Instruction 1117849704d84b73b04e5557e46c452c

2018-03-15

: Pdf Instruction 1117849704D84B73B04E5557E46C452C instruction_1117849704d84b73b04e5557e46c452c instruction upload

Open the PDF directly: View PDF PDF.
Page Count: 274

DownloadInstruction 1117849704d84b73b04e5557e46c452c
Open PDF In BrowserView PDF
HPE
MSR954_MSR954P_MSR958-CMW710-R0
411 Release Notes

The information in this document is subject to change without notice.
© Copyright [First Year] 2015, [Current Year]2016 Hewlett Packard Enterprise Development LP

Contents
Version information ···········································································1
Version number ···························································································································1
Version history ····························································································································2
Hardware and software compatibility matrix ······················································································6
Upgrading restrictions and guidelines·······························································································7

Hardware feature updates ··································································8
CMW710-R0411 ··························································································································8

Software feature and command updates ···············································8
MIB updates ····················································································8
Operation changes ···········································································9
Restrictions and cautions ···································································9
Open problems and workarounds ························································9
List of resolved problems ·································································10
Resolved problems in CMW710-R0411 ··························································································10
Resolved problems in CMW710-R0407 ··························································································12
Resolved problems in CMW710-E0404P06·····················································································12
Resolved problems in CMW710-R0304P12 ····················································································12

Support and other resources·····························································12
Accessing Hewlett Packard Enterprise Support················································································12
Documents ·······························································································································13
Related documents ··············································································································13
Documentation feedback ······································································································13

Appendix A Feature list ···································································14
Hardware features ······················································································································14
Software features ·······················································································································15

Appendix B Upgrading software ························································18
Software types ··························································································································18
Upgrade methods ······················································································································18
Preparing for the upgrade ············································································································19
Centralized devices upgrading from the CLI ····················································································20
Saving the running configuration and verifying the storage space ·················································20
Downloading the image file to the router ··················································································21
Specifying the startup image file ·····························································································21
Rebooting and completing the upgrade ···················································································22
Distributed devices upgrading from the CLI ·····················································································23
Display the slot number of the active MPU ···············································································23
Save the current configuration and verify the storge space ··························································23
Download the image file to the router ······················································································24
Specifying the startup image file ·····························································································25
Reboot and completing the upgrade ·······················································································26
Distributed devices ISSU ·············································································································28
Disabling the standby MPU auto-update function·······································································28
Saving the running configuration and verifying the storage space ·················································28
Downloading the upgrade image file to the router ······································································29
Upgrading the standby MPU ··································································································30
Upgrading the active MPU ····································································································31
Upgrading from the BootWare menu ······························································································33
i

Accessing the BootWare menu ······························································································34
Using TFTP/FTP to upgrade software through an Ethernet port ···················································35
Using XMODEM to upgrade software through the console port ····················································38
Managing files from the BootWare menu ························································································43
Displaying all files ················································································································44
Changing the type of a system software image ·········································································44
Deleting files ······················································································································45
Handling software upgrade failures································································································46

Appendix C Handling console login password loss ································46
Disabling password recovery capability ··························································································46
Handling console login password loss ····························································································47
Examining the password recovery capability setting ···································································48
Using the Skip Current System Configuration option ··································································49
Using the Skip Authentication for Console Login option ······························································50
Using the Restore to Factory Default Configuration option···························································50

ii

List of Tables
Table 1 Version history .................................................................................................................................................................... 2
Table 2 HPE product device numbers matrix ......................................................................................................................... 6
Table 3 Hardware and software compatibility matrix ......................................................................................................... 7
Table 4 MIB updates ........................................................................................................................................................................ 8
Table 5 MSR954P_MSR958 specifications .............................................................................................................................14
Table 6 MSR954 specifications ..................................................................................................................................................14
Table 7 software features .............................................................................................................................................................15
Table 8 Storage media ..................................................................................................................................................................19
Table 9 BootWare menu options ..............................................................................................................................................35
Table 10 Ethernet submenu options .......................................................................................................................................36
Table 11 Network parameter fields and shortcut keys .....................................................................................................36
Table 12 Serial submenu options .............................................................................................................................................38
Table 13 File Control submenu options .................................................................................................................................44
Table 14 BootWare options and password recovery capability compatibility matrix ..........................................46

iii

This document describes the features, restrictions and guidelines, open problems, and workarounds
for version R0411. Before you use this version in a live network, back up the configuration and test
the version to avoid software upgrade affecting your live network.
Use this document in conjunction with HPE MSR954_MSR954P_MSR958-CMW710-R0411
Release Notes (Software Feature Changes) and the documents listed in "Related documents"

Version information
Version number
HPE Comware Software, Version 7.1.064, Release 0411
Please see the example below generated by the display version command:
 display version
HPE Comware Software, Version 7.1.064, Release 0411
Copyright (c) 2010-2016 Hewlett Packard Enterprise Development LP
HPE MSR954 uptime is 0 weeks, 0 days, 23 hours, 0 minutes
Last reboot reason : Power on
Boot image: flash:/msr954-cmw710-boot-r0411.bin
Boot image version: 7.1.064P21, Release 0411
Compiled Jul 14 2016 16:00:00
System image: flash:/msr954-cmw710-system-r0411.bin
System image version: 7.1.064, Release 0411
Compiled Jul 14 2016 16:00:00
Feature image(s) list:
flash:/msr954-cmw710-wifidog-r0411.bin, version: 7.1.064
Compiled Jul 14 2016 16:00:00
flash:/msr954-cmw710-wwd-r0411.bin, version: 7.1.064
Compiled Jul 14 2016 16:00:00
flash:/msr954-cmw710-security-r0411.bin, version: 7.1.064
Compiled Jul 14 2016 16:00:00
flash:/msr954-cmw710-voice-r0411.bin, version: 7.1.064
Compiled Jul 14 2016 16:00:00
flash:/msr954-cmw710-data-r0411.bin, version: 7.1.064
Compiled Jul 14 2016 16:00:00
CPU ID: 0xa
1G bytes DDR3 SDRAM Memory
10M bytes Flash Memory
PCB Version: 2.0
CPLD Version: 0.0
Basic BootWare Version: 1.41
Extended BootWare Version: 1.41
[SLOT 0]CON (Hardware)2.0, (Driver)1.0, (CPLD)0.0
[SLOT 0]GE0/0 (Hardware)2.0, (Driver)1.0, (CPLD)0.0
[SLOT 0]4GSW (Hardware)2.0, (Driver)1.0, (CPLD)0.0
[SLOT 0]SFP0/5 (Hardware)2.0, (Driver)1.0, (CPLD)0.0
[SLOT 0]CELLULAR0/0 (Hardware)2.0, (Driver)1.0, (CPLD)0.0

1

[SLOT 0]CELLULAR0/1 (Hardware)2.0, (Driver)1.0, (CPLD)0.0

Version history
Table 1 Version history
Version number

Last version

Release
date

Release
type

Remarks

CMW710-R0411

CMW710-R04
10

2016-09-1
9

Release
version

support
MSR954_MSR954P_MSR958
series

Fixes bugs
support
MSR954_MSR954P_MSR958
series

New feature:

CMW710-R04
08P05

2016-08-2
9

CMW710-R0410

CMW710-R03
04P12

2



1. Support of multicast for
ADVPN



2. Application layer state
filtering



3.SIP keepalive



4.Multicast fast forwarding



5. Attack defense policy
application to a security zone



6. AAA support for IKE
extended authentication



7. Percentage-based CAR



8. Logging OSPF router ID
conflict events

Release 
version 

9.AFT
10. Configuring enhanced CC
authentication in FIPS mode



11. Support of AAA for
NETCONF



12. Mobile IP tunnel interface
settings



13. LISP



14. LISP tunnel entries and
dynamic mobility



15. Support of IPv6 multicast
routing for VPN instances



16.LISP virtual machine
multi-hop mobility and DDT



17. LISP NSR



18. PPPoE client support for
IPv6



19. DPI engine and content
filtering

3



20. IPS



21. NBAR



22. URL filtering



23. Local portal Web server



24.Support of portal for
NETCONF



25. Newly-added MIB objects



26. IPS, ACG, and SSL VPN
licenses



27. Support of NQA for
NETCONF



28. Configuring CWMP to
support VPN



29. Transceiver module source
alarm



30. VLAN interface
performance optimization



31. NAT support for multicast
source address in PIM
join/prune packets



32. GDOI GM group
anti-replay window



33. SIP compatibility



34. Voice VLAN



35. L2TP-based EAD



36. BFD for an aggregation
group



37. 4G modem IMSI/SN
binding authentication



38. Media Stream Control
(MSC) logging



39. IMSI/SN binding
authentication



40. Specifying a band for a 4G
modem



41. Using tunnel interfaces as
OpenFlow ports



42. NETCONF support for ACL
filtering



43. WAAS



44 Support for the MKI field in
SRTP or SRTCP packets



45. SIP domain name



46. Setting the maximum size
of advertisement files



47. Support of VCF for
NETCONF



48. Support of SNMP for
NETCONF



49. Support of file system for
NETCONF



50. Support of PoE for
NETCONF



51. Support of RMON for
NETCONF



52. Support of policy-based
routing for NETCONF



53. Support of BGP for
NETCONF



54. Support of OSPF for
NETCONF



55. Support of ping for
NETCONF



56. Support of tracert for
NETCONF



57. Support of L2VPN for
NETCONF



58. SIP support for VRF



59. IKEv2



60. Specifying an IKEv2 profile
for an IPsec policy



61. Bidirectional BFD control
detection for RIP



62. OSPF router ID
autoconfiguration



63. Associating a static route
with a track entry



64. VLAN tag processing rule
for incoming traffic



65. IP-based portal-free rule



66. Portal redirect packet
statistics



67. GDVPN



68. OpenFlow instance



69. Enabling the Extended
Sequence Number (ESN)
feature for an IPsec transform
set



70. Enabling Traffic Flow
Confidentiality (TFC) padding
for an IPsec policy



71.SIP session refresh


4

Modified feature



1. User profile



2.Tunnel interface support for

IPsec and VXLAN tunnel
modes

5



3. PKI certificate auto-renewal



4. Configuring the PKI entity
DN



5. ADVPN



6. Telnet redirect



7. DHCP snooping
performance optimization



8. OSPF performance
optimization



9. IP performance optimization



10. AAA



11. Configuring a cellular
interface for a 3G/4G modem



12. QoS on VXLAN tunnel
interfaces



13. Option 60 encapsulation in
DHCP replies



14. MPLS QoS support for
matching the EXP field



15. MPLS QoS support for
marking the EXP field



16.Automatic configuration



17. User profile



18. Default size of the TCP
receive and send buffer



19. Support for per-packet load
sharing



20. Default user role



21. Debugging



22. SSH username



23. IS-IS hello packet sending
interval



24. Displaying information
about NTP servers from the
reference source to the
primary NTP server



25. Saving, rolling back, and
loading the configuration



26. Displaying information
about SSH users



27. SIP trusted nodes



28. IPsec ESP encryption
algorithms



29. IPsec ESP authentication
algorithms



30. IPsec AH authentication
algorithms



31. Specifying an encryption
algorithm for an IKE proposal



32.Specifying an
authentication algorithm for an
IKE proposal



33. Generating asymmetric
key pairs



34. Specifying an ECDSA key
pair for certificate request



35. QoS MIB



36. Enabling PFS for an IPsec
transform set



37. Displaying track entry
infomration




Removed feature

1.Tiny proxy
2. Displaying switching fabric
channel usage

CMW710-R0408P05

CMW710-R04
07

2016-07-0
1

Release
version

Only support MSR954P_MSR958
series

New feature:
1. BGP trap support for VRF
information.

