIP) that are sensitive to time. The packet of priority service has absolute priority to occupy the bandwidth. 1. Bandwidth can be allocated in proportion for the packets of different services. 17 2. If no specific types of packets exist, the bandwidth can be increased automatically for the existing packet types. 1. Easy to configure. 2. The bandwidth can be protected for coordinated (interactive) data source (for example, TCP packet sending). Specified 3. Capable of reducing the jitter of the by the user delay. (256 by 4. Small packet is sent with priority. default) 5. Different bandwidths can be allocated for the flows with different priorities. 6. When the number of the flows is reduced, the bandwidths for the existing traffic can be increased automatically. Disadvantages 1. All packets are treated equally, and the arriving sequence of packets determines the packet occupied bandwidth, delay and loss of the packets. 2. It has no restriction on mismatched data source (for example, UDP packet sending), while the mismatched data source will affect the bandwidth of the matched data source (for example, TCP packet sending). 3. Delay of the real-time application that is sensitive to time can not be ensured (for example VoIP). 1. Configuration is needed, and processing speed is slow. 2. If the bandwidth for packets with higher priority is not restricted, packets with lower priority may not acquire the bandwidth. Configuration is needed, and processing speed is slow. The processing speed is slower than FIFO. 3.1.4 Working Principle of Congestion Management Policy Normally, queuing technology is adopted to manage congestion. When congestion occurs, data packets queue up at the sending interface of the router following a certain policy. When the packets are dispatched, the sending sequence of the packets is determined following a certain policy. 3-4 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management I. FIFO queue Packets leaving the interface Packets sent from this interface Dequeuing dispatch Figure QC-3-2 Schematic diagram of FIFO queuing As shown in the figure above, packets enter FIFO queue in sequence. The dequeuing sequence is the same as the incoming queue sequence, that is, the packet that arrives earlier will be sent earlier, while the packet arrives later will be sent later. FIFO does not make any judgement on the packets, and allocation of network bandwidth and resource are determined according to the arriving sequence of the packets. Therefore, vicious application may occupy all network resources, seriously affecting data transmission of key services. II. PQ Queue high Packets leaving the interface medium Classification Packets sent from this interface normal Dequeuing dispatch low Figure QC-3-3 Schematic diagram of priority queuing As shown in the figure above, PQ is used to provide strict priority for important network data. It ensures that the most important data in the network unit using PQ can be processed as fast as possible. PQ can flexibly specify the priority sequence according to network protocol (for example, IP and IPX), data inflow interface, length of the packet and source address/destination address. When the queues are dispatched, PQ first sends the packets in the queue with higher priority in strict compliance with high-to-low sequence. If the queue with higher priority is empty, the packets in the queue with lower priority can be sent. The packets in the queue with lower priority might be congested due to the existence of packets in the queue with higher priority. Therefore, the packets of key service (for example, ERP) are put in the queue with higher priority, and the packets of ordinary service (for example, E-mail) are put in the queue with lower priority. In this way, it can be ensured that packets of key services are transmitted with priority, and the packets of ordinary services are transmitted in the idle intervals during the processing of the key service data. 3-5 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management III. CQ Q ueue Q ueue 1 10% P a c k e ts le a v in g th e in te rfa c e Q ueue 2 10% C la s s ific a tio n .. . P a c k e ts s e n t fr o m th is in te r fa c e Q ueue 16 D e q u e u in g d is p a tc h 30% Figure QC-3-4 Schematic diagram of custom queuing As shown in the figure above, CQ classifies the packets into 17 categories (corresponding to 17 queues in CQ) following the specified policy. According to its category, the packets queue up and enter the corresponding queue of CQ based on the first-in first-out policy. Of the 17 queues of CQ, No.0 queue is a system queue, and No.1 to No.16 are user queues. And the user can configure the proportion of interface bandwidth occupied for each user queue. When the queues are dispatched, the packets in the system queue are sent with priority until the queue is empty. Then according to the bandwidth configured beforehand, a specific amount of packets in No.1 to No.16 queues are sent out in the polling mode in sequence. PQ assigns absolute priority to the packets with higher priority level compared with the packets with lower priority level. Although this ensures that the key service data can be transmitted with priority, the packets with lower priority level will all be congested if the bandwidth is occupied completely for transmitting massive packets with higher priority. If CQ is adopted, this case can be avoided. There are 17 queues in CQ. The user can configure the policy of flow classification, and specify the proportion of interface bandwidths occupied by the 16 user queues. Thus, the packets of different services are allocated with different bandwidths, ensuring that key services can get more bandwidths while preventing from no bandwidth available for ordinary services. In the network diagram shown in figure QC-2-1, suppose the server of LAN 1 sends key service data to the server of LAN 2, and PC of LAN 1 sends ordinary service data to PC of LAN 2. The serial port connected with WAN is configured with CQ for congestion management. Key service data flow between the server enters queue A, and ordinary service data flow between PCs enters queue B. The proportion of interface bandwidth occupied by queue A against queue B is configured to 3:1 (for example, queue A in each dispatching can continuously send 6000 bytes of packets, and queue B in each dispatching can continuously send 2000 bytes of packets). In this way, CQ treats the two packet types of different services in different ways. When queue A is dispatched, the packets is sent continuously till the number of bytes being sent is no less than 6000 or the queue is empty, then CQ turns to dispatching the next user queue. When queue B is dispatched, the dispatching will not end till the number of bytes being sent continuously is no less than 2000 or the queue B is empty. In this way, if congestion occurs and there are always packets in queue A and B to be sent, from the statistics result it can be seen that the proportion of the bandwidths acquired by the key services against the bandwidths acquired by the ordinary services is approximately 3:1. 3-6 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management IV. WFQ Queue queue 1 Packets leaving the interface queue 2 Classification ... Packets sent from this interface queue N Dequeuing dispatch Figure QC-3-5 Schematic diagram of weighted fair queuing WFQ embodies the weight on the basis of ensuring fairness, and the amount of the weight depends on the IP Precedence brought in the IP packet headers. As shown in the figure above, WFQ classifies the packets according to the flow (packets with the same source IP address, destination IP address, source port number, destination port number, protocol number and TOS), and each flow is allocated with to one queue. When outgoing from the queue, WFQ allocates the bandwidth to be occupied at the exit by each flow according to the precedence of the flow. The smaller number of the precedence, the less bandwidth of the flow. The bigger number of the precedence, the more bandwidth of the flow. For example, there are currently 8 flows at the interface, with priority of 0, 1, 2, 3, 4, 5, 6 and 7.So, the total bandwidth allocated is the sum of all priorities (flow priority + 1). That is, 1+2+3+4+5+6+7+8=36 The proportion of bandwidth occupied by each flow is: (priority number +1) / (all priorities (flow priority + 1)) That is, each flow can acquire the bandwidth as follows: 1/36, 2/36, 3/36, 4/36, 5/36, 6/36, 7/36, 8/36. Another example: there are 4 flows currently, the priority of three flows is 4, and the priority of one flow is 5, then the total bandwidth allocated is: (4 + 1) * 3 + (5 + 1) = 21 Therefore, the bandwidth for the three flows with priority 4 is 5/21, and the bandwidth for the flow with priority 5 is 6/21. 3.2 Configuration of Congestion Management 3.2.1 Configuring PQ I. PQ Configuration task list Configuration task list of priority queue is as follows: z z z Configure the priority queue Apply priority queue at the interface Maintain and monitor the priority queue 3-7 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management II. Configuring priority queue Priority queue includes the definition for a group of priority queues and it specifies in which queue a packet is placed and the maximum length of different priority queues. To complete the queuing of a priority queue, you must allocate this list to the interface. The same priority queue can be applied to multiple interfaces. Certainly, you can create multiple different priority policies to be applied to different interfaces. 16 groups can be configured in the priority list at most (that is, the value range of the list-number is 1-16). In each group, the following information is specified: what kind of packets enters what kind of queue, length of each queue, the number of the bytes that can be sent continuously from the respective queues in each polling, etc. The priority queue can be defined as four levels: high, medium, normal and low. Packets will be forwarded by the level sequence. That is, after all the packets in the high queue are sent out, send all the packets in the medium queue, and then send all the packets in the normal queue, and at last send the packets in the low queue. Priority queue can be configured according to the modes below. 1) Configure priority queue according to network layer protocols Data packets can be classified according to different types of protocols to make them enter different priority queues. Perform the following task in the global configuration mode. Table QC-3-2 Configure the priority queue according to the network layer protocol Operation Configure the priority queue according to the network layer protocol Delete classification policy in the priority queues Command priority-list list-number protocol protocol-name { high | medium | normal | low } [ queue-keyword keyword-value ] no priority-list list-number protocol protocol-name { high | medium | normal | low } [ queue-keyword keyword-value ] No priority queue is established by default. Here, list-number is the group number of priority queue. protocol-name is the name of the protocol, the value of which can be IP and IPX at present. When protocol-name is IP, the value of queue-keyword and keyword-value is shown in the table below. Table QC-3-3 Value of queue-keyword and keyword-value in IP queue-keyword keyword-value Null fragments Null Null list lt gt tcp udp Meaning If it is an IP packet, it enters the queue. If it is a fragmentary IP packet, it enters the priority queue IP packet in compliance with a specific access-list-number (normal) access-list-number definition enters the priority queue. IP packet whose length is smaller than a count value enters the priority Length Value queue. Length Value IP packet whose length is larger than a count value enters the priority queue. If the source of IP packet or destination TCP port number is the specified port Port No. number, the packet enters the queue. If the source of IP packet or destination UDP port number is the specified Port No. port number, the packet enters the priority queue. 3-8 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management If protocol-name is IPX, the value of queue-keyword and keyword-value is shown in the table below. Table QC-3-4 Value of queue-keyword and keyword-value in IPX queue-keyword keyword-value Null Null lt Length Value gt Length Value 2) Meaning If it is an IPX packet, it enters the queue IPX packet whose length is smaller than a count value enters the priority queue. IPX packet whose length is larger than a count value enters the priority queue. Configure the priority queue according to the interface Data packet is classified by the interface through which it enters, and is accordingly put into queue with different priority. Perform the following task in the global configuration mode. Table QC-3-5 Configuring priority queue according to the interface Operation Command Configure the priority queue according to the interfaces Delete classification policies in the priority queue priority-list list-number interface type number { high | medium | normal | low } no priority-list list-number interface type number {high | medium | normal | low } No priority queue is established by default. 3) Configure the default queue Packets not in compliance with any matching policy in the priority queue should be allocated to a default priority queue. Perform the following task in the global configuration mode. Table QC-3-6 Configuration the default priority queue Operation Configure the default priority queue Restore the default priority of the priority queue Command priority-list list-number default { high | medium | normal | low } no priority-list list-number default No priority queue is established by default. Multiple policys can be defined for a group of the priority queue, and this group can be applied to a certain interface. When a packet reaches this interface (then sent out from this interface), the system matches this packet along the policy link. If the packet is matched with a certain policy, it enters the corresponding queue, and the matching is completed. If the packet does not match with any policy, it enters the default queue. The default priority of the priority queue is normal. 4) Specify the queue length of the priority queue (optional) The queue length in each priority queue can be specified (the queue length refers to the maximum number of packets that can be accommodated in a queue). Perform the following task in the global configuration mode. 3-9 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management Table QC-3-7 Configuration of queue length of priority queue Operation Command Configure the queue length of the priority queue Restore the default value of priority queue length priority-list list-number queue-limit high-limit medium-limit normal-limit low-limit no priority-list list-number queue-limit The default length of respective queues is shown in the table below. Table QC-3-8 The value of default length of the priority queue Queue Length high medium normal low 20 40 60 80 III. Applying priority queue to the interface The configured priority queue can be applied to a specific interface, and each interface can be allocated only with one priority queue. Perform the following task in the interface configuration mode. Table QC-3-9 Apply the priority queue to the interface Operation Command Apply the priority queue to the interface Restore the default congestion management policy at the interface priority-group list-number no priority-group The interface adopts FIFO queuing by default. IV. Maintaining and monitoring the priority queue Table QC-3-10 Maintenance and monitoring of the priority queue Operation Command Show the status of the priority queue Show the configuration of the priority queue at the interface Enable the priority queue debugging packets switches 1) Show the status of the priority queue. (If a value is the same with its default value, the status is not showed). Quidway# show queueing priority List 1 1 1 1 5 show queueing priority show interface [ type number ] debug priority-queue Queue high medium normal low high Args 645 22 123 567 protocol ip 3-10 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management 3.2.2 Configuring CQ I. CQ configuration task list Configuration task of custom queuing is as follows: z z z Configure the custom queue Apply the custom queue to the interface Maintenance and monitoring of the custom queue II. Configuring the custom queue 16 groups can be configured in the custom queue at most (that is, the value range of the list-number is 1-16). In each group, the following information is specified: what kind of packets enters what kind of queue, length of each queue, the number of the bytes that can be sent continuously from the respective queues in each polling, etc. Each time packets of No.1-16 queues are sent in turn. The number of bytes sent each time cannot be less than the number defined by the queue, and packets will be sent out until the queue is empty. Multiple priority queues can be configured. The system will match the packets according to the sequence specified in the policy list. If the system finds that the packet matches with a policy, it ends the whole searching process. Custom queue can be configured according to the modes below. 1) Configure the custom queue according to the network layer protocol Packets can be classified according to the different protocol types, and make them enter the queues with different custom priority. Perform the following task in the global configuration mode. 3-11 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management Table QC-3-11 Configuring the custom queue according to network layer protocol Operation Command Configure the custom queue according to the network layer protocol Delete the classification policy in the custom queue custom-list list-number protocol protocol-name queuenumber [ queue-keyword keyword-value ] no custom-list list-number protocol protocol-name queue-number [ queue-keyword keyword-value ] Here, list-number is the group number of the custom queue. Queue-number is the queue number, the value of which can be 0-16. protocol-name can be IP and IPX. The values of queue-keyword and keyword-value are the same as the values in the priority queue. 2) Configure the custom queue according to the interface configuration Packets can be classified according to different types of router interfaces into which the packet enters, so that the packets can enter different custom-queues. Perform the following task in the global configuration mode. Table QC-3-12 Configuring the custom queue according to the interface Operation Command Configure the custom queue according to the interface Delete the policy in the custom queue 3) custom-list list-number interface type number queuenumber no custom-list list-number interface type number Configure the default queue Packet not in compliance with any matching policy in the priority queue should be allocated with a default custom-queue. Perform the following task in global configuration mode. Table QC-3-13 Configuration the default custom queue Operation Command Configure the default custom queue Restore the default queue number of the custom queue custom-list list-number default queue-number no custom-list list-number default Multiple policies can be defined for a custom queue, and these policies can be applied to a certain interface. When a packet reaches this interface (and sent out from this interface), the system will match for this packet along the policy link. If the packet is matched with a specific policy, it enters the corresponding queue, and the matching is completed. If the packet does not match any policy, it enters the default queue. The number of the default custom queue is 16 by default. 4) Specify the queue length of the custom queue (optional) The queue length of each priority queue can be specified (the queue length refers to the maximum number of packets that can be accommodated in a queue). Perform the following task in the global configuration mode. 3-12 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management Table QC-3-14 Configuration of queue length of the custom queue Operation Command Configure the queue length of the custom queue Restore the default value of custom queue length custom-list list-number queue queue-number limit queue-limit no custom-list list-number queue queue-number limit The queue length of the custom queue is 20 by default, with the value range of 0-32767 packets. 5) Configure the continuously sent byte number of the custom queue (optional), The continuously sent byte number can be specified for each custom queue (the number of bytes that can be accommodated). Perform the following task in the global configuration mode. Table QC-3-15 Configure the continuously sent byte number of the custom queue Operation Command Configure the continuously sent byte number of the custom queue Restore the default value of the continuously sent byte number of the custom queue custom-list list-number queue queue-number byte-count byte-count-number no custom-list list-number queue queue-number byte-count By default the continuously sent byte number of each queue is 1500 in each polling and the value range is 0-16777215 bytes. byte-count-number: when the router dispatches the user queue of CQ, it keeps taking out packets from this queue to send till the sent byte count is no less than the value of byte-count-number configured for this queue or until this queue is empty, then it turns to dispatch the next user queue of CQ. Therefore, the value of byte-count-number will affect the proportion of interface bandwidth occupied by each user queue of CQ, and determine the duration after which the router will dispatch the next queue of CQ. If the value of byte-count-number is too small, since the router will turn to the next queue only after it has at least sent one packet, the bandwidth actually obtained by respective queues may be quite different from what is expected. If the value of bytecount-number is too big, long delay may be resulted from switching between the queues. III. Applying custom queue to the interface The configured custom queue can be applied to a specific interface, and each interface can only be allocated with one custom queue. Perform the following task in the interface configuration mode. Table QC-3-16 Apply the custom queue to the interface Operation Command Apply the custom queue to the interface Restore the default congestion management policy at the interface 3-13 custom-group list-number no custom-group Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management The interface adopts FIFO queuing by default. IV. Maintaining and monitoring the custom queue Table QC-3-17 Maintenance and monitoring of the custom queue Operation Command Show the custom queue status Show the configuration of the custom queue at the interface Enable the custom queue debugging packets switches 6) show queuing custom show interface [type number] debug custom-queue Show the status of the custom queue. Quidway# show queueing custom Current custom-queue-list configuration: List Queue Args 1 0 default 3.2.3 Configuring WFQ I. WFQ configuration task list Configuration task of weighted fair queue is as follows: z z Configure the weighted fair queue Maintenance and monitoring of the weighted fair queue II. Configuring the weighted fair queue Perform the following task in the interface configuration mode. Table QC-3-18 Configuring the weighted fair queue Operation Command Configure the weighted fair queue Restore the managing policy of the default queue congestion on the interface fair-queue [ discard-threshold [ dynamic-queue-count ] ] no fair-queue By default, FIFO is adopted as the congestion management policy. discard-threshold is 64 bytes and dynamic-queue-count is 256 bytes by default. III. Maintenance and monitoring of the weighted fair queue Table QC-3-19 Maintenance and monitoring of the weighted fair queue Operation Command Show the configuration of the weighted fair queue Enable the fair queue debugging packets switches 1) show queueing fair debug fair-queue Show the status of the weighted fair queue. Quidway# show queueing fair Current fair queue configuration: Interface Discard threshold 3-14 Dynamic queue count Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Serial0 Congestion Management 64 256 3.3 Configuration Example of Congestion Management 3.3.1 PQ Configuration Example ! Define access control list, permitting packets from network segment 10.10.0.0 to pass. Quidway(config)# access-list 1 permit 10.10.0.0 ! Define a policy for the 1st group of the priority queue, allow IP packet with accesslist-list 100 to enter the queue with high priority. Quidway(config)# priority-list 1 protocol ip high list 1 ! Define the length of the 1st high queue of the priority queue as 10, and the lengths of other queues adopt default values. Quidway(config)# priority-list 10 queue-limit 10 40 60 80 ! Apply priority queue 1 on Serial 0. Quidway(config-if-Serial0)# priority-group 1 ! Define a policy for the 2nd group of the priority queue, making all the packets from Serial 1 enter the queue with medium priority. Quidway(config)# priority-list 2 interface serial 1 medium ! Apply priority queue 2 on Serial 1. Quidway(config-if-Serial0)# priority-group 2 3.3.2 CQ Configuration Example I. Requirements In WAN, establish two parallel tunnels (GRE encapsulation) that correspond the same physical line, requiring that the physical line bandwidths are proportionally allocated according to the services on the two tunnels. 3-15 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management II. Networking diagram PC1:10.1.3.10 PC2:10.1.5.10 (10.1.1.1)tunnel0(10.1.1.2) e0.0:10.1.3.1 s0:192.168.0.2 s0:192.168.0.1 (10.1.7.1)tunnel1(10.1.7.2) e0.1:10.1.4.1 8240 e0:10.1.5.1 e1:10.1.6.1 3680 PC3:10.1.4.10 PC4:10.1.6.10 Figre QC-3-6 Networking diagram of CQ Configuration III. Configuration 1) Configuring 8240 router ! Configure access control list Quidway(config)# access-list normal 105 permit ip 10.1.5.0 0.0.0.255 10.1.4.0 0.0.0.255 Quidway(config)# access-list normal 105 deny ip any any Quidway(config)# access-list normal 107 permit ip 192.168.0.1 0.0.0.0 192.168.0.2 0.0.0.0 Quidway(config)# access-list normal 108 permit ip 192.168.1.1 0.0.0.0 192.168.1.2 0.0.0.0 (CQ uses this command) ! Configure CQ Quidway(config)# custom-list 1 queue 1 limit 100 Quidway(config)# custom-list 1 queue 1 byte-count 5000 Quidway(config)# custom-list 1 queue 2 limit 100 Quidway(config)# custom-list 1 queue 2 byte-count 1000 Quidway(config)# custom-list 1 protocol ip 1 list 107 Quidway(config)# custom-list 1 protocol ip 2 list 108 (CQ restricts that the flow of tunnel0 is larger than that of tunnel1, and CQ is effective at the exit) ! Configure main and slave address of Serial0 Quidway(config-if-Serial0)# ip address 192.168.0.2 255.255.255.252 Quidway(config-if-Serial0)# ip address 192.168.1.2 255.255.255.252 secondary ! Apply CQ 1 on Serial0 Quidway(config-if-Serial0)# custom-group 1 3-16 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management ! Configure Tunnel0 Quidway(config-if-Tunnel0)# ip address 10.1.2.1 255.255.255.0 Quidway(config-if-Tunnel0)# tunnel source 192.168.0.2 Quidway(config-if-Tunnel0)# tunnel destination 192.168.0.1 ! Configure Tunnel1 Quidway(config-if-Tunnel1)# ip address 10.1.7.1 255.255.255.0 Quidway(config-if-Tunnel1)# tunnel source 192.168.1.2 Quidway(config-if-Tunnel1)# tunnel destination 192.168.1.1 2) Configuring 3680 router Quidway(config)# access-list normal 105 permit ip 10.1.4.0 0.0.0.255 10.1.5.0 0.0.0.255 Quidway(config)# access-list normal 105 deny ip any any Quidway(config)# access-list normal 107 permit ip 192.168.0.2 0.0.0.0 192.168.0.1 0.0.0.0 Quidway(config)# access-list normal 108 permit ip 192.168.1.2 0.0.0.0 192.168.1.1 0.0.0.0 (CQ uses this command) ! Configure CQ Quidway(config)# custom-list 1 queue 1 limit 100 Quidway(config)# custom-list 1 queue 1 byte-count 5000 Quidway(config)# custom-list 1 queue 2 limit 100 Quidway(config)# custom-list 1 queue 2 byte-count 1000 Quidway(config)# custom-list 1 protocol ip 1 list 107 Quidway(config)# custom-list 1 protocol ip 2 list 108 (CQ restricts that the flow of tunnel0 is larger than that of tunnel1, and CQ is effective at the exit) ! Configure main and slave address of Serial0 Quidway(config-if-Serial0)# ip address 192.168.0.1 255.255.255.252 Quidway(config-if-Serial0)# ip address 192.168.1.1 255.255.255.252 secondary ! Apply CQ 1 on Serial0 Quidway(config-if-Serial0)# custom-group 1 ! Configure Tunnel0 Quidway(config-if-Tunnel0)# ip address 10.1.2.2 255.255.255.0 Quidway(config-if-Tunnel0)# tunnel source 192.168.0.1 Quidway(config-if-Tunnel0)# tunnel destination 192.168.0.2 ! Configure Tunnel1 Quidway(config-if-Tunnel1)# ip address 10.1.7.2 255.255.255.0 Quidway(config-if-Tunnel1)# tunnel source 192.168.1.1 3-17 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Congestion Management Quidway(config-if-Tunnel1)# tunnel destination 192.168.1.2 3.4 Troubleshooting of Congestion Management The common fault of congestion management configuration is that the expected goal of the user can not be fulfilled when the configuration is completed. The fault is usually caused by the incorrect policy of flow classification configured by the user. To solve the problem, enable the information debugging and locate the fault according to the debugging information displayed on the screen. z Display PQ debugging information Quidway#debug priority-queue Quidway(config)#logging on Quidway(config)#log console debug When packets are sent by the interface configured with PQ policy, all information about queue selection will be shown on the screen. z Display CQ debugging information Quidway# debug custom-queue Quidway(config)# logging on Quidway(config)#log console debug When packets are sent by the interface configured with CQ policy, all information about queue selection will be shown on the screen. z Display WFQ debugging information Quidway# debug fair-queue Quidway(config)# logging on Quidway(config)# logging console debug When packets are sent by the interface configured with WFQ policy, all information about queue selection will be shown on the screen. 3-18 HUAWEI® VRP User Manual – Configuration Guide Volume 3 10 – DDR Configuration (DC) User Manual -Configuration Guide (Volume 3) Versatile Routing Platform Table of Contents Table of Contents Chapter 1 DDR Configuration ..................................................................................................... 1-1 1.1 Brief Introduction to Dial Configuration ............................................................................. 1-1 1.2 Introduction to DDR Technology....................................................................................... 1-1 1.3 Preparing DDR Configuration ........................................................................................... 1-2 1.4 Configuring DDR............................................................................................................... 1-3 1.4.1 Configuring Legacy DDR ....................................................................................... 1-3 1.4.2 Configuring Dialer Profile ..................................................................................... 1-11 1.4.3 Configuring Callback ............................................................................................ 1-13 1.4.4 Configuring DDR Special Functions .................................................................... 1-18 1.5 Monitoring and Maintenance of DDR.............................................................................. 1-20 1.6 DDR Typical Configuration Example .............................................................................. 1-21 1.6.1 Legacy DDR ......................................................................................................... 1-21 1.6.2 Dialer Profile......................................................................................................... 1-23 1.6.3 Point-to-Point DDR............................................................................................... 1-25 1.6.4 Point-to-Multipoint DDR ....................................................................................... 1-28 1.6.5 Multipoint-to-Multipoint DDR ................................................................................ 1-31 1.6.6 DDR Bearing IPX ................................................................................................. 1-37 1.6.7 DDR Bearing IP and IPX at the Same Time ........................................................ 1-41 1.6.8 Flow Control of Dialer Profile (MP over Dialer Profile)-Case 1 ............................ 1-45 1.6.9 B Channels for Dial-up and Connection to the Remote End - Case 2................. 1-47 1.6.10 Two Serial Ports for Dial-up and Remote Dial Connection – Case 3 ................ 1-49 1.6.11 One Serial Port for Dial-up and Remote Dial Connection – Case 4 .................. 1-50 1.6.12 DDR for Access Service..................................................................................... 1-52 1.6.13 DDR for Inter-Router Callback ........................................................................... 1-57 1.6.14 DDR in Which the Router Calls Back PC........................................................... 1-59 1.6.15 DDR for Autodial ................................................................................................ 1-61 1.6.16 DDR Using Dialer Map Cyclically....................................................................... 1-62 1.6.17 DDR Using Dialer Map as Backup..................................................................... 1-63 1.7 Precautions for DDR Configuration ................................................................................ 1-65 1.7.1 Configuring Dialer-group ...................................................................................... 1-65 1.7.2 Configuring Synchronous/Asynchronous Serial Port Using DDR........................ 1-65 1.7.3 Configuring Network Layer Address .................................................................... 1-66 1.7.4 Configuring PPP In Dialer Profile Configuration Mode ........................................ 1-67 1.7.5 Configuring PPP In Legacy DDR Configuration Mode......................................... 1-71 1.7.6 Configure Dialer-list.............................................................................................. 1-75 i User Manual -Configuration Guide (Volume 3) Versatile Routing Platform Table of Contents 1.8 Troubleshooting DDR ..................................................................................................... 1-75 1.8.1 DDR Fault Diagnosis............................................................................................ 1-75 1.8.2 DDR Fault Elimination.......................................................................................... 1-79 1.8.3 Troubleshooting with DDR Debugging Information.............................................. 1-80 Chapter 2 Configuration of Modem Management ..................................................................... 2-1 2.1 Modem Management Functions Provided by VRP1.4...................................................... 2-1 2.2 Modem Script.................................................................................................................... 2-1 2.2.1 Function.................................................................................................................. 2-1 2.2.2 Syntax .................................................................................................................... 2-1 2.3 Configuring Modem Management .................................................................................... 2-3 2.3.1 Modem Management Configuration Task List ....................................................... 2-3 2.3.2 Configuring Modem Call-In and Call-Out Authorities ............................................. 2-3 2.3.3 Configuring Modem Script...................................................................................... 2-3 2.3.4 Executing Modem Script Manually......................................................................... 2-4 2.3.5 Specifying the Event to Trigger Modem Script....................................................... 2-4 2.3.6 Configuring Modem Answer Mode......................................................................... 2-4 2.4 Typical Configuration of Modem Management................................................................. 2-5 2.4.1 Managing Modem with Modem Script.................................................................... 2-5 2.4.2 Remote Configuration Using Modem and Through Asynchronous Interface ........ 2-6 2.4.3 Router Initialization with Initialization Script ........................................................... 2-7 2.4.4 Direct Dial with Script ............................................................................................. 2-7 2.4.5 Interactively Connect Cisco Router Through Modem ............................................ 2-8 ii Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Chapter 1 DDR Configuration 1.1 Brief Introduction to Dial Configuration VRP1.3 provides subscribers with a perfect dial solution: z z z z z z z z Support various dial interfaces, including asynchronous serial ports, ISDN BRI interface and ISDN PRI interface, for subscribers to choose from according to networking needs and network conditions. Provide powerful DDR (Dial-on-Demand Routing) function to meet the needs of subscribers for various network topologies. Support link layer protocols like PPP. Support network layer protocols like IP and IPX. Support to run dynamic routing protocols like RIP on dial interfaces. Support flexible dial interface backup modes. Provide, at asynchronous dial interfaces, powerful control on various Modems. Highly interoperable with the dial functions of other various routers of the industry. The following are the meanings of terms used in this chapter. z z z z z z Physical interface: interface that physically exists, like Serial0 interface or Bri0 interface. Dialer interface: logical interface that is set for DDR configuration. Specific physical interfaces can be bound to Dialer interface to enable DDR. Dial interface: a generic term for any interface used for dial connection—possibly a logical Dialer interface, or a physical interface bound to the Dialer interface, or a physical interface that directly enables DDR. Dial string: PSTN telephone number or ISDN telephone number Legacy DDR (Legacy DDR): a DDR configuration mode as compared with the “Dialer Profile”. Dialer Profile (Dialer Profiles): developed to meet the needs of various dial configurations for some common physical interfaces. 