2. SSH redirect.
CMW710-R0407

CMW710-E04
04P06

2016-05-1
1

Release
version

Only support MSR954P_MSR958
series

Fixes bugs

CMW710-E0404P06

CMW710-E04
03

2016-03-0
3

ESS
version

Only support MSR954-D4G

Fixes bugs

CMW710-E0403

First release

2015-12-0
2

ESS
version

Only support MSR954P_MSR958
series

CMW710-R0304P12

CMW710-E03
04

2015-09-1
5

Release
version

Only support MSR954

CMW710-E0304

First release

2015-06-1
1

ESS
version

Only support MSR954

Hardware and software compatibility matrix
CAUTION:
To avoid an upgrade failure, use Table 3to verify the hardware and software compatibility before
performing an upgrade.
Table 2 HPE product device numbers matrix
Product code

HPE MSR series

JH373A

HPE MSR954 Serial 1GbE Dual 4GLTE (WW) CWv7 Router
6

JH300A

HPE MSR958 1GbE Combo 2GbE-WAN 8GbE-LAN CWv7 Router

JH301A

HPE MSR958 1GbE Combo PoE+ 2GbE-WAN 8GbE-LAN CWv7 Router

JH296A

HP MSR954 1GbE+SFP Router

JH297A

HP MSR954-W 1GbE+SFP (WW) Router

JH298A

HP MSR954-W 1GbE+SFP LTE (AM) Rtr

JH299A

HP MSR954-W 1GbE+SFP LTE (WW) Rtr

Table 3 Hardware and software compatibility matrix
Item

Specifications
MSR958

Product
family

MSR954-D4G
MSR954
MSR958: 121 or higher

Boot ROM
version

MSR954-D4G: 120 or higher
MSR954: 141 or higher

Host
software

Hardware

software

MD5 Check Sum

File size

MSR958

MSR958-CMW7
10-R0411.IPE

5bca7ea9ed0353e006040
843b61ae407

57,857,024 bytes

MSR954-D4
G

MSR954P-CMW
710-R0411.IPE

3a2eb54228a8b2e4e2cc9
6629f6496bb

45,137,920 bytes

MSR954

MSR954-CMW7
10-R0411.IPE

e3533740b11f183ed6395
8b8d23a1cc4

57,011,200 bytes

iMC BIMS 7.2 (E0402P02)
iMC EAD 7.2 (E0407)
iMC TAM 7.2 (E0407)
iMC UAM 7.2 (E0407)
iMC MVM 7.2 (E0402P02)
iMC version

iMC NTA 7.2 (E0402P02)
iMC PLAT 7.2 (E0403P04)
iMC QoSM 7.2 (E0403H01)
iMC RAM 7.2 (E0402)
iMC SHM 7.2 (E0402l01)
iMC UBA 7.2 (E0401p03)
iMC VFM 7.2 (E0402H02)

iNode
version

iNode PC 7.2 (E0407)

Upgrading restrictions and guidelines
None

7

Hardware feature updates
CMW710-R0411
None

Software feature and command updates
For more information about the software feature and command update history, see HPE
MSR954_MSR954P_MSR958-CMW710-R0411 Release Notes (Software Feature Changes).

MIB updates
Table 4 MIB updates
Item

MIB file

Module

Description

CMW520-R0411
New

None

None

None

Modified

None

None

None

None

None

hh3c-entity-ext.mib

HH3C-ENTITY-EXT-MIB

Added
hh3cEntityExtSFPAlarmOn
Ex and
hh3cEntityExtSFPAlarmOff
Ex of
HH3C-ENTITY-EXT-MIB
trap

rfc1493-bridge.mib

BRIDGE-MIB

Modified description of
dot1dTpFdbTable

hh3c-splat-vlan.mib

HH3C-LswVLAN-MIB

Modified description of
hh3cdot1qVlanType

hh3c-pvst.mib

HH3C-PVST-MIB

Modified description of
hh3cQinQv2IfConfigTable

hh3c-qinqv2.mib

HH3C-QINQV2-MIB

Modified description of
hh3cQinQv2ServiceTPID
and
hh3cQinQv2IfCustomerTPI
D

hh3c-lpbkdt.mib

HH3C-LPBKDT-MIB

Modified description of
Scalar objects and
hh3cLpbkdtPortTable

hh3c-power-eth-ext.mib

HH3C-POWER-ETH-EXTMIB

Modified description of
hh3cPseProfilePairs

rfc3621-power-ethernet.mib

POWER-ETHERNET-MIB

Modified description of
pethPsePortPowerPairs

CMW520-R0407
New

None

Modified

8

Item

MIB file

Module

Description

hh3c-splat-inf.mib

HH3C-LswINF-MIB

Modified description of
hh3cifEthernetAutoSpeed

hh3c-ifqos2.mib

HH3C-IFQOS2-MIB

Modified description of
hh3cIfQoSLRConfigTable

None

None

None

rfc2925-disman-ping.mib

DISMAN-PING-MIB

Modified description of
pingCtlTable

hh3c-nqa.mib

HH3C-NQA-MIB

Modified description of
hh3cNqaCtlTable

HH3C-TRANSCEIVER-INF
O-MIB

Modified description of
hh3cTransceiverCurTXPow
er and
hh3cTransceiverCurRXPow
er

CMW710-R0304P12
New

Modified
hh3c-transceiver-info.mib

Operation changes
None

Restrictions and cautions
1.

The WLAN configuration gets lost when the version of a router is degraded from E04XX or
R04XX to R03XX. Please reconfigure WLAN features after degrading and save the
configuration file.

2.

The mGRE and Suite B features are not available in the current software version R04XX.

Open problems and workarounds
201608190045


Symptom: Profile 3 of a VZW or Sprint modem cannot be modified.



Condition: This symptom might occur if Profile 3 of a VZW or Sprint modem is modified.



Workaround: None.

201608110569


Symptom: The system executes commands issued through TR-069 from user view instead of
from system view. As a result, command execution fails.



Condition: This symptom might occur if the system executes commands issued through
TR-069.



Workaround: Add the system-view command to the beginning of the issued commands.

201607220244


Symptom: The system displays a configuration success message when an IP address that is
being used by a loopback interface is assigned to a GigabitEthernet interface through TR-069.

9



Condition: This symptom might occur if an IP address that is being used by a loopback interface
is assigned to a GigabitEthernet interface through TR-069.



Workaround: Do not assign an IP address to multiple interfaces.

201607150391


Symptom: The DHCP requests forwarded by a DHCP relay agent carry the IP address of the
packet outgoing interface as the source IP address instead of the IP address of the DHCP relay
interface.



Condition: This symptom might occur if a DHCP relay agent forwards DHCP requests to the
router that acts as a DHCP server.



Workaround: Execute the dhcp relay source-address x.x.x.x command on the interface
enabled with DHCP relay agent.

List of resolved problems
Resolved problems in CMW710-R0411
201609130134


Symptom(1): CVE-2016-4953



Condition(1): An attacker who knows the origin timestamp and can send a spoofed packet
containing a CRYPTO-NAK to an ephemeral peer target before any other response is sent can
demobilize that association.



Symptom(2): CVE-2016-4954



Condition(2): An attacker who is able to spoof packets with correct origin timestamps from
enough servers before the expected response packets arrive at the target machine can affect
some peer variables and, for example, cause a false leap indication to be set.



Symptom(3): CVE-2016-4956



Condition(3): The fix for NtpBug2978 does not cover broadcast associations, so broadcast
clients can be triggered to flip into interleave mode.

201609130162


Symptom: An MSR router reboots unexpectedly because of memory exhaustion.



Condition: This symptom might occur if the router is enabled with SNMP and SNMP
notifications and a user Telnets to the router by using a username longer than 253 bytes.

201609130139


Symptom(1): CVE-2015-8138.



Condition(1): To distinguish legitimate peer responses from forgeries, a client attempts to verify
a response packet by ensuring that the origin timestamp in the packet matches the origin
timestamp it transmitted in its last request. A logic error exists that allows packets with an origin
timestamp of zero to bypass this check whenever there is not an outstanding request to the
server.



Symptom(2): CVE-2015-7979.



Condition(2): An off-path attacker can send broadcast packets with bad authentication (wrong
key, mismatched key, incorrect MAC, etc) to broadcast clients. It is observed that the broadcast
client tears down the association with the broadcast server upon receiving just one bad packet.



Symptom(3): CVE-2015-7974.



Condition(3): Symmetric key encryption uses a shared trusted key. The reported title for this
issue was "Missing key check allows impersonation between authenticated peers" and the
10

report claimed "A key specified only for one server should only work to authenticate that server,
other trusted keys should be refused." Except there has never been any correlation between
this trusted key and server v. clients machines and there has never been any way to specify a
key only for one server. We have treated this as an enhancement request, and ntp-4.2.8p6
includes other checks and tests to strengthen clients against attacks coming from broadcast
servers.


Symptom(4): CVE-2015-7973.



Condition(4): If an NTP network is configured for broadcast operations, then either a
man-in-the-middle attacker or a malicious participant that has the same trusted keys as the
victim can replay time packets.

201609130143


Symptom(1): CVE-2016-1550



Condition(1): Packet authentication tests have been performed using memcmp() or possibly
bcmp(), and it is potentially possible for a local or perhaps LAN-based attacker to send a packet
with an authentication payload and indirectly observe how much of the digest has matched.



Symptom(2): CVE-2016-1551



Condition(2): While the majority OSes implement martian packet filtering in their network stack,
at least regarding 127.0.0.0/8, a rare few will allow packets claiming to be from 127.0.0.0/8 that
arrive over physical network. On these OSes, if ntpd is configured to use a reference clock an
attacker can inject packets over the network that look like they are coming from that reference
clock.



Symptom(3): CVE-2016-2519



Condition(3): ntpq and ntpdc can be used to store and retrieve information in ntpd. It is possible
to store a data value that is larger than the size of the buffer that the ctl_getitem() function of
ntpd uses to report the return value. If the length of the requested data value returned by
ctl_getitem() is too large, the value NULL is returned instead. There are 2 cases where the
return value from ctl_getitem() was not directly checked to make sure it's not NULL, but there
are subsequent INSIST() checks that make sure the return value is not NULL. There are no
data values ordinarily stored in ntpd that would exceed this buffer length. But if one has
permission to store values and one stores a value that is "too large", then ntpd will abort if an
attempt is made to read that oversized value.