1.2 Introduction to DDR Technology DDR is short for Dial-on-Demand Routing, referring to the routing technique used for interconnection of routers through PSTN. Currently there are two major kinds of public switched networks, PSTN (public switched telephone network) and ISDN (integrated services digital network). Dialing is necessary to get connected to them. DDR is adopted when routers are interconnected by asynchronous serial ports through PSTN, or by ISDN BRI/PRI interface through ISDN. In most cases, routers are not connected. Only if there are packets to be transferred between them, will DDR be started and dialup connection established between them to transfer packets. When the links are idle, DDR will automatically disconnect them— in other words, “dial-ondemand”. Therefore, DDR is quite cost-effective when there is not much information between two points and, if any, it is transferred in burst mode. DDR is not a protocol, hence no international standards. It is implemented by various router vendors themselves as needed. 1-1 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration 1.3 Preparing DDR Configuration For a network needing DDR, subscribers can make configuration preparations following the flow below. z z z z z z z Specify which routers in the network need DDR, which interfaces of these routers use DDR, what transmission medium is used, what topology is adopted, whether these interfaces are sending calls, receiving calls, or sending and receiving calls at the same time. Specify the type of interface to be used (asynchronous serial port or ISDN BRI/PRI interface). Specify the interface encapsulation to be used (PPP etc.). Specify the network protocol to be used (IP or IPX etc.). Specify the dynamic routing protocol (RIP etc.) to be used at DDR interface. Select either Legacy DDR or Dialer Profile to configure DDR. Configure DDR. The flow chart of configuration preparations is shown in the following figure. Used by which routers in the network Which network is used (PSTN or ISDN) Which routers send calls and which receive Async ISDN Serial Encapsulate? , (X.25,FR,SLIP PPP ) Network protocol? (IP, IPX) DDR Standard DDR (legacy DDR) or flexible DDR (Diaber Profiles) Configure DDR Figure DC-1-1 DDR configuration preparation flow 1-2 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration For details about the configurations of link layer protocol, network layer protocol and dynamic routing protocol, please refer to “WAN Protocol Configuration”, “Network Protocol Configuration” and “Routing Protocol Configuration” of this manual. 1.4 Configuring DDR VRP1.3 provides two DDR configuration modes: Legacy DDR and Dialer Profile. The differences between the two DDRs are given below: z Different scopes of applications As described above, Dialer Profile is developed to meet the needs of various dial configurations for some common physical interfaces. For example, with only one ISDN BRI interface, Legacy DDR cannot enable Internet access and interconnection with another remote terminal at the same time, but this is possible with Dialer Profile. z Different application methods and configurations For Legacy DDR, a dial interface may be served by multiple physical interfaces, but a physical interface can belong to only one dial interface. A physical interface inherits the attributes of the dial interface that it serves. A physical interface can be both bound to the dial interface and configured as a dial interface, or directly configured as a dial interface (which is later referred to as “a physical interface directly enables DDR”). Finally, a dial interface can correspond to multiple call destination addresses through dialer map. For Dialer Profile, although any interface may be served by multiple physical interfaces, a physical interface may serve multiple dial interfaces at the same time. It is necessary to configure authentication on the physical interface that serves Dialer Profile so that it can find, through the subscriber name of the dial-in party, the dial interface it should serve in this call. A physical interface must be bound to the dial interface to implement dial function. Finally, a dial interface corresponds to only one call destination address designated by the command dialer string. By default, dialer in-band command is configured on ISDN BRI and PRI interfaces. That is, ISDN BRI/PRI interface is designated by default to enable DDR in Legacy DDR mode. Therefore: z z If ISDN BRI/PRI interface is configured in Legacy DDR mode, it is unnecessary to execute dialer in-band command. If ISDN BRI/PRI interface is configured in Dialer Profile mode, it is necessary to execute no dialer in-band command first. Described below are the configurations of Legacy DDR, Dialer Profile, callback and special functions. 1.4.1 Configuring Legacy DDR I. The configuration tasks of Legacy DDR include: z z z z Configure an interface to send calls Configure an interface to receive calls Configure an interface to send and receive calls Set the attribute parameters of Legacy DDR. II. Configure an interface to send calls 1) Call to a single point Step 1: enable DDR. 1-3 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Please use the following commands in the configuration mode of the designated physical interface. Table DC-1-1 Enable DDR in Legacy DDR mode Operation Command Enable DDR in Legacy DDR mode dialer in-band This command is needed to make a call through an asynchronous serial port. For ISDN interface, the system automatically loads this command, making manual configuration with this command unnecessary. Step 2: set the dial string of the interface. The following command is needed to call only one destination through this interface. Please use the following command in the configuration mode of the physical interface that directly enables DDR. Table DC-1-2 Set the dial string of the interface Operation Command Set the dial string of the interface 2) dialer string dial-string [:isdn-address] Call to multiple points Step 1: enable DDR. For configuration mode and command format, please refer to Step 1 of “Call to a single point”. Step 2: set different dial strings for different destinations. Please use the following command in the configuration mode of the physical interface that directly enables DDR. Table DC-1-3 Set different dial strings for different destinations Operation Command Set different dial strings for different destinations Can define different identifiers for ISDN interface 3) dialer map protocol next-hop-address dialstring [: isdnsubaddress] dialer map protocol next-hop-address dialstring [: isdnsubaddress] Call from Dialer Rotary Group Dialer Rotary Group matches a logic dial interface to a group of physical interfaces. The configurations for this logic dial interface will be inherited by the physical interfaces in the Dialer Rotary Group. When a logic dial interface has been configured, once a physical interface is put in Dialer Rotary Group, this physical interface will inherit all configurations for the logic dial interface. When Dialer Rotary Group has been configured, if multiple destinations have been set for a logic dial interface, then any physical interface in Dialer Rotary Group can be used to call any previously set destination. Dialer Rotary Group applies to the interfaces with multiple calls to multiple destinations. 1-4 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration To configure a Dialer Rotary Group, follow the steps below: Step 1: create a logic dial interface. Please use the following command in global configuration mode. Table DC-1-4 Create a logic dial interface Operation Command Create a logic dial interface interface dialer number In the command, number is both the interface number of the logic dial interface and the identification number of Dialer Rotary Group. That is to say, when a logic dial interface is created, a Dialer Rotary Group is also specified for this interface. Step 2: enable DDR. Please use this command in the configuration mode of the logic dial interface. For the command format, please refer to Step 1 of “Call to a single point”. Step 3: designate multiple destinations for this Dialer Rotary Group. Please use this command in the configuration mode of the dial interface. Table DC-1-5 Set different dial strings for different destinations Operation Set different dial strings for different destinations Command dialer map protocol next-hop-address Dialstring [: isdnsubaddress] Step 4: put the physical interface into Dialer Rotary Group. Table DC-1-6 Put the designated physical interface into Dialer Rotary Group. Operation Command Enter the configuration mode of the designated physical interface (used in global configuration mode) Put the physical interface into Dialer Rotary Group (used in the configuration mode of the designated physical interface) interface interface-type interface-number dialer rotary-group number The physical interface in Dialer Rotary Group doesn’t use its own IP address—in application, it will inherit the IP address of the logic dial interface. The parameter number in the command dialer rotary-group number in the configuration mode of the physical interface should be the same as the number in the command interface dialer number in the configuration mode of the logic interface corresponding to the physical interface. In addition, an ISDN interface (BRI or PRI) itself can be regarded as Dialer Rotary Group of its subordinate B channel. Meanwhile, it can serve as a physical interface in other Dialer Rotary Groups. Following is the schematic diagram of Dialer Rotary Group. 1-5 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Router Dialer Dialer Interface 1 Interface 2 Serial 6 Serial 1 Serial 5 Serial 2 Serial 4 Serial 3 Figure DC-1-2 Schematic diagram of Dialer Rotary Group III. Configure an interface to receive calls 1) Receive calls from a single point To configure an interface to receive calls from a single point, just enable DDR. For configuration mode and command format, please refer to Step 1 of “Call to a single point”. As described above, for ISDN BRI/PRI interface, Legacy DDR has been enabled by default, making execution of this command unnecessary. 2) Receive calls from multiple points Usually, Dialer Rotary Group can be defined to receive calls from multiple points. Calls can be received flexibly from Dialer Rotary Group. Step 1: create a logic dial interface. For configuration mode and command format, please refer to Step 2 of “Call from Dialer Rotary Group”. Step 2: enable DDR. For configuration mode and command format, please refer to Step 2 of “Call from Dialer Rotary Group”. Step 3: select PPP encapsulation and select CHAP or PAP authentication. Receiving calls from multiple points entails CHAP or PAP authentication, otherwise various points cannot be distinguished from each other. CHAP authentication is recommended because it has encrypted password before transferring it, while PAP authentication transfers clear text. Please use this command in the configuration mode of the logic dial interface. 1-6 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Table DC-1-7 Select PPP encapsulation and select CHAP or PAP authentication Operation Command Select PPP encapsulation Select authentication mode encapsulation ppp ppp authentication {chap | pap} Step 4: set the correspondence between remote call subscriber name and protocol address so that the router can distinguish them. Please use the following command in the configuration mode of the logic dial interface. Table DC-1-8 Set the correspondence between remote subscriber name and protocol address Operation Command Set the correspondence between remote subscriber name and protocol address dialer map protocol next-hop-address name hostname Step 5: if CHAP authentication is selected, users need to set the correspondence between user name and password. The settings of both parties of the call shall be consistent. Please use the following command in the global configuration mode. Table DC-1-9 Set the correspondence between user name and password Operation Command Set the correspondence between user name and password user name password {0 | 7} password Step 6: put the physical interface into Dialer Rotary Group. For the configuration mode, command format and use mode, please refer to Step 4 of “Call from Dialer Rotary Group”. IV. Configure an interface to send and receive calls 1) Send calls to and receive calls from a point To send calls to and receive calls from a point, just make the following configurations and select PPP encapsulation. It is unnecessary to select authentication mode. Table DC-1-10 Configure a point to send and receive calls Operation Command Enter the configuration mode of a specified physical interface (used in global configuration mode) Enable DDR in Legacy DDR (used in the configuration mode of a specified physical interface) Set dial string (used in the configuration mode of the physical interface that directly enables DDR) 2) interface interface-type interface-number dialer in-band dialer string dial-string [: isdnsubaddress] Send calls to and receive calls from multiple points To send calls to and receive calls from multiple points, make the following configurations. 1-7 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Table DC-1-11 Configure to send calls to and receive calls from multiple points Operation Command Enter the configuration mode of a specified physical interface (used in global configuration mode) Select PPP encapsulation (used in the configuration mode of the specified physical interface) Select authentication mode (used in the configuration mode of the specified physical interface) Configure the correspondence between the protocol address of the remote interface and user name and dial string (used in the configuration mode of the specified physical interface) interface interface-type interface-number encapsulation ppp ppp authentication {chap | pap} dialer map protocol next-hop-address name hostname dialerstring [: isdnsubaddress] V. Set the attribute parameters of Legacy DDR 1) Set link idle time If an interface has been set to send calls, then it is possible to set that DDR will disconnect the link in case of link idle timeout. Please use the following command in the configuration mode of dial interfaces (including logic dial interface and physical interface that directly enables DDR, same below). Table DC-1-12 Set link idle timeout Operation Command Set link idle timeout 2) dialer idle-timeout seconds Set idle time of busy interface When links compete with each other, fast-idle timer will be started. Competition refers to the case when an interface, which has already established a link, is required to establish a new link with another interface. If the idle time of the first link exceeds the time set by fast-idle timer, DDR will disconnect the first link and establish a new link. Please use the following command in the configuration mode of the dial interface. 1-8 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Table DC-1-13 Set the idle time of busy interface Operation Command Set the idle time of busy interface 3) dialer fast-idle seconds Set link disconnection time When a link is disconnected due to failure or onhook, a new connection can be established only after the set time. Please use the following command in the configuration mode of the dial interface. Table DC-1-14 Set link disconnection time Operation Command Set link disconnection time 4) dialer enable-timeout seconds Set the maximum waiting time interval from call originating to call connection establishment. Please use the following command in the configuration mode of the dial interface. Table DC-1-15 Set wait-for-carrier time for port data Operation Command Set the maximum waiting time interval from call originating to call connection establishment. 5) dialer wait-for-carrier-time seconds Set access control of the dial interface Message filtering function can be set for the dial interface. Messages passing the dial interface can be classified into two categories through access control: z z Interesting—messages undergoing access control. When the dial interface receives an interesting message, if the corresponding link has been established, then DDR will send the message through this link and clear idle-time timer. If the corresponding link has not been established, then a call will be sent. Uninteresting—messages not under access control. When the dial interface receives an uninteresting message, if the corresponding link has been established, DDR will send the message through this link and do not clear idle-time timer. If the corresponding link has not been established, no call will be sent and this message will be discarded. If no dialer-group has been configured in the interface configuration, or no dialer-list corresponding to dialer-group has been configured in the global configuration, the dial interface cannot send the message. 1-9 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Table DC-1-16 Set access control of the dial interface Operation Command Configure standard access control list (used in global configuration mode) Configure extended access control list (used in global configuration mode) Configure the correspondence between access-list and Dialer Access Group (used in global configuration mode) In the configuration of dial interface, put the interface in Dialer Access Group (used in the configuration mode of dial interface) 6) access-list access-list-number {deny | permit} [wildcard-mask] access-list access-list-number {deny | permit} protocol dialer-list dialer-group protocol protocol-name {permit | deny} or dialer-list dialer-group list access-list-number dialer-group group-number Set the priorities of physical interfaces in Dialer Rotary Group Specify the sequence to use various interfaces based on their priorities. Please use the following command physical interface. in the configuration mode of the designated Table DC-1-17 Set the priorities of physical interfaces in Dialer Rotary Group Operation Command Set the priorities of physical interfaces in Dialer Rotary Group dialer priority number The value range of number is 1-127, 1 being the highest, 127 the lowest, and 1 by default. 7) Set hold-queue If no hold-queue has been established at the dial interface, when a message reaches the dial interface, the message will be lost. If a hold-queue has been established, then the message will be cached rather than get lost before connection establishment. Please use the following command in the configuration mode of the dial interface. Table DC-1-18 Set hold-queue at the dial interface Operation Command Set hold-queue at the dial interface 8) dialer hold-queue packets Set load threshold In a Dialer Rotary Group, when the proportion between flow and bandwidth, which locate on a physical interface that directly enables DDR (including serial port, ISDN BRI/PRI interface) or a Dialer interface, exceeds load threshold presupposed, DDR will start another physical interface or another physical interface belongs to the same Dialer Rotary Group and transfer data to the same destination. Actually, it realizes dynamic PPP link binding under Legacy DDR. This command must be used together with ppp multilink command. To have the detail of ppp multilink, please refer to ”Configure Link Layer protocols” in “VRP User Manual-Command Reference (V1.5)”. 1-10 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration In a Dialer Rotary Group, when the traffic bandwidth of a physical interface exceeds the preset threshold, DDR will start another physical interface and transfer data to the same destination. Perform the following task in the dialer interface configuration mode. Table DC-1-19 Set load threshold Operation Command Set load threshold Configure the interface encapsulated with PPP to operate in MP mode dialer load-threshold load [ either | inbound | outbound ] 9) ppp multilink Set autodial interval The following command, used in combination with the key word autodial in dialer map command, is used to set the interval for DDR to make autodial attempts. Please use the following command in the configuration mode of the dial interface. Table DC-1-20 Set autodial interval Operation Command Set autodial interval dialer autodial-interval seconds The default interval is 300 seconds. 1.4.2 Configuring Dialer Profile I. Introduction to Dialer Profile Dialer Profile allows the configuration of a physical interface and the logic configuration of a call to be made separately, and then dynamically bind the two to place a call. Dialer Profile uses Dialer Profiles to describe its dial attributes. All calls to the same destination network use the same Dialer Profiles. A Dialer Profiles include the following elements: z z z A logic dial interface, corresponding to a dial string, used to reach a destination network. Features of the dial interface, such as idle-timeout. A Dialer Pool, the set of bound physical interfaces with priorities, used for dial. In a Dialer Profiles, the relation between dial interfaces, Dialer Pool and physical interfaces is: z z One dial interface can use only one Dialer Pool. One Dialer Pool may contain several physical interfaces with different priorities, and a physical interface may belong to several different Dialer Pool. Therefore, in configuring DDR with Dialer Profile, the configuration tasks for a physical interface include: select encapsulation, configure Dialer Pool to which the interface belongs, and set dial authentication mode. The relation between dial interfaces, Dialer Pool and physical interfaces is shown in the following diagram. 1-11 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Figure DC-1-3 Schematic diagram of the relation between dial interfaces, dialer pool and physical interfaces In the above diagram, dial interface 1 uses Dialer Pool 2, physical interface BRI 1 belongs to Dialer Pool 2, with a priority. Physical interface BRI 2 also belongs to Dialer Pool 2, but with a different priority. For example, suppose that the priority of BRI 1 in Dialer Pool 2 is 100 and that of BRI 2 is 50. Because the priority of BRI 1 is higher than that of BRI 2, dial interface 1 will first select BRI 1 in Dialer Pool 2. II. Configuration task list of Dialer Profile The configuration tasks of Dialer Profile include: z z z Configure a logic dial interface Set the attribute parameters of the logic dial interface Bind physical interfaces for a Dialer Pool III. Configure a logic dial interface Many logic dial interfaces (the specific number depends on router resources) can be created in a router. Every logic dial interface includes all configurations required to reach a destination network. Follow the steps below to configure a logic dial interface. Please use the following command in the configuration mode of the logic dial interface. Table DC-1-21 Configure a logic dial interface Operation Command Set fast-idle time Set idle-timeout time Set wait-for-carrier-time Set autodial interval Set hold-queue Set load threshold (only in Dialer interface configuration mode) Set link disconnection time dialer fast-idle seconds dialer idle-timeout seconds dialer wait-for-carrier-time seconds dialer autodial-interval seconds dialer hold-queue packets dialer load-threshold load [ either | inbound | outbound ] dialer enable-timeout seconds IV. Set the attribute parameters of a dial interface Please use the following command in the configuration mode of the logic dial interface. 1-12 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Table DC-1-22 Configure the features of the dial interface Operation Set fast-idle time Set idle-timeout time Set wait-for-carrier-time Set autodial interval Command dialer fast-idle seconds dialer idle-timeout seconds dialer wait-for-carrier-time seconds dialer autodial-interval seconds V. Bind physical interfaces for a dialer pool The following steps are enough to bind a physical interface for a Dialer Pool. Table DC-1-23 Configure a physical interface for a dialer pool Operation Command Enter the configuration mode of the designated physical interface (used in global configuration mode) Select PPP encapsulation (used in the configuration mode of the designated physical interface) Set CHAP authentication (used in the configuration mode of the designated physical interface) Designate this interface as a member of a Dialer Pool, and set its priority (use this command again to designate this interface as a member of another Dialer Pool at the same time) (used in the configuration mode of the designated physical interface) interface interface-type interface-number encapsulation ppp ppp authentication chap dialer pool-member number [ priority priority ] 1.4.3 Configuring Callback I. The significance of callback Callback enables “call receiver” to call back “call sender” so as to: z z z z Enhance security: in callback processing, Server end calls Client (as above) end according to locally configured call number, thus avoiding insecurity due to disclosed user name and password. Save call charge (when the charge rates of two directions are different). Change charge bearer. Combine charge lists. II. Terms and abbreviations z z Client end: the first call originator, which requires the opposite end to call back the local end. Server end: the first call receiver, which will call back the opposite end. III. Functions implemented by callback Callback requires the common participation of two ends, one as Client end and the other as Server end. The basic operation flow is: Client end originates a call as “call sender”, Server end determines whether to call back; if so, Server end disconnects the incoming call, and sends a call to Client end. VRP1.3 implements the following two callback functions: 1) In PPP callback, the following supports are considered: 1-13 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform z z z 2) DDR Configuration General support (both ends have fixed network layer addresses and have implemented RFC1570). Support when Client end needs dynamic distribution of network layer addresses. Support when only Server end has implemented RFC1570. In ISDN environment, use ISDN calling line identification function to realize callback. IV. Configure ISDN calling line identification callback To support ISDN calling line identification callback, a dialer caller command is provided at ISDN interface. 1) The configurations when ISDN calling line identification callback is combined with Legacy DDR. Table DC-1-24 Use Legacy DDR to configure ISDN calling line identification callback Operation Command Enter the configuration mode of the designated dial interface (used in global configuration mode) Perform callback or connection for an incoming call that matches remote-number (used in the configuration mode of the dial interface) Set delay time before callback (used in the configuration mode of the dial interface) interface interface-type interface-number dialer caller remote-number callback or dialer caller remote-number dialer enable-timeout seconds remote-number in dialer caller command refers to the telephone number of the remote end. 2) The configurations when ISDN calling line identification callback is combined with Dialer Profile. Table DC-1-25 Use Dialer Profile to configure ISDN calling line identification callback Operation Command Enter the configuration mode of the logic dial interface (used in global configuration mode) Perform callback or connection for an incoming call that matches remote-number (used in the configuration mode of the dial interface) Set delay time before callback (used in the configuration mode of the dial interface) 3) interface dialer interface-number dialer caller remote-number callback or dialer caller remote-number dialer enable-timeout seconds Application features of ISDN calling line identification callback i. An incoming call is processed in any of the following three ways based on the matching of incoming call number and the locally configured dialer caller: z z z Reject the incoming call—if dialer caller has been configured and the incoming call number doesn’t have any matching dialer caller. Accept the incoming call—dialer caller has not been configured, or the incoming call number matches the dialer caller without the key word “callback”. Callback—the incoming call number matches the dialer caller containing the key word “callback”. 1-14 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration ii. The matching between the incoming call number and dialer caller is “right end matching”, with “*” representing any character. iii. If multiple dialer callers match the incoming call number, then select one in line with the following principle: z z Majority principle: first select the one with less “*”. Minority principle: first select the one that is found first. iv. Specify the dialer caller related to an incoming call in line with the following principle: z z If the physical interface receiving the call is an interface bound by Legacy DDR, then, in “dialer caller” configured by the logic dial interface to which it belongs, search the dialer caller matching the incoming call number. If the physical interface receiving the call is an interface bound by Dialer Profile, then, in all “dialer callers” configured by the logic dial interface to which it belongs, search the dialer caller matching the incoming call number. v. Before callback, take enable-timeout value configured at the corresponding dial interface (or the physical interface that directly enables DDR) as the delay time. vi. For an incoming call which is determined as needing callback according to dialer caller, it is also necessary to configure, at the corresponding interface, dialer map completely consistent with dial string and incoming call string (when combining with the dialer string of Dialer Profile, dialer string has to be configured, which needn’t be consistent with the incoming call string). V. Configure PPP callback In applying PPP callback, configure one end as Client end and the other end as Server end. 1) The system provides three configuration commands to implement PPP callback Please use the following two commands in the configuration mode of the dial interface. Table DC-1-26 PPP callback commands in the configuration mode of the dial interface Operation Command Set the local end as callback Server end/Client end Configure callback by searching the matching dialer map according to the name of the remote end or by the callback dial string. At this time, dialer map command must contain name parameter, otherwise callback is impossible ppp callback accept | request dialer callback-server username or dialer callback-server dial-string The first command is configured at Server end, used by DDR to determine whether to call back by using the dial string provided PPP, or to call back according to the configuration contents of dialer map. The key word “accept” in the second command sets the router as Server end and the key word “request” sets the router as Client end. Please use the following command in global configuration mode. Table DC-1-27 PPP callback command in global configuration mode Operation Command The call string for the local end to determine callback according to the name of the remote end 1-15 user name [callback-dialstring telephone-number] Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform 2) DDR Configuration Use Legacy DDR to configure PPP callback The configurations of Client end are shown in the following table. 1-16 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Table DC-1-28 Client end using Legacy DDR to configure PPP Operation Command Enter the configuration mode of the dial interface (used in global configuration mode) Select PPP encapsulation (used in the configuration mode of the dial interface) Set local end name and password for remote authentication (used in the configuration mode of the dial interface) Set the local end to authenticate the name and password of the remote end in CHAP mode (used in global configuration mode) Set the local end as callback Client end (used in the configuration mode of the dial interface) Set local call and dial strings (used in the configuration mode of the dial interface) interface interface-type interface-number encapsulation ppp ppp pap sent-username name password {0 | 7} password or ppp chap host name ppp chap password { 0 | 7 } password user remotename password {0 | 7} password ppp callback request dialer map protocol nexthopaddr dial-string The configurations of Server end are shown in the following table. Table DC-1-29 Server end using Legacy DDR to configure PPP callback Operation Command Enter the configuration mode of the dial interface (used in global configuration mode) Select PPP encapsulation (used in the configuration mode of the dial interface) Set PPP authentication mode (used in the configuration mode of the dial interface) Set the local end as callback Server end (used in the configuration mode of the dial interface) Configure callback by searching the matching dialer map according to the name of the remote end or by the callback dial string. At this time, dialer map command must contain name parameter, otherwise callback is impossible (used in the configuration mode of the dial interface) If dialer callback-server dial-string has been configured, callback dial string needs to be configured (used in global configuration mode) 3) interface interface-type interface-number encapsulation ppp ppp authentication pap or ppp authentication chap ppp callback accept dialer callback-server username or dialer callback-server dial-string user name callback-dialstring telephonenumber Use Dialer Profile to configure PPP callback The configurations of Client end are shown in the following table. 1-17 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Table DC-1-30 Client end using Dialer Profile to configure PPP callback Operation Command Enter the configuration mode of the dial interface (used in global configuration mode) Select PPP encapsulation (used in the configuration mode of the dial interface) Set local end name and password for remote authentication Set the local end to authenticate the name and password of the remote end in chap mode (used in global configuration mode) Set the local end as callback Client end (used in the configuration mode of the dial interface) Set local call and dial strings (used in the configuration mode of the dial interface) interface dialer interface-number encapsulation ppp ppp pap sent-username name password {0 | 7} password or ppp chap host name ppp chap password {0 | 7} password user remotename password {0 | 7} password ppp callback request dialer string dial-string The configurations of Server end are shown in the following table. Table DC-1-31 Server end using Dialer Profile to configure PPP callback Operation Command Enter the configuration mode of the dial interface (used in global configuration mode) Select PPP encapsulation (used in the configuration mode of the dial interface) Set PPP authentication mode, which should be the same as that selected by the Client end (used in the configuration mode of the dial interface) Set the local end as callback Server end (used in the configuration mode of the dial interface) Set callback based on callback dial string (used in the configuration mode of the dial interface) Set callback dial string (used in global configuration mode) interface dialer interface-number encapsulation ppp ppp authentication pap or ppp authentication chap ppp callback accept dialer callback-server dial-string user name callback-dialstring telephonenumber 1.4.4 Configuring DDR Special Functions I. Configure ISDN dedicated line The essence of configuring ISDN is to establish a semi-permanent connection. ISDN dedicated line configuration can only be used in combination with Legacy DDR configuration. This function requires that the switch of the telecom office should have corresponding dedicated lines connecting the remote equipment. 