Symptom(4): CVE-2016-1547



Condition(4): For ntp-4 versions up to but not including ntp-4.2.8p7, an off-path attacker can
cause a preemptable client association to be demobilized by sending a crypto NAK packet to a
victim client with a spoofed source address of an existing associated peer. This is true even if
authentication is enabled.
Furthermore, if the attacker keeps sending crypto NAK packets, for example one every second,
the victim never has a chance to reestablish the association and synchronize time with that
legitimate server.
For ntp-4.2.8 thru ntp-4.2.8p6 there is less risk because more stringent checks are performed
on incoming packets, but there are still ways to exploit this vulnerability in versions before
ntp-4.2.8p7.



Symptom(5): CVE-2016-1548



Condition(5): It is possible to change the time of an ntpd client or deny service to an ntpd client
by forcing it to change from basic client/server mode to interleaved symmetric mode. An
attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches
the peer->dst timestamp recorded for that server. After making this switch, the client will reject
all future legitimate server responses. It is possible to force the victim client to move time after
the mode has been changed. Ntpq gives no indication that the mode has been switched.



Symptom(6): CVE-2015-7704



Condition(6): The fix for NtpBug2901 in ntp-4.2.8p4 went too far, breaking peer associations.

11

Resolved problems in CMW710-R0407
201604200673


Symptom: A GE interface goes down after the speed auto 1000 command is executed on the
interface.



Condition: This symptom occurs if the speed auto 1000 command, which is not supported by a
GE interface, is executed on a GE interface.

Resolved problems in CMW710-E0404P06
201602030095


Symptom: The router displays incorrect output during a boot process.



Condition: This symptom might occur if the router is powered on.

Resolved problems in CMW710-R0304P12
201508030418


Symptom: The reset counters interface command cannot clear the rate statistics on
Eth-channel interfaces.



Condition: This symptom might occur if the reset counters interface command is used to clear
the rate statistics on Eth-channel interfaces.

Support and other resources
Accessing Hewlett Packard Enterprise Support


For live assistance, go to the Contact Hewlett Packard Enterprise Worldwide website:
www.hpe.com/assistance



To access documentation and support services, go to the Hewlett Packard Enterprise Support
Center website:
www.hpe.com/support/hpesc

Information to collect:


Technical support registration number (if applicable).



Product name, model or version, and serial number.



Operating system name and version.



Firmware version.



Error messages.



Product-specific reports and logs.



Add-on products or components.



Third-party products or components.

12

Documents
To find related documents, see the Hewlett Packard Enterprise Support Center website at
http://www.hpe.com/support/hpesc.


Enter your product name or number and click Go. If necessary, select your product from the
resulting list.



For a complete list of acronyms and their definitions, see HPE FlexNetwork technology
acronyms.

Related documents
The following documents provide related information:


HPE FlexNetwork MSR954 Routers Quick Start



HPE FlexNetwork MSR954 Routers Installation Guide



HPE FlexNetwork MSR958 Routers Quick Start



HPE FlexNetwork MSR958 Routers Installation Guide



HPE FlexNetwork MSR Router Series Configuration Guides



HPE FlexNetwork MSR Router Series Command References

Documentation feedback
Hewlett Packard Enterprise is committed to providing documentation that meets your needs. To help
us improve the documentation, send any errors, suggestions, or comments to Documentation
Feedback (docsfeedback@hpe.com). When submitting your feedback, include the document title,
part number, edition, and publication date located on the front cover of the document. For online help
content, include the product name, product version, help edition, and publication date located on the
legal notices page.

13

Appendix A Feature list
Hardware features
Table 5 MSR954P_MSR958 specifications
Item

JH300A

JH301A

JH373A

Console port

1

USB port

1

GE WAN port

1GE+1Combo

1GE+1Combo

1GE

GE LAN port

8

8

4

Memory

DDR III 1GB

Flash

256MB

Dimensions (H × W × D)
(excluding rubber feet
and mounting brackets)

330×230×44.2mm

330×230×44.2mm

300×200×44.2mm

AC power adapter

100V AC~240V AC,50Hz~60Hz

Max. AC power

20W

20W+65W(PoE)

24W

Operating temperature

0℃~45℃

0℃~45℃

0℃~40℃

Relative humidity
(non-condensing)

5%~90%

JH297A

JH298A

JH299A

2

1

1

Table 6 MSR954 specifications
Item

JH296A

Console port

1

USB port

2

GE WAN port

2

GE LAN port

4

Memory

DDR III 1GB

Flash

256MB

Dimensions (H × W × D)
(excluding rubber feet
and mounting brackets)

43.6 × 266 × 161 mm (1.72 × 10.47 × 6.34 in)

AC power adapter

100V AC~240V AC,50Hz~60Hz

Max. AC power

15W

Operating temperature

0℃~45℃

Relative humidity
(non-condensing)

5%~90%

14

Software features
Table 7 software features
Category

Features
ARP: proxy ARP, gratuitous ARP, and authorized ARP
Ethernet_II
Ethernet_SNAP
VLAN: port-based VLAN and VLAN-based port isolation
802.3x

LAN protocol:

802.1p
802.1Q
802.1X
STP, RSTP, and MSTP
Port multicast suppression
VXLAN
PPPoE client/server

WAN protocols:

DCC
3G/4G
Fast forwarding (unicast or multicast)
TCP

IP services

UDP
IP unnumbered
Policy-based routing (unicast or multicast)
Ping and Trace
DHCP server
DHCP client
DNS client
DNS static
DNS proxy

IP application

DDNS
NQA
NTP
Telnet
TFTP client
FTP client
FTP server
IPHC
Static routing

IP route

Dynamic routing protocols: RIP, OSPF, BGP, and IS-IS
Routing policy
Local authentication

AAA

RADIUS
HWTACACS
LDAP

15

ASPF
Firewall

ACL
Filter
Security zone-based firewall
Port security
IPsec
Portal
L2TP

Security

NAT and NAPT
PKI
RSA
SSH v1.5 and SSH v2.0
uRPF
GRE
VRRP
Interface backup

Reliability

BFD
Load balancing
Track

Traffic supervision

CAR (Committed Access Rate)
LR (Line Rate)

Congestion
management

FIFO, PQ, CQ, WFQ, CBQ, and RTPQ

Congestion
avoidance

WRED/RED

Traffic shaping

GTS(Generic Traffic Shaping)

Other QOS
technologies

IPHC
Sub-interface QOS
SNMPv1, SNMPv2c, and SNMPv3
MIB
Information center

Network
management

NETCONF
SMS-based automatic configuration
USB-based automatic configuration
Web-based network management
EAA
CLI-based network management
License management

Local management

File system management
Automatic configuration
Startup image backup
Console login

User access
management

TTY login
Telnet login
SSH login
16

FTP access
XMODEM access

17

Appendix B Upgrading software
This section describes how to upgrade system software while the router is operating normally or
when the router cannot correctly start up.

Software types
The following software types are available:


Boot ROM image—A .bin file that comprises a basic section and an extended section. The
basic section is the minimum code that bootstraps the system. The extended section enables
hardware initialization and provides system management menus. You can use these menus to
load application software and the startup configuration file or manage files when the device
cannot correctly start up.



Comware image—Includes the following image subcategories:




Boot image—A .bin file that contains the Linux operating system kernel. It provides process
management, memory management, file system management, and the emergency shell.
System image—A .bin file that contains the minimum feature modules required for device
operation and some basic features, including device management, interface management,
configuration management, and routing. To have advanced features, you must purchase
feature packages.



Feature package—Includes a set of advanced software features. Users purchase feature
packages as needed.



Patch packages—Irregularly released packages for fixing bugs without rebooting the
device. A patch package does not add new features or functions.

Comware software images that have been loaded are called "current software images."
Comware images specified to load at the next startup are called "startup software images."
Boot ROM image, boot image, and system image are required for the system to work. These images
might be released separately or as a whole in one .ipe package file. If an .ipe file is used, the system
automatically decompresses the file, loads the .bin boot and system images and sets them as
startup software images.

Upgrade methods
You can upgrade system software by using one of the following methods:
Upgrade method

Remarks

Centralized devices upgrading from the
CLI

Distributed devices upgrading from the
CLI

You must reboot the router to complete the upgrade.
This method
services.

can

interrupt

ongoing

network

You must reboot the router to complete the upgrade.
This method
services.

can

interrupt

ongoing

network

This method upgrades the router with the least
amount of downtime.

Distributed devices ISSU

Use this method when the router cannot

Managing files from the BootWare menu

correctly start up.
18

Preparing for the upgrade
Before you upgrade system software, complete the following tasks:


Set up the upgrade environment as shown in Table 9.



Configure routes to make sure that the router and the file server can reach each other.



Run a TFTP or FTP server on the file server.



Log in to the CLI of the router through the console port.



Copy the upgrade file to the file server and correctly set the working directory on the
TFTP or FTP server.



Make sure the upgrade has minimal impact on the network services. During the
upgrade, the router cannot provide any services.

IMPORTANT:
In the BootWare menu, if you choose to download files over Ethernet, the Ethernet port must be
GE0 on an MSR954P, MSR958, MSR2003, MSR2004-24, MSR2004-48, MSR3012, MSR3024,
MSR3044, and MSR3064 router, and must be M-GE0 on an MSR4060 and MSR4080 router.

Table 8 Storage media
Model

Storage medium

Path

Router Types

MSR954P

Flash

flash:/

Centralized devices

MSR958

Flash

flash:/

Centralized devices

MSR2003

Flash

flash:/

Centralized devices

MSR2004-24

Flash

flash:/

Centralized devices

MSR2004-48

Flash

flash:/

Centralized devices

MSR3012

CF card

cfa0:/

Centralized devices

MSR3024

CF card

cfa0:/

Centralized devices

MSR3044

CF card

cfa0:/

Centralized devices

MSR3064

CF card

cfa0:/

Centralized devices

MSR4060

CF card

cfa0:/

Centralized devices

MSR4080

CF card

cfa0:/

Distributed devices

19

Figure 1 Set up the upgrade environment

Centralized devices upgrading from the CLI
You can use the TFTP or FTP commands on the router to access the TFTP or FTP server to back up
or download files.

Saving the running configuration and verifying the storage
space
1.

Save the running configuration
save
The current configuration will be written to the device. Are you sure? [Y/N]:y
Please input the file name(*.cfg)[flash:/startup.cfg]
(To leave the existing filename unchanged, press the enter key):
Validating file. Please wait...
Configuration is saved to device successfully.


2.

Identify the system software image and configuration file names and verify that the flash has
sufficient space for the new system software image.
dir
Directory of flash:
0 drw-

- Aug 15 2012 12:03:13

1 -rw-

84 Aug 15 2012 12:17:59

2 drw-

- Aug 15 2012 12:03:14

license

3 drw-

- Aug 15 2012 12:03:13

logfile

4 -rw-

11418624 Dec 15 2011 09:00:00

msr2000-cmw710-boot-a0005.bin

5 -rw-

1006592 Dec 15 2011 09:00:00

msr2000-cmw710-data-a0005.bin

6 -rw-

10240 Dec 15 2011 09:00:00

7 -rw-

24067072 Dec 15 2011 09:00:00

8 -rw-

1180672 Dec 15 2011 09:00:00

9 drw-

- Aug 15 2012 12:03:13

diagfile
ifindex.dat

msr2000-cmw710-security-a0005.bin
msr2000-cmw710-system-a0005.bin
msr2000-cmw710-voice-a0005.bin
seclog

10 -rw-

1632 Aug 15 2012 12:18:00

startup.cfg

11 -rw-

25992 Aug 15 2012 12:18:00

startup.mdb

262144 KB total (223992 KB free)

20



Downloading the image file to the router
Using TFTP
Download the system software image file, for example, msr2000.ipe to the flash on the router.
tftp 192.168.1.100 get msr2000.ipe
% Total
100 35.9M

% Received % Xferd
100 35.9M

0

0

Average Speed

Time

Time

Time

Current

Dload

Total

Spent

Left

Speed

Upload

559k

0

0:01:05

0:01:05 --:--:--

546k



Using FTP
1.