1-18 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Table DC-1-32 Use Legacy DDR to configure ISDN dedicated line Operation Command Configure dial string, according to which DDR determines datagram (used in the configuration mode of the dial interface) Enter the configuration mode of the designated ISDN interface (used in global configuration mode) Set the ISDN interface to belong to a dialer group (used in the configuration mode of ISDN interface) Set B channel used to connect dedicated lines (used in the configuration mode of ISDN interface) Configure dialer map (used in the configuration mode of the dial interface) dialer-list dialer-group protocol protocol-name {permit | deny | list access-list-number} interface interface-type interface-number dialer-group number dialer isdn-leased channel-number dialer map protocol next-hop-address dial-string II. Configure autodial Autodial means that when the router has been started, DDR will automatically try to establish dial connection with the remote end, making it unnecessary to trigger datagram. If dial connection fails, DDR will automatically try to establish dial connection at regular intervals. Once the dial connection is established, it won’t disconnect itself due to timeout (i.e. dialer idle-timeout is not functional). Table DC-1-33 Configure autodial Operation Command Enter the configuration mode of the designated dial interface (used in global configuration mode) Configure dialer map for autodial (used in the configuration mode of the dial interface) Set autodial interval (used in the configuration mode of the dial interface) interface interface-type interface-number dialer map protocol next-hop-address name hostname dialerstring [: isdnsubaddress] autodial dialer autodial-interval seconds Autodial interval is 300 seconds by default. III. Configure cyclic use of dialer map In dialer map configuration, the same destination network layer address can be configured with multiple dialer maps, using different dial strings, thus forming dial string backup between them. When DDR is establishing dial connection with the remote end, if the dial string currently used can’t connect the remote end, then, in the next call, the next dialer map and the dial string configured by it will be selected automatically. The configurations are as follows: 1-19 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Table DC-1-34 Configure cyclic use of dialer map Operation Command Enter the configuration mode of the dial interface (used in global configuration mode) Configure dialer map (used in the configuration mode of the dial interface) Configure several other dialer maps oriented to the same destination network layer address and using different dial strings (used in the configuration mode of the dial interface) interface interface-type interface-number dialer map protocol next-hop-address name hostname dialerstring [: isdn subaddress] dialer map protocol next-hop-address name hostname dialerstring [: isdn subaddress] 1.5 Monitoring and Maintenance of DDR In any configuration mode, the following command can be used to display dial interface information, thus monitoring and maintaining DDR. Table DC-1-35 Display DDR interface information Operation Command Display dial interface information show dialer [interface interface-type interface-number] For example: Quidway# show dialer interface serial 1 The system displays: Serial1 - dialer type = Serial NextHop_address Dialer_Strings Successes Failures Max_call Last_call 100.1.1.1 8888 Idle timer (120 secs), Fast Idle timer (20 secs) Wait for carrier (60 secs), Re_enable (20 secs) The above includes dialer map table at the interface and such information as the configuration of DDR features. Specific items are explained in the following table. Table DC-1-36 Description of the display information items of show dialer command Name Meaning The address of the remote end corresponding to a Dialer map at the interface Dial string corresponding to the Dialer map Number of Dialer map call successes Number of Dialer map call failures The maximum time Dialer map is used The time Dialer map is used for the last call The time set by Dialer idle-timeout command The time set by Dialer fast-idle command The time set by Dialer wait-for-carrier-time command The time set by Dialer enable-timeout command NextHop_address Dialer_Strings Successes Failures Max_call Last_call Idle timer Fast Idle timer Wait for carrier Re_enable 1-20 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration 1.6 DDR Typical Configuration Example 1.6.1 Legacy DDR I. Network requirements In the following diagram, the local router XXX and the remote routers YYY and ZZZ are connected through DDR. Remote routers YYY and ZZZ can call the local router XXX, while XXX can only call YYY, not ZZZ. II. Networking diagram Figure DC-1-4 Schematic diagram of a Legacy DDR configuration III. Configuration procedure ! Create a dial interface Quidway (config)# interface dialer 1 ! Configure IP address of the dial interface Quidway (config-if-Dialer1)# ip address 131.108.2.1 255.255.255.0 Quidway (config-if-Dialer1)# ip address 131.126.4.1 255.255.255.0 secondary ! Configure encapsulation PPP of the dial interface and CHAP authentication Quidway (config-if-Dialer1)# encapsulation ppp Quidway (config-if-Dialer1)# ppp authentication chap ! Configure domain name XXX of the local router Quidway (config-if-Dialer1)# ppp chap host XXX (this name is the same as the user name when the remote router configuration authenticates the local end. This will not be explained further in later examples). ! Configure password xxxsystem when the local router is authenticated by the remote router 1-21 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway (config-if-Dialer1)# ppp chap password 0 xxxsystem ! Enable DDR in Legacy DDR mode Quidway (config-if-Dialer1)# dialer in-band ! Designate the subordinate Group Quidway (config-if-Dialer1)# dialer-group 1 ! Indicating that the local end and YYY can send calls to and receive calls from each other Quidway (config-if-Dialer1)# dialer map ip 131.108.2.5 name YYY 1415553434 ! Indicating that the local end can only receive calls from ZZZ Quidway (config-if-Dialer1)# dialer map ip 131.126.4.5 name ZZZ Quidway (config-if-Dialer1)# exit ! Set dial control Quidway (config)# dialer-list 1 protocol ip permit ! Designate the asynchronous serial ports Serial0 and Serial1 to belong to rotary-group 1 (corresponding to interface dialer 1, which will not be explained further in later examples). Quidway (config)# interface serial 0 Quidway (config-if-Serial0)# dialer rotary-group 1 Set Serial0 to asynchronous mode and enable Modem attributes. Quidway (config-if-Serial0)# physical-layer async Quidway (config-if-Serial0)# modem Quidway (config-if-Serial0)# exit Quidway (config)# interface serial 1 Set Serial1 as asynchronous mode and enable Modem attributes. Quidway (config-if-Serial1)# physical-layer async Quidway (config-if-Serial1)# modem Quidway (config-if-Serial1)# dialer rotary-group 1 ! Configure remote user name and password for CHAP authentication: router YYY password to be authenticated is yyysystem; router ZZZ password to be authenticated is zzzsystem. Quidway (config)# user YYY password 0 yyysystem Quidway (config)# user ZZZ password 0 zzzsystem 1-22 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration 1.6.2 Dialer Profile I. Networking requirements In the following diagram, the central router is connected to the remote end through four ISDN BRI interfaces. It can send and receive calls. Each remote end is in a different IP network section. II. Networking diagram Figure DC-1-5 Schematic diagram of a Dialer Profile configuration III. Configuration procedure ! Create Dialer Profile going to IP subnetwork 1.1.1.0 Quidway(config)# interface dialer 1 Quidway(config-if-Dialer1)# no dialer in-band Quidway(config-if-Dialer1)# ip address 1.1.1.1 255.255.255.0 Quidway(config-if-Dialer1)# encapsulation ppp Quidway(config-if-Dialer1)# dialer remote-name Smalluser Quidway(config-if-Dialer1)# dialer string 4540 Quidway(config-if-Dialer1)# dialer pool 3 Quidway(config-if-Dialer1)# dialer-group 1 Quidway(config-if-Dialer1)# exit ! Create Dialer Profile going to IP subnetwork 2.2.2.0 Quidway(config)# interface dialer 2 Quidway(config-if-Dialer2)# no dialer in-band Quidway(config-if-Dialer2)# ip address 2.2.2.2 255.255.255.0 1-23 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Dialer2)# encapsulation ppp Quidway(config-if-Dialer2)# dialer remote-name Mediumuser Quidway(config-if-Dialer2)# dialer string 5264540 Quidway(config-if-Dialer2)# dialer pool 1 Quidway(config-if-Dialer2)# dialer-group 2 ! Create Dialer Profile going to IP subnetwork 3.3.3.0 Quidway(config)# interface dialer 3 Quidway(config-if-Dialer3)# no dialer in-band Quidway(config-if-Dialer3)# ip address 3.3.3.3 255.255.255.0 Quidway(config-if-Dialer3)# encapsulation ppp Quidway(config-if-Dialer3)# dialer remote-name Poweruser Quidway(config-if-Dialer3)# dialer string 4156884540 Quidway(config-if-Dialer3)# dialer hold-queue 10 Quidway(config-if-Dialer3)# dialer pool 2 Quidway(config-if-Dialer3)# dialer-group 2 ! Configure interface Bri0 Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# dialer pool-member 1 priority 100 Quidway(config-if-Bri0)# ppp authentication chap ! Configure interface Bri1 Quidway(config)# interface bri 1 Quidway(config-if-Bri1)# encapsulation ppp Quidway(config-if-Bri1)# dialer pool-member 1 priority 50 Quidway(config-if-Bri1)# dialer pool-member 2 priority 50 Quidway(config-if-Bri1)# dialer pool-member 3 Quidway(config-if-Bri1)# ppp authentication chap ! Configure interface Bri2 Quidway(config)# interface bri 2 Quidway(config-if-Bri2)# encapsulation ppp Quidway(config-if-Bri2)# dialer pool-member 2 priority 100 Quidway(config-if-Bri2)# ppp authentication chap ! Configure interface Bri3 Quidway(config)# interface bri 3 Quidway(config-if-Bri3)# encapsulation ppp 1-24 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Bri3)# dialer pool-member 2 priority 150 Quidway(config-if-Bri3)# ppp authentication chap ! Configure remote user name and password for CHAP authentication and set dial control. Please refer to Example 1 (omitted here). 1.6.3 Point-to-Point DDR I. Networking diagram Router A 2 005 881 48 88100 Modem PSTN Router B Modem Connect through PSTN by using serial port Router A 8810148 ISDN 8810152 Router B Connect through ISDN by using ISDN Figure DC-1-6 Networking diagram of point-to-point DDR configuration example II. Configuration procedure Solution 1: use Legacy DDR configuration mode to realize the following at the serial port: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.2 8810052 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.2 255.255.255.0 1-25 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.1 8810048 Solution 2: use Dialer Profile configuration mode to realize the following at the serial port: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user userb password 0 passb Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name userb Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810052 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name usera Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810048 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userb password 0 passb Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async 1-26 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap Solution 3: use Legacy DDR configuration mode to realize the following at ISDN BRI and PRI interfaces: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.2 8810152 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.1 8810148 Solution 4: use Dialer Profile configuration mode to realize the following at ISDN BRI and PRI interfaces: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user userb password 0 passb Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name userb Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810152 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer0)# interface bri 0 Quidway(config-if-Bri0)# no dialer in-band Quidway(config-if-Bri0)# dialer pool-member 1 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication pap 2) Configure router B: 1-27 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name usera Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810148 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userb password 0 passb Quidway(config-if-Dialer0)# interface bri 0 Quidway(config-if-Bri0)# no dialer in-band Quidway(config-if-Bri0)# dialer pool-member 1 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication pap 1.6.4 Point-to-Multipoint DDR I. Networking requirements In the connection as shown in the following diagram, A and B can call each other, A and C can call each other, but B and C can’t call each other. II. Networking diagram 2 005 881 48 88100 Router A Router B Modem PSTN 881 006 3 Modem Connection Via serial port Modem through PSTN Router C Figure DC-1-7 Networking diagram of point-to-multipoint DDR configuration example III. Configuration procedure Solution 1: use Legacy DDR configuration mode to realize the following at the serial port: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 1-28 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.2 8810052 Quidway(config-if-Serial0)# dialer map ip 100.1.1.3 8810063 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.1 8810048 3) Configure router C: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# ip address 100.1.1.3 255.255.255.0 Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.1 8810048 Solution 2: use Dialer Profile configuration mode to realize the following at the serial port: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user userb password 0 passb Quidway(config)# user userc password 0 passc Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name userb Quidway(config-if-Dialer0)# dialer-group 1 1-29 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Dialer0)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# dialer string 8810052 Quidway(config-if-Dialer0)# interface dialer 1 Quidway(config-if-Dialer1)# ip address 122.1.1.1 255.255.255.0 Quidway(config-if-Dialer1)# dialer remote-name userc Quidway(config-if-Dialer1)# dialer-group 1 Quidway(config-if-Dialer1)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer1)# dialer pool 2 Quidway(config-if-Dialer1)# dialer string 8810063 Quidway(config-if-Dialer1)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# dialer pool-member 2 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name usera Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userb password 0 passb Quidway(config-if-Dialer0)# dialer string 8810048 Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap 3) Configure router C: 1-30 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 122.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name usera Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userc password 0 passc Quidway(config-if-Dialer0)# dialer string 8810048 Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap 1.6.5 Multipoint-to-Multipoint DDR I. Networking requirements In the connection as shown in the following diagram, A can establish calls with B and C at the same time. II. Networking diagram Modem Router A 88100 52 5 005 881 Router B Modem PSTN 881 004 8 4 05 10 88 Modem Modem Router C Connection via serial port through PSTN 52 88101 Router A 88101 48 Router B ISDN 88101 63 Connection using ISDN BRI PRI through ISDN Router C Figure DC-1-8 Networking diagram of multipoint-to-multipoint DDR configuration example 1-31 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration III. Configuration procedure Solution 1: use Legacy DDR configuration mode to realize the following at the serial port: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer in-band Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer map ip 100.1.1.2 8810055 Quidway(config-if-Dialer0)# dialer map ip 100.1.1.3 8810048 Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer rotary-group 0 Quidway(config-if-Serial0)# interface serial 1 Quidway(config-if-Serial1)# physical-layer async Quidway(config-if-Serial1)# modem Quidway(config-if-Serial1)# dialer rotary-group 0 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.1 8810052 Quidway(config-if-Serial0)# dialer map ip 100.1.1.1 8810054 3) Configure router C: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# ip address 100.1.1.3 255.255.255.0 1-32 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.1 8810054 Quidway(config-if-Serial0)# dialer map ip 100.1.1.1 8810052 Solution 2: use Dialer Profile configuration mode to realize the following at the serial port: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user userb password 0 passb Quidway(config)# user userc password 0 passc Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name userb Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# dialer string 8810055 Quidway(config-if-Dialer0)# interface dialer 1 Quidway(config-if-Dialer1)# ip address 122.1.1.1 255.255.255.0 Quidway(config-if-Dialer1)# dialer remote-name userc Quidway(config-if-Dialer1)# dialer-group 1 Quidway(config-if-Dialer1)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer1)# dialer pool 2 Quidway(config-if-Dialer1)# dialer string 8810048 Quidway(config-if-Dialer1)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# dialer pool-member 2 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap Quidway(config-if-Serial0)# interface serial 1 Quidway(config-if-Serial1)# physical-layer async Quidway(config-if-Serial1)# modem 1-33 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial1)# dialer pool-member 1 Quidway(config-if-Serial1)# dialer pool-member 2 Quidway(config-if-Serial1)# encapsulation ppp Quidway(config-if-Serial1)# ppp authentication pap 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name usera Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userb password 0 passb Quidway(config-if-Dialer0)# dialer string 8810052 Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap 3) Configure router C: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 122.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name usera Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userc password 0 passc Quidway(config-if-Dialer0)# dialer string 8810054 Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 1-34 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap Solution 3: use Legacy DDR configuration mode to realize the following at ISDN BRI and PRI interfaces: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.2 8810152 Quidway(config-if-Bri0)# dialer map ip 100.1.1.3 8810163 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.1 8810148 3) Configure router C: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.3 255.255.255.0 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.1 8810148 Solution 4: use Dialer Profile configuration mode to realize the following at ISDN BRI and PRI interfaces: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user userb password 0 passb Quidway(config)# user userc password 0 passc Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name userb Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# dialer string 8810152 1-35 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Dialer0)# interface dialer 1 Quidway(config-if-Dialer1)# ip address 122.1.1.1 255.255.255.0 Quidway(config-if-Dialer1)# dialer remote-name userc Quidway(config-if-Dialer1)# dialer-group 1 Quidway(config-if-Dialer1)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer1)# dialer pool 2 Quidway(config-if-Dialer1)# dialer string 8810163 Quidway(config-if-Dialer1)# interface bri 0 Quidway(config-if-Bri0)# no dialer in-band Quidway(config-if-Bri0)# dialer pool-member 1 Quidway(config-if-Bri0)# dialer pool-member 2 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication pap 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name usera Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userb password 0 passb Quidway(config-if-Dialer0)# dialer string 8810148 Quidway(config-if-Dialer0)# interface bri 0 Quidway(config-if-Bri0)# no dialer in-band Quidway(config-if-Bri0)# dialer pool-member 1 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication pap 3) Configure router C: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 122.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name usera 1-36 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userc password 0 passc Quidway(config-if-Dialer0)# dialer string 8810148 Quidway(config-if-Dialer0)# interface bri 0 Quidway(config-if-Bri0)# no dialer in-band Quidway(config-if-Bri0)# dialer pool-member 1 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication pap 1.6.6 DDR Bearing IPX DDR can bear both IP network layer protocol and IPX network layer protocol. Make the following three modifications to the above-mentioned various solutions, and it is possible to connect DDR bearing IPX. z z z Replace the statements configuring IP network layer addresses of various interfaces with the statements configuring IPX addresses; Replace the IP address in dialer map configuration command with IPX address; Change ip in dialer-list configuration command into ipx. The following is the implementation solution of DDR bearing IPX and oriented to point-to-point connection. Its hardware configurations and dial string configurations are the same as the configurations in the example “Point-to-Point DDR”. I. Networking diagram 052 8810 Router A PSTN Modem Modem Router B 48 88100 Connection via serial port through PSTN Router A 88101 48 ISDN 8810152 Router B Connection using ISDN BRI PRI through ISDN Figure DC-1-9 Networking diagram of the configuration example of DDR bearing IPX II. Configuration procedure Solution 1: use Legacy DDR configuration mode to realize the following at the serial port: 1) Configure router A: 1-37 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.1 Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ipx network 1 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 2) Quidway(config-if-Serial0)# dialer map ipx 1.1.1.2 8810052Configure router B: Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.2 Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ipx network 1 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ipx 1.1.1.1 8810048 Solution 2: use Dialer Profile configuration mode to realize the following at the serial port: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.1 Quidway(config)# user userb password 0 passb Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ipx network 1 Quidway(config-if-Dialer0)# dialer remote-name userb Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810052 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 1-38 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap 2) Configure router B: Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.2 Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ipx network 1 Quidway(config-if-Dialer0)# dialer remote-name usera Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810048 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userb password 0 passb Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap Solution 3: use Legacy DDR configuration mode to realize the following at ISDN BRI and PRI interfaces: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.1 Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ipx network 1 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ipx 1.1.1.2 8810152 2) Configure router B: Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.2 Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ipx network 1 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ipx 1.1.1.1 8810148 1-39 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Solution 4: use Dialer Profile configuration mode to realize the following at ISDN BRI and PRI interfaces 1) Configure router A: Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.1 Quidway(config)# user userb password 0 passb Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ipx network 1 Quidway(config-if-Dialer0)# dialer remote-name userb Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810152 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer0)# interface bri 0 Quidway(config-if-Bri0)# no dialer in-band Quidway(config-if-Bri0)# dialer pool-member 1 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication pap 2) Configure router B: Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx network 1.1.2 Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ipx network 1 Quidway(config-if-Dialer0)# dialer remote-name usera Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810148 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userb password 0 passb Quidway(config-if-Dialer0)# interface bri 0 Quidway(config-if-Bri0)# no dialer in-band Quidway(config-if-Bri0)# dialer pool-member 1 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication pap 1-40 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration 1.6.7 DDR Bearing IP and IPX at the Same Time DDR can bear IP and IPX at the same time on one dial connection. That is, when a call connection has been established, IP message and IPX message can be sent at the same time on this connection. The following is the implementation solution of DDR bearing IP and IPX at the same time and oriented to point-to-point connection. Its hardware configurations and dial string configurations are the same as the configurations in the example “Point-to-Point DDR” I. Networking diagram 052 8810 Router A PSTN Modem Modem Router B 48 88100 Connection via serial port through PSTN Router A 88101 48 8810152 ISDN Router B Connection using ISDN BRI PRI through ISDN Figure DC-1-10 Networking diagram of DDR configuration bearing IP and IPX at the same time II. Configuration procedure Solution 1: use Legacy DDR configuration mode to realize the following at the serial port: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.1 Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Serial0)# ipx network 1 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.2 8810052 1-41 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0)# dialer map ipx 1.1.1.2 8810052 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.2 Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Serial0)# ipx network 1 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.1 8810048 Quidway(config-if-Serial0)# dialer map ipx 1.1.1.1 8810048 Solution 2: use Dialer Profile configuration mode to realize the following at the serial port: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.1 Quidway(config)# user userb password 0 passb Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# ipx network 1 Quidway(config-if-Dialer0)# dialer remote-name userb Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810052 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap 1-42 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform 2) DDR Configuration Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.2 Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# ipx network 1 Quidway(config-if-Dialer0)# dialer remote-name usera Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810048 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userb password 0 passb Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap Solution 3: use Legacy DDR configuration mode to realize the following at ISDN BRI and PRI interfaces: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.1 Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Bri0)# ipx network 1 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.2 8810152 Quidway(config-if-Bri0)# dialer map ipx 1.1.1.2 8810152 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.2 1-43 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Bri0)# ipx network 1 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.1 8810148 Quidway(config-if-Bri0)# dialer map ipx 1.1.1.1 8810148 Solution 4: use Dialer Profile configuration mode to realize the following at ISDN BRI and PRI interfaces: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.1 Quidway(config)# user userb password 0 passb Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# ipx network 1 Quidway(config-if-Dialer0)# dialer remote-name userb Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810152 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer0)# interface bri 0 Quidway(config-if-Bri0)# no dialer in-band Quidway(config-if-Bri0)# dialer pool-member 1 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication pap 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# ipx routing 1.1.2 Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# ipx network 1 Quidway(config-if-Dialer0)# dialer remote-name usera 1-44 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810148 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userb password 0 passb Quidway(config-if-Dialer0)# interface bri 0 Quidway(config-if-Bri0)# no dialer in-band Quidway(config-if-Bri0)# dialer pool-member 1 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication pap 1.6.8 Flow Control of Dialer Profile (MP over Dialer Profile)-Case 1 By setting flow load threshold to control flow distribution, bandwidth can be distributed in real-time and maximum bandwidth can be provided. I. Networking requirements In the following diagram, local router and remote router are interconnected through two BRI interface. Bandwidth should be provided according to the real flow. II. Networking diagram RouterA BRI0 RouterB 660368 ISDN 2.2.2.2 PRI0 661012 BRI1 660378 Figure DC-1-11 Networking diagram of DDR – Case 1 III. Configuration procedure 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user userb password 0 passb Quidway(config)# flow-interval 3 Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 2.2.2.1 255.255.255.0 1-45 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Dialer0)# encapsulation ppp Quidway(config-if-Dialer0)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer0)# ppp multilink Quidway(config-if-Dialer0)# dialer remote-name userb Quidway(config-if-Dialer0)# dialer string 661012 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer load-threshold 80 ! Configure physical interface Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# no dialer in-band Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp multilink Quidway(config-if-Bri0)# dialer pool-member 1 Quidway(config-if-Bri0)# ppp authentication pap Quidway(config-if-Bri0)# ppp pap sent-username usera password 0 passa Quidway(config)# interface bri 1 Quidway(config-if-Bri1)# no dialer in-band Quidway(config-if-Bri1)# encapsulation ppp Quidway(config-if-Bri1)# ppp multilink Quidway(config-if-Bri1)# dialer pool-member 1 Quidway(config-if-Bri1)# ppp authentication pap Quidway(config-if-Bri1)# ppp pap sent-username usera password 0 passa 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user usera password 0 passa Quidway(config)# flow-interval 3 Quidway(config)# controler e1 0 Quidway(config-if-E1-0)# pri-group Quidway(config-if-E1-0)# interface Serial 0:15 Quidway(config-if-Serial0:15)# encapsulation ppp Quidway(config-if-Serial0:15)# ppp multilink Quidway(config-if-Serial0:15)# ip address 2.2.2.1 255.255.255.0 1-46 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0:15)# dialer in-band Quidway(config-if-Serial0:15)# dialer-group 1 Quidway(config-if-Serial0:15)# dialer map ip 2.2.2.2 660368 Quidway(config-if-Serial0:15)# dialer map ip 2.2.2.2 660378 Quidway(config-if-Serial0:15)# ppp authentication pap Quidway(config-if-Serial0:15)# ppp pap sent-username userb password 0 passb 1.6.9 B Channels for Dial-up and Connection to the Remote End - Case 2 Case 2: DDR in which one B channel in ISDN BRI interface is used for dial connection to the remote end and the other for dedicated connection to the remote end. Using one of the B channels of ISDN BRI interface for dial-up, the other one for remote dial-up connection. I. Networking requirements DDR is the implementation solution. As shown in the following diagram, router A can dial-up and dial to router B at the same time. We assume user access Internet with 163 Special Service number (user name: user163, password: pass163). II. Networking diagram Internet 163 PC B PC A ISDN Ethernet 8810163 8810148 Router B Router A Figure DC-1-11 Networking diagram of DDR – Case 2 III. Configuration procedure Solution: use Dialer Profile to realize: 1) Configure router A: Quidway(config)# access-list 1 deny any Quidway(config)# access-list 1 permit 10.110.10.0 0.0.0.255 Quidway(config)# nat pool 202.110.10.10 202.110.10.11 pool 1 Quidway(config)# dialer-list 1 protocol ip permit 1-47 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config)# user userb password 0 passb Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name userb Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# dialer string 8810163 Quidway(config-if-Dialer0)# interface dialer 1 Quidway(config-if-Dialer1)# ip address negotiate Quidway(config-if-Dialer1)# nat inside 1 pool 1 Quidway(config-if-Dialer1)# dialer remote-name userc Quidway(config-if-Dialer1)# dialer-group 1 Quidway(config-if-Dialer1)# ppp pap sent-username user163 password 0 pass163 Quidway(config-if-Dialer1)# dialer pool 2 Quidway(config-if-Dialer1)# dialer string 163 Quidway(config-if-Dialer1)# interface bri 0 Quidway(config-if-Bri0)# no dialer in-band Quidway(config-if-Bri0)# dialer pool-member 1 Quidway(config-if-Bri0)# dialer pool-member 2 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication pap 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name usera Quidway(config-if-Dialer0)# dialer string 8810148 Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userb password 0 passb Quidway(config-if-Dialer0)# interface bri 0 Quidway(config-if-Bri0)# no dialer in-band 1-48 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Bri0)# dialer pool-member 1 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication pap 1.6.10 Two Serial Ports for Dial-up and Remote Dial Connection – Case 3 Case 3: DDR in which one serial port is used for dial access to Internet and another for remote dial connection. I. Networking requirements One of the two B channels of ISDN BRI can be used for private line and the other for dial-up. As shown in the following diagram, router A and router B are interconnected with one B channel, the other B channel dial to router B. II. Networking diagram 8810148 Router A Router B ISDN 8810152 Router C Figure DC-1-12 Networking diagram of DDR – Case 3 III. Configuration procedure Solution: use Legacy DDR configuration to realize: 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Bri0)# dialer isdn-leased 1 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.2 8810152 Quidway(config-if-Bri0)# dialer map ip 100.1.1.3 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.1 8810148 3) Configure router C: 1-49 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.3 255.255.255.0 Quidway(config-if-Bri0)# dialer isdn-leased 1 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.1 1.6.11 One Serial Port for Dial-up and Remote Dial Connection – Case 4 Case 4: DDR in which one serial port is used both for dial access to Internet and for remote dial connection. I. networking requirements Using Dialer Profile, we can configure a serial port to dial-up and dial to the remote end. As shown in the following diagram, router A can dial-up and dial to router B at the same time. We assume user access Internet with 163 Special Service number (user name: user163, password: pass163). PC A PC B Ethernet Internet 163 PSTN 8810052 Router A 8810048 Modem Modem Router B Figure DC-1-13 Networking diagram of DDR – Case 4 Solution: use Dialer Profile configuration to realize: 1) Configure router A Quidway(config)# access-list 1 deny any Quidway(config)# access-list 1 permit 10.110.10.0 0.0.0.255 Quidway(config)# nat pool 202.110.10.10 202.110.10.11 pool 1 Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user userb password 0 passb Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name userb 1-50 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# ppp pap sent-username usera password 0 passa Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# dialer string 8810048 Quidway(config-if-Dialer0)# interface dialer 1 Quidway(config-if-Dialer1)# ip address negotiate Quidway(config-if-Dialer1)# nat inside 1 pool 1 Quidway(config-if-Dialer1)# dialer remote-name userc Quidway(config-if-Dialer1)# dialer-group 1 Quidway(config-if-Dialer1)# ppp pap sent-username user163 password 0 pass163 Quidway(config-if-Dialer1)# dialer pool 2 Quidway(config-if-Dialer1)# dialer string 163 Quidway(config-if-Dialer1)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# dialer pool-member 2 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap 2) Configure router B Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name usera Quidway(config-if-Dialer0)# dialer string 8810052 Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userb password 0 passb Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# encapsulation ppp 1-51 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0)# ppp authentication pap 1.6.12 DDR for Access Service I. Networking requirements We have designed the DDR implementation solution for access service by way of asynchronous serial port and ISDN PRI interface. Here, it is supposed that the dial string resources obtained by users from the telecom office are 8810048-8810055 and 8810148 respectively, serving 16 Internet users. In the configuration command, use Serial2:15 to identify ISDN PRI interface created at cE1/PRI interface. II. Networking diagram Router A Modem 8810048 Modem 8810049 Modem 8810050 Modem 8810051 Modem Modem Modem Modem 8810053 8810054 8810055 8810052 PSTN Access service using asynchronous serial port Router A 8810148 ISDN Access service using ISDN PRI interface Figure DC-1-15 Networking diagram of the configuration example of DDR for access service III. Configuration procedure Solution 1: use Legacy DDR configuration mode, PPP PAP authentication and 8 asynchronous serial ports to realize: Configure router A: 1-52 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user user1 password 0 pass1 Quidway(config)# user user2 password 0 pass2 Quidway(config)# user user3 password 0 pass3 Quidway(config)# user user4 password 0 pass4 Quidway(config)# user user5 password 0 pass5 Quidway(config)# user user6 password 0 pass6 Quidway(config)# user user7 password 0 pass7 Quidway(config)# user user8 password 0 pass8 Quidway(config)# user user9 password 0 pass9 Quidway(config)# user user10 password 0 pass10 Quidway(config)# user user11 password 0 pass11 Quidway(config)# user user12 password 0 pass12 Quidway(config)# user user13 password 0 pass13 Quidway(config)# user user14 password 0 pass14 Quidway(config)# user user15 password 0 pass15 Quidway(config)# user user16 password 0 pass16 Quidway(config)# ip local pool 1 100.1.1.1 100.1.1.16 Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.254 255.255.255.0 Quidway(config-if-Dialer0)# peer default ip address pool 1 Quidway(config-if-Dialer0)# dialer in-band Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# encapsulation ppp Quidway(config-if-Dialer0)# ppp authentication pap Quidway(config-if-Dialer0)# interface async 1 Quidway(config-if-Async1)# dialer rotary-group 0 Quidway(config-if-Async1)# interface async 2 Quidway(config-if-Async2)# dialer rotary-group 0 Quidway(config-if-Async2)# interface async 3 Quidway(config-if-Async3)# dialer rotary-group 0 Quidway(config-if-Async3)# interface async 4 Quidway(config-if-Async4)# dialer rotary-group 0 1-53 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Async4)# interface async 5 Quidway(config-if-Async5)# dialer rotary-group 0 Quidway(config-if-Async5)# interface async 6 Quidway(config-if-Async6)# dialer rotary-group 0 Quidway(config-if-Async6)# interface async 7 Quidway(config-if-Async7)# dialer rotary-group 0 Quidway(config-if-Async7)# interface async 8 Quidway(config-if-Async8)# dialer rotary-group 0 Solution 2: use Legacy DDR configuration mode, PPP CHAP authentication and 8 asynchronous serial ports to realize: Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user user1 password 0 pass1 Quidway(config)# user user2 password 0 pass2 Quidway(config)# user user3 password 0 pass3 Quidway(config)# user user4 password 0 pass4 Quidway(config)# user user5 password 0 pass5 Quidway(config)# user user6 password 0 pass6 Quidway(config)# user user7 password 0 pass7 Quidway(config)# user user8 password 0 pass8 Quidway(config)# user user9 password 0 pass9 Quidway(config)# user user10 password 0 pass10 Quidway(config)# user user11 password 0 pass11 Quidway(config)# user user12 password 0 pass12 Quidway(config)# user user13 password 0 pass13 Quidway(config)# user user14 password 0 pass14 Quidway(config)# user user15 password 0 pass15 Quidway(config)# user user16 password 0 pass16 Quidway(config)# ip local pool 1 100.1.1.1 100.1.1.16 Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.254 255.255.255.0 Quidway(config-if-Dialer0)# peer default ip address pool 1 Quidway(config-if-Dialer0)# dialer in-band Quidway(config-if-Dialer0)# dialer-group 1 1-54 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Dialer0)# encapsulation ppp Quidway(config-if-Dialer0)# ppp authentication chap Quidway(config-if-Dialer0)# interface async 1 Quidway(config-if-Async1)# dialer rotary-group 0 Quidway(config-if-Async1)# interface async 2 Quidway(config-if-Async2)# dialer rotary-group 0 Quidway(config-if-Async2)# interface async 3 Quidway(config-if-Async3)# dialer rotary-group 0 Quidway(config-if-Async3)# interface async 4 Quidway(config-if-Async4)# dialer rotary-group 0 Quidway(config-if-Async4)# interface async 5 Quidway(config-if-Async5)# dialer rotary-group 0 Quidway(config-if-Async5)# interface async 6 Quidway(config-if-Async6)# dialer rotary-group 0 Quidway(config-if-Async6)# interface async 7 Quidway(config-if-Async7)# dialer rotary-group 0 Quidway(config-if-Async7)# interface async 8 Quidway(config-if-Async8)# dialer rotary-group 0 Solution 3: use Legacy DDR configuration mode and PPP PAP authentication to realize the following at ISDN PRI interface: Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user user1 password 0 pass1 Quidway(config)# user user2 password 0 pass2 Quidway(config)# user user3 password 0 pass3 Quidway(config)# user user4 password 0 pass4 Quidway(config)# user user5 password 0 pass5 Quidway(config)# user user6 password 0 pass6 Quidway(config)# user user7 password 0 pass7 Quidway(config)# user user8 password 0 pass8 Quidway(config)# user user9 password 0 pass9 Quidway(config)# user user10 password 0 pass10 Quidway(config)# user user11 password 0 pass11 Quidway(config)# user user12 password 0 pass12 1-55 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config)# user user13 password 0 pass13 Quidway(config)# user user14 password 0 pass14 Quidway(config)# user user15 password 0 pass15 Quidway(config)# user user16 password 0 pass16 Quidway(config)# ip local pool 1 100.1.1.1 100.1.1.16 Quidway(config)# interface serial2:15 Quidway(config-if-Serial2:15)# ip address 100.1.1.254 255.255.255.0 Quidway(config-if-Serial2:15)# peer default ip address pool 1 Quidway(config-if-Serial2:15)# dialer-group 1 Quidway(config-if-Serial2:15)# encapsulation ppp Quidway(config-if-Serial2:15)# ppp authentication pap Solution 4: use Legacy DDR configuration mode and PPP CHAP authentication to realize the following at ISDN PRI interface: Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user user1 password 0 pass1 Quidway(config)# user user2 password 0 pass2 Quidway(config)# user user3 password 0 pass3 Quidway(config)# user user4 password 0 pass4 Quidway(config)# user user5 password 0 pass5 Quidway(config)# user user6 password 0 pass6 Quidway(config)# user user7 password 0 pass7 Quidway(config)# user user8 password 0 pass8 Quidway(config)# user user9 password 0 pass9 Quidway(config)# user user10 password 0 pass10 Quidway(config)# user user11 password 0 pass11 Quidway(config)# user user12 password 0 pass12 Quidway(config)# user user13 password 0 pass13 Quidway(config)# user user14 password 0 pass14 Quidway(config)# user user15 password 0 pass15 Quidway(config)# user user16 password 0 pass16 Quidway(config)# ip local pool 1 100.1.1.1 100.1.1.16 Quidway(config)# interface serial2:15 Quidway(config-if-Serial2:15)# ip address 100.1.1.254 255.255.255.0 1-56 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial2:15)# peer default ip address pool 1 Quidway(config-if-Serial2:15)# dialer-group 1 Quidway(config-if-Serial2:15)# encapsulation ppp Quidway(config-if-Serial2:15)# ppp authentication chap 1.6.13 DDR for Inter-Router Callback I. Networking requirements We have designed two implementation solutions: “use ISDN calling line identification callback” and “Use PPP callback”. In the implementation solution “use ISDN calling line identification callback”, routers at both ends need to use ISDN interface for interconnection. In the following configuration procedure, Bri 0 is used to identify ISDN interface, router A is used as callback Server end and router B as callback Client end. “ISDN calling line identification callback” and “PPP callback” can be used in combination, and users can simply combine the configuration procedures of the two listed below: II. Networking diagram 8810152 Router A ISDN 8810148 Router B Networking diagram of ISDN caller identifying callback 8810052 Router A PSTN Modem Modem 8810048 Router B Networking diagram of PPP callback Figure DC-1-16 Networking diagram of inter-router callback DDR configuration example III. Configuration procedure Solution 1: use ISDN calling line identification callback 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.2 8810152 1-57 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Bri0)# dialer caller 8810152 callback 3) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.1 8810148 Solution 2: use PPP callback and Server end uses user-configured dialer map for callback 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user quidwayb password 0 quidwayb Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.2 name quidwayb 8810052 Quidway(config-if-Serial0)# dialer callback-server username Quidway(config-if-Serial0)# ppp authentication pap Quidway(config-if-Serial0)# ppp callback accept 4) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.1 8810048 Quidway(config-if-Serial0)# ppp pap sent-username quidwayb password 0 quidwayb Quidway(config-if-Serial0)# ppp callback request Solution 3: use PPP callback and Server end dynamically creates dialer map for callback 1) Configure router A: 1-58 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user quidwayb password 0 quidwayb callback-dialstring 8810052 Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer callback-server dialstring Quidway(config-if-Serial0)# ppp authentication pap Quidway(config-if-Serial0)# ppp callback accept 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.1 8810048 Quidway(config-if-Serial0)# ppp pap sent-username quidwayb password 0 quidwayb Quidway(config-if-Serial0)# ppp callback request 1.6.14 DDR in Which the Router Calls Back PC I. Networking requirements We have designed two implementation solutions: “use user-configured dialer map for callback” and “dynamically create dialer map for callback”. In both solutions, routers are used to allocate IP addresses for PCs. II. Networking diagram 8810052 Router A 8810048 Modem PSTN Modem PC Figure DC-1-17 Networking diagram of DDR configuration example in which routers call back PCs 1-59 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration III. Configuration procedure Solution 1: using user-configured dialer map for callback, with router A serving as server end. 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user pc password 0 pc Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Serial0)# peer default ip address 100.1.1.2 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.2 name pc 8810052 Quidway(config-if-Serial0)# dialer callback-server username Quidway(config-if-Serial0)# ppp authentication pap Quidway(config-if-Serial0)# ppp pap sent-username quidway password 0 quidway Quidway(config-if-Serial0)# ppp callback accept 2) Configure PC: a. Configure Modem connected to PC end to “automatic answering mode”; b. Click: Start->Programs->Accessories->Communications->Dialup network; c. In “Dialup network” window, select “Set up new connection”; d. In “My connection” established, select “TCP/IP setting”, in which: z z z Select “Server allocated with IP address”; Cancel “Use IP head pointer compression”; Cancel “Use default gateway of the remote network”; e. In “My connection” established, select “Server type”, in which: z z z Select “ppp”; Cancel “Logon network”; Cancel “Start software compression”. Solution 2: Dynamically creating dialer map for callback, with router A as Server end 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user pc password 0 pc callback-dialstring 8810052 Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Serial0)# peer default ip address 100.1.1.2 1-60 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer callback-server dialstring Quidway(config-if-Serial0)# ppp authentication pap Quidway(config-if-Serial0)# ppp pap sent-username quidway password 0 quidway Quidway(config-if-Serial0)# ppp callback accept 2) Configure PC: a. Configure Modem connected to PC end to “automatic answering mode”; b. Click: Start->Programs->Accessories->Communications->Dialup network; c. In “Dialup network” window, select “Set up new connection”; d. In “My connection” established, select “TCP/IP setting”, in which: z z z Select “Server allocated with IP address”; Cancel “Use IP head pointer compression”; Cancel “Use default gateway of the remote network”; e. In “My connection” established, select “Server type”, in which: z z z Select “ppp”; Cancel “Logon network”; Cancel “Start software compression”. 1.6.15 DDR for Autodial I. Networking requirements We have designed point-to-point autodial configuration solution. Point-to-multipoint and multipoint-to-multipoint autodial can be configured in a similar way. In the following diagram, router A automatically dials to call router B at an interval of 180 seconds. II. Networking diagram 8810052 8810048 Router A Modem PSTN Router B Modem Figure DC-1-18 Networking diagram of the configuration example of DDR for autodial III. Configuration procedure 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 1-61 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.2 8810052 autodial Quidway(config-if-Serial0)# dialer autodial-interval 180 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 1.6.16 DDR Using Dialer Map Cyclically I. Networking requirements We have designed two routers to use dialer map cyclically. In the following networking diagram, router A calls router B. II. Networking diagram 8810060 8810048 Router A Modem PSTN Router B 8810052 Modem Modem Figure DC-1-19 Networking diagram of the configuration example of DDR using dialer map cyclically III. Configuration procedure 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# ip address 100.1.1.1 255.255.255.0 1-62 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.2 8810052 Quidway(config-if-Serial0)# dialer map ip 100.1.1.2 8810060 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# dialer in-band Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer rotary-group 0 Quidway(config-if-Serial0)# interface serial 1 Quidway(config-if-Serial1)# physical-layer async Quidway(config-if-Serial1)# modem Quidway(config-if-Serial1)# dialer rotary-group 0 1.6.17 DDR Using Dialer Map as Backup I. Networking requirements We have designed two configurations in which the logical interface designed by dialer map is used as backup interface and as main interface. In the following diagram, we have configured backup in router A. s0 port of router A is configured as dial port, and s1 port is configured as DDN directly connected port of encapsulation PPP. II. Networking diagram 8810060 Modem Router A 8810048 PSTN Router B 8810052 Modem Modem Figure DC-1-20 Networking diagram of the configuration example of DDR with dialer map as backup III. Configuration procedure Solution 1: Logical interface as backup interface 1-63 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform 1) DDR Configuration Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.2 8810060 lin 1 Quidway(config-if-Serial0)# interface serial 1 Quidway(config-if-Serial1)# ip address 200.1.1.1 255.255.255.0 Quidway(config-if-Serial1)# encapsulation ppp Quidway(config-if-Serial1)# backup logic-channel 1 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# interface serial 1 Quidway(config-if-Serial1)# ip address 200.1.1.2 255.255.255.0 Quidway(config-if-Serial1)# encapsulation ppp Solution 2: Logical interface as main interface 1) Configure router A: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.2 8810060 lin 1 1-64 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0)# exit Quidway(config)# logic-channel 1 Quidway(config-logic-channel1)# backup interface serial 1 Quidway(config-logic-channel1)# exit Quidway(config)# interface serial 1 Quidway(config-if-Serial1)# ip address 200.1.1.1 255.255.255.0 Quidway(config-if-Serial1)# encapsulation ppp 2) Configure router B: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Serial0)# physical-layer asynct Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# interface serial 1 Quidway(config-if-Serial1)# ip address 200.1.1.2 255.255.255.0 Quidway(config-if-Serial1)# encapsulation ppp 1.7 Precautions for DDR Configuration 1.7.1 Configuring Dialer-group Dialer-group must be configured at the logic dial interface or at the physical interface that directly enables DDR, and dialer-group must correspond to dialer-list configured in global configuration status, as shown in the following bold-typed parts. Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# dialer in-band Quidway(config-if-Dialer0)# dialer-group 1 1.7.2 Configuring Synchronous/Asynchronous Serial Port Using DDR To make synchronous/asynchronous serial port visible and perform DDR configuration on it, it is necessary to execute two configuration commands, physical-layer async and modem, and enable DDR command, as shown in the following bold-typed parts. 1-65 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band 1.7.3 Configuring Network Layer Address To enable network layer to find a route to the correct interface, network layer address (such as IP address) must be configured at the logic dial interface or the physical interface that directly enables DDR, as shown in the following bold-typed parts. Example 1: in Legacy DDR configuration mode, the physical interface enables DDR by being bound to the logic dial interface. Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer in-band Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810052 Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer rotary-group 0 Example 2: in Legacy DDR configuration mode, the physical interface directly enables DDR. Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer string 8810052 Example 3: Dialer Profile configuration mode Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 1-66 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Dialer0)# dialer remote-name user1 Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# dialer string 8810052 Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 1.7.4 Configuring PPP In Dialer Profile Configuration Mode In Dialer Profile configuration mode, if the local end needs to receive an incoming call, PPP authentication must be configured at the local physical interface so as to determine which dial interface the incoming call in oriented to. There are two PPP authentication modes: PAP authentication and CHAP authentication. With different PPP authentication modes, the desired configuration commands and application modes are different, as detailed below: The PPP configuration commands involved are: z z z z z encapsulation ppp ppp authentication { pap | chap } ppp pap sent-username name password { 0 | 7 } password ppp chap host hostname user username password { 0 | 7 } password I. Apply PAP authentication With PAP name authentication mode, configuration must be performed according to the following steps, in which name1 and pass1 can be replaced with specific character strings selected by the users. z z z z z Configure the remote user name of the local Dialer interface: dialer remote-name name1 Configure link layer protocol encapsulation of the local physical interface: encapsulation ppp Configure PPP authentication mode: ppp authentication pap Configure the user name and password of the remote router: user name1 password 0 pass1 Configure the user name and password sent by the local Dialer interface or the physical interface directly enabling DDR during PAP authentication: ppp pap sent-username name1 password 0 pass1 Example 1: apply serial port 1) Configure local router: Quidway(config)# user remoteuser1 password 0 remotepass1 Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# interface dialer 0 1-67 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name remoteuser1 Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer-pool 1 Quidway(config-if-Dialer0)# dialer string 8810052 Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap 2) Configure remote router: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer string 8810048 Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp sent-username remoteuser1 password 0 remotepass1 Example 2: apply ISDN BRI and PRI interfaces 1) Configure local router: Quidway(config)# user remoteuser1 password 0 remotepass1 Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name remoteuser1 Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer-pool 1 Quidway(config-if-Dialer0)# dialer string 8810152 1-68 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Dialer0)# interface bri 0 Quidway(config-if-Bri0)# no dialer in-band Quidway(config-if-Bri0)# dialer pool-member 1 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication pap 2) Configure remote router: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Bri0)# dialer string 8810048 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp sent-username remoteuser1 password 0 remotepass1 II. Apply CHAP authentication With CHAP authentication mode, configuration must be performed according to the following steps, in which name1, name2 and pass1 can be replaced with specific character strings selected by the users. z z z z z z z Configure the remote user name of the local Dialer interface: dialer remote-name name1 Configure link layer protocol encapsulation of the local physical interface: encapsulation ppp Configure PPP authentication mode: ppp authentication chap Configure local router name of CHAP authentication: ppp chap host name2 Configure the user name and password of the remote router: user name1 password 0 pass1 Configure the user name and password of the local router: user name2 password 0 pass1 Configure remote router name at Dialer interface, or the physical interface directly enabling DDR, of the remote router: ppp chap host name1 Example 1: apply serial port 1) Configure local router: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user remoteuser1 password 0 togetherpass Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name remoteuser1 Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer pool 1 1-69 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Dialer0)# dialer string 8810052 Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication chap Quidway(config-if-Serial0)# ppp chap host localuser1 2) Configure remote router: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user localuser1 password 0 togetherpass Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# dialer in-band Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810048 Quidway(config-if-Dialer0)# ppp chap host remoteuser1 Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer rotary-group 0 Example 2: apply ISDN BRI and PRI interfaces 1) Configure local router: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user remoteuser1 password 0 togetherpass Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name remoteuser1 Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# dialetr string 8810152 Quidway(config-if-Dialer0)# interface bri 0 Quidway(config-if-Bri0)# no dialer in-band Quidway(config-if-Bri0)# dialer pool-member 1 1-70 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication chap Quidway(config-if-Bri0)# ppp chap host localuser1 2) Configure remote router: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user localuser1 password 0 togetherpass Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer string 8810048 Quidway(config-if-Bri0)# ppp chap host remoteuser1 1.7.5 Configuring PPP In Legacy DDR Configuration Mode In Legacy DDR configuration mode, if the local end needs to receive an incoming call, then, when name is configured in the local dialer map, PPP authentication must be configured at the corresponding logic dial interface or the physical interface directly enabling DDR, so as to obtain the remote user name for determining dialer map at the local end. There are two PPP authentication modes: PAP authentication and CHAP authentication. With different PPP authentication modes, the desired configuration commands and application modes are different, as detailed below: The PPP configuration commands involved are: z z z z z encapsulation ppp ppp authentication { pap | chap } ppp pap sent-username name password { 0 | 7} password ppp chap host hostname user username password { 0 | 7} password I. Apply PAP authentication With PAP name authentication mode, configuration must be performed according to the following steps, in which name1 and pass1 can be replaced with specific character strings selected by the users. z z z z z Configure the remote user name of the local Dialer interface: dialer map protocol next-hop-address name name1 Configure link layer protocol encapsulation of the local physical interface: encapsulation ppp Configure PPP authentication mode: ppp authentication pap Configure the user name and password of the remote router: user name1 password 0 pass1 Configure the user name and password sent by the local Dialer interface or the physical interface directly enabling DDR during PAP authentication: ppp pap sent-username name1 password 0 pass1 Example 1: apply serial port 1) Configure local router: 1-71 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config)# user remoteuser1 password 0 remotepass1 Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer map ip 100.1.1.2 name remoteuser1 8810052 Quidway(config-if-Dialer0)# encapsulation ppp Quidway(config-if-Dialer0)# ppp authentication pap Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer rotary-group 0 2) Configure remote router: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer string 8810048 Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp sent-username remoteuser1 password 0 remotepass1 Example 2: apply ISDN BRI and PRI interfaces 1) Configure local router: Quidway(config)# user remoteuser1 password 0 remotepass1 Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Bri0)# dialer map ip 100.1.1.2 name remoteuser1 8810152 Quidway(config-if-Bri0)# dialer-group 1 1-72 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication pap 2) Configure remote router: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Bri0)# dialer string 8810148 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp sent-username remoteuser1 password 0 remotepass1 II. Apply CHAP authentication With CHAP authentication mode, configuration must be performed according to the following steps, in which name1, name2 and pass1 can be replaced with specific character strings selected by the users. z z z z z z z Configure the remote user name of the local Dialer interface: dialer map protocol next-hop-address name name1 Configure link layer protocol encapsulation of the local physical interface: encapsulation ppp Configure PPP authentication mode: ppp authentication chap Configure local router name of CHAP authentication: ppp chap host name2 Configure the user name and password of the remote router: user name1 password 0 pass1 Configure the user name and password of the local router: user name2 password 0 pass1 Configure remote router name at Dialer interface, or the physical interface directly enabling DDR, of the remote router: ppp chap host name1 Example 1: apply serial port 1) Configure local router: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user remoteuser1 password 0 togetherpass Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer map ip 100.1.1.2 name remoteuser1 8810052 Quidway(config-if-Dialer0)# encapsulation ppp Quidway(config-if-Dialer0)# ppp authentication chap Quidway(config-if-Dialer0)# ppp chap host localuser1 Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# interface serial 0 1-73 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer rotary-group 0 2) Configure remote router: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user localuser1 password 0 togetherpass Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# dialer in-band Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer string 8810048 Quidway(config-if-Dialer0)# encapsulation ppp Quidway(config-if-Dialer0)# ppp authentication chap Quidway(config-if-Dialer0)# ppp chap host remoteuser1 Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer rotary-group 0 Example 2: apply ISDN BRI and PRI interfaces 1) Configure local router Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user remoteuser1 password 0 togetherpass Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Bri0)# dialer map ip 100.1.1.2 name remoteuser1 8810152 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication chap Quidway(config-if-Bri0)# ppp chap host localuser1 2) Configure remote router: Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user localuser1 password 0 togetherpass Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Bri0)# dialer-group 1 1-74 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Bri0)# dialer string 8810148 Quidway(config-if-Bri0)# encapsulation ppp Quidway(config-if-Bri0)# ppp authentication chap Quidway(config-if-Bri0)# ppp chap host remoteuser1 1.7.6 Configure Dialer-list Dialer-list is configured in global configuration mode, and, when combined with dialergroup, is used by DDR to determine whether the datagram sent is an interesting message. DDR processes the sent datagram in the following ways: z z z For an uninteresting message, if no dial link has been established to send the message, DDR will discard the message; For an interesting message, if no dial link is available to send the message, DDR will dial and cache the message; If a dial link is available to send the message, then no matter whether the message is interesting or not, DDR will send the message on this dial link. Dialer-list is configured in two modes: z z Directly configured to protocol; Configured through access-list; The above two configuration modes cannot be used at the same time, that is, one dialer-list can be configured in only one mode, as exemplified below: Example 1: in the dialer-list directly configured to protocol, IP message is interesting and IPX message is uninteresting. Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# dialer-list 1 protocol ipx deny Example 2: in dialer-list configured through access-list, all IP messages except rip message are interesting. Quidway(config)# access-list deny udp any eq rip any eq rip Quidway(config)# access-list 101 permit ip any any Quidway(config)# dialer-list 1 list 101 1.8 Troubleshooting DDR 1.8.1 DDR Fault Diagnosis Causes for common DDR faults can be diagnosed from the following aspects: I. Whether modem is normal If Modem is abnormal, like persistent noise or busy tone, then try to return it to normal by executing shutdown and no shutdown commands at the physical interface connected to Modem. If this operation fails, then try to return it to normal by executing AT command string at the physical interface connected to Modem. For example: 1-75 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Quidway(config)# chat-script ATE0S0=0&C1&D2 OK AT&W DDR Configuration Quidway(config)#chat-script yaho "" AT&F OK Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# start-chat yaho II. Check whether network layer address is configured at relevant interface If no network layer address has been configured at the logic dial interface or at the physical interface directly enabling DDR, then, when the network layer searches for routers, it cannot find the dial interface, so that DDR cannot dial. The configurations in Example 1 below are wrong, because no IP address is configured at the interface. Example 2 shows correct configurations obtained by modifying Example 1, with IP address configured at the interface. Example 1: wrong configurations in which IP address is not configured Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.1 8810154 Example 2: correct DDR configuration (the bold-typed part is added) Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.3 255.255.255.0 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.1 8810154 III. Check whether dialer-group is configured The dialer-group must be configured on logical dial interface or the physical interface directly enabling DDR, otherwise DDR will not process packets sent from and received by the dial interface. As shown in the following example 1 is a wrong configuration, in which no dialer-group is configured on the interface, while shown in example 2 is a correct configuration in which the error is corrected by configuring dialer-group on the interface Example 1: wrong DDR configuration without dialer-group. Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Bri0)# dialer map ip 100.1.1.1 8810152 Example 2: correct DDR configuration (the bold-typed part is added) Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 1-76 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Bri0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.1 8810152 IV. Check whether dialer-list is configured correctly DDR specifies whether to dial and send one packet sent to the dial interface, according to the dialer-list corresponding to the dialer-group configured by the user. If the packet is out of dialer-list range, then DDR will send the packet if the link to send this packet is existing, otherwise DDR discard this packet. That is, DDR will not automatically perform dial connection for packets beyond dialer-list range. As shown in the following example 1, dialer-list is incorrectly configured as deny IP packet, in this case, DDR will not create call dial connection for IP packet on the corresponding dial port. Example 2 presents the correct configuration. Example 1: incorrect DDR configuration, dialer-list configuration error (bold-typed part). Quidway(config)# dialer-list 1 protocol ip deny Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.1 8810152 Example 2: the modified correct DDR configuration (the bold-typed part) Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface bri 0 Quidway(config-if-Bri0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Bri0)# dialer-group 1 Quidway(config-if-Bri0)# dialer map ip 100.1.1.1 8810152 V. Check whether the configuration for PPP authentication is correct Under the Dialer Profile configuration, if the local end requires receiving incoming call, then PPP authentication must be configured at both local and remote end, and at both dialer and physical interface. If the PPP authentication configuration is incorrect, or if the remote name consulted through PPP is different from the remote-name of DDR configuration, there will be no interworking between the two ends. PPP authentication configuration error may be caused by one of the following factors: z z z z The user-name is not configured, causing the failure of ppp consulting. The ppp authentication is not configured, so that PPP fails to request name from the remote to be used by DDR. The ppp authentication pap is configured, but there is error in ppp pap sentusername configuration, causing the failure of ppp consulting. The ppp authentication chap is configured, but there is error in ppp chap host configuration, causing the failure of ppp consulting. 1-77 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration VI. Check whether synchronous/asynchronous serial port is correctly configured as asynchronous mode, and whether Modem is configured The synchronous/asynchronous serial port must be configured first into asynchronous interface and configured with Modem configuration command, before any DDR configuration can proceed. If the dial configuration command is invisible on synchronous/asynchronous serial port, a frequent cause is that the synchronous/asynchronous serial port has not been configured as asynchronous interface. Now the dial configuration command will be visible, by running the following two configuration commands under this synchronous/asynchronous serial port configuration: Quidway(config-if-SerialX)# physical-layer async Quidway(config-if-SerialX)# modem VII. Check whether synchronous/asynchronous serial port is bound to logical dial interface or directly enables DDR The synchronous/asynchronous serial port has to be bound to logical dial interface or directly enable DDR, then it can be used in dial connection. The configuration command for synchronous/asynchronous serial port to directly enable DDR dialer in-band, as shown in the following example (bold-typed): Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# ip address 100.1.1.3 255.255.255.0 Quidway(config-if-Serial0)# dialer in-band Quidway(config-if-Serial0)# dialer-group 1 Quidway(config-if-Serial0)# dialer map ip 100.1.1.1 8810054 The configuration command to bind synchronous/asynchronous serial port to logical dial interface: The configuration command under Legacy DDR configuration is dialer rotary-group, as shown in the following example (bold-typed part): Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.1 255.255.255.0 Quidway(config-if-Dialer0)# dialer in-band Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer map ip 100.1.1.2 8810055 Quidway(config-if-Dialer0)# dialer map ip 100.1.1.3 8810048 Quidway(config-if-Dialer0)# interface serial 0 1-78 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer rotary-group 0 The configuration command under Dialer Profile configuration is dialer pool and dialer pool-member, as shown in the following example (bold-typed part): Quidway(config)# dialer-list 1 protocol ip permit Quidway(config)# user usera password 0 passa Quidway(config)# interface dialer 0 Quidway(config-if-Dialer0)# ip address 100.1.1.2 255.255.255.0 Quidway(config-if-Dialer0)# dialer remote-name usera Quidway(config-if-Dialer0)# dialer-group 1 Quidway(config-if-Dialer0)# dialer pool 1 Quidway(config-if-Dialer0)# ppp pap sent-username userb password 0 passb Quidway(config-if-Dialer0)# dialer string 8810052 Quidway(config-if-Dialer0)# interface serial 0 Quidway(config-if-Serial0)# physical-layer async Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# dialer pool-member 1 Quidway(config-if-Serial0)# encapsulation ppp Quidway(config-if-Serial0)# ppp authentication pap 1.8.2 DDR Fault Elimination The following are the troubleshooting procedure of some typical faults: Fault 1: Modem does not dial Troubleshooting: when the router configuration dials DDR, if the Modem does not dial when sending data, the cause may be one of the followings: 1) z z 5) z z z z z z Hardware Whether modem is connected correctly. Whether modem is initialized correctly. Software If the interface is synchronous/asynchronous, it is not set as asynchronous mode. The modem in and modem out commands are not configured. DDR is not enabled. The dialer map or dialer string corresponding to packet is not configured. The dialer-group command is not configured. The packet, being an uninteresting packet, does not trigger any call. The packet may be set as interesting packet with dialer-list command. Fault 2: Modem does not receive call Troubleshooting: the causes may be as follows: 1-79 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform 1) z z z 6) z z z DDR Configuration Hardware Whether modem is connected correctly. Whether modem is initialized correctly, whether it is set as non-automatic answer. Refer to Modem section of this manual for details. Whether the telephone line is connected correctly. Software If the interface is synchronous/asynchronous, it is not set as asynchronous mode. The modem in and modem out commands are not configured. DDR is not enabled. Fault 3: when the Modem is connected, the opposite party still cannot be pinged through. Troubleshooting: the cause may be one of the followings: z z z z Whether the encapsulation of two ends is consistent. If encapsulation ppp is used, whether the authentication is configured correctly at both ends. DDR is not enabled. The receiving end is configured with dialer map, but there is no dialer map matching the calling end. 1.8.3 Troubleshooting with DDR Debugging Information I. How to acquire DDR debugging information Execute the following commands in privileged user mode, to see DDR debugging information: Quidway# debug dialer event Quidway# debug dialer packet Quidway(config)# logging on II. The debugging information displayed when DDR can interwork with the opposite end Information displayed at the calling end: DDR DDR DDR DDR DDR DDR DDR DDR DDR DDR DDR DDR DDR DDR DDR DDR DDR DDR DDR try to find routing to 100.1.1.2 on interface Serial0 it is an interesting packet Find a dialer map matching the address Try to find a free channel to dial 8810052 on the interface Dialing 8810052 on interface Serial0 of interface Serial0 Enqueue this packet try to find routing to 100.1.1.2 on interface Serial0 it is an interesting packet Find a dialer map matching the address A link is connecting by this dialer map, waiting this link Enqueue this packet try to find routing to 100.1.1.2 on interface Serial0 it is an interesting packet Find a dialer map matching the address A link is connecting by this dialer map, waiting this link Enqueue this packet try to find routing to 100.1.1.2 on interface Serial0 it is an interesting packet Find a dialer map matching the address 1-80 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform DDR Configuration DDR A link is connecting by this dialer map, waiting this link DDR Enqueue this packet DDR queue is full discard the packet DDR try to find routing to 100.1.1.2 on interface Serial0 DDR it is an interesting packet DDR Find a dialer map matching the address DDR A link is connecting by this dialer map, waiting this link DDR Enqueue this packet DDR queue is full discard the packet % SIMUDIAL Serial0 changed state to UP. DDR Receive CALL_CONN_CFM % interface Serial0 changed state to UP. DDR link layer ask the PPP_interface of the interface Serial0 DDR link layer transfer NAME "" to DDR on interface Serial0 DDR NAME authentication OK DDR link negotiation Up on interface Serial0 % Line protocol ip on interface Serial0,changed state to UP. Information displayed at the call receiving end: %SIMUDIAL Serial0 changed state to UP. DDR Receive CALL_CONN_IND % interface Serial0 changed state to UP. DDR link layer ask the PPP_interface of the interface Serial0 DDR link layer transfer NAME "" to DDR on interface Serial0 DDR NAME authentication OK DDR link negotiation Up on interface Serial0 DDR peeraddr matching success on interface serial0, link Up. % Line protocol ip on interface Serial0,changed state to UP. III. The debugging information displayed when DDR fails to interwork with the opposite end and the solution This section lists in turn the debugging information when DDR fails to interwork with the opposite end and explains how it is generated. Users may clear the fault by following the attached solutions. DDR: Receive CALL_DISC_IND This debugging information may be generated by the following causes: a. The physical connection between local end and remote end is cut off, poor connection between telephone line and router, and poor telephone line quality.b. Incorrect PPP authentication configuration, PPP authentication fails to pass. c. The remote DDR authentication fails to pass, the name (dialer remote-name, name in dialer map) configured by DDR is inconsistent with the name configured in PPP authentication configuration, there is no local network layer address in the remote dialer map. d. It is not a fault, while the problem is caused when the remote DDR idle-timeout timer is timeout, the opposite end hooks on this connection. The solutions are as follows: a. For incorrect PPP configuration, please configure according to the example above. b. If the names are configured inconsistently, please configure according to the example above. c. For the problem of “Network layer address”, please take one of the following solutions in the configuration of the opposite end: 1-81 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform z z DDR Configuration Add in the remote router, the dialer map corresponding to local router network layer address. Remove all the dialer maps in the remote configuration, and use dial string instead. DDR: link negotiation Down on interface *** This debugging information may be generated by the following causes: incorrect PPP configuration, so that PPP consulting fails and thus the connection is hooked on. The solution is: configure with reference of the example above. DDR: NAME authentication ERROR failed This debugging information may be generated by the following causes: the name (dialer remote-name, name in dialer map) configured by DDR is inconsistent with the name configured in PPP, local DDR authentication fails to pass thus this connection is hooked on. The solution is: configure with reference of the example above. DDR: peeraddr matching error on interface *** shutdown link This debugging information may be generated by the following cause: there is no remote network layer address in the local dialer map. The solution is: add in the local router, the dialer map corresponding to remote network layer address, or remove all the dialer maps in the local configuration, and use dial string instead. DDR:idle-timeout on interface *** shutdown! start enable-time This debugging information does not indicate any error, instead, it means that the local DDR idle-timeout time is timeout and DDR hooks on the connection normally. DDR: wait-for-carrier-timeout on a link on interface *** shutdown!start enable-time This debugging information may be generated by the following cause: local router fails to dial and connect the opposite end, because the opposite end is busy or telephone line quality is poor. DDR: The interface has no dialer-group discard the packet! This debugging information may be generated by the following cause: dialer-group configuration command is not configured on the corresponding logical dial interface or on the physical port directly enabling DDR. The solution is: configure with reference of the example above. DDR: there is not a dialer string on the interface failed discard packet This debugging information may be generated by the following cause: dialer-map is not configured on the corresponding logical dialer interface or on the physical port directly enabling DDR, and no dial string is configured. The solution is: configure dialer map and dial string locally according to the calls to be sent by local end. DDR: Enable-timeout is effective failed This debugging information does not indicate any error, instead, it is because that the enable-timeout timer of the corresponding physical port is not yet timeout. When the timer is timeout, the corresponding physical port can be used to dial. 1-82 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Modem Management Chapter 2 Configuration of Modem Management 2.1 Modem Management Functions Provided by VRP1.4 Modem is a network equipment in extensive use. Satisfactory management and control of modem are important functions of router. However, as there are numerous modem manufacturers and diversified models, there may exist differences in terms of specific implementation and command details, although the standard AT command set of the industry is prevailing. To enhance router’ flexibility as much as possible, Quidway router series provide the following Modem management functions: 1) z z 2) 3) Provide a set of script language for modem management, referred to as Modem script below, in order to better the control of the Modem connected with the router. Modem script may be executed in the following two ways: Execute modem script directly through chat-script command, for initialization of modem or other configurations. Trigger the execution of modem script through specific events (such as router startup, Modem call completed and start-chat command). In the meantime, the cooperation of the script and the relevant commands can enhance router’s remote configuration function. When the asynchronous serial port works in Interactive mode, the user may establish its connection with this asynchronous serial port in dummy terminal mode or remotely through modem, and manage the router configuration. The interoperability with other equipment providers (such as Cisco), is mainly shown in the fact that the asynchronous serial ports of both parties work in Interactive mode, and the two equipment are interconnected through modem. 