From FTP client view, download the system software image file (for example, msr26.ipe) to the
CF card on the router.
ftp> get msr2000.ipe
msr2000.ipe already exists. Overwrite it? [Y/N]:y
227 Entering passive mode (192,168,1,100,5,20)
125 Using existing data connection
226 Closing data connection; File transfer successful.
37691392 bytes received in 17.7 seconds (2.03 Mbyte/s)
[ftp]

2.

Return to user view.
[ftp]quit
221 Service closing control connection


Specifying the startup image file
1.

Specify the msr2000.ipe file as the main image file at the next reboot.
boot-loader file flash:/msr2000.ipe main
Images in IPE:
msr2000-cmw710-boot-a0005.bin
msr2000-cmw710-system-a0005.bin
msr2000-cmw710-security-a0005.bin
msr2000-cmw710-voice-a0005.bin
msr2000-cmw710-data-a0005.bin
This command will set the main startup software images. Continue? [Y/N]:y
Add images to the device.
Successfully copied flash:/msr2000-cmw710-boot-a0005.bin to
flash:/msr2000-cmw710-boot-a0005.bin.
Successfully copied flash:/msr2000-cmw710-system-a0005.bin to
flash:/msr2000-cmw710-system-a0005.bin.

21

Successfully copied flash:/msr2000-cmw710-security-a0005.bin to
flash:/msr2000-cmw710-security-a0005.bin.
Successfully copied flash:/msr2000-cmw710-voice-a0005.bin to
flash:/msr2000-cmw710-voice-a0005.bin.
Successfully copied flash:/msr2000-cmw710-data-a0005.bin to
flash:/msr2000-cmw710-data-a0005.bin.
The images that have passed all examinations will be used as the main startup software
images at the next reboot on the device.


2.

Verify that the file has been loaded.
 display boot-loader
Software images on the device:
Current software images:
flash:/msr2000-cmw710-boot-a0004.bin
flash:/msr2000-cmw710-system-a0004.bin
flash:/msr2000-cmw710-security-a0004.bin
flash:/msr2000-cmw710-voice-a0004.bin
flash:/msr2000-cmw710-data-a0004.bin
Main startup software images:
flash:/msr2000-cmw710-boot-a0005.bin
flash:/msr2000-cmw710-system-a0005.bin
flash:/msr2000-cmw710-security-a0005.bin
flash:/msr2000-cmw710-voice-a0005.bin
flash:/msr2000-cmw710-data-a0005.bin
Backup startup software images:
None


Rebooting and completing the upgrade
1.

Reboot the router.
reboot
Start to check configuration with next startup configuration file, please
wait.........DONE!
This command will reboot the device. Continue? [Y/N]:y
Now rebooting, please wait...

System is starting...

2.

After the reboot is complete, verify that the system software image is correct.
 display version
HPE Comware Software, Version 7.1.042, Release 000702
Copyright (c) 2010-2013 Hewlett-Packard Development Company, L.P.
HPE MSR2003 uptime is 0 weeks, 0 days, 13 hours, 23 minutes
reboot reason : User reboot
Boot image: flash:/msr2000-cmw710-boot-a0005.bin

22

Last

Boot image version: 7.1.040, Alpha 0005
System image: flash:/msr2000-cmw710-system-a0005.bin
System image version: 7.1.040, Alpha 0005
CPU ID: 0x1
1G bytes DDR3 SDRAM Memory
2M bytes Flash Memory
PCB

Version:

3.0

CPLD

Version:

1.0

Basic

BootWare Version:

1.04

Extended BootWare Version:

1.04

[SLOT

0]AUX

(Hardware)3.0

(Driver)1.0,

(Cpld)1.0

[SLOT

0]GE0/0

(Hardware)3.0

(Driver)1.0,

(Cpld)1.0

[SLOT

0]GE0/1

(Hardware)3.0

(Driver)1.0,

(Cpld)1.0

[SLOT

0]CELLULAR0/0

(Hardware)3.0

(Driver)1.0,

(Cpld)1.0



Distributed devices upgrading from the CLI
You can use the TFTP or FTP commands on the router to access the TFTP or FTP server to back up
or download files.

Display the slot number of the active MPU
Perform the display device command in any view to display the slot number of the active MPU. By
default, the standby MPU will automatically synchronize the image files from active MPU.
display device
Slot No.

Board Type

Status

Primary

SubSlots

----------------------------------------------------------------------------0

MPU-100

Normal

Master

0

1

MPU-100

Normal

Standby

0

2

SPU-100

Normal

N/A

10



Save the current configuration and verify the storge space
1.

Perform the save command in any view to save the current configuration.
save
The current configuration will be written to the device. Are you sure? [Y/N]:y
Please input the file name(*.cfg)[cfa0:/startup.cfg]
(To leave the existing filename unchanged, press the enter key):
Validating file. Please wait...
Configuration is saved to device successfully.


2.

Perform the dir command in user view to identify the system software image and configuration
file names and verify that the CF card has sufficient space for the new system software image.
dir
Directory of cfa0:

23

0 drw-

- Jan 07 2013 14:02:12

1 -rw-

307 Jan 22 2013 17:02:02

2 drw-

- Jan 07 2013 14:02:12

diagfile
ifindex.dat
license

3 drw-

- Jan 22 2013 13:42:00

4 -rw-

21412864 Jan 22 2013 16:49:00

MSR4000-cmw710-boot-r0005p01.bin

logfile

5 -rw-

1123328 Jan 22 2013 16:50:30

MSR4000-cmw710-data-r0005p01.bin

6 -rw-

11264 Jan 22 2013 16:50:26

7 -rw-

45056000 Jan 22 2013 16:49:34

8 -rw-

2746368 Jan 22 2013 16:50:26

MSR4000-cmw710-security-r0005p01.bin
MSR4000-cmw710-system-r0005p01.bin
MSR4000-cmw710-voice-r0005p01.bin

9 drw-

- Jan 07 2013 14:02:12

10 -rw-

2166 Jan 22 2013 17:02:02

startup.cfg

seclog

11 -rw-

34425 Jan 22 2013 17:02:02

startup.mdb

507492 KB total (438688 KB free)


Download the image file to the router
Using TFTP
Perform the tftp get command in user view to download the system software image file, for example,
msr4000.ipe to the CF card on the router.
tftp 192.168.1.100 get msr4000.ipe
% Total

% Received % Xferd

Average Speed
Dload

Time

Upload

Total

Time

Time

Current

Spent

Left

Speed

45 67.0M

45 30.4M

0

0

792k

0

0:01:26

0:00:39

0:00:47

844k

100 67.0M

100 67.0M

0

0

772k

0

0:01:28

0:01:28 --:--:--

745k



Using FTP
1.

Perform the get command in FTP client view to download the system software image file
msr4000.ipe to the CF card on the router.
ftp> get msr4000.ipe
msr4000.ipe already exists. Overwrite it? [Y/N]:y
227 Entering passive mode (192,168,1,100,5,20)
125 Using existing data connection
226 Closing data connection; File transfer successful.
37691392 bytes received in 17.7 seconds (2.03 Mbyte/s)
[ftp]

2.

Perform the quit command in FTP client view to return to user view.
[ftp]quit
221 Service closing control connection


Copy the image file to CF card root directory of the standby MPU
 copy msr4000.ipe slot1#cfa0:/
Copy cfa0:/msr4000.ipe to slot1#cfa0:/msr4000.ipe?[Y/N]:y
Copying file cfa0:/msr4000.ipe to slot1#cfa0:/ msr4000.ipe...Done.

24

Specifying the startup image file
1.

Perform the boot-loader command in user view to d specify the msr4000.ipe file as the main
image file for the active MPU on slot 0 at the next reboot.
boot-loader file flash:/msr4000.ipe slot 0 main
Images in IPE:
msr4000-cmw710-boot-a0005.bin
msr4000-cmw710-system-a0005.bin
msr4000-cmw710-security-a0005.bin
msr4000-cmw710-voice-a0005.bin
msr4000-cmw710-data-a0005.bin
This command will set the main startup software images. Continue? [Y/N]:y
Add images to the device.
Successfully copied flash:/msr4000-cmw710-boot-a0005.bin to
cfa0:/msr4000-cmw710-boot-a0005.bin.
Successfully copied flash:/msr4000-cmw710-system-a0005.bin to
cfa0:/msr4000-cmw710-system-a0005.bin.
Successfully copied flash:/msr4000-cmw710-security-a0005.bin to
cfa0:/msr4000-cmw710-security-a0005.bin.
Successfully copied flash:/msr4000-cmw710-voice-a0005.bin to
cfa0:/msr4000-cmw710-voice-a0005.bin.
Successfully copied flash:/msr4000-cmw710-data-a0005.bin to
cfa0:/msr4000-cmw710-data-a0005.bin.
The images that have passed all examinations will be used as the main startup software
images at the next reboot on the device.


2.

Perform the boot-loader command in user view to d specify the msr4000.ipe file as the main
image file for the standby MPU on slot 1 at the next reboot.
boot-loader file flash:/msr4000.ipe slot 0 main
Images in IPE:
msr4000-cmw710-boot-a0005.bin
msr4000-cmw710-system-a0005.bin
msr4000-cmw710-security-a0005.bin
msr4000-cmw710-voice-a0005.bin
msr4000-cmw710-data-a0005.bin
This command will set the main startup software images. Continue? [Y/N]:y
Add images to the device.
Successfully copied flash:/msr4000-cmw710-boot-a0005.bin to
cfa0:/msr4000-cmw710-boot-a0005.bin.
Successfully copied flash:/msr4000-cmw710-system-a0005.bin to
cfa0:/msr4000-cmw710-system-a0005.bin.
Successfully copied flash:/msr4000-cmw710-security-a0005.bin to
cfa0:/msr4000-cmw710-security-a0005.bin.
Successfully copied flash:/msr4000-cmw710-voice-a0005.bin to
cfa0:/msr4000-cmw710-voice-a0005.bin.
Successfully copied flash:/msr4000-cmw710-data-a0005.bin to
cfa0:/msr4000-cmw710-data-a0005.bin.
The images that have passed all examinations will be used as the main startup software
images at the next reboot on the device.


25

3.

Perform the display boot-loader command in user view to verify that the file has been loaded.
 display boot-loader
Software images on slot 0:
Current software images:
cfa0:/MSR4000-cmw710-boot-a0004.bin
cfa0:/MSR4000-cmw710-system-a0004.bin
cfa0:/MSR4000-cmw710-security-a0004.bin
cfa0:/MSR4000-cmw710-voice-a0004.bin
cfa0:/MSR4000-cmw710-data-a0004.bin
Main startup software images:
cfa0:/MSR4000-cmw710-boot-a0005.bin
cfa0:/MSR4000-cmw710-system-a0005.bin
cfa0:/MSR4000-cmw710-security-a0005.bin
cfa0:/MSR4000-cmw710-voice-a0005.bin
cfa0:/MSR4000-cmw710-data-a0005.bin
Backup startup software images:
None
Software images on slot 1:
Current software images:
cfa0:/MSR4000-cmw710-boot-r0005p01.bin
cfa0:/MSR4000-cmw710-system-r0005p01.bin
cfa0:/MSR4000-cmw710-security-r0005p01.bin
cfa0:/MSR4000-cmw710-voice-r0005p01.bin
cfa0:/MSR4000-cmw710-data-r0005p01.bin
Main startup software images:
cfa0:/MSR4000-cmw710-boot-r0005p01.bin
cfa0:/MSR4000-cmw710-system-r0005p01.bin
cfa0:/MSR4000-cmw710-security-r0005p01.bin
cfa0:/MSR4000-cmw710-voice-r0005p01.bin
cfa0:/MSR4000-cmw710-data-r0005p01.bin
Backup startup software images:
None

Reboot and completing the upgrade
1.

Perform the reboot command in user view to reboot the router.
reboot
Start to check configuration with next startup configuration file, please
wait.........DONE!
This command will reboot the device. Continue? [Y/N]:y
Now rebooting, please wait...

System is starting..

2.

After the reboot is complete, perform the display version command to verify that the system
software image is correct.
 display version
HPE Comware Software, Version 7.1.042, Release 000702
Copyright (c) 2010-2013 Hewlett-Packard Development Company, L.P.
HPE MSR4060 uptime is 0 weeks, 0 days, 11 hours, 49 minutes

26

Last reboot reason : Power on
Boot image: cfa0:/MSR4000-cmw710-boot-a0005.bin
Boot image version: 7.1.040, Alpha 0005
System image: cfa0:/MSR4000-cmw710-system-a0005.bin
System image version: 7.1.040, Alpha 0005
Feature image(s) list:
cfa0:/MSR4000-cmw710-security-a0005.bin, version: 7.1.040
cfa0:/MSR4000-cmw710-voice-a0005.bin, version: 7.1.040
cfa0:/MSR4000-cmw710-data-a0005.bin, version: 7.1.040
Slot 0: MPU-100 uptime is 0 week, 0 day, 1 hour, 20 minutes
Last reboot reason : Power on
CPU ID: 0x3
2G bytes DDR3 SDRAM Memory
8M bytes Flash Memory
PCB

Version:

2.0

CPLD

Version:

1.0

Basic

BootWare Version:

1.04

Extended BootWare Version:

1.04

[SUBSLOT

0]CON

(Hardware)2.0

(Driver)1.0,

(Cpld)1.0

[SUBSLOT

0]AUX

(Hardware)2.0

(Driver)1.0,

(Cpld)1.0

[SUBSLOT

0]MGE0

(Hardware)2.0

(Driver)1.0,

(Cpld)1.0

Slot 1: MPU-100 uptime is 0 week, 0 day, 1 hour, 8 minutes
Last reboot reason : User reboot
CPU ID: 0x3
2G bytes DDR3 SDRAM Memory
8M bytes Flash Memory
PCB
CPLD
Basic

Version:

2.0

Version:

1.0

BootWare Version:

1.05

Extended BootWare Version:

1.05

[SUBSLOT

0]CON

(Hardware)2.0

(Driver)1.0,

(Cpld)1.0

[SUBSLOT

0]AUX

(Hardware)2.0

(Driver)1.0,

(Cpld)1.0

[SUBSLOT

0]MGE0

(Hardware)2.0

(Driver)1.0,

(Cpld)1.0

Slot 2: SPU-100 uptime is 0 week, 0 day, 1 hour, 19 minutes
Last reboot reason : Power on
CPU ID: 0x5
2G bytes DDR3 SDRAM Memory
8M bytes Flash Memory
PCB

Version:

2.0

CPLD

Version:

1.0

Basic

BootWare Version:

1.02

Extended BootWare Version:

1.02

[SUBSLOT

0]GE2/0/0

(Hardware)2.0

(Driver)1.0,

(Cpld)1.0

[SUBSLOT

0]GE2/0/1

(Hardware)2.0

(Driver)1.0,

(Cpld)1.0

[SUBSLOT

0]GE2/0/2

(Hardware)2.0

(Driver)1.0,

(Cpld)1.0

27

[SUBSLOT

0]GE2/0/3

(Hardware)2.0

(Driver)1.0,

(Cpld)1.0

[SUBSLOT

0]CELLULAR2/0/0

(Hardware)2.0

(Driver)1.0,

(Cpld)1.0

[SUBSLOT

0]CELLULAR2/0/1

(Hardware)2.0

(Driver)1.0,

(Cpld)1.0

[SUBSLOT

1]HMIM-4SAE

(Hardware)3.0

(Driver)1.0,

(Cpld)4.0

Distributed devices ISSU
The In-Service Software Upgrade (ISSU) function enables software upgrade with the least amount of
downtime.
To implement ISSU of a distributed device, use these guidelines:


Make sure the device has two MPUs.



Upgrade the standby MPU is upgraded first to form a new forwarding plane and a new control
plane.



Upgrade the active MPU after the standby MPU operates correctly. The standby MPU will
synchronize data and configuration from the active MPU and take over the forwarding and
control functions.

Disabling the standby MPU auto-update function
When you upgrade the active MPU of a dual-MPU distributed device, the standby MPU auto-update
function automatically upgrades the standby MPU by default. To use ISSU, you must disable the
function.
To disable the standby MPU auto-update function:
1.

View the roles of the MPUs.
display device
Slot No.

Board Type

Status

Primary

SubSlots

----------------------------------------------------------------------------0

MPU-100

Normal

Master

0

1

MPU-100

Normal

Standby

0

2

SPU-100

Normal

N/A

10



The output shows that the MPU in slot 0 is the active MPU.
2.

Disable the standby MPU auto-update function.
system-view
[Sysname]version check ignore
[Sysname]undo version auto-update enable

Saving the running configuration and verifying the storage
space
1.

Save the running configuration.
save
The current configuration will be written to the device. Are you sure? [Y/N]:y
Please input the file name(*.cfg)[cfa0:/startup.cfg]
(To leave the existing filename unchanged, press the enter key):
Validating file. Please wait...
Configuration is saved to device successfully.

28



2.

Check the storage space.
dir
Directory of cfa0:
0 drw-

- Jan 07 2014 14:02:12

1 -rw-

307 Jan 22 2014 17:02:02

2 drw-

- Jan 07 2014 14:02:12

license

3 drw-

- Jan 22 2014 13:42:00

logfile

4 -rw-

20050944 Jan 10 2014 09:06:48

msr4000-cmw710-boot-e010204.bin

5 -rw-

2001920 Jan 10 2014 09:08:28

msr4000-cmw710-data-e010204.bin

6 -rw-

11264 Jan 10 2014 09:08:18

7 -rw-

61538304 Jan 10 2014 09:07:36

8 -rw-

3232768 Jan 10 2014 09:08:22

9 drw-

- Jan 07 2014 14:02:12

diagfile
ifindex.dat

msr4000-cmw710-security-e010204.bin
msr4000-cmw710-system-e010204.bin
msr4000-cmw710-voice-e010204.bin
seclog

10 -rw-

2166 Jan 22 2014 17:02:02

startup.cfg

11 -rw-

34425 Jan 22 2014 17:02:02

startup.mdb

507492 KB total (438688 KB free)


The output shows the CF card has 438688 KB of free storage space. If the CF card of your
device is not sufficient for the upgrade image, delete unused files.

Downloading the upgrade image file to the router
Using TFTP
Download the upgrade image file (for example, msr4000.ipe) to the CF card on the router.
tftp 192.168.1.100 get msr4000.ipe
% Total

% Received % Xferd

Average Speed
Dload

Time

Upload

Total

Time

Time

Current

Spent

Left

Speed

45 67.0M

45 30.4M

0

0

792k

0

0:01:26

0:00:39

0:00:47

844k

100 67.0M

100 67.0M

0

0

772k

0

0:01:28

0:01:28 --:--:--

745k



Using FTP
1.

From FTP client view, download the upgrade image file (for example, msr4000.ipe) to the CF
card on the router.
ftp> get msr4000.ipe
msr4000.ipe already exists. Overwrite it? [Y/N]:y
227 Entering passive mode (192,168,1,100,5,20)
125 Using existing data connection
226 Closing data connection; File transfer successful.
37691392 bytes received in 17.7 seconds (2.03 Mbyte/s)
[ftp]

2.

Return to user view.
[ftp]quit
221 Service closing control connection


29

Copying the image file to the root directory of the CF card on the standby MPU
 copy msr4000.ipe slot1#cfa0:/
Copy cfa0:/msr4000.ipe to slot1#cfa0:/msr4000.ipe?[Y/N]:y
Copying file cfa0:/msr4000.ipe to slot1#cfa0:/ msr4000.ipe...Done.

Upgrading the standby MPU
1.

Specify the msr4000.ipe file as the main startup image file for the standby MPU.
boot-loader file msr4000.ipe slot 1 main
Verifying the IPE file and the images......Done.
HPE MSR4060 images in IPE:
msr4000-cmw710-boot-e010305.bin
msr4000-cmw710-system-e010305.bin
msr4000-cmw710-security-e010305.bin
msr4000-cmw710-voice-e010305.bin
msr4000-cmw710-data-e010305.bin
This command will set the main startup software images. Continue? [Y/N]:y
Add images to slot 1.
Decompressing file msr4000-cmw710-boot-e010305.bin to
slot1#cfa0:/msr4000-cmw710-boo
t-e010305.bin...............Done.
Decompressing file msr4000-cmw710-system-e010305.bin to
slot1#cfa0:/msr4000-cmw710-s
ystem-e010305.bin...............................................Done.
Decompressing file msr4000-cmw710-security-e010305.bin to
slot1#cfa0:/msr4000-cmw710
-security-e010305.bin...Done.
Decompressing file msr4000-cmw710-voice-e010305.bin to
slot1#cfa0:/msr4000-cmw710-vo
ice-e010305.bin....Done.
Decompressing file msr4000-cmw710-data-e010305.bin to
slot1#cfa0:/msr4000-cmw710-dat
a-e010305.bin...Done.
The images that have passed all examinations will be used as the main startup so
ftware images at the next reboot on slot 1.

2.

Reboot the standby MPU.
reboot slot 1
This command will reboot the specified slot, Continue? [Y/N]:y
Now rebooting, please wait...

3.