2.2 Modem Script 2.2.1 Function Quidway router series provide Modem script, mainly functions as follows: z z Modem script can be used to flexibly control modems of different models, for example, different initialization strings used can help modems of different manufacturers and models to work in harmony with the router. Modem script can be used for interactive login of remote systems, and the interactive consulting of scripts can be used to switch into different connection status. When connection is established through modem between the asynchronous serial port of the modems of both parties, which protocol to encapsulate on the physical link and various working parameters of the protocol can be specified through consulting. 2.2.2 Syntax Common modem script format is as follows: receive-string1 send-string1 receive-string2 send-string2 2-1 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Modem Management Here: z z z z z z z z z z z z z send-string stands for sending character string receive-string stands for receiving character string send-string and receive-string usually appear in pairs, and the script must begin with sending character string. For example, send-string1 receive-string1 ...... means that the execution flow is: send character string send-string1 to modem in the hope of receiving character string receive-string1. If before timeout, successful matching of character string and receive-string1 is received, continue to execute the following script, otherwise terminate its execution. If the last character string is a send-string, it means that script execution may be ended after sending this string, instead of waiting for receiving string. If the script begins with waiting for sending character string, instead of receiving character string, then the first send-string can be set as "", while the meaning of such mark is explained below. For the received string, in addition to its ending with \c, the end of the character string will be automatically attached with a return mark when it is sent. The received strings are matched with the method irrelevant with positions, i.e., as long as the content to receive contains the string expected to receive, the matching is successful. In the matching of received strings, there may be a number of strings expected to receive which are connected with “-“. So long as it matches one of them, the matching is successful. The timeout for waiting to receive character string is 5 seconds by default, the TIMEOUT seconds may be inserted into the script from time to time to adjust the timeout of waiting to receive character string, and such setting will remain valid in the same script before the next TIMEOUT setting. All the character strings and key words in the script are case sensitive. The character strings or key words are separated with spaces, the space in a string itself should be marked with double quotation marks " ", and if it is empty in the quotation marks (i.e.,""), the character string may two meanings. That is, if "" is at the beginning of the script, it means to directly wait for receiving character string, instead of sending any character string, while if it is in other locations, the content of the string is regarded as "". ABORT receive-string may be inserted into the script from time to time to change script execution flow, indicating if the received string full matches receive-string, the script execution will be terminated. In the script, ABORT receive-string may appear several times, which will function jointly, so long as it matches one of them, the script execution will be terminated, and wherever ABORT receive-string appears, it plays its role in the entire script execution process. The escape characters may be inserted into the script, to better the control of script and its flexibility, meanwhile all the escape characters are the separating characters of the character strings at the same time. Table DC-2-1 List of key script words Key words ABORT receive-string TIMEOUT seconds Description ABORT is followed by a character string, used to match the character strings sent by Modem or the remote DTE equipment. The method is complete matching, there may be a number of ABORTs specified in a script, and each is valid in the course of script execution. TIMEOUT is followed by a number, used to set the waiting timeout of receiving character string, if no character string expected is received during the waiting time, the script execution fails. This setting remains valid after it is set, until the next TIMEOUT setting. Here the unit is second, and the value range is 0-180, default value is 180. 2-2 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Modem Management Table DC-2-2 List of script escape characters Escape characters Description No additional return character is sent when sending character string, the location is at the end of send-string as other positions are invalid. Pause of 2 seconds Send line change character Send return character Send space character Send tabulate character Send \\ character As an alternative telephone number. When DDR calls the script to dial, the place with \T will be replaced with telephone number, so that the same dial script can be used for different dialing. \c \d \n \r \s \t \\ \T 2.3 Configuring Modem Management 2.3.1 Modem Management Configuration Task List The Modem management configuration task list is as follows: z z z z z z Configure modem call-in and call-out authorities Configure modem script Manually execute modem script Specify the event to trigger modem script Configure the working mode of asynchronous interface related to modem Configure modem answer mode 2.3.2 Configuring Modem Call-In and Call-Out Authorities Perform the following task in asynchronous serial port mode. Table DC-2-3 Configure modem call-in and call-out authorities Operation Command Only modem call-in allowed Only modem call-out allowed Modem call-in and call-out allowed Modem call-in and call-out disallowed modem in modem out Modem no modem Modem call-in and call-out are allowed by default. 2.3.3 Configuring Modem Script Perform the following task in global mode. Table DC-2-4 Configure modem script Operation Command Define modem script Delete modem script chat-script script-name script no chat-script script-name 2-3 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Modem Management For specific format of script, please refer to Modem script syntax. 2.3.4 Executing Modem Script Manually The start-chat command can be used, when necessary, to execute the specified Modem script, in order to manage the Modem externally connected with the interface. Perform the following task in asynchronous serial port mode. Table DC-2-5 Manually execute modem script Operation Command Manually execute Modem script start-chat script-name 2.3.5 Specifying the Event to Trigger Modem Script Relate modem script to events, that is, the router will automatically execute corresponding script when a specific event occurs. In VRP1.4, the script events supported include: z z z z z When the call-out connection of the line is established successfully: execute the specified script when the modem call-out connection is established successfully. When the call-in connection of the line is established successfully: execute the specified script when the modem call-in connection is established successfully. DDR dialing: start the dial script during DDR dialing. Line reset: execute the specified script when the line is disconnected. System power on and reboot: execute the specified script for corresponding asynchronous serial port during system power on and initialization. The script command may be used to specify corresponding scripts for all the above events. Perform the following task in asynchronous serial port mode. Table DC-2-6 Specify events triggering modem script Operation Command Specify the modem script to execute when call-out connection of the line is established successfully Specify the modem script to execute when call-in connection of the line is established successfully Specify the modem script to execute during DDR dialing. Specify the modem script to execute during line reset Specify the modem script to execute during system power on and reboot Specify the default modem initialization string Script activation script-name Script connection script-name Script dialer script-name Script reset script-name Script startup script-name Script init-string init-string 2.3.6 Configuring Modem Answer Mode Perform the following task in asynchronous serial port mode. 2-4 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Modem Management Table DC-2-7 Configure modem answer mode Operation Command MODEM is in automatic answer mode MODEM is I nnon-automatic answer mode modem-autoanswer no modem-autoanswer By default, modem is in non-automatic answer mode. The configuration mainly depends on whether the status of the external modem of the asynchronous interface is automatic answer mode (i.e., if Modem’s AA indicator is on).If the modem is in automatic answer mode, the user has to be execute modemautoanswer before using dialing function; if modem is not in automatic answer mode, the user has to be execute no modem-autoanswer. If the configuration is inconsistent with the modem status, some incoming Modem calls may not be received normally. 2.4 Typical Configuration of Modem Management 2.4.1 Managing Modem with Modem Script Modem PSTN PC Quidway router Figure DC-2-1 Networking diagram of router’s management configuration for modemExample 1: Modem automatically adapts to baud rate For the asynchronous interface connected with modem, the baud rate of modem can be configured with standard AT command, in AT command set, set “AT” to modem, if “OK” is received, the modem can automatically match the corresponding baud rate, and the configuration is written into and saved in modem, the corresponding AT command is “AT&W”, therefore the corresponding configuration procedure is as follows: 1) Configure modem script Quidway(config)# chat-script baud "" AT OK AT&W OK 2) Execute the corresponding script under interface configuration mode, assuming that modem is connected to interface Serial0. Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# start-chat baud Example 2: Restore the ex-factory setting of modem The modem command to restore ex-factory configuration nis “AT&F”, similar to the configuration procedure of setting baud rate: Quidway(config)# chat-script factory "" AT OK AT&F OK Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# start-chat factory 2-5 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Modem Management Example 3: Configure modem initialization parameter Correctly initialize modem configuration is an important step to connect modem correctly. The following is a brief introduction to the common AT initialization commands and work to do for initialization. z z z z z During consulting between modems, modem rates must remain unchanged, otherwise new rate matching should be performed with AT command. Modem locks EIA/TIA-232 serial port rate in different ways. The modem manual may be consulted to learn how modem locks rate (optional items include &b, \j, &q, \n or using s register). Modem must use data carrier detection (DCD) to indicate the establishment of its remote connection, such configuration of most modems is performed with &c1 command. Refer to modem manuals for details. Modem must allow to hook on its active connection through Data Terminal Ready (DTR) signal, such configuration for most modems is performed with &d2 or &d3. Refer to modem manuals for details. If the modem is required of call-in function, it must be configured with incoming call off-hook ringing number, our requirement is not to adopt the automatic answer ring mode, most modems are configured as S0=0. Refer to modem manuals for details. In consideration of the above conditions, our typical initialization string is as follows: AT&b1&c1&d2&s0=0 Explanation for functionality of the initialization string: z z z z Lock serial port rate Enable DCD detection Enable DTR hook-on function Configure as non-automatic answer The procedure to configure is as follows: Quidway(config)# chat-script init "" AT&b1&c1&d2&s0=0 OK Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# start-chat init 2.4.2 Remote Configuration Using Modem and Through Asynchronous Interface I. Networking requirements AS introduced above, modem can be used for remote configuration through Console interface, Quidway router series also support the remote configuration using modem through asynchronous interface. 2-6 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Modem Management II. Networking diagram Connection available from all asynchronous interface Quidway Router Modem Modem PSTN PC Figure DC-2-2 Networking diagram of remote configuration using modem and through asynchronous interface III. Configuration procedure Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# physical asynchronous Quidway(config-if-Serial0)# modem inout Quidway(config-if-Serial0)# async mode interactive 2.4.3 Router Initialization with Initialization Script I. Configuration requirements Enable the router to initialize the modem connected with asynchronous interface during power on or restart. II. Configuration procedure Quidway(config)# chat-script init "" AT OK AT&B1&C1&D2&S0=1 OK AT&W OK Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# physical asynchronous Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# script startup init 2.4.4 Direct Dial with Script Configuration procedure: Quidway(config)# chat-script dial "" AT OK ATDT8810058 CONNECT Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# physical asynchronous 2-7 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Configuration of Modem Management Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# start-chat dial 2.4.5 Interactively Connect Cisco Router Through Modem I. Networking requirements The Quidway router should be interconnected with Cisco router using Modem through asynchronous interface, and the asynchronous interfaces of both parties should work in interaction mode, when the physical link is established, Quidway router requires Cisco router to conduct PPP consulting. II. Networking diagram Cisco Modem Modem PC PSTN Quidway Router Figure DC-2-3 Networking diagram of interactive connection with cisco router through modem III. Configuration procedure Quidway(config)# chat-script cisco Router>-\r-Router> "PPP 1.1.1.1" Quidway(config)# interface serial 0 Quidway(config-if-Serial0)# physical asynchronous Quidway(config-if-Serial0)# modem Quidway(config-if-Serial0)# async mode interactive Quidway(config-if-Serial0)# script activation cisco 2-8 HUAWEI® VRP User Manual – Configuration Guide Volume 3 11 – VoIP Configuration (VC) User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Table of Contents Table of Contents Chapter 1 VoIP Configuration ..................................................................................................... 1-1 1.1 VoIP Overview .................................................................................................................. 1-1 1.1.1 VoIP Principle......................................................................................................... 1-2 1.1.2 IP Voice Implementation over VRP........................................................................ 1-3 1.1.3 IP Voice Feature over VRP .................................................................................... 1-4 1.2 VoIP Configuration............................................................................................................ 1-6 1.2.1 VoIP Configuration Task List.................................................................................. 1-6 1.2.2 Configuring Dial-peer ............................................................................................. 1-6 1.2.3 Configuring Dial Terminator ................................................................................... 1-8 1.2.4 Configuring Abbreviated Dialing............................................................................. 1-9 1.2.5 Configuring Voice Port ........................................................................................... 1-9 1.2.6 Configuring Global Number Match Policy ............................................................ 1-11 1.2.7 Configuring the Recovery Method of Voice Board............................................... 1-11 1.3 VoIP Monitoring and Maintenance.................................................................................. 1-12 1.4 Typical VoIP Configuration Examples ............................................................................ 1-16 1.4.1 Configuring Router FXS Port for Interconnection ................................................ 1-16 1.4.2 Configuring Router FXO and E&M Trunk Ports for Interconnection .................... 1-18 1.4.3 Configuring the Interconnection of Router FXO Port in PLAR Mode................... 1-20 1.4.4 Configuring Interconnection with Refiner for Large Network Solution ................. 1-21 1.5 VoIP Troubleshooting ..................................................................................................... 1-22 Chapter 2 IP Fax Configuration ................................................................................................. 2-1 2.1 Overview to IP Fax............................................................................................................ 2-1 2.2 Configuring IP Fax ............................................................................................................ 2-1 2.2.1 Task List of IP Fax Configuration ........................................................................... 2-1 2.2.2 Checking If Configuring Fax to Use ECM Mode .................................................... 2-2 2.2.3 Configuring Fax Rate ............................................................................................. 2-2 2.2.4 Configuring Fax Train Mode................................................................................... 2-3 2.2.5 Configuring Fax Local-train Threshold Value......................................................... 2-3 2.2.6 Configuring Gateway Carrier Transmit Energy Level ............................................ 2-4 2.2.7 Configuring Sending Redundancy Packet Number of T38 Fax Protocol............... 2-4 2.2.8 Configuring the Fax Protocol Intercommunicating with Cisco Equipment ............. 2-5 2.2.9 Configuring the Intercommunication Method with Other Equipment ..................... 2-5 2.3 Monitoring and Maintenance of IP Fax ............................................................................. 2-5 2.4 Typical Configuration of IP Fax......................................................................................... 2-6 i User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Table of Contents Chapter 3 E1 Voice Configuration .............................................................................................. 3-1 3.1 Overview of E1 Voice Configuration ................................................................................. 3-1 3.1.1 Function of E1 Voice ............................................................................................. 3-1 3.1.2 Usage of cE1/PRI Interface................................................................................... 3-1 3.1.3 Features of E1 Voice.............................................................................................. 3-2 3.2 E1 Voice Configuration ..................................................................................................... 3-3 3.2.1 Configuration Task List of E1 Voice ....................................................................... 3-3 3.2.2 Configuring POTS dial-peer ................................................................................... 3-3 3.2.3 Configuring VoIP dial-peer ..................................................................................... 3-4 3.2.4 Configuring the Basic Parameters of E1 Interface................................................. 3-5 3.2.5 Configuring Voice Port (E1 Interface) .................................................................... 3-6 3.2.6 Configuring E1 Voice R2 Signaling ........................................................................ 3-7 3.2.7 Configuring the Basic Parameters of ISDN PRI Interface ................................... 3-10 3.2.8 Configuring Voice Port (ISDN PRI Interface) ....................................................... 3-11 3.3 Monitoring and Maintenance of E1 Voice....................................................................... 3-11 3.4 Typical Configuration Examples of E1 Voice.................................................................. 3-15 3.4.1 Router Connected to PBX through E1 Voice Port ............................................... 3-15 3.4.2 Router Connected to PBX in ISDN PRI Mode ..................................................... 3-17 3.4.3 Two-stage Dialing Configuration .......................................................................... 3-18 3.4.4 Transmission of Data and Voice Simultaneously................................................. 3-20 3.5 Fault Diagnosis and Troubleshooting of E1 Voice.......................................................... 3-21 Chapter 4 GK Client Configuration............................................................................................. 4-1 4.1 Overview of GK Client ...................................................................................................... 4-1 4.2 Configuration of GK Client ................................................................................................ 4-1 4.2.1 Configuration Task List of GK Client ...................................................................... 4-1 4.2.2 Configuring One Interface as H.323 Gateway Interface ........................................ 4-1 4.2.3 Activating or Deactivate GK Client Function .......................................................... 4-2 4.2.4 Configuring Gateway Alias..................................................................................... 4-2 4.2.5 Configure the GK Server Name and Address........................................................ 4-2 4.2.6 Configuring Tech-Prefix ......................................................................................... 4-3 4.2.7 Configuring GK Interworking Mode ........................................................................ 4-3 4.3 Typical Configuration Examples of GK Client................................................................... 4-4 4.4 Fault Diagnosis and Troubleshooting of GK Client........................................................... 4-6 Chapter 5 IPHC Configuration..................................................................................................... 5-1 5.1 Overview of IPHC ............................................................................................................. 5-1 5.2 IPHC Configuration ........................................................................................................... 5-2 5.2.1 Configuration Task List of IPHC............................................................................. 5-2 5.2.2 Enable/disable RTP header compression.............................................................. 5-2 5.2.3. Configure the Max. Connection Number of RTP Header Compressions .............. 5-2 ii User Manual - Configuration Guide (Volume 3) Versatile Routing Platform Table of Contents 5.2.4 Configure the Max. Connection Number of TCP Header Compressions .............. 5-3 5.2.5 Configure the Cisco-compatible RTP header compression................................... 5-3 5.2.6 Configure the deleting of udp_chk field from UDP header .................................... 5-3 5.3 Monitoring and Maintenance of IPHC............................................................................... 5-4 iii Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration Chapter 1 VoIP Configuration 1.1 VoIP Overview VoIP is the abbreviation of Voice over IP. What we often called IP phone is a typical application of the VoIP. The application of VoIP in router makes it possible that the voice service can be implemented through the IP network, including the plain phone service and fax. VoIP is implemented through voice packet. In VoIP, the digital signal processor (DSP) splits the voice signals into frames and stores them in packets for transmission. VoIP is mainly a software solution. It needs the support of voice port board added to the router. At the beginning of 1995, a kind of software product that could make toll calls on Internet was available for the first time, and this phone service implemented on Internet was called Internet phone, this was the early form of the IP phone. Through five years of development, the IP phone has been developed all over the world as a new type of phone service, which poses as a great threat to the plain phone service. The development of IP telephone benefits from the promotion of technology and the drive of market. The years of technological accumulation makes the technology of transforming voice into IP technology increasingly mature and practical. At the same time, the high-speed development of the integrated circuits (IC) causes the price of the core component of the IP phone—DSP going down greatly, these factors contribute to the technical possibility for the promotion of the IP telephone. The drive of market benefits is also a significant reason for the rapid development of the IP phone. Using the VoIP network composed of IP voice gateway and other device, we can bypass the toll calls to the data network, thus greatly reducing large bill for toll expenses and benefits the subscribers. Through the development from the beginning of 1990s till now, the IP phone has developed form the IP software period to the IP gateway period. And also the current VoIP application has developed from the simple PC products with voice service to the telecommunication service with multiple services and functionality such as high reliability, high quality voice, fax and data transmission. At present, IP gateway is used to interconnect PSTN (Public Switching Telephone Network) and the Internet, so as to mature the technology of PC to phone, phone to PC and phone to phone. In addition, voice quality is greatly improved and the commercial requirements can be satisfied. 1-1 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration 1.1.1 VoIP Principle I. Basic composition IP network IP voice gateway IP voice gateway PSTN PSTN Telephone GateKeeper Telephone Figure VC-1-1 Basic composition of the VoIP system For the plain voice service, all the functions from the caller to the called are implemented by PSTN, but IP voice service is quite different. In the above figure, the IP voice gateway provides the port between the IP network and the public telephone networks (PSTN/ISDN), and user is connected to the IP voice gateway through the PSTN local loop. The IP voice gateway is responsible for converting the analogue signals to digital signals, compressing and packetizing so that they become packet voice signals that can be transmitted over the IP network. Then, they are sent to the user gateway and the IP voice gateway at the called end reverts the packets to recognizable analogue voice signals. Once these signals arrive at the called terminal through PSTN, a communication process from telephone to telephone completes. In real VoIP networking, you may need gatekeeper to accomplish functions such as routing and access control. VoIP uses UDP (User Datagram Protocol) in the Transport Layer. Since the UDP provides connectionless and unreliable datagram service, it is not very appropriate for real-time application. The current approach is to run the RTP (Real-time Transport Protocol) over the UDP to enhance function of real-time application. IP header UDP header RTP header Voice load Figure VC-1-2 VoIP packet format II. H.323 protocol stack To realize the VoIP, currently almost all the manufacturers adopt the ITU-T standard protocol family H.323. The H.323 protocol is implemented in the Application Layer, which mainly describes the terminals, device and services for multimedia communication in local area network without quality of service (QoS) guarantee, including H.225.0, H.245, G.729, G.723.1, G.711, H.261, H.263 and T.120 series, etc. G.723.1, G.729 and G.711 are audio codec protocols, H.263 and H.261 are video codec protocols, H.225.0 and H.245 are system control protocols, and the T.120 series are multimedia data transport protocol. RTP and its controlled protocols RTCP (RTP Control Protocol) together ensure the real-timeliness of voice message transmission. The function of RTP is enhanced via RTCP. RTCP is used to give feedback for the quality of data dispatch. With this 1-2 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration feedback, the application system can adapt to different network environment. The feedback on the quality of transmission is also helpful for the fault location and diagnosis. H.323 Protocol stack Data T.126 Signaling Audio Video H.245 H.225.0 RAS G.711 G.729 G.723.1 G.723.A H.261 H.263 T.127 T.324 T.124, T.125 T.123 RTP, RTCP TCP UDP Network Layer Link Layer Physical Layer Figure VC-1-3 H.323 protocol stack III. A typical telephone call processing by VoIP Before configuring the voice function for router, please firstly learn the relevant flow of the Application Program Layer for the smooth configuration. 1) 2) 3) 4) 5) 6) 7) 8) User picks up the hook and the voice interface board detects the action. Then the board transmits this signal to the VoIP signal processing part over the router. The VoIP Session Application Program plays the dialing tone and waits for the user to dial. The user begins to dial, and the VoIP session application program collects and stores the dialed number. After collecting enough number to match a configured destination mode, the number will be mapped to an IP host through a dial plan mapper. The IP host directly connects with the target telephone or the PBX. If the PBX is connected, PBX will accomplish the remaining part of the call. The VoIP session application program uses the H.323 protocol to transmit and receive voice data channel for the connection in each direction over the IP network. If the PBX is to processes a call, it will forward the call to the destination telephone. The agreed codec mode is enabled at both ends of connection, which uses the RTP/UDP/IP as protocol stack to continue the session. Once the end-to-end RTP voice channel is established, the prompt signals of all the calling procedures and the signals that can be transmitted in the band are transported through this channel over the IP network. RTCP packet is used to transmit such information as the transmission quality of voice data in the calling session. When one calling party is on-hook, the session ends, and both ends resume the idle state and wait for a new call establishment triggered by the next off-hook. 1.1.2 IP Voice Implementation over VRP The router serves as voice gateway to provide voice functions, which makes data conversion from the circuit-switching network to the packet-switching network. During the conversion, you need to convert the phone numbers to the IP addresses that the 1-3 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration packet switching can identify, therefore; the key factor of router configuration lies in the mapping of the phone numbers and the IP addresses. The ports that support the voice function in the Quidway series routers include FXS (Foreign eXchange Station, i.e., the plain telephone service port), FXO (Foreign eXchange Office, two-wire loop trunk), the E&M trunk port and E1 voice port. The device with FXS port type must be connected with the device with FXO port type (the ordinary telephone set is a standard FXO port). The ring current received by the FXS and FXO is AC current of 25Hz and 60 volts, while the signal received and sent in the E&M port is DC signal. Table VC-1-1 The match table between the plain switch and the router interconnection interface Switch Loop trunk line (FXS) Subscriber line (FXO) E&M trunk E1 trunk Router FXO FXS E&M trunk E1 trunk Capacity (channel) 1 1 1 30 1.1.3 IP Voice Feature over VRP The IP voice over the VRP abides by G.711 (A law), G.729, G.723.1, H.225.0, H.245, and standards such as RFC1889, 1890, etc., which can support the FXS, FXO, E&M port and E1 port. The IP voice characteristics over the VRP include: z Silence suppression Automatically detect the time segments of silence during session and pause the generation of data flows during these time segments, so as to reduce the sent voice data quantity. z Comfort noise Through generating appropriate background noise, the sharp voice between the speaking and pause that resulted from the silence suppression is avoided. z Jitter buffering Jitter is caused by the variations of the data packet arrival rate in the network due to the time delay variation. In order to compensate this jitter, we have added a buffer to the voice devices at the receiving side to store data packets for enough time length. Thus, even the slowest packet can arrive in time for processing in sequence. In the mean time, the buffer can adjust the packet length of the voice port board, and send the voice data to the voice port board at a stable speed z Supporting QoS Since there is high requirement for the real-time voice service, precedence needs to be given to voice packet sending. You can take the measures such as setting Priority Queuing (PQ) and Custom Queuing (CQ) at the transmit end. For the configuration of PQ and CQ, please refer to the relevant sections of the “QoS Configuration “. z Supporting IP Fax The IP Fax system is established on the basis of the VoIP, which serves to establish the fax channel, transmit and receive the fax data. The IP Fax implementation includes modulation/demodulation, fax protocol processing, IP channel maintenance, etc. 1-4 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration The router can also support some special service functions provided by the SPC switch, such as: ---Do not disturb After setting the “Do not disturb “ service, no matter if it is idle, the subscriber phone set will reject any incoming call request, and the caller will only hear the busy tone. For the DTMF phone set connecting with the voice router, after off-hook, dial *56#, and the “Do not disturb” service is set. Dial #56#, the setting is removed. ---Call Forwarding on Busy (CFB) After setting the “Forwarding on busy”, if the subscriber phone set is in seized status, the new incoming call will be forwarded to the specified phone set. For the DTMF phone set connecting with the voice router, after off-hook, dial *58*ABCD, the CFB service is set. Dial #58#, the setting is removed. Note: ABCD represents the number of the phone you want to forward the calls to. Please note that this function only apply to phone set connecting with the router FXS port, and can only specify the phone set that connects to the same router as this phone set as forwarding destination; otherwise, the setting is invalid. --- Call Forwarding Unconditional (CFU) After setting the call forwarding unconditional, no matter the subscriber phone is busy or not, all the incoming calls will be forwarded to the specified phone set. For the DTMF phone set connecting with the voice router, after off-hook, dial *57*ABCD and the CFU service is set. Dial #57#, the setting is removed. Note: ABCD represents the number of the phone you want to forward calls to. Please note that this function only apply to phone set connecting with the router FXS port, and can only specify the phone set that connects to the same router as this phone set as forwarding destination, otherwise it is invalid. ---Alarm clock service After setting the alarm clock service, when the time set by the subscriber is up, the phone set will continue to ring for 45 seconds and then hang up. This function only validate during the 24 hours after setting. For the DTMF phone set connecting with the voice router, after off-hook, dial *55*HHMM for the service setting and dial #55# to remove the setting. Note: HH stands for hour, the virtual value is integer within the range from 0 to 23, and MM stands for minute, the virtual value is integer within the range from 0 to 59. 