After the standby MPU starts up, verify the startup image files.
display boot-loader
Software images on slot 0:
Current software images:
cfa0:/msr4000-cmw710-boot-e010204.bin
cfa0:/msr4000-cmw710-system-e010204.bin
cfa0:/msr4000-cmw710-security-e010204.bin
cfa0:/msr4000-cmw710-voice-e010204.bin
cfa0:/msr4000-cmw710-data-e010204.bin
Main startup software images:

30

cfa0:/msr4000-cmw710-boot-e010204.bin
cfa0:/msr4000-cmw710-system-e010204.bin
cfa0:/msr4000-cmw710-security-e010204.bin
cfa0:/msr4000-cmw710-voice-e010204.bin
cfa0:/msr4000-cmw710-data-e010204.bin
Backup startup software images:
cfa0:/msr4000-cmw710-boot-e010203.bin
cfa0:/msr4000-cmw710-system-e010203.bin
cfa0:/msr4000-cmw710-security-e010203.bin
cfa0:/msr4000-cmw710-voice-e010203.bin
cfa0:/msr4000-cmw710-data-e010203.bin
Software images on slot 1:
Current software images:
cfa0:/msr4000-cmw710-boot-e010305.bin
cfa0:/msr4000-cmw710-system-e010305.bin
cfa0:/msr4000-cmw710-security-e010305.bin
cfa0:/msr4000-cmw710-voice-e010305.bin
cfa0:/msr4000-cmw710-data-e010305.bin
Main startup software images:
cfa0:/msr4000-cmw710-boot-e010305.bin
cfa0:/msr4000-cmw710-system-e010305.bin
cfa0:/msr4000-cmw710-security-e010305.bin
cfa0:/msr4000-cmw710-voice-e010305.bin
cfa0:/msr4000-cmw710-data-e010305.bin
Backup startup software images:
cfa0:/msr4000-cmw710-boot-e010203.bin
cfa0:/msr4000-cmw710-system-e010203.bin
cfa0:/msr4000-cmw710-security-e010203.bin
cfa0:/msr4000-cmw710-voice-e010203.bin
cfa0:/msr4000-cmw710-data-e010203.bin

The output shows that the standby MPU is running the new images.

Upgrading the active MPU
1.

Specify the msr4000.ipe file as the main startup image file for the active MPU.
boot-loader file msr4000.ipe slot 0 main
Verifying the IPE file and the images......Done.
HPE MSR4060 images in IPE:
msr4000-cmw710-boot-e010305.bin
msr4000-cmw710-system-e010305.bin
msr4000-cmw710-security-e010305.bin
msr4000-cmw710-voice-e010305.bin
msr4000-cmw710-data-e010305.bin
This command will set the main startup software images. Continue? [Y/N]:y
Add images to slot 0.
Decompressing file msr4000-cmw710-boot-e010305.bin to
cfa0:/msr4000-cmw710-boot-e010
305.bin...............Done.

31

Decompressing file msr4000-cmw710-system-e010305.bin to
cfa0:/msr4000-cmw710-systeme010305.bin..............................................Done.
Decompressing file msr4000-cmw710-security-e010305.bin to
cfa0:/msr4000-cmw710-secur
ity-e010305.bin...Done.
Decompressing file msr4000-cmw710-voice-e010305.bin to
cfa0:/msr4000-cmw710-voice-e0
10305.bin....Done.
Decompressing file msr4000-cmw710-data-e010305.bin to
cfa0:/msr4000-cmw710-data-e010
305.bin...Done.
The images that have passed all examinations will be used as the main startup so
ftware images at the next reboot on slot 0.

2.

Reboot the active MPU.
reboot slot 0
This command will reboot the specified slot, Continue? [Y/N]:y
Now rebooting, please wait...

The standby MPU takes over the forwarding and controlling functions before the active MPU
reboots.
3.

After the active MPU starts up, verify the startup image files.
display boot-loader
Software images on slot 0:
Current software images:
cfa0:/msr4000-cmw710-boot-e010305.bin
cfa0:/msr4000-cmw710-system-e010305.bin
cfa0:/msr4000-cmw710-security-e010305.bin
cfa0:/msr4000-cmw710-voice-e010305.bin
cfa0:/msr4000-cmw710-data-e010305.bin
Main startup software images:
cfa0:/msr4000-cmw710-boot-e010305.bin
cfa0:/msr4000-cmw710-system-e010305.bin
cfa0:/msr4000-cmw710-security-e010305.bin
cfa0:/msr4000-cmw710-voice-e010305.bin
cfa0:/msr4000-cmw710-data-e010305.bin
Backup startup software images:
cfa0:/msr4000-cmw710-boot-e010203.bin
cfa0:/msr4000-cmw710-system-e010203.bin
cfa0:/msr4000-cmw710-security-e010203.bin
cfa0:/msr4000-cmw710-voice-e010203.bin
cfa0:/msr4000-cmw710-data-e010203.bin
Software images on slot 1:
Current software images:
cfa0:/msr4000-cmw710-boot-e010305.bin
cfa0:/msr4000-cmw710-system-e010305.bin
cfa0:/msr4000-cmw710-security-e010305.bin
cfa0:/msr4000-cmw710-voice-e010305.bin
cfa0:/msr4000-cmw710-data-e010305.bin
Main startup software images:

32

cfa0:/msr4000-cmw710-boot-e010305.bin
cfa0:/msr4000-cmw710-system-e010305.bin
cfa0:/msr4000-cmw710-security-e010305.bin
cfa0:/msr4000-cmw710-voice-e010305.bin
cfa0:/msr4000-cmw710-data-e010305.bin
Backup startup software images:
cfa0:/msr4000-cmw710-boot-e010203.bin
cfa0:/msr4000-cmw710-system-e010203.bin
cfa0:/msr4000-cmw710-security-e010203.bin
cfa0:/msr4000-cmw710-voice-e010203.bin
cfa0:/msr4000-cmw710-data-e010203.bin

4.

Perform the display boot-loader command in user view to verify that the file has been loaded.
 display boot-loader
Software images on slot 0:
Current software images:
cfa0:/MSR4000-cmw710-boot-r0005p01.bin
cfa0:/MSR4000-cmw710-system-r0005p01.bin
cfa0:/MSR4000-cmw710-security-r0005p01.bin
cfa0:/MSR4000-cmw710-voice-r0005p01.bin
cfa0:/MSR4000-cmw710-data-r0005p01.bin
Main startup software images:
cfa0:/MSR4000-cmw710-boot-a0005.bin
cfa0:/MSR4000-cmw710-system-a0005.bin
cfa0:/MSR4000-cmw710-security-a0005.bin
cfa0:/MSR4000-cmw710-voice-a0005.bin
cfa0:/MSR4000-cmw710-data-a0005.bin
Backup startup software images:
None
Software images on slot 1:
Current software images:
cfa0:/MSR4000-cmw710-boot-r0005p01.bin
cfa0:/MSR4000-cmw710-system-r0005p01.bin
cfa0:/MSR4000-cmw710-security-r0005p01.bin
cfa0:/MSR4000-cmw710-voice-r0005p01.bin
cfa0:/MSR4000-cmw710-data-r0005p01.bin
Main startup software images:
cfa0:/MSR4000-cmw710-boot-r0005p01.bin
cfa0:/MSR4000-cmw710-system-r0005p01.bin
cfa0:/MSR4000-cmw710-security-r0005p01.bin
cfa0:/MSR4000-cmw710-voice-r0005p01.bin
cfa0:/MSR4000-cmw710-data-r0005p01.bin
Backup startup software images:
None

Upgrading from the BootWare menu
You can use the following methods to upgrade software from the BootWare menu:


Using TFTP/FTP to upgrade software through an Ethernet port
33



Using XMODEM to upgrade software through the console port

Accessing the BootWare menu
1.

Power on the router (for example, an H3C MSR 2003 router), and you can see the following
information:
System is starting...
Press Ctrl+D to access BASIC-BOOTWARE MENU...
Booting Normal Extended BootWare
The Extended BootWare is self-decompressing....Done.
****************************************************************************
*
*

*
HPE MSR2003 BootWare, Version 1.20

*

*
*

****************************************************************************
Copyright (c) 2010-2013 Hewlett-Packard Development Company, L.P.
Compiled Date

: Jun 22 2013

CPU ID

: 0x1

Memory Type

: DDR3 SDRAM

Memory Size

: 1024MB

Flash Size

: 2MB

Nand Flash size

: 256MB

CPLD Version

: 2.0

PCB Version

: 3.0

BootWare Validating...
Press Ctrl+B to access EXTENDED-BOOTWARE MENU...

2.

Press Ctrl + B to access the BootWare menu.
Password recovery capability is enabled.
Note: The current operating device is flash
Enter < Storage Device Operation > to select device.
======================================================
|<1> Boot System

|

|<2> Enter Serial SubMenu

|

|<3> Enter Ethernet SubMenu

|

|<4> File Control

|

|<5> Restore to Factory Default Configuration

|

|<6> Skip Current System Configuration

|

|<7> BootWare Operation Menu

|

|<8> Skip authentication for console login

|

|<9> Storage Device Operation

|

|<0> Reboot

|

============================================================================
Ctrl+Z: Access EXTENDED ASSISTANT MENU

34

Ctrl+F: Format File System
Enter your choice(0-9):

Table 9 BootWare menu options
Item

Description

<1> Boot System

Boot the system software image.

<2> Enter Serial SubMenu

Access the Serial submenu (see Table 12 ) for upgrading
system software through the console port or changing the
serial port settings.

<3> Enter Ethernet SubMenu

Access the Ethernet submenu (see Table 10) for upgrading
system software through an Ethernet port or changing
Ethernet settings.

<4> File Control

Access the File Control submenu (see Table 13) to retrieve
and manage the files stored on the router.

<5> Restore to Factory Default
Configuration

Delete the next-startup configuration files and load the
factory-default configuration.

<6> Skip Current System Configuration

Start the router with the factory default configuration. This is a
one-time operation and does not take effect at the next reboot.
You use this option when you forget the console login
password.

<7> BootWare Operation Menu

Access the BootWare Operation menu for backing up,
restoring, or upgrading BootWare. When you upgrade the
system software image, BootWare is automatically upgraded.
HPE does not recommend upgrading BootWare separately.
This document does not cover using the BootWare Operation
menu.

<8> Skip authentication for console login

Clear all the authentication schemes on the console port.

<9> Storage Device Operation

Access the Storage Device Operation menu to manage
storage devices. Using this option is beyond this chapter.

<0> Reboot

Restart the router.

Using TFTP/FTP to upgrade software through an Ethernet
port
1.

Enter 3 in the BootWare menu to access the Ethernet submenu.
==============================================================
|Note:the operating device is flash

|

|<1> Download Image Program To SDRAM And Run

|

|<2> Update Main Image File

|

|<3> Update Backup Image File

|

|<4> Download Files(*.*)

|

|<5> Modify Ethernet Parameter

|

|<0> Exit To Main Menu

|

============================================================================
Enter your choice(0-4):

35

Table 10 Ethernet submenu options
Item

Description

<1> Download Application Program To SDRAM And
Run

Download a system software image to the SDRAM
and run the image.

<2> Update Main Image File

Upgrade the main system software image.

<3> Update Backup Image File

Upgrade the backup system software image.

<4> Download Files(*.*)

Download a system software image to the Flash or
CF card.

<5> Modify Ethernet Parameter

Modify network settings.

<0> Exit To Main Menu

Return to the BootWare menu.

2.

Enter 5 to configure the network settings.
==================================================
|Note:

'.' = Clear field.

|
|

|

'-' = Go to previous field.
Ctrl+D = Quit.

|
|

==========================================================================
Protocol (FTP or TFTP) :ftp
Load File Name

:msr2000.ipe
:

Target File Name

:msr2000.ipe
:

Server IP Address

:192.168.1.1

Local IP Address

:192.168.1.100

Subnet Mask

:255.255.255.0

Gateway IP Address

:0.0.0.0

FTP User Name

:user001

FTP User Password

:********

Table 11 Network parameter fields and shortcut keys
Field

Description

'.' = Clear field

Press a dot (.) and then Enter to clear the setting for a field.

'-' = Go to previous field

Press a hyphen (-) and then Enter to return to the previous field.

Ctrl+D = Quit

Press Ctrl + D to exit the Ethernet Parameter Set menu.

Protocol (FTP or TFTP)

Set the file transfer protocol to FTP or TFTP.

Load File Name

Set the name of the file to be downloaded.

Target File Name

Set a file name for saving the file on the router. By default, the target
file name is the same as the source file name.

Server IP Address

Set the IP address of the FTP or TFTP server. If a mask must be
set, use a colon (:) to separate the mask length from the IP address.
For example, 192.168.80.10:24.

Local IP Address

Set the IP address of the router.

Subnet Mask

Subnet Mask of the local IP address.

Gateway IP Address

Set a gateway IP address if the router is on a different network than
the server.
36

FTP User Name

Set the username for accessing the FTP server. This username
must be the same as configured on the FTP server. This field is not
available for TFTP.

FTP User Password

Set the password for accessing the FTP server. This password
must be the same as configured on the FTP server. This field is not
available for TFTP.

3.

Select an option in the Ethernet submenu to upgrade a system software image. For
example, enter 2 to upgrade the main system software image.
Loading.....................................................................
............................................................................
............................................................................
.........................................Done.
37691392 bytes downloaded!
The file is exist,will you overwrite it? [Y/N]Y
Image file msr2000-cmw710-boot-a0005.bin is self-decompressing...
Saving file flash:/msr2000-cmw710-boot-a0005.bin .............................
......Done.
Image file msr2000-cmw710-system-a0005.bin is self-decompressing...
Saving file flash:/msr2000-cmw710-system-a0005.bin ...........................
.........................................Done.
Image file msr2000-cmw710-security-a0005.bin is self-decompressing...
Saving file flash:/msr2000-cmw710-security-a0005.bin Done.
Image file msr2000-cmw710-voice-a0005.bin is self-decompressing...
Saving file flash:/msr2000-cmw710-voice-a0005.bin ......Done.
Image file msr2000-cmw710-data-a0005.bin is self-decompressing...
Saving file flash:/msr2000-cmw710-data-a0005.bin ..Done.
====================================================
|Note:the operating device is flash

|

|<1> Download Image Program To SDRAM And Run

|

|<2> Update Main Image File

|

|<3> Update Backup Image File

|

|<4> Download Files(*.*)

|

|<5> Modify Ethernet Parameter

|

|<0> Exit To Main Menu

|

|

|

============================================================================
Enter your choice(0-4):

4.

Enter 0 to return to the BootWare menu
======================================================
|<1> Boot System

|

|<2> Enter Serial SubMenu

|

|<3> Enter Ethernet SubMenu

|

|<4> File Control

|

|<5> Modify BootWare Password

|

|<6> Skip Current System Configuration

|

|<7> BootWare Operation Menu

|

37

|<8> Skip authentication for console login

|

|<9> Storage Device Operation

|

|<0> Reboot

|

============================================================================
Enter your choice(0-9):

5.

1 to boot the system.
Loading the main image files...
Loading file flash:/msr2000-cmw710-system-a0005.bin..........................
Done.
Loading file flash:/msr2000-cmw710-boot-a0005.bin..............Done.
Image file flash:/msr2000-cmw710-boot-a0005.bin is self-decompressing.........
.....Done.
System image is starting...
Line aux0 is available.

Press ENTER to get started.

Using XMODEM to upgrade software through the console
port
1.

Enter 2 in the BootWare menu to access the Serial submenu.
======================================================
|Note:the operating device is flash

|

|<1> Download Image Program To SDRAM And Run

|

|<2> Update Main Image File

|

|<3> Update Backup Image File

|

|<4> Download Files(*.*)

|

|<5> Modify Serial Interface Parameter

|

|<0> Exit To Main Menu

|

============================================================================
Enter your choice(0-4):

Table 12 Serial submenu options
Item

Description

<1> Download Application Program To SDRAM And
Run

Download an application to SDRAM through the
serial port and run the program.

<2> Update Main Image File

Upgrade the main system software image.

<3> Update Backup Image File

Upgrade the backup system software image.

<4>Download Files(*.*)

Download a system software image to the Flash or
CF card.

<5> Modify Serial Interface Parameter

Modify serial port parameters

<0> Exit To Main Menu

Return to the BootWare menu.

2.

Select an appropriate baud rate for the console port. For example, enter 5 to select 115200 bps.
==============================================================

38

|Note:'*'indicates the current baudrate

|

|

|

Change The HyperTerminal's Baudrate Accordingly

|------------------------------------------------------|
|<1> 9600(Default)*

|

|<2> 19200

|

|<3> 38400

|

|<4> 57600

|

|<5> 115200

|

|<0> Exit

|

============================================================================
Enter your choice(0-5):

The following messages appear:
Baudrate has been changed to 115200 bps.
Please change the terminal's baudrate to 115200 bps, press ENTER when ready.

NOTE:
Typically the size of a .bin file is over 10 MB. Even at 115200 bps, the download takes about 30
minutes.

3.

Select Call > Disconnect in the HyperTerminal window to disconnect the terminal from the
router.

Figure 2 Disconnect the terminal connection

NOTE:
If the baud rate of the console port is 9600 bps, jump to step 9.

4.

Select File > Properties, and in the Properties dialog box, click Configure.

39

Figure 3 Properties dialog box

5.

Select 115200 from the Bits per second list and click OK.

40

Figure 4 Modify the baud rate

6.

Select Call > Call to reestablish the connection.

Figure 5 Reestablish the connection

7.

Press Enter.
The following menu appears:
The current baudrate is 115200 bps
==============================================================
|Note:'*'indicates the current baudrate

|

|

|

Change The HyperTerminal's Baudrate Accordingly

|------------------------------------------------------|
|<1> 9600(Default)

|

|<2> 19200

|

|<3> 38400

|

|<4> 57600

|

|<5> 115200*

|

|<0> Exit

|

============================================================================
Enter your choice(0-5):

41

8.

Enter 0 to return to the Serial submenu.
======================================================
|Note:the operating device is flash

|

|<1> Download Image Program To SDRAM And Run

|

|<2> Update Main Image File

|

|<3> Update Backup Image File

|

|<4> Download Files(*.*)

|

|<5> Modify Serial Interface Parameter

|

|<0> Exit To Main Menu

|

============================================================================
Enter your choice(0-4):

9.

Select an option from options 2 to 3 to upgrade a system software image. For example,
enter 2 to upgrade the main system software image.
Please Start To Transfer File, Press  To Exit.
Waiting ...CCCCC

10. Select Transfer > Send File in the HyperTerminal window.
Figure 6 Transfer menu

11. In the dialog box that appears, click Browse to select the source file, and select Xmodem from
the Protocol list.
Figure 7 File transmission dialog box

12. Click Send. The following dialog box appears:

42

Figure 8 File transfer progress

13. When the Serial submenu appears after the file transfer is complete, enter 0 at the
prompt to return to the BootWare menu.
Download successfully!
37691392 bytes downloaded!
Input the File Name:main.bin
Updating File flash:/main.bin..............................................
.....................................................Done!
======================================================
|Note:the operating device is flash

|

|<1> Download Image Program To SDRAM And Run

|

|<2> Update Main Image File

|

|<3> Update Backup Image File

|

|<4> Download Files(*.*)

|

|<5> Modify Serial Interface Parameter

|

|<0> Exit To Main Menu

|

============================================================================
Enter your choice(0-4):

14. Enter 1 in the BootWare menu to boot the system.
15. If you are using a download rate other than 9600 bps, change the baud rate of the terminal to
9600 bps. If the baud rate has been set to 9600 bps, skip this step.

Managing files from the BootWare menu
To change the type of a system software image, retrieve files, or delete files, enter 4 in the BootWare
menu.
The File Control submenu appears:
============================================================
|Note:the operating device is cfa0

|

43

|<1> Display All File(s)

|

|<2> Set Image File type

|

|<3> Set Bin File type

|

|<4> Set Configuration File type

|

|<5> Delete File

|

|<6> Copy File

|

|<0> Exit To Main Menu

|

==========================================================================
Enter your choice(0-6):

Table 13 File Control submenu options
Item

Description

<1> Display All File

Display all files.

<2> Set Image File type

Change the type of a system software image (.ipe).

<3> Set Bin File type

Change the type of a system software image (.bin).

<4> Set Configuration File type

Change the type of a configuration file.

<5> Delete File

Delete files.

<6> Copy File

Copy File

<0> Exit To Main Menu

Return to the BootWare menu.

Displaying all files
To display all files, enter 1 in the File Control submenu:
Display all file(s) in flash:
'M' = MAIN

'B' = BACKUP

'N/A' = NOT ASSIGNED

============================================================================
|NO. Size(B)

Time

Type

Name

|

|1

37691392

Aug/16/2012 07:09:16 N/A

flash:/msr2000.ipe

|2

25992

Aug/15/2012 12:18:00 N/A

flash:/startup.mdb

|

|3

1632

Aug/15/2012 12:18:00 M

flash:/startup.cfg

|

|4

84

Aug/15/2012 12:17:59 N/A

flash:/ifindex.dat

|

|5

11029

Aug/15/2012 13:31:16 N/A

flash:/logfile/logfile1.log

|

|6

17

Aug/16/2012 07:47:24 N/A

flash:/.pathfile

|

|7

1006592

Aug/16/2012 07:44:16 M

|8

815

Aug/15/2012 12:03:14 N/A

|9

1180672

Aug/16/2012 07:44:15 M

flash:/msr2000-cmw710-voice-a0005. bin|

|10

10240

Aug/16/2012 07:44:15 M

flash:/msr2000-cmw710-security-a0005.bin|

|11

24067072

Aug/16/2012 07:44:10 M

flash:/msr2000-cmw710-system-a0005.bin|

|12

11418624

Aug/16/2012 07:44:05 M

flash:/msr2000-cmw710-boot-a0005.bin|

|

flash:/msr2000-cmw710-data-a0005.bin|
flash:/license/DeviceID.did

|

============================================================================

Changing the type of a system software image
System software image file attributes include main (M), and backup (B). You can store only one main
image, and one backup image on the router. A system software image can have any combination of
the M, and B attributes. If the file attribute you are assigning has been assigned to an image, the
44

assignment removes the attribute from that image. The image is marked as N/A if it has only that
attribute.
To change the type of a system software image:
1.

Enter 2 in the File Control submenu.
'M' = MAIN

'B' = BACKUP

'N/A' = NOT ASSIGNED

============================================================================
|NO. Size(B)

Time

|1

37691392

Aug/16/2012 07:09:16 N/A

Type

|0

Exit

Name

|

flash:/msr2000.ipe

|
|

============================================================================
Enter file No:1

2.