1-5 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration ---Line group access Set line group access, you can set multiple physical lines as one phone number, in this case if there is an incoming call, it will automatically select the idle line for the reply to reduce the configuration complexity and increase the networking capacity. 1.2 VoIP Configuration 1.2.1 VoIP Configuration Task List The configuration tasks of the VoIP include: z z z z z z Configuring dial-peer Configuring dial terminator Configuring abbreviated dialing Configuring voice port Configuring the global number match policy Configuring the recovery method of voice board 1.2.2 Configuring Dial-peer The key to mastering the VoIP configuration lies in understanding the dial-peers. According to different locations (the calling side or the called side), we can divide a call into four segments in a complete phone-to-phone connection and each segment (called call leg) corresponds to a dial-peer. Source Destination IP IP Network Network Router Call leg for POTS dial peer 1 Router Call leg for VOIP dial peer 2 Call leg for VOIP dial peer 3 Call leg for POTS dial peer 4 IP Network Network IP Router Router Source Destination Figure VC-1-4 Call division viewed from the router at both ends From the above figure, we can see that, there are two types of the dial-peers used in voice communications: z z POTS dial-peer VoIP dial-peer 1-6 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration I. POTS dial-peer configuration POTS is the abbreviation of the Plain Old Telephone Service, which refers to ordinary telephone service. The POTS dial-peer configuration means to establish relationship between the physical voice port and the local telephone device. Generally we only need to configure two commands: destination-pattern and port. The command of destination-pattern is used to define phone numbers related to POTS dial-peer, and the command of port connect the POTS dial-peer with an actual voice port which is usually the voice port connecting the router to the local office. Furthermore, prefix should be configured for the outgoing PBX subscribers. Please use the command dial-peer voice pots in the global configuration mode, and use other configurations in the dial-peer configuration mode. Table VC-1-2 POTS dial-peer configuration commands Operations Commands Configure POTS dial-peer and enter the POTS configuration Delete the POTS dial-peer Disable truncating the called number Truncate the called number Configure dial-peer destination pattern (phone number) Delete the dial-peer destination pattern (phone number) Set IP packet precedence Restore the IP packet precedence to the default Configure the local port number Cancel the local port number Configure the phone number prefix Cancel the phone number prefix Disable the POTS dial-peer Enable the POTS dial-peer Enable the silence detection Disable the silence detection dial-peer voice number pots no dial-peer voice number cancel-truncate no cancel-truncate destination-pattern string no destination-pattern ip precedence priority-number no ip precedence port port-number no port prefix string no prefix shutdown no shutdown vad no vad By default, the command no cancel-truncate (i.e., truncate the called number) and the command no vad (disable the silence detection) are valid. The default value of the configuration command ip precedence (IP packet precedence) is 0. II. VoIP dial-peer configuration The VoIP dial-peer configuration involves the corresponding of the phone numbers with the IP addresses. The key configuration commands are destination-pattern and session target. The destination-pattern defines the phone numbers related to the VoIP dial-peer, and the session target specifies the destination IP address for the VoIP dial-peer. 1-7 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration Note: The configuration commands here are addressed to the router, and the “Incoming” and “Outgoing” are also defined in respect of router. Therefore, the POTS dial-peer uses the destination-pattern to define the phone number of the phone set connected with the local router voice port, while the VoIP dial-peer uses the destination-pattern to define the called number. Please use the command dial-peer voice voip in the global configuration mode, and use other configurations in the dial-peer configuration mode. Table VC-1-3 VoIP dial-peer configuration commands Operations Commands Configure the VoIP dial-peer and enter the VoIP configuration Delete the VoIP dial-peer Configure the codec mode Restore the codec default value Configure phone number Delete phone number Set IP packet precedence Restore the IP packet precedence to the default value Configure the target IP address Delete the configured IP address Disable the VoIP dial-peer Enable the VoIP dial-peer Configure the technical prefix of the H.323 gateway Delete the technical prefix of the H.323 gateway Enable the silence detection Disable the silence detection dial-peer voice number voip no dial-peer voice number codec { 1st-priority-level | 2nd-priority-level | 3rdpriority-level | 4th-priority-level } { g711alaw | g711ulaw | g723r53 | g723r63 | g729r8 } no codec { 1st-priority-level | 2nd-priority-level | 3rd-priority-level | 4th-priority-level } destination-pattern string no destination-pattern ip precedence priority-number no ip precedence session target { ipv4:a.b.c.d | ras } no session target shutdown no shutdown tech-prefix string no tech-prefix vad no vad By default, the command no tech-prefix (i.e., do not configure the technical prefix of the H.323 gateway at the beginning) validates, and the command no vad (Disable the silence detection) validates. The default of the configuration command codec (voice codec mode) is g729r8. The default of the configuration command ip precedence (IP packet precedence) is 0. 1.2.3 Configuring Dial Terminator The dial terminator configuration can notify the router that, on receiving the keystroke input, the dialing is finished and it will begin to make mode match and find the called end. Please make the following configurations in the global configuration mode: 1-8 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration Table VC-1-4 Configuring the dial terminator Operations Commands Configure the dial terminator Delete the dial terminator dial-peer terminator character no dial-peer terminator By default, we do not configure the dial terminator. 1.2.4 Configuring Abbreviated Dialing In many enterprises, the first several digits of all the phone numbers are the same, and you only need to dial the last several digits for internal call. The VoIP service can also use this kind of abbreviated dialing with the command num-exp. After the dialing completes, the abbreviated dialing will automatically expand to the complete E.164 number. Please make the following configurations in the global configuration mode. Table VC-1-5 Configuring abbreviated dialing Operations Commands Configure the abbreviated dialing Delete the abbreviated dialing num-exp extension-number expanded-number no num-exp extension-number By default, we do not configure the abbreviated dialing. 1.2.5 Configuring Voice Port The router provides analogue voice ports for the implementation of the VoIP. The signaling type of these analogue voice ports depends upon the VI (Voice Interface) board installed. The command voice-port is used to configure the characteristics related to the special voice port signaling type. The voice port support the following three basic voice signaling types: z z z FXS (Foreign eXchange Station): FXS port used the standard RJ-11 line to directly connect with the device such as ordinary phone set, fax, PBX, etc., which can provide ring, voltage and dial tone. FXO (Foreign eXchange Office): two wire loop trunk, the FXO port uses RJ-11 line to connect the local calls to the PSTN central office or to the PBX that does not support the E&M signalings. The FXO port device can only connect to device with FXS port. E&M: The E&M port uses the RJ-45 line to connect the remote calls from the IP network to the PBX trunk. The E&M signaling provides the on-hook and off-hook signals and reduces the interference to some lower degree, which is usually used in the PBX backbone or connection line. The voice port configuration mainly involves the configuration of some physical characteristics. Usually, you can use defaults for the physical port parameters and do not need to configure again. Please use the command voice-port in the global configuration mode, and make other configurations in the voice-port configuration mode. 1-9 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration Table VC-1-6 Configuring voice-port Operations Commands Configure voice physical port Set the busy tone detection type for the port Restore the port detection busy tone type to the default Enable comfort noise setting Disable comfort noise setting Specify E.164 phone number of the destination end Delete E.164 phone number of the destination end Configure the port description character string Delete the port description character string Enable the echo cancellation function or set the sample length of the echo cancellation Cancel the echo cancellation function or restore the sample length of the echo cancellation to the default Configure the voice input gain Restore the voice input gain to the default Configure the E&M trunk circuit type Delete the available wire selection scenario Configure the voice output attenuation Restore the voice output attenuation to the default Set the port start mode Delete the set voice port start mode Configure the relevant time interval of the voice port dialing Restore the relevant time interval of the voice port dialing to the default Configure the relevant time parameters in the E&M port Restore the relevant time parameters in the E&M port to the default Configure the E&M trunk type The E&M trunk type specified in the configuration voice-port port-number area { north-america | custom | europe } no area comfort-noise no comfort-noise connection plar string no connection plar description string no description echo-cancel { enable | coverage coverage-time } no echo-cancel { enable | coverage } input gain value no input gain operation { 2-wire | 4-wire } no operation { 2-wire | 4-wire } output attenuation value no output attenuation signal { loopstart | groudstart | wink-start | immediate | delay-dial } no signal { loopstart | groudstart | wink-start | immediate | delay-dial } timeouts {call-disconnect | initial | interdigit } seconds no timeouts {call-disconnect | initial | interdigit } timing {delay-duration | delay-start | digit | interdigit | wink-duration | wink-wait } milliseconds no timing {delay-duration | delay-start | digit | interdigit | wink-duration | wink-wait } type { 1 | 2 | 3 | 5 } no type { 1 | 2 | 3 | 5 } The default of the configuration command operation (E&M trunk circuit type) is 4-wire. The default of the configuration command signal (port start mode) for the FXS and FXO ports is loop start, and for the E&M port, its default is immediate. The value for configuration command input gain is 0 and the value for output attenuation is 0. The default value of the configuration command timeouts initial (initialization timeout interval) is 10s. The default value of the configuration command timeouts interdigit (keystroke timeout interval) is 10s. The default value of the configuration command timing delay-duration (timing delay timeout interval) is 400 ms. The default value of the configuration command timing delay-start (timing delay start timeout interval) is 300 ms. The default value of the configuration command timing digit (DTMF signal duration) is 120 ms. 1-10 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration The default value of the configuration command timing interdigit (time interval between the DTMF signals) is 120 ms. The default value of the configuration command timing wink-duration (wink time delay interval) is 500 ms. The default value of the configuration command timing wink-wait (wink-wait time interval) 500 ms. The default value of the configuration command type (E&M trunk type) is 5. 1.2.6 Configuring Global Number Match Policy To better adapt to the diversity of the subscriber dial plan, the number match policy includes match as per the longest number or the shortest number. When using the longest number match, if the input number length is less than the number length configured by the command destination-pattern, please wait until timeout, and then select the shortest number policy. When using the shortest number match, if the input number length is greater than that configured by the command destination-pattern, then the redundant numbers will be neglected. Please make the following configurations in the global mode: Table VC-1-7 Configuring the global number match policy Operations Commands Configure the number match policy of the whole office voip match-policy { longest | shortest } By default, please use the shortest number match policy. 1.2.7 Configuring the Recovery Method of Voice Board When the voice board becomes abnormal for some reason, two methods can be adopted to recover the board, i.e., the manual recovery and automatic recovery. After enabling the WATCHDOG, it will monitor the board status every five seconds and will automatically recover the board if any abnormality is detected. In this case, manual interference is not necessary. If WATCHDOG is disabled, the board cannot be recovered automatically if any abnormality occurs and manual recovery is needed. Please make the following configuration in global configuraiton mode. 1-11 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration Table VC-1-8 Configuring the recovery method of voice board Operations Commands Enable WATCHDOG Disable WATCHDOG voip enable-watchdog voip disable-watchdog By default, WATCHDOG is enabled. 1.3 VoIP Monitoring and Maintenance Please use the command voip reset in the global configuration mode, and use the following commands show and debug in the privileged user mode. Table VC-1-9 VoIP monitoring and maintenance Operations Commands Reset the voice board Display the call information of the voice port Display the call statistic information of the KHT module Display the call control block information in the RCV module Display the call statistic information between the RCV module and other modules Display the voice port information Display various statistic information in the VPP module Enable the debugging information output switch of the H.225.0 negotiated packets or events Enable the debugging information output of the H.245 negotiated packets or event Enable the debugging information output of the KHT module Enable the debugging information output of the RCV module Enable the debugging information output of the VPM module voip reset slot-number show call-history voice-port number show kht statistics show rcv ccb show rcv statistic { all | call | cc | error | ipp | proc | timer | vpm | vpp } show voice-port number show vpp [ channel channel-no ] debug h225 { asn1 | event } Enable the debugging information output of the VPP module 1) debug h245 { asn1 | event } debug kht { all | error | ipp | rcv | timer | vpp } debug rcv { all | cc | error | ipp | timer | vpm | vpp } debug vpm { all | buffer | command | dsp | em | error | ipp | port | receive | send } debug vpp { all | codecm | error | ipp | kht | rcv | timer | vpm } Display the call information of the voice port Quidway# show call-history voice-port 2 Voice-port 2 type FXS POTS, Line state is opened start outgoing call 4 times, 3 success receive incoming call 8 times, 6 success the latest 10 calling number is: %1% called number 1001 %2% called number 1001 %3% called number 1001 %4% called number 1001 The above information indicates that the type of the voice port 2 is FXS, the line is in an activated status. Four calls are originated at this port, in which three are successful calls. There are eight calls received, in which six are successful. The ten latest called numbers originated at this port, if the calls are less than ten, it will display as per the actual calls. 2) Display the call statistic information of the KHT module Quidway# show kht statistics KHT: Receive IPP packet, begin KHT flow: 1-12 0 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform KHT: KHT: KHT: KHT: KHT: KHT: KHT: KHT: KHT: KHT: KHT: KHT: KHT: KHT: KHT: VoIP Configuration Dial successfully, match POTS dial-peer: Dial successfully, match VoIP dial-peer: Dial successfully, NOT match dial-peer: Send IPAlerting packet to RCV: Send IPConnect packet to RCV: Send PlayDialTone packet to VPP: Send RecvNum packet to VPP: Timer malloc failed: Invalid timer error: Invalid timeout packet error: Receive invalid packet from IPP: Receive invalid packet from VPP: Receive invalid phone number from IPP: CCB NOT found: CCB status error: 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 The above information indicates the amount of various types of information in sequence. The information includes the amount of the following packets: z z z z z z z z z z z z z z z z 3) packet of receiving the IPP module successful dialing and matching the POTS dial-peer successful dialing and matching the VoIP dial-peer successful dialing but not matching the dial-peer the ring packet sent by the KHT to the RCV module the connection establishment packet sent by the KHT to the RCV module the prompt tones playing packet sent by the KHT to the VPP module the dialing number receiving packet sent by the KHT to the VPP module timer distribution error invalid timer error invalid timeout packet invalid information received by the IPP module invalid information received by the VPP module the invalid phone numbers received by the IPP module the call control block (CCB) not found CCB status error, etc. Display the call control block information in the RCV module Quidway# show rcv ccb RCV : { CCB [ 1 ] CallID CallState IppID IppState CcID CcState VpmID CallType CallAttribute CallSignaling EncodeType E1Slot E1Port TimeSlot ChannelID VpuState IppTimer CcTimer VpuTimer CcChanMsg E1ChanMsg CallerNumber CalledNumber prev next : : : : : : : : : : : : : : : : : : : : : : : : : 0x0043 TALK 0x004f IPPS_CONNECTED 0xffff CCS_CONNECTED 0xffff OUTGOING 0x00000000 0x00000002 0x0000001f 0xffffffff 0xffffffff 0xffffffff 0x00000003 VS_CONNECTED 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 111 660010 0x00000000 0x01409500 1-13 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration } The above information indicates that the call control block 1 serves as outgoing call, the state of each module is connection established, the call state is in call process, the calling number is 111 and the called number is 660010. RCV : CCB [ 2 ] { CallID CallState IppID IppState CcID CcState VpmID CallType CallAttribute CallSignaling EncodeType E1Slot E1Port TimeSlot ChannelID VpuState IppTimer CcTimer VpuTimer CcChanMsg E1ChanMsg CallerNumber CalledNumber prev next : : : : : : : : : : : : : : : : : : : : : : : : : 0x0042 TALK 0x004e IPPS_CONNECTED 0xffff CCS_CONNECTED 0x0039 INCOMING 0x00000000 0x00000004 0x00000009 0xffffffff 0xffffffff 0xffffffff 0x00000000 VS_CONNECTED 0x00000000 0x00000000 0x00000000 0x00000000 0x00000000 111 660010 0x01409000 0x00000000 } The above information indicates that the call control block 2 serves as incoming call, the state of each module is connection established, the call state is in call process, the calling number is 111 and the called number is 660010. 4) Display the call statistic information between the RCV module and other modules Quidway# show rcv statistic call Statistic about RCV calls : { RCV_CC_ACTIVE_CALL RCV_CC_ACTIVE_CALL_SUCCEEDED RCV_CC_ACTIVE_CALL_FAILED RCV_CC_PASSIVE_CALL RCV_CC_PASSIVE_CALL_SUCCEEDED RCV_CC_PASSIVE_CALL_FAILED RCV_R2_ACTIVE_CALL RCV_R2_ACTIVE_CALL_SUCCEEDED RCV_R2_ACTIVE_CALL_FAILED RCV_R2_PASSIVE_CALL RCV_R2_PASSIVE_CALL_SUCCEEDED RCV_R2_PASSIVE_CALL_FAILED RCV_VPM_ACTIVE_CALL RCV_VPM_ACTIVE_CALL_SUCCEEDED RCV_VPM_ACTIVE_CALL_FAILED RCV_VPM_PASSIVE_CALL RCV_VPM_PASSIVE_CALL_SUCCEEDED RCV_VPM_PASSIVE_CALL_FAILED } : : : : : : : : : : : : : : : : : : 0 0 0 0 0 0 5 2 3 4 1 3 39 11 28 18 15 3 The above information indicates the total number of the CC, R2 signaling in the RCV module and the call packets of each VPM module, the number of successful call packets, the number of the failed call packets. Using the other parameters (such as CC, IPP, VPM, etc), it will display the statistic information in corresponding module. 1-14 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform 5) VoIP Configuration Display the voice port information ! Execute this command for a voice port in calling progress. Quidway# show voice-port 0 Voice-port 0 type FXS POTS , Line state is opened channel status is CH_TALKING coding protocol 729, decoding protocol 729 calling number 1001 called number 2001, direction outgoing Call-ID is 2 Call-reference is 12 comfort-voice is enabled, reset 0 times Administrative State is UP In Gain is Set to 0 dB Out Attenuation is Set to 0 dB Echo Cancellation is enable Initial Time Out is set to 10 s Interdigit Time Out is set to 10 s The above information indicates that the voice port type is FXS, the line is in activated state, the voice port is calling progress now, the codec mode is G.729, the calling number is 1001 and the called number is 2001. ! Execute this command for a currently idle voice port. Quidway# show voice-port 0 Voice-port 0 type FXS POTS , Line state is opened channel status is CH_IDLE coding protocol 0, decoding protocol 0 calling number called number , direction outgoing Call-ID is 2 Call-reference is 0 comfort-voice is enabled, reset 0 times Administrative State is UP In Gain is Set to 0 dB Out Attenuation is Set to 0 dB Echo Cancellation is enable Initial Time Out is set to 10 s Interdigit Time Out is set to 10 s Since the voice codec mode is mutually negotiated and determined in the session, we cannot see the codec information in the idle state. 6) Display various statistic information in the VPP module Quidway# show vpp Channel = 0 Status = CH_TRANSFRAME ConnectRightTimes = 53 ConnectWrongTimes = 0 DisConnectRightTimes = 52 DisConnectWrongTimes = 0 RecvCodecmDataRightTimes = 577898 RecvCodecmDataWrongTimes = 0 SendCodecmDataRightTimes = 78272 SendCodecmDataWrongTimes = 0 RecvIppDataRightTimes = 78275 RecvIppDataWrongTimes = 0 SendIppDataRightTimes = 577906 SendIppDataWrongTimes = 0 RecvCodecmDataBytes = 17337270 RecvIppDataBytes = 1845370 Channel = 1 Status = CH_IDLE ConnectRightTimes = 4 ConnectWrongTimes = 0 DisConnectRightTimes = 4 DisConnectWrongTimes = 0 RecvCodecmDataRightTimes = 207 RecvCodecmDataWrongTimes = 0 SendCodecmDataRightTimes = 181 SendCodecmDataWrongTimes = 0 RecvIppDataRightTimes = 181 RecvIppDataWrongTimes = 0 SendIppDataRightTimes = 207 SendIppDataWrongTimes = 0 RecvCodecmDataBytes = 6210 RecvIppDataBytes = 5430 …… Total ConnectRightTimes = 66 ConnectWrongTimes = 0 DisConnectRightTimes = 64 DisConnectWrongTimes = 0 RecvCodecmDataRightTimes = 607188 RecvCodecmDataWrongTimes = 2 SendCodecmDataRightTimes = 107473 SendCodecmDataWrongTimes = 0 RecvIppDataRightTimes = 107473 RecvIppDataWrongTimes = 0 1-15 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform SendIppDataRightTimes RecvCodecmDataBytes VoIP Configuration = 607188 = 18215640 SendIppDataWrongTimes = 0 RecvIppDataBytes = 2721160 The above information indicates the information as follows: z z z z z z z z times of right and wrong connection establishment in each voice channel the times of correct and wrong disconnection the times of correct and wrong coding data receiving the times of correct and wrong coding data sending the times of correct and wrong IPP data receiving the times of correct and wrong IPP data sending the total number of the received coding data byte the total number of the received IPP data byte. 1.4 Typical VoIP Configuration Examples 1.4.1 Configuring Router FXS Port for Interconnection I. Networking requirements Telephones in Beijing and Shenzhen can directly make phone calls via WAN through router with voice functions. This network connected in this way is of simple structure, subscribers can directly make phone calls from the router. But the shortcoming of this kind of network is the small capacity, so the group calls cannot be implemented. This scenario is applicable for small office system. The FXS (POTS) port number of the router determines the number of the phones that the router can support to directly access. Depending upon the type, the router can at maximum connect with three or seven voice interface boards respectively. According to the port type, the voice interface board can be divided into FXO board, FXS board and E&M board, which provide two or four FXO ports, FXS ports and E&M ports respectively. II. Networking diagram Tel.3 Tel.1 010 1001 - 0755-2001 port 0 port 1 WAN WAN 1.1.1.1 WAN WAN Router_Beijing port 0 2.2.2.2 port 1 Router_Shenzhen 010-1002 Tel.2 0755-2002 Tel.4 Figure VC-1-5 The router directly connects with ordinary DTMF phones 1-16 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration III. Configuration procedures 1) Router_Beijing configuration: Quidway# config ! Configure VoIP dial-peer. Quidway(config)# dial-peer voice 4 voip ! Configure the called number, the dot is wildcard character. Quidway(config-peer-voip4)# destination-pattern 0755.... ! Configure the IP address of the called party. Quidway(config-peer-voip4)# session target ipv4:2.2.2.2 ! Configure the local ports Tel.1 connects with. Quidway(config-peer-voip4)# dial-peer voice 6 pots ! Configure the phone number of Tel.1. Quidway(config-peer-pots6)# destination-pattern 0101001 ! Configure the relationship between POTS dial-peer 6 and port 0. Quidway(config-peer-pots6)# port 0 ! Configure the local ports Tel.2 connects with. Quidway(config-peer-pots6)# dial-peer voice 5 pots ! Configure the phone number of Tel.2. Quidway(config-peer-pots5)# destination-pattern 0101002 ! Configure the relationship between POTS dial-peer 5 and port 1. Quidway(config-peer-pots5)# port 1 2) Router_Shenzhen configuration Quidway# config Quidway(config)# dial-peer voice 1 voip Quidway(config-peer-voip1)# destination-pattern 010.... Quidway(config-peer-voip1)# session target ipv4:1.1.1.1 ! Configure the local ports Tel.3 connects with. Quidway(config-peer-voip1)# dial-peer voice 4 pots Quidway(config-peer-pots4)# destination-pattern 07552001 Quidway(config-peer-pots4)# port 0 ! Configure the local ports Tel.4 connects with. Quidway(config-peer-pots4)# dial-peer voice 5 pots Quidway(config-peer-pots5)# destination-pattern 07552002 Quidway(config-peer-pots5)# port 1 1-17 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration 1.4.2 Configuring Router FXO and E&M Trunk Ports for Interconnection I. Networking requirements There is a local telephone network established by PBX in Beijing, Shenzhen and Shanghai respectively, it is required that the three networks implement interconnection via three routers with voice function and the internal PBX subscribers can make nonlocal ordinary calls via VoIP. The routers in Beijing and shanghai can provide the FXO ports, while the router in Shenzhen uses the E&M port. You may select any of the following modes for the connection of any router and the PBX: z z z The routers provide the FXS ports, the PBXs provide two wire loop trunk port FXOs The routers provide the FXO ports, the PBXs provide ordinary line port FXSs All the routers and the PBXs provide the E&M trunk ports The number of connection established between the PBX subscribers in Shenzhen and Beijing are determined by the smaller one of the number of Router_Shenzhen E&M trunk ports and Router_Beijing FXO trunk ports, so it is with Shanghai. In the following figure, Tel.1 in Beijing is an ordinary PSTN subscriber. If not using VoIP, when the subscribers in Shenzhen or Shanghai dial Tel.1, they need to add the area code 010, but through the VoIP configuration, instead of dialling the area code, you can call in local mode, which is very convenient and can also save call charge. Provided that when the internal PBX subscribers in the three cities make external calls, they need to dial “0” firstly. II. Networking diagram 021-1001 021-1002 Shanghai FXO Port0 PBX WAN 3.3.3.3 Port1 Router_ Shanghai Router_Shenzhen WAN 2.2.2.2 E&M Port6 0755-2001 0755-2002 WAN 010-1002 010-1001 FXO Port0 Port1 PBX WAN 1.1.1.1 Router_Beijing Shenzhen PBX Beijing PSTN Tel.1 010-6543 Figure VC-1-6 The routers connect with the PBXs via the E&M trunk 1-18 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration III. Configuration procedures 1) Router_Beijing configuration: ! Configure the VoIP dial-peer to Shenzhen. Quidway(config)# dial-peer voice 0755 voip Quidway(config-peer-voip775)# destination-pattern 0755.... Quidway(config-peer-voip775)# session target ipv4:2.2.2.2 ! Configure the VoIP dial-peer to Shanghai. Quidway(config-peer-voip775)# dial-peer voice 021 voip Quidway(config-peer-voip21)# destination-pattern 021.... Quidway(config-peer-voip21)# session target ipv4:3.3.3.3 ! Configure local port Port0. Qduiway(config-peer-voip21)# dial-peer voice 4 pots Quidway(config-peer-pots4)# destination-pattern 010.... Quidway(config-peer-pots4)# port 0 ! Configure prefix, dial 0 first for outgoing call, and the comma indicates that it will send the number 500 ms after sending the prefix “0”. Quidway(config-peer-pots4)# prefix 0, ! Configure the local port Port 1. Quidway(config-peer-pots4)# dial-peer voice 5 pots Quidway(config-peer-pots5)# destination-pattern 010.... Quidway(config-peer-pots5)# port 1 ! Configure prefix, dial “0” first for outgoing calls, with 500 ms time delay. Quidway(config-peer-pots5)# prefix 0, 2) 3) The configuration of Router_Shanghai is the same as that of Router_Beijing. Router_Shenzhen configuration: Quidway# config ! Configure the VoIP dial-peer to Shanghai. Quidway(config)# dial-peer voice 21 voip Quidway(config-peer-voip21)# destination-pattern 021.... Quidway(config-peer-voip21)# session target ipv4:3.3.3.3 ! Configure the VoIP dial-peer to Beijing. Quidway(config-peer-voip21)# dial-peer voice 010 voip Quidway(config-peer-voip10)# destination-pattern 010.... Quidway(config-peer-voip10)# session target ipv4:1.1.1.1 ! Configure the local port Port 6. 1-19 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration Qduiway(config-peer-voip10)# dial-peer voice 7 pots Quidway(config-peer-pots7)# destination-pattern 0755.... Quidway(config-peer-pots7)# port 6 ! E&M port setting. Quidway(config-peer-pots7)# voice-port 6 Quidway(config-voice-port6)# signal wink-start Quidway(config-voice-port6)# operation 4-wire Quidway(config-voice-port6)# type 5 1.4.3 Configuring the Interconnection of Router FXO Port in PLAR Mode I. Networking requirements We specify that the FXO port of Router_Shenzhen works in the PLAR (Private Line Auto Ringdown) mode, the default remote connection phone number is 0101001. When the PBX subscriber 0755-2001 dials the number 0755-2003, firstly it will connect with the Router_Shenzhen. Since the FXO port works in the PLAR mode, it will automatically use the set remote connection number to request connection with the subscriber 010-1001 in Beijing. II. Networking diagram 0755-2001 010-1001 Port 0 WAN 1.1.1.1 0755-2003 WAN WAN Router_Beijing PBX FXO Port1 WAN 2.2.2.2 Router_Shenzhen Figure VC-1-7 Router_Shenzhen FXO works in the PLAR mode III. Configuration procedures 1) Router_Beijing configuration Quidway(config)# dial-peer voice 4 voip Quidway(config-peer-voip4)# destination-pattern 0755.... Quidway(config-peer-voip4)# session target ipv4:2.2.2.2 Quidway(config-peer-voip4)# dial-peer voice 5 pots Quidway(config-peer-pots5)# destination-pattern 0101001 1-20 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration Quidway(config-peer-pots5)# port 0 2) Router_Shenzhen configuration Quidway# config Quidway(config)# dial-peer voice 10 voip Quidway(config-peer-voip10)# destination-pattern 010.... Quidway(config-peer-voip10# session target ipv4:1.1.1.1 Quidway(config-peer-voip10)# dial-peer voice 11 pots Quidway(config-peer-pots11)# destination-pattern 07552001 Quidway(config-peer-pots11)# port 1 ! Make the following FXO Port1 configuration. Quidway(config)# voice-port 1 Quidway(config-voice-port1)# connection plar 0101001 1.4.4 Configuring Interconnection with Refiner for Large Network Solution I. Network requirements Router_Beijing and Router_Shanghai connect with the PBXs via trunk port, while Router_Shenzhen connects with Quidway A8010 Refiner through the Ethernet via a high-speed router. With the separated data and voice service, the network processing capacity can be improved. The burden of VoIP and the voice service of large Intranet can be lessened. With the expansion of the enterprise scale, you may use GateKeeper to carry out management according to actual requirements. II. Networking diagram Shenzhen E1 Public Switch A8010 Refiner LAN Gate keeper Gate keeper Router_3 WAN Router_1 Router_2 PSTN PSTN Beijing Shanghai PBX PBX 1-21 Chapter 1 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform VoIP Configuration Figure VC-1-8 Interconnecting mode of the voice router and the voice gateway III. Configuration description In the networking diagram, Router_1 and Router_2 are routers with voice function. In configuration, the session target should point to the interface between the A8010 Refiner and the Ethernet. Since the A8010 Refiner itself does not have routing function, we need Router_3 to implement the work related to routing function. 1.5 VoIP Troubleshooting Fault 1: The user hears busy tone after dialing. Troubleshoot: Take the following procedures. z z z Firstly check that the remote router exists and you can ping the remote IP address. Check that the dial-peer configuration is correct. Check that the phone number configuration is correct. You can use the command show call voice-port number to view the call history. 1-22 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform IP Fax Configuration Chapter 2 IP Fax Configuration 2.1 Overview to IP Fax Traditional faxes are sent and received over PSTN. Today fax services are widely used due to its advantages, such as many kinds of transmissive information, fast speed for information transmission and easy to use. Type G3 facsimile machines are frequently used fax terminals in the current fax communications. Type G3 fax is a communication equipment with digital signal process technology. In the process, image signal is turned into analog signal through a modem after it is digitized and compressed, then the analog signal is input into switch via general subscriber line. The so-called IP Fax, just as its name implies, indicates that fax is sent and received over Internet. Quidway series router can provide VoIP function. With the features of IP Fax, it also can offer IP Fax functions. IP Fax can provide PSTN subscribers with Internet fax services, thus the subscribers only need to pay for considerable cheap expenses when sending international and domestic faxes. The diagram of IP Fax architecture is as follows: PSTN PSTN Internet Router Router Figure VC-2-1 Architecture of IP Fax IP realtime fax complies with ITU-T T.30 and T.4 protocols on the side of PSTN and complies with H.323 and T.38 protocols on the side of IP. T.30 protocol is the transmission protocol and recommendation for the document fax in the Public Switched Telephone Network (PSTN). It has made detailed description and rules on the communication process, the signal format adopted in communication, control signaling and error correction mode of category 3 facsimile over PSTN network. T.4 protocol regulates the related standards and specifications for the file transmission through category 3 facsimile terminals. It has made the standardization rules on image coding mode, signal modulation mode and rate, transmission time, error correction mode as well as file transfer mode of the category 3 facsimile terminal. T.38 protocol stipulates the recommendations and specifications for the realtime communication through category 3 facsimile terminals over IP network. It has made some description and rules on the communication mode, packet format, error correction and some communication process of the category 3 facsimile over IP network. 2.2 Configuring IP Fax 2.2.1 Task List of IP Fax Configuration You should configure VoIP before configuring IP Fax. For the detailed procedure of VoIP configuration, please refer to the section “Chapter 1 VoIP Configuration” in the manual. 2-1 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform IP Fax Configuration IP telephone works after VoIP is configured. Generally speaking, faxes can now be sent and received by using the default configuration of IP Fax only after a facsimile machine is connected. The procedures of configuring IP Fax are mainly used to set up the specific parameters of IP Fax or used for some specified conditions. For example, fax operation can not be completed when the default gateway carrier transmit energy level. The task of IP Fax configuration is as follows: z z z z z z z z Check if configuring fax to use ECM mode Configure fax rate Configure fax train mode Configure Fax Local-train Threshold Value Configure gateway carrier transmit energy level Configure redundancy packet number of T38 fax protocol Configure the fax protocol intercommunicating with Cisco equipment Configure the intercommunication method with other equipment All of the above configuration tasks should be carried out under the condition of dial peer entity configuration mode. 2.2.2 Checking If Configuring Fax to Use ECM Mode According to ITU-T Recommendation, Error Correction Mode (ECM) is necessary to the transmission of facsimile message with the half-duplex and half-modulation system of ITU-T V.34 protocol, at the same time the category G3# facsimile terminal operating in full duplex mode is required to support half-duplex mode, that is to support ECM mode. If the facsimile adopts ECM mode, it has error correction function, and provides automatic request for retransmission (ARQ) technology, at the same time facsimile packet will be transmitted in the form of HDLC frame. On the contrary, if the facsimile machine adopts non-ECM mode (the mode that facsimile must support), it has no error correction function, and the facsimile uses binary string to transmit. In actual configuration, if the facsimile machines on both sides support ECM mode, but the configuration on the side of gateway is non-ECM mode, then non-ECM mode should be adopted. If the facsimile machine on either or neither of sides does not support ECM mode, then non-ECM mode should also be used. Only when the facsimile machines on both sides support ECM mode and the gateway uses ECM mode, ECM mode can be adopted. Please perform the following configuration in dial peer configuration mode. Table VC-2-1 Check if configuring fax to use ECM mode Operation Command Configuring fax does not use ECM mode Configuring fax uses ECM mode fax-relay ecm disable no fax-relay ecm disable The gateway does not use ECM mode by default. 2.2.3 Configuring Fax Rate Subscribers can configure fax rate according to the different protocols. 2-2 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform IP Fax Configuration If it is set to be the values except for “disable” and “voice”, the fax rate shall be set to be the corresponding values. The rate set here is not specified rate but the highest allowable rate. When the setting is voice mode (i.e. ”voice”), the highest allowable rate of fax should be finally determined by the differences among voice codec protocols. z z z The fax rate is 14400bps if G.711 voice encoding & decoding protocol is used The fax rate is 4800bps if G.723.1 Annex A voice encoding & decoding protocol is used. The fax rate is 7200bps if G.729 voice encoding & decoding protocol is used The fax function is disable when the setting is “disable”. Please perform the following configuration in dial peer configuration mode. Table VC-2-2 Configure fax rate Operation Command Configure fax rate fax rate { 12000 | 14400 | 2400 | 4800 | 7200 | 9600 | disable | voice } By default, the fax rate will be determined by voice mode. 2.2.4 Configuring Fax Train Mode Local-train mode indicates that the gateway takes part in the rate train between the facsimile machines on the both ends. In the mode, the facsimile machine and gateway respectively take part in the training, then the receiving gateway sends the train results of the receiving end to the sending gateway, finally the sending gateway will determine the final message transmission rate according to the train results of the receiving end and its own end. Point-to-point train mode indicates that the gateways do not take part in the rate train between the facsimile machines on the both ends. In the mode, the rate train processes between the two facsimile machine terminals and is transparent to the gateways. Please perform the following configuration in dial peer configuration mode. Table VC-2-3 Configure fax train mode Operation Command Configure fax train mode fax train-mode { local | ppp} The mode is local-train mode (local) by default. 2.2.5 Configuring Fax Local-train Threshold Value When the rate train is being processed between facsimile machines, the sending facsimile machine sends TCF data of “0” to the receiving facsimile machine for 1.5 +10% seconds, then the receiving end will determine if the rate is acceptable according to the received TCF data. When it is configured to be local-train mode, use this command to configure the threshold value of the local-train. When “1” appears in the received TCF data, it indicates TCF data encountered errors during the transmission. If the number of the 2-3 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform IP Fax Configuration received “1” is less than the preset threshold value, then the current rate train is successful, otherwise, it is not successful. Please perform the following configuration in dial peer configuration mode. Table VC-2-4 Configure fax local-train threshold value Operation Command Configure fax local-train threshold value Restore the default value of fax local-train threshold value fax local-train threshold threshold no fax local-train threshold By default, the fax local-train threshold value is 10. The threshold value ranges from 0 to 100. 2.2.6 Configuring Gateway Carrier Transmit Energy Level Generally, the default values of gateway carrier transmit energy level are acceptable. If subscriber found fax could not established when the other configurations are correct, you may try to adjust the gateway carrier transmit energy level. Less energy level value shows higher energy. Please perform the following configuration in dial peer configuration mode. Table VC-2-5 Configure gateway carrier transmit energy level Operation Command Configure gateway carrier transmit energy level Restore the default value of gateway carrier transmit energy level fax level level no fax level By default, the gateway carrier transmit energy level is 15. The level value ranges from 3 to 60. 2.2.7 Configuring Sending Redundancy Packet Number of T38 Fax Protocol Low-speed data indicates the command data compliant with V.21 and the data rate is 300bps. High-speed data indicates TCF and image data. Please perform the following configuration in dial peer configuration mode. Table VC-2-6 Configure sending redundancy packet number of T38 fax protocol Operation Command Configure redundancy packet number of low-speed data of T38 fax protocol Restore the default value of redundancy packet number of low-speed data of T38 fax protocol Configure redundancy packet number of high-speed data of T38 fax protocol Restore the default value of redundancy packet number of high-speed data of T38 fax protocol 2-4 fax protocol t38 ls-redundancy number no fax protocol t38 ls-redundancy fax protocol t38 hs-redundancy number no fax protocol t38 hs-redundancy Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform IP Fax Configuration By default, the number for sending two kinds of redundancy packet is 0.The redundancy packet number for sending low-speed data ranges from 0 to 5, and the redundancy packet number for sending high-speed data ranges from 0 to 2. 2.2.8 Configuring the Fax Protocol Intercommunicating with Cisco Equipment The two kinds of fax protocols including T.38 and Cisco fax protocol are supported. When it intercommunicates with Cisco fax terminal, please select Cisco fax protocol. When it is intercommunicates with other fax terminals supporting T.38 protocol, select T.38 protocol. Because Cisco device does not support the fax local train mode, pointto-point train mode must be adopted to communication with Cisco device. Please perform the following configuration in dial peer configuration mode. Please perform the following configuration in dial peer configuration mode. Table VC-2-7 Configure the fax protocol intercommunicating with Cisco equipment Operation Command Configure the fax protocol intercommunicating with Cisco equipment fax protocol { cisco | t38 } By default, T.38 protocol is used. 2.2.9 Configuring the Intercommunication Method with Other Equipment Generally, RTP mode (the corresponding parameter is rtp) is used when using T.38 protocol. But you should select to use VT mode (the corresponding parameter is vt) if it intercommunicates with the gateway of VocalTec. Please perform the following configuration in dial peer configuration mode. Table VC-2-8 Configure the modes intercommunicating with other equipment Operation Command Configure the intercommunication method with other equipment fax support-mode { standard | rtp | vt } By default, rtp protocol is used. 2.3 Monitoring and Maintenance of IP Fax Please use the following commands to monitor and maintain IP Fax in the privileged user mode. 2-5 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform IP Fax Configuration Table VC-2-9 Monitoring and maintenance of IP Fax Operation Command Open all of the debugging information switches of ipfax Open the debugging information switch of function api of ipfax Open the debugging information switch of main task of ipfax Open the debugging information switch of controller of ipfax Open the debugging information switch of level 1 error message of ipfax Open the debugging information switch of level 2 error message of ipfax Open the debugging information switch of level 3 error message of ipfax Open the debugging information switch of all levels of error messages of ipfax Open the debugging information switch of T38 message of ipfax Open the debugging information switch of cisco message of ipfax Open the debugging information switch for reading and writing fax data between vpm module and voice card. debug ipfax all debug ipfax api debug ipfax cc debug ipfax controller debug ipfax error 1_level debug ipfax error 2_level debug ipfax error 3_level debug ipfax error all debug ipfax t38 debug ipfax cisco debug vpm fax 2.4 Typical Configuration of IP Fax The networking mode of IP Fax is basically the same as IP Phone. Thus, the functions of IP Fax can be realized only when the telephone sets in the network of IP Phone are replaced by facsimile machines. You can basically use the functions of IP Fax only if you can configure IP Phone. The operation is easy to use. 1) Networking Requirements Suppose a company headquarter located in Shenzhen plans to send/receive faxes to/from its Beijing branch via IP network. The fax number of its Beijing branch is 0101002, and the number of Shenzhen headquarter is 07551001. The IP address used to access to the Internet port through the router in Beijing is 1.1.1.2. The IP address used to access to the Internet port through the router in Shenzhen is 1.1.1.1. The facsimile machine in Beijing is connected with the second voice port on the router, and the facsimile machine in Shenzhen is connected with the first voice port on the router. 2) Networking Diagram port2 1.1.1.1 1.1.1.2 port1 Internet 0101002 Router Shenzhen Router Beijing 07551001 Figure VC-2-2 Networking diagram for typical IP fax configuration 3) Configuration Procedure The parameter settings for the router in Beijing is as follows: Quidway(config)# dial-peer voice 1 voip Quidway(config-peer-voip1)# destination 07551001 Quidway(config-peer-voip1)# session target ipv4:1.1.1.1 2-6 Chapter 2 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform IP Fax Configuration Quidway(config-peer-voip1)# dial-peer voice 2 pots Quidway(config-peer-pots2)# destination 0101002 Quidway(config-peer-pots2)# port 2 The parameter settings for the router in Shenzhen is as follows: Quidway(config)# dial-peer voice 2 voip Quidway(config-peer-voip2)# destination 0101002 Quidway(config-peer-voip2)# session target ipv4:2.2.2.2 Quidway(config-peer-voip2)# dial-peer voice 1 pots Quidway(config-peer-pots1)# destination 07551001 Quidway(config-peer-pots1)# port 1 2-7 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration Chapter 3 E1 Voice Configuration 3.1 Overview of E1 Voice Configuration 3.1.1 Function of E1 Voice E1 voice refers to the implementation of VoIP function over E1 line, so as to provide voice transmission mode compatible with data transmission. In order to implement this function, the corresponding E1 voice port needs to be provided on the router and also a range of functions suitable for voice transmission over E1 line should be provided. The networking that adopts E1 line for voice transmission is the same as the ordinary VoIP networking applications, except that the connection between PSTN switch and the router is through E1 trunk, and the signaling adopted for the line is R2 signaling (similar to China No. 1 Signaling) or DSS1 subscriber signaling on ISDN PRI interface. The basic networking is shown in the diagram below: IP network E1 IP voice gateway IP voice gateway PSTN E1 PSTN Telephone Telephone Gate Keeper Figure VC-3-1 Basic Structure of E1 Voice System Adopting E1 voice mode, the router can provide more channels for voice communication and supports integrated transmission of data and voice, greatly enhancing the utilization rate of the router and the range of the services supported. 3.1.2 Usage of cE1/PRI Interface The physical port of E1 voice is cE1/PRI interface, which is divided into 32 TSs (time slots) numbered from 0 to 31. The following lists three methods to use this interface: I. Interface not divided into TSs logically When used as E1 interface, do not divide it into TSs logically and use the full capability of the interface for data transmission. The bandwidth of the interface is 2Mbit/s (TSs 0 to 31) and its logical attribute is equal to the synchronous serial port with rate of 2Mbit/s. On the interface, link layer protocols such as PPP, FR, LAPB, X.25 and HDLC, and network protocols such as IP and IPX, are supported. 3-1 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration II. Interface divided into TSs logicailly & TS 16 not as special channel When used as cE1 interface, all the other 31 TSs except TS0 can be divided into several groups, with each group of TSs used as one interface (channel-group) after being bound. Its logical attribute is equal to the synchronous serial ports of different rates. On the interface, link layer protocols such as PPP, FR, LAPB, X.25 and HDLC, and network protocols such as IP and IPX, are supported. III. Interface divided into TSs logicailly & TS 16 as signaling channel When DSS1 subscriber signaling is adopted, the interface is used as ISDN PRI interface. Since TS16 is used as transmission connection signaling for D channel, you can only bind TS 16 with any other TSs (except for TS0 and TS16) and use as one interface (pri-group). Its logical attribute is the same as ISDN dial-up. On this interface, PPP link layer protocol and network protocols such as IP and IPX are supported, and parameters such as DDR can be configured. When the upper layer uses R2 signaling, the contents transported in the TSs are: Every 32 TSs constitute a basic frame; every 16 basic frames constitute one multiframe; the TS0 of every odd basic frame is used to transport the synchronous identity of the frame; the TS16 of every odd basic frame is used to transport line signaling. In each multiframe, the TS0 of the odd basic frame is used to transport FAS (Frame Alignment Signal), and that of the even basic frame is used to transport NFAS (Non Frame Alignment Signal). What transported on it is the state information about the links, which provides control signaling for basic rate multiplexing. The 4 significant bits of the TS 16 of the first basic frame (Frame 0) of every multiframe are used to transport the synchronous identity (Multiframe Alignment Signal (MFAS)) and the insignificant 4 bits are used to transport asynchronous identity. The TS16 of the other 15 basic frames transport the line state of every two TSs respectively, for instance, basic frame 1 is used to transport the states of TS1 and TS16; basic frame 2 is used to transport the states of TS2 and TS17. 3.1.3 Features of E1 Voice I. Signaling modes supported DSS1 subscriber signaling is supported on ISDN PRI interface and R2 signaling is supported on E1 interface. II. Protocols and standards supported Support the relevant protocols under ITU-T H.323 frame and support the 5.3K and 6.3K compression algorithms of G.711, G.729 and G.723.1 Annex A of ITU standard, support CRC4 and non-CRC4 framing modes, support the two kinds of line coding of HDB3 and AMI. III. Support single stage dialing and two-stage dialing It supports the two access functions of single stage dialing and two-stage dialing, which adapts itself to the difference between various PBX exchanges in their transportation of called numbers to the router. When one PBX exchange is transporting voice access number to the router and the number is deleted, the router adopts single stage dialing access mode to access the subscriber. If PBX exchange does not delete the access 3-2 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration number, the router will receive the complete dial number of the subscriber. In this case, the router adopts two-stage dialing mode and releases prompt tone to guide the subscriber to input other information. IV. Integrated transmission of voice and data When DSS1 subscriber signaling is adopted on ISDN PRI interface, Integrated transmission of voice and data is supported. By Integrated transmission, it means that data and voice are transported in the different B channels in one physical line. 3.2 E1 Voice Configuration 3.2.1 Configuration Task List of E1 Voice The tasks of E1 voice configuration includes: z Configure POTS dial-peer z Configure VoIP dial-peer z Configure the basic parameters of E1 interface z Configure the voice port (E1 interface) z Configure E1 voice R2 signaling z Configure the basic parameters of ISDN PRI interface z Configure voice port (ISDN PRI interface) 3.2.2 Configuring POTS dial-peer POTS, the abbreviation of Plain Old Telephone Service, i.e., the ordinary telephone service. Configuring POTS dial-peer is to establish relationship between the voice port and the local telephone device. There are two basic configuration commands: destination-pattern and port. Destination-pattern is used to define the destination pattern associated with POTS dial-peer, while port relates POTS dial-peer to one logical voice port, which is generally the voice port that the router connects to the local exchange (PBX) through E1 line. Besides, the prefix may need to be configured for the outgoing PBX subscribers. Please perform the configuration of dial-peer voice pots in global configuration mode, and perform other configurations in POTS dial-peer configuration mode. 3-3 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration Table VC-3-1 Configuration Commands of POTS dial-peer Operation Command Enter POTS dial-peer configuration mode Delete POTS dial-peer Disable the truncating of the called number Truncate the called number Configure the destination pattern of the dial-peer (telephone number) Delete the destination pattern of the dial-peer (telephone number) Configure the access number of two-stage dialing Delete the access number of two-stage dialing Set the precedence of IP packet Recover the default value of the precedence of the IP packet Configure the correspondence between POTS dial-peer and DS0 group logical voice port Configure the correspondence between POTS dial-peer and ISDN PRI group logical voice port Cancel the correspondence between POTS dial-peer and logical voice port Configure the prefix of the outgoing number Delete the prefix of the outgoing number Disable the POTS dial-peer Enable the POTS dial-peer Enable silence detection Disable silence detection dial-peer voice number pots no dial-peer voice number cancel-truncate no cancel-truncate destination-pattern string no destination-pattern incoming called-number number no incoming called-number ip precedence priority-number no ip precedence port e1-controller-number :ds0-group-number port e1-controller-number :15 no port prefix string no prefix shutdown no shutdown vad no vad By default, no cancel-truncate (i.e. truncate the called number) and no vad (i.e. disable silence detection) become effective. The default value of configuration command ip precedence (the precedence of IP packet) is 0. 3.2.3 Configuring VoIP dial-peer VoIP is the abbreviation of Voice over IP. VoIP dial-peer is used to match telephone number with IP address. There are two basic configuration commands: destinationpattern and session target. The destination-pattern defines the telephone number associated with VoIP dial-peer, while session target specifies the destination IP address for VoIP dial-peer. Please perform dial-peer voice voip in global configuration mode, and perform other configurations in VoIP dail-peer (dial-peer) configuration mode. 3-4 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration Table VC-3-2 Configuration Commands of VoIP dial-peer Operation Commands Enter VoIP dial-peer configuration mode Delete VoIP dial-peer Configure voice codec method Recover the default value of voice codec method Configure the destination pattern of dial-peer (telephone number) Delete the destination pattern of the dial-peer (telephone number) Set the precedence of IP packet Recover the default value of the precedence of IP packet Set the session target of the dail-peer Delete the session target of the dial-peer Disable the VoIP dial-peer Enable the VoIP dial-peer Configure H.323 gateway tech-prefix Delete H.323 gateway tech-prefix Enable silence detection Disable silence detection dial-peer voice number voip no dial-peer voice number codec { 1st-priority-level | 2nd-priority-level | 3rd-priority-level | 4th-priority-level } { g711alaw | g711ulaw | g723r53 | g723r63 | g729r8 } no codec { 1st-priority-level | 2nd-priority-level | 3rd-priority-level | 4th-priority-level } destination-pattern string no destination-pattern ip precedence priority-number no ip precedence session target { ipv4:a.b.c.d | ras } no session target shutdown no shutdown tech-prefix string no tech-prefix vad no vad By default, no tech-prefix (i.e. H.323 gateway tech-prefix not configured initially) command becomes effective, and no vad (disable silence detection) command becomes effective. The default value of configuration command codec (voice coding and decoding method) is g729r8. The default value of configuration command ip precedence (the precedence of IP packet) is 0. 3.2.4 Configuring the Basic Parameters of E1 Interface In order that the device on the two ends of E1 trunk will be synchronized in communication, E1 clock source needs to be configured for the device on both ends. At this stage, there are two ways to select the clock source: generating the clock by itself and extracting the clock from the line. When channel-group is successfully configured, the system will create the serial port corresponding to the channel-group automatically. The number of the new serial port is “(the number of the serial port where the channel group lies + the total number of the serial ports): channel-group number”. Please use commands controller e1 and interface serial in global configuration mode and perform other configurations in E1 controller interface configuration mode. 3-5 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration Table VC-3-3 Configuration Commands of E1 Interface Operation Command Enter E1 controller interface configuration Establish channel-group for the specified TS Delete specified channel-group Set clock source Cancel clock source Configure framing mode Configure line coding mode Start loopback test Disable loopback test Select interface mode Enter the serial port corresponding to the channel-group controller e1 port channel-group channel-group-no timeslots timeslotslist no channel-group channel-group-no clock { line [ primary ] | internal } no clock framing { crc4 | no-crc4 } linecode { ami | hdb3 } loopback no loopback using { e1 | ce1 } interface serial serial-no :channel-group-no By default, no loopback (i.e. disable loopback test) becomes effective. The default value of the configuration command clock (clock source) is line. The default value of the configuration command framing (framing mode) is no-crc4. The default value of the configuration command linecode (line coding mode) is hdb3. The default value of the configuration command using (E1 interface mode) is ce1. 3.2.5 Configuring Voice Port (E1 Interface) Before entering voice port (E1 interface) configuration mode, first DS0 group needs to be created in E1 controller interface configuration mode. In this way, the system will create the voice port corresponding to the DS0 group automatically. Please use voice-port command in global configuration mode and perform other configurations in voice port configuration mode. 3-6 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration Table VC-3-4 Configuration Commands of E1 Voice Port Operation Command Enter voice port configuration mode Enable comfort noise setting Disable comfort noise setting Establish PLAR mode connection for voice port Delete the PLAR connection of the voice port Configure the description information of the port Delete the description information of the port Enable echo cancellation function or set the time coverage of echo cancellation sampling Cancel echo cancellation function or recover the default value of the time coverage of echo cancellation sampling Set voice input gain Recover the default value of voice input gain Set echo cancellation to use non-linear processing procedure Cancel echo cancellation’s use of non-linear processing procedure Configure voice output attenuation Recover the default value of voice output attenuation Disable the voice port Enable the voice port voice-port port-nunmber :ds0-group-number comfort-noise no comfort-noise connection plar telephone-number no connection plar description string no description echo-cancel { enable | coverage coverage-time } no echo-cancel { enable | coverage } input gain value no input gain non-linear no non-linear output attenuation value no output attenuation shutdown no shutdown By default, comfort-noise (i.e. enable comfort-noise setting) command becomes effective and no connection plar (i.e. the system has not established PLAR mode connection initially) command becomes effective, and non-linear (i.e. enable nonlinear processing procedure) becomes effective. The default value of configuration command echo-cancel (enable echo cancellation) is enable. The default value of command echo-cancel coverage (time coverage of echo cancellation sampling) is 16ms. The default value of configuration command input gain (voice input gain) is 0. The default value of configuration command output attenuation (voice output attenuation) is 0. 3.2.6 Configuring E1 Voice R2 Signaling I. Configuring DS0 group DS0 is the logical voice port abstracted from the actual E1 port by defining the time slot list, and it serves voice transmission. The time slots included in the DS0 group are all used to transmit voice, while the other time slots not included still can serve data information transmission. Only one DS0 can be defined on one E1 port. The R2 signaling configuration for E1 line is facilitated by configuring signaling type and the relevant parameters of R2 signaling for each DS0. When DS0 group is successfully configured, the system will create the voice port corresponding to the DS0 according to the current E1 port number and DS0 group number. The voice port number is “E1 port number: DS0 group number”. For the commands in the table below, please use controller e1 in global configuration mode and the others in E1 controller interface configuration mode. 3-7 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration Table VC-3-5 DS0 Configuration Commands of DS0 Group Operation Command Enter E1 controller interface configuration mode Create DS0 of certain type Delete the specified DS0 group controller e1 port-number ds0-group group-number timeslots timeslots-list type { e&m-fgb | e&m-immediate-start | fxs-loop-start | r2-digital [ r2-compelled [ ani ] ] } no ds0-group group-number By default, the system has not created any DS0 group. II. Configuring Related Parameters of R2 Signaling R2 signaling conforms to ITU-T recommendation, and is classified into line signaling and register signaling, which can be used for national network and international network. China No. 1 signaling is a subset of R2 signaling. The line signaling, which is classified into forward and backward signaling, is mainly used to monitor the seizure, release and block state of the trunk. The register signaling, also classified into forward and backward signaling, adopts multi-frequency compelled mode to transmit address information, the language bit and authentication bit of international call, echo cancellation information, caller attribute and callee attribute information, and etc. Please use cas-custom command in E1 controller interface configuration mode and perform other configurations in R2 signaling configuration mode. 3-8 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration Table VC-3-6 Configuration Commands of R2 Signaling Operation Command Enter R2 signaling configuration mode Configure the number of the numbers collected before the caller number or the caller identity required Recover the default value of the number of the numbers collected Set the debounce time of the line signaling Recover the default value of the debounce time of the line signaling Specify a command by default Set the inversion mode of line signal Recover the default value of the inversion mode of line signal Set the code of KA signal Recover the default value of the code of KA signal Set the code of KD signal Recover the default value of the code of KD signal Set the latency of sending seizure acknowledgement signal Recover the default value of the latency of sending seizure acknowledgement signal Set E1 trunk routing mode Set the time interval to wait for various signals Recover the default value of the time interval to wait for various signals Set the direction of E1 trunk Recover the default value of the direction of E1 trunk Set the signal value of C and D signal bits Recover the default value of the signal value of C and D signal bits cas-custom ds0-group-number caller-digits number no caller-digits debounce-time number no debounce-time default invert-abcd A-bit B-bit C-bit D-bit no invert-abcd ka number no ka kd number no kd seizure-ack-time millseconds no seizure-ack-time select-mode [ max | maxpoll | min | minpoll ] timeouts { kb | kd | nextnum | ringing | sendasw } value no timeouts { kb | kd | nextnum | ringing | sendasw } trunk-direction timeslots timeslot-list { in | out | dual } no trunk-direction timeslots timeslot-list unused-abcd A-bit B-bit C-bit D-bit no unused-abcd By default, comfort-noise (i.e., enable comfort-noise setting) command becomes effective, and non-linear (i.e., enable non-linear processing procedure) command becomes effective. The default value of the configuration command caller-digits (the number required to be collected before the caller number) is 1, and that for debounce-time (the debounce-time of line signaling) is 40ms, and invert-abcd (the inversion mode of line signaling) disabled, i.e., the value is 0 0 0 0. The default value of command ka (the code of KA signal) is 1, and that for kd (the code of KD signal) is 3, the seizure-acktime (the latency of sending seizure acknowledgement signal) 100ms. The default value of the command select-mode (E1 trunk routing mode) is min, and that of the command timeouts kb (the time interval waiting for receiving KB signal) is 5000ms, and timeouts kd (the time interval waiting for receiving KD signal) 5000ms. The default value of the command timeouts nextnum (the time interval waiting for receiving next MFC compelled digital signal) is 5000ms, and that for timeouts ringing (the time waiting for the end of the ring) is 30000, and timeouts sendasw (the time interval waiting for sending answer signal) 500. The default value of command trunk-direction (the direction of E1 trunk) is dual, and that for unused-abcd (set the signal value of signal bit C and D) is 1111. 3-9 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration 3.2.7 Configuring the Basic Parameters of ISDN PRI Interface If DSS1 subscriber signaling of ISDN PRI interface is adopted between the router and the switch, the integrated transmission of voice and data is supported, in other words, in one E1 trunk connecting the router and the switch, voice signal and data signal occupy different B channels for transmission respectively. When the function of integrated transmission of voice and data is adopted, it is required to configure DDR dialing in the corresponding serial port of ISDN PRI group, so as to implement data transmission. After ISDN PRI group is successfully configured, the system will, on one hand, generate the corresponding voice port of the PRI group according to the E1 port number where the current PRI interface lies: the voice port number is “E1 port number:15”; on another hand, the system will generate the corresponding serial port of PRI group according to the current serial port number: the number of the new port is “(the number of the serial port where PRI group lies + the total number of serial ports) : 15”. After the channel-group is successfully configured, the system will create the corresponding serial port of the channel-group automatically. The number of the new serial port is “the number of the serial port where the channel-group lies + the total number of the serial port)”. Please use commands controller e1 and interface serial in global configuration mode, and perform other configurations in E1 controller interface configuration mode. Table VC-3-7 Configuration Commands of ISDN PRI Interface Operation Command Enter E1 controller interface configuration mode Create channel-group for specified TS Delete the specified channel-group Set clock source Cancel clock source Configure framing mode Configure line coding mode Start loopback test Disable loopback test Create PRI group Delete the specified PRI group Enter the corresponding serial port of channel-group Enter the corresponding serial port of ISDN PRI group controller e1 port channel-group channel-group-no timeslots timeslots-list no channel-group channel-group-no clock { line [ primary ] | internal } no clock framing { crc4 | no-crc4 } linecode { ami | hdb3 } loopback no loopback pri-group [ timeslots timeslots-list ] no pri-group interface serial serial-no :channel-group-no interface serial serial-no :15 By default, no channel-group (i.e. the system has not created channel-group for the time slots initially.) command becomes effective, and no loopback (i.e. disable loopback test) command becomes effective, and no pri-group (i.e. the system does not create any PRI group initially.) command becomes effective. The default value of configuration command clock (clock source) is line, and framing (framing mode) no-crc4, and linecode (line coding mode) hdb3. 3-10 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration 3.2.8 Configuring Voice Port (ISDN PRI Interface) Before entering voice port (ISDN PRI interface) configuration mode, first the ISDN PRI group needs to be created, so that the system will create the voice port corresponding to the PRI group automatically. Please perform voice-port configuration in global configuration mode and perform other configurations in voice port configuration mode. Table VC-3-8 Configuration Commands of ISDN Voice Port Operation Command Enter voice port configuration mode Enable comfort noise setting Disable comfort noise setting Establish PLAR mode connection for voice port Delete the PLAR connection of the voice port Configure the description information of the port Delete the description information of the port Enable echo cancellation function or set the time coverage of echo cancellation sampling Cancel echo cancellation function or recover the default value of the time coverage of echo cancellation sampling Configure voice input gain Recover the default value of voice input gain Set echo cancellation to use non-linear processing procedure Cancel echo cancellation’s use of non-linear processing procedure Configure voice output attenuation Recover the default value of voice output attenuation Disable the voice port Enable the voice port voice-port port-number :15 comfort-noise No comfort-noise connection plar telephone-number No connection plar description string No description echo-cancel { enable | coverage coverage-time } no echo-cancel { enable | coverage } input gain value no input gain non-linear no non-linear output attenuation value no output attenuation shutdown no shutdown By default, comfort-noise (i.e. enable comfort noise setting) command becomes effective, no connection plar (i.e. the system has not established PLAR mode connection initially.) command becomes effective, and non-linear (i.e. start non-linear processing procedure) command becomes effective. The default value of configuration command echo-cancel (enable echo cancellation) is enable, and echo-cancel coverage (the time coverage of echo cancellation sampling) 16ms, and input gain (voice input gain) 0, and output attenuation (voice output attenuation) 0. 3.3 Monitoring and Maintenance of E1 Voice I. Maintaining the MFC Channel and Circuit of the Specified TS MFC channel is used to bear R2 register signaling, while the circuit is used to bear the actual incoming and outgoing calls. You can perform maintenance operations such as open, block and query to the MFC channel of the specified TS. You can perform operations such as open, block, query and reset to the trunk circuit of the specified TS. The operations of open and block are reverse process to each other. 3-11 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration Please use cas-custom command in E1 controller interface configuration mode and perform other configurations in R2 signaling configuration mode. Table VC-3-9 Operation & Maintenance Commands for MFC Channels and TSs Operation Command Enter R2 signaling configuration mode Perform maintenance and operation to the MFC channel of the specified TS Perform maintenance and operation to the trunk circuit of the specified TS cas-custom ds0-group-number mfc { block | open | query } timeslots timeslotslist ts { block | open | query | reset } timeslots timeslots-list II. show Command Related to E1 Voice Please use the following show commands to monitor in privileged mode. Table VC-3-10 The show Commands of E1 Voice Operation Command Show the attribute of E1 controller port Show the configuration of voice port Show the interface ISDN status Show the call statistics related to R2 signaling in RCV module Show the call statistics of R2 signaling Show the relevant information of VoIP show controller e1 port-number show voice-port port-number : { ds0-group-number | 15 } show isdn status [ interface interface-name ] show rcv statistic r2 1) show r2 call-statistics show voip { downqueue e1vi-bno | phy-statistic e1vibno | upqueue e1vi-bno | version vpu-bno } Show the attribute of E1 controller port Quidway# show controller e1 0 E1 1-0 is up. Applique type is Channelized E1 - 120 OHM balanced Framing is NO-CRC4, Line Code is HDB3, Source Clock is Internal. The above packets indicate that: E1 port is activated; the impedance of the trunk is 120; the framing mode is no-crc4; the line code is HDB3; the clock is internal clock. 2) Show the configuration of voice port Quidway# show voice-port 0:0 The voice port was ds0 connection type is PLAR, connection number:2001 The voice port's descrition:e1-port echo cancel enable echo cancel coverage 16 comfort noise enable The above packets indicate that: the E1 voice port 0:0 is in DS0 group mode; PLAR connection is adopted and the connection number is 2001; the voice port description is e1-port; the echo cancellation function is enabled and the time coverage of echo cancellation sampling is 16ms; comfort noise function is enabled. 3-12 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration Quidway# show voice-port 1:15 The voice port was pri this voice port was not set connection The voice port's descrition: echo cancel enable echo cancel coverage 16 music threshold is -70 input gain 0 output attenuation 0 non-linear initial timeouts 10 inter-digits timeouts 10 The above packets indicate: the voice port is ISDN PRI mode; PLAR connection is not adopted; voice port description is not specified; echo cancellation function is enabled; the time coverage of echo cancellation sampling is 16ms; both input gain and output attenuation are 0dB; echo cancellation uses non-linear processing procedure; the time set for waiting for the first digit is 10s; the dial time interval between each number is 10s. 3) Show interface ISDN status Quidway# show isdn status interface serial 1:15 Serial1:15 : Layer 2 Status: TEI = 0, State = AWAITING_ESTABLISHMENT Layer 3 Status: 0 Active Layer 3 Call(s) The above packets indicate that: the serial port corresponding to ISDN PRI interface is serial1:15; Layer 2 protocol in on status of waiting for the setup of connection; there is no activated call on layer 3. 4) Show the call statistics related to R2 signaling in RCV module Quidway# show rcv statistic r2 Statistic between RCV and R2 : { Send_R2_ConnectReqAck_SUCCESS : 0 Send_R2_ConnectReqAck_FAIL : 0 Send_R2_ActiveAck_SUCCESS : 0 Send_R2_ActiveAck_FAIL : 0 Send_R2_Onhook : 0 Send_R2_Offhook : 0 Recv_R2_ConnectReq : 0 Recv_R2_Active_TD_IN : 0 Recv_R2_Active_TD_OUT : 0 Recv_R2_Active_ELSE : 0 Recv_R2_Release : 0 3-13 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration Recv_R2_Alert_AP_ALERTING : 0 Recv_R2_Alert_ELSE : 0 Recv_R2_Unknow : 0 } The packets above show the interactive information between RCV module and R2 signaling, including the successful and failed number of the packets sent about the connection request acknowledgement, the successful and failed number of the packets sent about the activation acknowledgement, the number of the packets sent about onhook and offhook, the number of the connection request packets received, the number of the activation packets received, the number of the packets received about release, alert, unknown and etc. 5) Show the call statistics of R2 signaling Quidway# show r2 call-statistics r2 signalling call statistics 30 drop from state TK_BLOCKED_BY_PEER 1 drop from state TKI_WAIT_CALLED_NUM 2 drop from state TKI_WAIT_VPU_ACTIVE_ACK 2 drop from state TKI_CALLED_ONHOOK 1 drop from state TKO_SEND_CALLED_NUM 2 drop from state TKO_RELEASE_GUARD The above packets show the call statistics related to R2 signaling: the block of the opposite end causes the drop of 30 calls; waiting for the caller number causes the drop of 1 incoming call; waiting for the activation acknowledgement of the voice channel causes the drop of 2 incoming calls; the onhook of the called number causes the drop of 2 incoming calls; sending the called number causes the drop of 1 outgoing call; releasing guard signal causes the drop of 2 outgoing calls. 6) Show the related information of VoIP Quidway# show voip down-queue 5 V = 0,I = 0,P = 0,C = 0,E = E1VI_NULL_EVENT, B = 0 V = 0,I = 1,P = 0,C = 0,E = E1VI_NULL_EVENT, B = 0 …… V = 0,I = 255,P = 0,C = 0,E = E1VI_NULL_EVENT, B = 0 E1VI board 5 down interrupt queue is empty : The above packets show the contents of the downstream interrupted queue between E1 voice board and router motherboard: V denotes valid bit, I is the serial number, P port number, C channel number, E event, and B blocked bit. The packets shown by show voip up-queue is the same as that of show voip down-queue. Quidway# show voip version 0 [Slot 1] VI_NULL Hardware Version is 1.0, Driver Version is 1.0 The packets above show the hardware version and driver version of VI board. III. debug Commands Related to E1 Voice Please use the following debug commands in privileged mode for monitoring and maintenance. 3-14 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration Table VC-3-11 debug Commands of E1 Voice Operation Command Enable the debugging information output between RCV module and base layer R2 module Enable the debugging information output between VPP module and base layer R2 module Enable the output of the corresponding debugging information of R2 module debug rcv r2 debug vpp r2 debug r2 { all | dl controller e1-port-no timeslots-list | error | event | fail-reason | fsm controller e1-port-no timeslots-list | mfc controller e1-port-no timeslots-list | rcv | warning } 3.4 Typical Configuration Examples of E1 Voice 3.4.1 Router Connected to PBX through E1 Voice Port I. Networking requirement The telephones in Beijing and Shenzhen communicate with each other directly via IP network using routers with voice function. The FXS (POTS) interface of Beijing router is connected to the telephone directly and is connected to PBX exchange through E1 voice port. The Shenzhen router is connected to PBX exchange only through E1 voice port. The communications signaling adopts R2 signaling and adopts single stage dialing mode. II. Networking Diagram 010-1003 Port0 WAN 1.1.1.1 Router_ Beijing WAN Port0: 1 010-1002 WAN 2.2.2.2 Router_Shenzhen Port1:1 0755-2001 010-1001 E1 PBX E1 Shenzhen Beijing Figure VC-3-2 Router Connected to PBX in E1 Mode (Single stage dialing) III. Configuration Procedure 1) Parameters configuration of the Beijing-side router ! Configure DS0 group Quidway(config)# controller e1 0 3-15 PBX 0755-2002 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration Quidway(config-if-E1-0)# ds0-group 1 timeslots 1-31 type r2-digital ! Set up the POTS dial-peer on FXS interface (telephone number 010-1003) Quidway(config)# dial-peer voice 1003 pots ! Configure the destination pattern of the POTS dial-peer on FXS interface Quidway(config-peer-pots1003)# destination-pattern 0101003 ! Configure the POTS peer on FXS interface to correspond with logical port Quidway(config-peer-pots1003)# port 0 ! Create POTS dial-peer on E1 interface (telephone number 010-1001) Quidway(config)# dial-peer voice 1001 pots ! Configure the destination pattern of the POTS dial-peer on E1 interface Quidway(config-peer-pots1001)# destination-pattern 0101001 ! Configure the POTS peer on E1 interface to correspond with logical port Quidway(config-peer-pots1001)# port 0:1 ! Create VoIP dial-peer Quidway(config)# dial-peer voice 0755 voip ! Configure the destination pattern of VoIP dial-peer Quidway(config-peer-voip755)# destination-pattern 0755.... ! Configure VoIP peer to correspond with logical port Quidway(config-peer-voip755)# session target ipv4:2.2.2.2 2) The parameter configuration of the Shenzhen-side router is similar to that of Beijing-side. ! Configure DS0 group Quidway(config)# controller e1 1 Quidway(config-if-E1-1)# ds0-group 1 timeslots 1-31 type r2-digital ! Create the POTS dial-peer on E1 interface (tel: 0755-2001 or 2002, etc.) Quidway(config)# dial-peer voice 2001 pots ! Configure the destination pattern of POTS dial-peer on E1 interface Quidway(config-peer-pots2001)# destination-pattern 0755.... ! Configure the POTS peer on E1 interface to correspond with logical port Quidway(config-peer-pots2001)# port 1:1 ! Create VoIP dial-peer Quidway(config)# dial-peer voice 010 voip ! Configure the destination pattern of VoIP dial-peer Quidway(config-peer-voip10)# destination-pattern 010.... 3-16 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration ! Configure VoIP peer to correspond with logical port Quidway(config-peer-voip10)# session target ipv4:1.1.1.1 3.4.2 Router Connected to PBX in ISDN PRI Mode I. Networking requirement The telephones in Beijing and Shenzhen communicate with each other directly via IP network using routers with voice function. The FXS (POTS) interface of Beijing router is connected to the telephone directly and is connected to PBX exchange through E1 voice port. The Shenzhen router is connected to PBX exchange only through E1 voice port. The routers in both places are connected to the exchange by adopting ISDN PRI interface DSS1 subscriber signaling and adopts single stage dialing mode. II. Networking diagram The networking diagram is similar to VC-3-2, except that ISDN PRI interface DSS1 subscriber signaling is adopted between PBX and the router. III. Configuration procedure 1) Parameter configuration of the Beijing-side router ! Configure ISDN PRI group Quidway(config)# controller e1 0 Quidway(config-if-E1-0)# pri-group ! Create POTS dial-peer on FXS interface (telephone number 010-1003) Quidway(config)# dial-peer voice 1003 pots ! Configure the destination pattern of the POTS dial-peer on FXS interface (tel: 0101003) Quidway(config-peer-pots1003)# destination-pattern 0101003 ! Configure the POTS peer on FXS interface to correspond with the logical port (telephone number 010-1003) Quidway(config-peer-pots1003)# port 0 ! Create the POTS dial-peer on ISDN PRI interface (telephone number 010-1001) Quidway(config)# dial-peer voice 1001 pots ! Configure the destination pattern of POTS dial-peer on ISDN PRI interface (tel: 0101001) Quidway(config-peer-pots1001)# destination-pattern 0101001 ! Configure the POTS peer on ISDN PRI interface to correspond with logical port (tel: 010-1001) Quidway(config-peer-pots1001)# port 0:15 ! Create VoIP dail-peer 3-17 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration Quidway(config)# dial-peer voice 0755 voip ! Configure the destination pattern of the VoIP dial-peer Quidway(config-peer-voip755)# destination-pattern 0755.... ! Configure VoIP peer to correspond with logical port Quidway(config-peer-voip755)# session target ipv4:2.2.2.2 2) The parameter configuration of the Shenzhen-side router is similar to that of Beijing. ! Configure ISDN group Quidway(config)# controller e1 1 Quidway(config-if-E1-1)# pri-group ! Create the POTS dial-peer on ISDN PRI interface (tel: 0755-2001 or 2002, etc.) Quidway(config)# dial-peer voice 2001 pots Configure the destination pattern of the POTS dial-peer on ISDN PRI interface (tel: 0755-2001 or 2002, etc.) Quidway(config-peer-pots2001)# destination-pattern 0755.... ! Configure the POTS peer on ISDN PRI interface to correspond with logical port (tel: 0755-2001 or 2002, etc.) Quidway(config-peer-pots2001)# port 1:15 ! Create VoIP dial-peer Quidway(config)# dial-peer voice 010 voip ! Configure the destination pattern of VoIP dial-peer Quidway(config-peer-voip10)# destination-pattern 010.... ! Configure VoIP peer to correspond with logical port Quidway(config-peer-voip10)# session target ipv4:1.1.1.1 3.4.3 Two-stage Dialing Configuration I. Networking requirement The telephones in Beijing and Shenzhen communicate with each other directly via IP network using routers with voice function. The FXS (POTS) interface of Beijing router is connected to the telephone directly and is connected to PBX exchange through E1 voice port. The Shenzhen router is connected to PBX exchange only through E1 voice port. The communication signaling adopts R2 signaling. The subscribers of Beijing PBX exchange adopt two-stage dialing to dial to Shenzhen: first dial 163, then dial the called number according to the prompt tone in turn; Single stage dialing is adopted to dial to Beijing from Shenzhen, i.e. dial the “called number” directly. 3-18 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration II. Netwoking diagram 010-1003 Port0 WAN 1.1.1.1 Router_ Beijing WAN WAN 2.2.2.2 Port0:1 010-1002 Port1:1 0755-2001 010-1001 E1 PBX Router_Shenzhen Subscriber in Beijing dials 163, and then inputs in sequence the called number 07552001 according to the prompts. E1 Shenzhen Beijing 0755-2002 PBX Figure VC-3-3 Router Connected to PBX in E1 Mode (Two-stage dialing) III. Configuration procedure 1) Configuration of Beijing-side PBX exchange First modify the configuration of Beijing-side PBX exchange, so that PBX will not delete the access number 163, ensuring that PBX sends the number 163 to Beijing-side router. 2) Parameter configuration of Beijing-side router ! Configure DS0 group Quidway(config)# controller e1 0 Quidway(config-if-E1-0)# ds0-group 1 timeslots 1-31 type r2-digital ! Create the POTS dial-peer on FXS interface (telephone number 010-1003) Quidway(config)# dial-peer voice 1003 pots ! Configure the destination pattern of the POTS dial-peer on FXS interface Quidway(config-peer-pots1003)# destination-pattern 0101003 ! Configure the POTS peer on FXS interface to correspond with logical port Quidway(config-peer-pots1003)# port 0 ! Create the POTS dial-peer on E1 interface (Tel: 010-1001) Quidway(config)# dial-peer voice 1001 pots ! Configure the destination pattern of the POTS dial-peer on E1 interface Quidway(config-peer-pots1001)# destination-pattern 0101001 ! Configure the POTS peer on E1 interface to correspond with logical port Quidway(config-peer-pots1001)# port 0:1 ! Configure two-stage dialing 3-19 Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration Quidway(config-peer-pots1001)# incoming called-number 163 ! Create VoIP dial-peer Quidway(config)# dial-peer voice 0755 voip ! Configure the destination pattern of VoIP dial-peer Quidway(config-peer-voip755)# destination-pattern 0755.... ! Configure VoIP peer to correspond with logical port Quidway(config-peer-voip755)# session target ipv4:2.2.2.2 3) Configuration of Shenzhen-side PBX exchange Modify the configuration of Shenzhen-side PBX exchange, so that PBX deletes access number 163, ensuring that PBX only send the called number input by the subscriber to Shenzhen-side router. 4) The parameter configuration of Shenzhen-side router is the same as that of Shenzhen-side router specified in section 3.4.1. 3.4.4 Transmission of Data and Voice Simultaneously I. Networking requirement The telephones in Beijing and Shenzhen communicate with each other directly via IP network using routers with voice function. The FXS (POTS) interface of Beijing router is connected to the telephone directly and is connected to PBX exchange through E1 voice port. The Shenzhen router is connected to PBX exchange only through E1 voice port. The communications signaling adopts R2 signaling. The routers in Beijing and Shanghai are connected through PSTN network and implement data transmission in DDR mode. II. Networking diagram 010-1003 Router_Shanghai Port0 Router_Shenzhen WAN 1.1.1.1 Router_Beijing Port0:1 WAN WAN 2.2.2.2 Port1:1 E1 010-1001 0755-2001 E1 PSTN PBX Shanghai PBX Beijing Figure VC-3-4 Integrated Transmission of Data and Voice III. Configuration procedure 1) Parameter configuration of Beijing-side router 3-20 Shenzhen PBX Chapter 3 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform E1 Voice Configuration First perform voice configuration following the configuration procedure of Beijing-side router specified in section 3.4.2 step by step, and then configure DDR dialing in the corresponding port of ISDN PRI interface. Please refer to the relevant DDR sections for details. 2) Parameter configuration of Shanghai-side router Configure DDR dialing in the port corresponding to Beijing-side router. Please refer to the relevant DDR sections for details. 3) Parameter configuration of Shenzhen-side router Please perform voice configuration according to parameter configuration of Shenzhen-side router specified in section 3.4.2. 3.5 Fault Diagnosis and Troubleshooting of E1 Voice Fault 1: Failure in establishing connection when switch-side subscriber calls router-side subscriber Troubleshooting: please follow the following steps: z First, use show running command to check that all the TSs are used when configuring signaling. Please make sure that the TSs the exchange uses is the same as the TSs configured for the router. Connection cannot be established, if the TSs that the exchange uses for outgoing calls are not used in the configuration of the router. z If there is no dial tone in the call duration, please check that the exchange has sent the outgoing trunk office code to the router and that office code and access number are configured for the telephone number on the router. Generally, connection cannot be established, if the exchange also sends the outgoing trunk office code and the telephone number on the router-side does not add the office code or is not configured with access number. You can either delete the outgoing trunk office code in the exchange-side configuration, or configure access number on router-side. Fault 2: Using R2 signaling, the router fails to establish connection with subscribers on the exchange-side. Troubleshooting: please follow the following steps: First, use show running command to check that the trunk mode of the router corresponds with that of the exchange configuration. In other words, if the exchangeside is outgoing trunk, the router-side should be incoming trunk or bi-directional trunk; if the exchange-side is incoming trunk, the router-side should be out-going trunk or bidirectional trunk. If the trunk mode of the router-side is incoming trunk, the subscribers on router-side can only call in, and cannot call out. 3-21 Chapter 4 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform GK Client Configuration Chapter 4 GK Client Configuration 4.1 Overview of GK Client IP telephone uses Internet as the medium to transmit voice information. IP telephone GateWay (GW for short) lies between Public Switched Telephone Network (PSTN) and Internet access sites. It compresses the voice signal on PSTN network and transports it to the opposite end IP telephone gateway via Internet. Meanwhile, it receives the IP packet from Internet and decompresses it to restore to voice signal of PSTN network. The implementation of IP telephone function on router expands the function of the router, which indicates the trend of the gradual expansion from data service to voice service. As defined in ITU-T recommendation, GateKeeper (GK for short) is a H.323 entity that can provide such functions as address translation, admission control, bandwidth control and management, area management, security check, call control signaling and call management, and sometimes routing control and billing functions, for the H.323 terminal, GW or some Multipoint Control Unit (MCU) of Local Area Network or Wide Area Network. In an area managed by GK, to all the calls, GK not only provides call service control and also serves as the central control point. According to the composition of the entity that implements complete GK function, it can be classified into Client end and Server end. Taking router as its hardware medium, GK Client entity generally performs the configuration of IP voice gateway function for the router through the command line interface, and interacts with GK Server by RAS signaling, thus enable GK Server to provide services such as address translation, admission control, bandwidth management, and the management of router IP voice gateway. GK Server can be implemented on SUN workstation or routers. 4.2 Configuration of GK Client 4.2.1 Configuration Task List of GK Client The configuration tasks of GK Client include: z Configure one interface as H.323 gateway interface z Activate or deactivate GK Client function z Configure alias of the gateway z Configure the GK Server name and address corresponding to the gateway z Configure tech-prefix z Configure GK interconnection mode 4.2.2 Configuring One Interface as H.323 Gateway Interface The router communicates with GK Server as voice gateway device. It needs to specify the interface that communicates with GK server for the router. The interface specified is H.323 gateway interface. Ethernet port, serial port, etc., can all become H.323 gateway 4-1 Chapter 4 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform GK Client Configuration interface. Only after one interface is specified as H.323 gateway interface, can the function of CK Client be activated and can GK Client register to GK Server. Please perform the following configurations in interface configuration mode. Table VC-4-1 Specifying One Interface as H.323 Gateway Interface Operation Command Specify one interface as H.323 gateway interface Cancel one interface as H.323 gateway interface h323-gateway voip interface no h323-gateway voip interface By default, no interface is specified as H.323 gateway interface. 4.2.3 Activating or Deactivate GK Client Function Only when one interface is successfully configured as H.323 gateway interface, can GK Client function be activated. When the H.323 gateway interface is re-specified or the relevant parameters (such as gateway alias and corresponding Gatekeeper name) of other gateways are modified, you should activate GK Client function anew, so that the information related to Client stored in GK Server is updated timely. Please perform the following configurations in global configuration mode. Table VC-4-2 Activate or Deactivate GK Client Function Operation Command Activate GK Client function Deactivate GK Client function gateway no gateway By default, GK Client function is deactivated. 4.2.4 Configuring Gateway Alias Gateway alias is used to register at GK Server and identify gateway. One gateway can have only one alias. Please perform the following configurations in interface configuration mode. Table VC-4-3 Configure Gateway Alias Operation Command Configure gateway alias Delete gateway alias h323-gateway voip h323-id namestring no h323-gateway voip h323-id [ namestring ] By default, the gateway alias is blank, i.e. no gateway alias configured. 4.2.5 Configure the GK Server Name and Address When the GK Client of the router is activated, GK Client will automatically register the relevant information of the gateway to GK Server. Therefore, it needs to configure 4-2 Chapter 4 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform GK Client Configuration information of GK server, such as the IP address and name, to find the right GK Server device,. Please perform the following configurations in interface configuration mode. Table VC-4-4 Configure the GK Server Name and Address Corresponding with the Gateway Operation Configure the GK Server and IP address corresponding with the gateway Delete the GK Server and IP address corresponding with the gateway Command h323-gateway voip id gk-name ipaddr gk-ipaddress [ ras-port ] no h323-gateway voip id [ gk-name [ ipaddr gk-ipaddress [ rasport ] ] ] By default, no GK Server name and IP address are specified corresponding with the gateway. When using the command to configure, the default value of RAS communication port of GK Server is 1719. 4.2.6 Configuring Tech-Prefix Tech-prefix is used mainly for the convenience of identifying the gateway type of GK Server. One gateway can be configured with 10 tech-prefixes at most. Please perform the following configurations in interface configuration mode. Table VC-4-5 Configure Tech-Prefix Operation Command Configure tech-prefix Delete tech-prefix h323-gateway voip tech-prefix string no h323-gateway voip tech-prefix [ string ] By default, there is not any tech-prefix. 4.2.7 Configuring GK Interworking Mode As the device produced by different IP telephone device manufactures are different in their specific implementations of H.323 protocol, there is problem of interworking between the gateways and gatekeepers (GK Server) and between gatekeepers made by different manufacturers. If the voice gateway of the router is to communication with GK Server made by other manufacturers in the normal way, the matched interworking mode needs to be adopted. So far in this case, there are two manufacturers of GK Server involved, i.e., Cisco Inc., and Huawei Technologies. Please perform the following configurations in interface configuration mode. 4-3 Chapter 4 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform GK Client Configuration Table VC-4-6 Configure GK Interworking Mode Operation Command Configure GK interworking mode Recover the default value of GK interworking mode h323-gateway voip support-mode { cisco | huawei } no h323-gateway voip support-mode Be default, the GK interworking mode is cisco mode. 4.3 Typical Configuration Examples of GK Client I. Networking requirement The telephones in Beijing and Shenzhen communicate with each other directly via IP network using routers with voice function, and perform the dynamic resolution from the telephone number to IP address by virtue of GK. The serial port 0 of Beijing-side router is H.323 gateway interface. The IP address of serial port 0 is 1.1.1.1; the alias of the interface is Beijing-gsw; the name of the corresponding gatekeeper is gk-center; the address of the gatekeeper is 3.3.3.3; the RAS port number is 1719, and the tech-prefix is specified as 1#. The serial port 1 of Shenzhen-side router is H.323 gateway interface; the IP address is 2.2.2.2; the alias of the interface is shenzhen-gw; the other configurations are the same as those of Beijing-side. II. Networking diagram GK Server 3.3.3.3 Shenzhen-gw Beijing-gw serial0 1.1.1.1 Port0 WAN serial1 2.2.2.2 Port1 010-1001 0755-2001 Beijing Shenzhen Figure VC-4-1 Networking Mode of GW and GK Combination III. Configuration Procedure 1) Parameter configuration of Beijing-side router ! Create the POTS dial-peer on FXS interface Quidway(config)# dial-peer voice 1001 pots Quidway(config-peer-pots1001)# destination-pattern 0101001 4-4 Chapter 4 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform GK Client Configuration Quidway(config-peer-pots1001)# port 0 ! Create VOIP dial-peer Quidway(config)# dial-peer voice 0755 voip Quidway(config-peer-voip755)# destination-pattern 0755.... Quidway(config-peer-voip755)# session target ras ! Specify Serial0 as H.323 gateway interface Quidway(config-if-Serial0)# ip address 1.1.1.1 255.255.255.0 Quidway(config-if-Serial0)# h323-gateway voip interface ! Configure gateway alias and the corresponding GK name and IP address Quidway(config-if-Serial0)# h323-gateway voip h323-id beijing-gw Quidway(config-if-Serial0)# h323-gateway voip id gk-center ipaddr 3.3.3.3 1719 ! Configure tech-prefix Quidway(config-if-Serial0)# h323-gateway voip tech-prefix 1# ! Configure GK interworking mode Quidway(config-if-Serial0)# h323-gateway voip support-mode huawei ! Activate GK Client function Quidway(config)# gateway Quidway(config-gateway)# 2) Parameter configurations of Shenzhen-side are similar to those of Beijing-side ! Create POTS dial-peer on FXS interface Quidway(config)# dial-peer voice 2001 pots Quidway(config-peer-pots2001)# destination-pattern 07552001 Quidway(config-peer-pots2001)# port 1 ! Create VOIP dial-peer Quidway(config)# dial-peer voice 010 voip Quidway(config-peer-voip10)# destination-pattern 010.... Quidway(config-peer-voip10)# session target ras ! Specify Serial1 as H.323 gateway interface Quidway(config-if-Serial1)# ip address 2.2.2.2 255.255.255.0 Quidway(config-if-Serial1)# h323-gateway voip interface ! Configure gateway alias and the corresponding GK name and IP address Quidway(config-if-Serial1)# h323-gateway voip h323-id shenzhen-gw Quidway(config-if-Serial1)# h323-gateway voip id gk-center ipaddr 3.3.3.3 1719 ! Configure tech-prefix 4-5 Chapter 4 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform GK Client Configuration Quidway(config-if-Serial1)# h323-gateway voip tech-prefix 1# ! Configure GK interworking mode Quidway(config-if-Serial1)# h323-gateway voip support-mode huawei ! Activate GK Client function Quidway(config)# gateway Quidway(config-gateway)# 4.4 Fault Diagnosis and Troubleshooting of GK Client Fault 1: The register of GW on GK Server end fails. Troubleshooting: Please follow the following steps: z First, use ping command to check that it can interwork with GK Server on network layer. z Use show running-config command to check that gateway command takes effect. z Check that GK Server end gatekeeper is activated. Check that GK Server end has configured the area. 4-6 Chapter 5 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform IPHC Configuration Chapter 5 IPHC Configuration 5.1 Overview of IPHC IPHC (IP Header Compression) is the method to classify and compress packet such as IP, TCP and UDP, according to a series of header compression algorithms specified in relevant RFC documents, so as to enhance the transmission rate of voice, video and large packet over low-speed network. Currently, IPHC is mainly applied to the serial links running such protocols as PPP, FR and HDLC and carrying large amount of voice information. As described in RFC2507, the packets need to be compressed can be classified into the following categories: 1) 2) 3) IP header + TCP header IP header + UDP header IP header + UDP header + RTP header Among them, (RTP) Realtime Transmit Protocol is an application layer protocol lies above TCP/UDP, which is mainly used to transmit audio, video and simulated data information. The implementation of IPHC depends on the various existing compression algorithms, whose main concepts are to compress the header since many fields of the headers do not change or change regularly in the course of one-time connection. It divides header into TCP and NON_TCP type, and further divides them into smaller categories. Extracting the unchanged fields or the fields that change regularly from the header of the same packet type, it does not transmit or only transmit the changed values of those fields, thus achieving the purpose of compressing the length of the whole packet. IPHC defines the two ends of the link as compressor and non-compressor end respectively. The packet processing procedure is described as below: Compressor: According to the classification method in RFC2507 document, after it classify and compresses the packets, the compressor notifies the decompressor through different packet protocol numbers and makes the decompressor perform different compression in accordance with the corresponding protocol number. If the compressor receives fault-reporting packet CONTEXT_STATE sent from the decompressor, it will mark some location digits in the context storage table according to the information in the packet to identify the faulty packet flow and will performs faulty processing accordingly. For example, when the next packet arrives, it will transmit packets to the decompressor in the complete format to help the latter update context storage table and to implement re-synchronization, etc. Decompressor: It performs decompression according to the different types of packets transmitted from the compressor, and restores them into complete packets. If it finds that there is fault in packet decompression process, it will either discard the faulty packet or generate CONTEXT_STATE fault-reporting packet according to the actual conditions. By using IP header compression on low-speed serial link, it can implement: z z z Enhance the packet Interactive Response Speed Reduce the transmission cost of header, enabling small packet to achieve high link transmission quality and saving bandwidth resource Reduce the packet discard rate on lossy links 5-1 Chapter 5 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform IPHC Configuration 5.2 IPHC Configuration 5.2.1 Configuration Task List of IPHC The configuration tasks of IPHC include: z z z z z Enable/disable RTP header compression Configure the maximum connection number of RTP header compressions Configure the maximum connection number of TCP header compressions Configure the enabling of the Cisco-compatible RTP header compression Configure the removal of udp_chk field in the UDP header. 5.2.2 Enable/disable RTP header compression When RTP header compression is enabled, TCP header compression will be enabled accordingl. If the RTP header compression is disabled, the TCP header compression will also be disabled. Please make the following configuration in the interface configuration mode. Table VC-5-1 Enable/Disable RTP header compression Operation Command Enable RTP header compression Disable RTP header compression ip rtp header-compression no ip rtp header-compression By default, the interface will not perform RTP header compression on the packet. It should be pointed out for notice here, 1) 2) 3) The subscriber must configure RTP header compression command on both ends of the links at the same time. After TCP header compression is enabled, fast forwarding will not be performed on the packet compressed. After the configuration is completed, only when the shutdown and no shutdown operation are performed on the interface can the configuration take effect. 5.2.3. Configure the Max. Connection Number of RTP Header Compressions The subscriber can specify the maximum connection number on an interface that performs RTP header compression. Please perform the following configurations in interface configuration mode. Table VC-5-2 Configure the maximum connection number of RTP header compression Operation Command Configure the maximum connection number of RTP header compression Restore the default value of the maximum connection number of RTP header compression ip rtp compression-connections number no ip rtp compression-connections By default, the maximum connection number of TCP header compression that the interface allows is 16. The value ranges from 4 to 1000. 5-2 Chapter 5 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform IPHC Configuration Notice: After the configuration completes, please perform one “shutdown” and “no shutdown” operation to take effect the configuration. 5.2.4 Configure the Max. Connection Number of TCP Header Compressions The subscriber can specify the maximum connection number on an interface that performs TCP header compression. Please perform the following configurations in interface configuration mode. Table VC-5-3 Configure the maximum connection number of TCP header compression Operation Command Configure the maximum connection number of TCP header compression Restore the default value of the maximum connection number of TCP header compression ip tcp header-compression no ip tcp header-compression By default, the maximum connection number of TCP header compression that the interface allows is 16. The value ranges from 4 to 256. Notice: After the configuration completes, please perform one “shutdown” and “no shutdown” operation to take effect the configuration. 5.2.5 Configure the Cisco-compatible RTP header compression Please perform the following configurations in interface configuration mode. Table VC-5-4 Enable/Disable the Cisco-compatible RTP header compression Operation Command Enable the Cisco-compatible RTP Header Compression ip rtp header-compression cisco-format Disable the Cisco-compatible RTP Header Compression no ip rtp header-compression cisco-format By default, Cisco-compatible RTP header compression is enabled. 5.2.6 Configure the deleting of udp_chk field from UDP header The udp_chk field in UDP header can be set to 0, in other words, ignore UDP checksum field when performing header compression. In this way, 2-byte length in the header is saved. Please perform the following configurations in interface configuration mode. Table VC-5-5 Configure Deleting/Resetting the udp_chk Field in UDP Header Operation Command Delete the udp_chk field in UDP header Reset the udp_chk field in UDP header ip rtp header-compression delete-udpchk no ip rtp header-compression delete-udpchk By default, the udp_chk field in UDP packet field is set to 0. 5-3 Chapter 5 User Manual - Configuration Guide (Volume 3) Versatile Routing Platform IPHC Configuration 5.3 Monitoring and Maintenance of IPHC Table VC-5-6 Monitoring and Maintenance of IPHC Operation Command Show the statistics of TCP header compression Clear the storage table items of TCP header compression Show the statistics of RTP header compression Clear the storage table items of RTP header compression Enable the debugging information of TCP header Enable the debugging information of RTP header 1) show ip tcp header-compression [ interface-type interface-number ] clear ip tcp header-compression [ interface-type interface-number ] show ip rtp header-compression [ interface-type interface-number ] clear ip rtp header-compression [ interface-type interface-number ] debug ip tcp head-compression debug ip rtp head-compression Show the statistics of TCP header compression. Quidway# show ip tcp header-compression serial 0 TCP/IP header compression statistics: Interface Serial0: Rcvd: 0 total, 0 compressed, 0 errors 0 dropped, 0 buffer copies, 0 buffer failures Sent: 430 total 429 compressed, 15122 bytes saved, 139318 bytes sent 1.10 efficiency improvement factor Connect:16 rx slots, 16 tx slots, 1 long searches, 1 misses 99% hit ratio, five minute miss rate 0 misses/5mins, 0 max. 2) Show the statistics of RTP header compression. Quidway# show ip rtp header-compression serial 0 RTP/UDP/IP header compression statistics: Interface Serial0: Rcvd: 0 total, 0 compressed, 0 errors 0 dropped, 0 buffer copies, 0 buffer failures Sent: 430 total 429 compressed, 15122 bytes saved, 139318 bytes sent 1.10 efficiency improvement factor Connect: 16 rx slots, 16 tx slots, 1 long searches, 1 misses 99% hit ratio, five minute miss rate 0 misses/5mins, 0 max. The above information displays such parameters as the number of RTP packet received and transmitted on Sercial0, the number of the compressed RTP packets, the number of the bytes saved and the efficiency improvement factors. 5-4 How Are We Doing Let us share your comments with respect to the contents, formats and wording of this manual. Your feedback can be of great value in helping us improve our document. Please use a copy of these two pages for your comments, and fax to: +86-755-6540035 Documentation Development Department. 1. Please rate the effectiveness of this document in the following areas: Excellent Good Fair Poor Ease of Use Clarity Completeness Accuracy Organization Structure Appearance Examples Illustrations Overall Satisfaction 2. Please check the ways you feel we could improve this document: Improve the overview/introduction Improve the table of contents Improve the organization structure Include more figures Add more examples Add more details Make it more brief/concise Add more step-by-step procedures Add more troubleshooting info. Make it less technical Add more reference aids Improve the index Please provide details for the suggested improvement: 3. What did you like most about this document? 4. Feel free to write any comments below or on an attached sheet. 5. It is highly appreciated for any specific mistakes you have found (this page may be sent to us separately). Mistake Suggested Correction If we may contact you concerning your comments, please complete the following: Name:______________________ Tel: _____________________________ Company:________________________________ Date:________________ Address:_______________________________________________________ Page & Line No.
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Create Date : 2001:12:15 12:20:03Z Modify Date : 2002:08:06 11:11:04+12:00 Subject : Technical Document Page Count : 258 Page Mode : UseOutlines Creation Date : 2001:12:15 12:20:03Z Producer : Acrobat Distiller 4.05 for Windows Mod Date : 2002:08:06 11:11:04+12:00 Author : Huawei Metadata Date : 2002:08:06 11:11:04+12:00 Title : Configuration Guide-Volume 3 Description : Technical Document Creator : Huawei Has XFA : NoEXIF Metadata provided by EXIF.tools