Enter the number of the file you are working with, and press Enter.
Modify the file attribute:
==========================================================================
|<1> +Main

|

|<2> +Backup

|

|<0> Exit

|

==========================================================================
Enter your choice(0-2):

3.

Enter a number in the range of 1 to 4 to add or delete a file attribute for the file.
Set the file attribute success!

Deleting files
When storage space is insufficient, you can delete obsolete files to free up storage space.
To delete files:
1.

Enter 5 in the File Control submenu.
Deleting the file in cfa0:
'M' = MAIN

'B' = BACKUP

'N/A' = NOT ASSIGNED

Deleting the file in flash:
'M' = MAIN

'B' = BACKUP

'N/A' = NOT ASSIGNED

============================================================================
|NO. Size(B)

Time

Type

|1

37691392

Aug/16/2012 07:09:16 N/A

flash:/msr2000.ipe

|2

25992

Aug/15/2012 12:18:00 N/A

flash:/startup.mdb

|3

1632

Aug/15/2012 12:18:00 M

flash:/startup.cfg

|

|4

84

Aug/15/2012 12:17:59 N/A

flash:/ifindex.dat

|

|5

11029

Aug/15/2012 13:31:16 N/A

flash:/logfile/logfile1.log

|

|6

17

Aug/16/2012 07:47:24 N/A

flash:/.pathfile

|

|7

1006592

Aug/16/2012 07:44:16 M

flash:/msr2000-cmw710-data-a0005.bin|

|8

815

Aug/15/2012 12:03:14 N/A

flash:/license/DeviceID.did

|
|

|

1180672

|10

10240

|11

24067072

Aug/16/2012 07:44:10 M

flash:/msr2000-cmw710-system-a0005.bin|

|12

11418624

Aug/16/2012 07:44:05 M

flash:/msr2000-cmw710-boot-a0005.bin|

Aug/16/2012 07:44:15 M

Exit

Enter file No.:

2.

|

|9

0

Aug/16/2012 07:44:15 M

Name

Enter the number of the file to delete.
45

flash:/msr2000-cmw710-voice-a0005. bin|
flash:/msr2000-cmw710-security-a0005.bin|

3.

When the following prompt appears, enter Y.
The file you selected is flash:/msr2000-cmw710-security-a0005.bin,Delete it?
[Y/N]Y
Deleting...Done.

Handling software upgrade failures
If a software upgrade fails, the system runs the old software version. To handle a software failure:
1.

Check the physical ports for a loose or incorrect connection.

2.

If you are using the console port for file transfer, check the HyperTerminal settings (including
the baud rate and data bits) for any wrong setting.

3.

Check the file transfer settings:


If XMODEM is used, you must set the same baud rate for the terminal as for the
console port.



If TFTP is used, you must enter the same server IP addresses, file name, and
working directory as set on the TFTP server.



If FTP is used, you must enter the same FTP server IP address, source file name,
working directory, and FTP username and password as set on the FTP server.

4.

Check the FTP or TFTP server for any incorrect setting.

5.

Check that the storage device has sufficient space for the upgrade file.

6.

If the message “Something is wrong with the file” appears, check the file for file corruption.

Appendix C Handling console login
password loss
Disabling password recovery capability
Password recovery capability controls console user access to the device configuration and SDRAM
from BootWare menus.
If password recovery capability is enabled, a console user can access the device configuration
without authentication to configure new passwords.
If password recovery capability is disabled, console users must restore the factory-default
configuration before they can configure new passwords. Restoring the factory-default configuration
deletes the next-startup configuration files.
To enhance system security, disable password recovery capability.
Table 14 summarizes options whose availability varies with the password recovery capability setting.
Table 14 BootWare options and password recovery capability compatibility matrix
BootWare menu
option

Password
recovery
enabled

Password
recovery
disabled

Tasks that can be performed

Download Image
Program To SDRAM
And Run

Yes

No

Load and run Comware software images in
SDRAM.

46

Skip Authentication for
Console Login

Yes

No

Enable console login without authentication.

Skip Current System
Configuration

Yes

No

Load the factory-default configuration without
deleting the next-startup configuration files.

Restore to Factory
Default Configuration

No

Yes

Delete the next-startup configuration files and
load the factory-default configuration.

To disable password recovery capability:
Step

Command

Remarks

1.

Enter system view.

system-view

N/A

2.

Disable password recovery
capability.

undo password-recovery enable

By default, password
recovery capability is
enabled.

When password recovery capability is disabled, you cannot downgrade the device software to a
version that does not support the capability through the BootWare menus. You can do so at the CLI,
but the BootWare menu password configured becomes effective again.

Handling console login password loss
CAUTION:
Handling console login password loss causes service outage.

The method for handling console login password loss depends on the password recovery capability
setting (see Figure 9).
Figure 9 Handling console login password loss
Console login password lost

Reboot the router to access
EXTENDED-BOOTWARE menu

Yes

Skip Current System
Configuration

Password recovery
capability enabled?

Skip Authentication
for Console Login

Reboot the router
Configure new passwords
in system view
Save the running configuration

47

No

Restore to Factory Default
Configuration

Examining the password recovery capability setting
1.

Reboot the router.
System is starting...
Press Ctrl+D to access BASIC-BOOTWARE MENU...
Press Ctrl+T to start heavy memory test
Booting Normal Extended BootWare........
The Extended BootWare is self-decompressing....Done.
****************************************************************************
*
*

*
HPE MSR3000 BootWare, Version 1.20

*

*
*

****************************************************************************
Copyright (c) 2010-2013 Hewlett-Packard Development Company, L.P.
Compiled Date

: May 13 2013

CPU ID

: 0x2

Memory Type

: DDR3 SDRAM

Memory Size

: 2048MB

BootWare Size

: 1024KB

Flash Size

: 8MB

cfa0 Size

: 247MB

CPLD Version

: 2.0

PCB Version

: 2.0

BootWare Validating...
Press Ctrl+B to access EXTENDED-BOOTWARE MENU...

2.

Press Ctrl + B within three seconds after the "Press Ctrl+B to access
EXTENDED-BOOTWARE MENU..." prompt message appears.

3.

Read the password recovery capability setting information displayed before the
EXTEND-BOOTWARE menu.
Password recovery capability is enabled.
Note: The current operating device is cfa0
Enter < Storage Device Operation > to select device.
======================================================
|<1> Boot System

|

|<2> Enter Serial SubMenu

|

|<3> Enter Ethernet SubMenu

|

|<4> File Control

|

|<5> Restore to Factory Default Configuration

|

|<6> Skip Current System Configuration

|

|<7> BootWare Operation Menu

|

|<8> Skip Authentication for Console Login

|

|<9> Storage Device Operation

|

|<0> Reboot

|

48

============================================================================
Ctrl+Z: Access EXTEND ASSISTANT MENU
Ctrl+F: Format File System
Enter your choice(0-9):

Using the Skip Current System Configuration option
1.

Reboot the router to access the EXTEND-BOOTWARE menu, and then enter 6.
The current mode is password recovery.
Note: The current operating device is cfa0
Enter < Storage Device Operation > to select device.
======================================================
|<1> Boot System

|

|<2> Enter Serial SubMenu

|

|<3> Enter Ethernet SubMenu

|

|<4> File Control

|

|<5> Restore to Factory Default Configuration

|

|<6> Skip Current System Configuration

|

|<7> BootWare Operation Menu

|

|<8> Skip Authentication for Console Login

|

|<9> Storage Device Operation

|

|<0> Reboot

|

============================================================================
Ctrl+Z: Access EXTEND ASSISTANT MENU
Ctrl+F: Format File System
Enter your choice(0-9): 6

After the configuration skipping flag is set successfully, the following message appears:
Flag Set Success.

2.

When the EXTEND-BOOTWARE menu appears again, enter 1 to reboot the router.
The router starts up with the factory-default configuration without deleting the next-startup
configuration files.

3.

To use the configuration in a next-startup configuration file, load the file in system view.
 system-view
[HPE] configuration replace file cfa0:/startup.cfg
Current configuration will be lost, save current configuration? [Y/N]:n
Info: Now replacing the current configuration. Please wait...
Info: Succeeded in replacing current configuration with the file startup.cfg.

4.

Configure a new console login authentication mode and a new console login password.
In the following example, the console login authentication mode is password and the
authentication password is 123456. For security purposes, the password is always saved in
ciphertext, whether you specify the simple or cipher keyword for the set authentication
password command.
 system-view
[HPE] line aux 0
[HPE-line-aux0] authentication-mode password
[HPE-line-aux0] set authentication password simple 123456

49

Use the line aux 0 command on an MSR2000 or MSR 3000 routers. The console port and the
AUX port are the same physical port.
Use the line console 0 command on an MSR4000 routers. An MSR4000 router has a separate
console port.
5.

To make the settings take effect after a reboot, save the running configuration to the
next-startup configuration file.
[HPE-line-aux0] save

Using the Skip Authentication for Console Login option
1.

Reboot the router to access the EXTEND-BOOTWARE menu, and then enter 8.
The current mode is password recovery.
Note: The current operating device is cfa0
Enter < Storage Device Operation > to select device.
======================================================
|<1> Boot System

|

|<2> Enter Serial SubMenu

|

|<3> Enter Ethernet SubMenu

|

|<4> File Control

|

|<5> Restore to Factory Default Configuration

|

|<6> Skip Current System Configuration

|

|<7> BootWare Operation Menu

|

|<8> Skip Authentication for Console Login

|

|<9> Storage Device Operation

|

|<0> Reboot

|

============================================================================
Ctrl+Z: Access EXTEND ASSISTANT MENU
Ctrl+F: Format File System
Enter your choice(0-9): 8

The router deletes the console login authentication configuration commands from the main
next-startup configuration file. After the operation is completed, the following message appears:
Clear Image Password Success!

2.

When the EXTEND-BOOTWARE menu appears again, enter 1 to reboot the router.
The router starts up with the main next-startup configuration file.

3.

Configure a console login authentication mode and a new console login password. See
"Configure a new console login authentication mode and a new console login
password.Configure a new console login authentication mode and a new console login
password."

4.

To make the setting take effect after a reboot, save the running configuration to the next-startup
configuration file.
[HPE-line-aux0] save

Using the Restore to Factory Default Configuration option
CAUTION:
Using the Restore to Factory Default Configuration option deletes both the main and backup
next-configuration files.
50

1.

Reboot the router to access the EXTEND-BOOTWARE menu, and enter 5.
The current mode is no password recovery.
Note: The current operating device is cfa0
Enter < Storage Device Operation > to select device.
======================================================
|<1> Boot System

|

|<2> Enter Serial SubMenu

|

|<3> Enter Ethernet SubMenu

|

|<4> File Control

|

|<5> Restore to Factory Default Configuration

|

|<6> Skip Current System Configuration

|

|<7> BootWare Operation Menu

|

|<8> Skip Authentication for Console Login

|

|<9> Storage Device Operation

|

|<0> Reboot

|

============================================================================
Ctrl+Z: Access EXTEND ASSISTANT MENU
Ctrl+F: Format File System
Enter your choice(0-9): 5

2.

At the prompt for confirmation, enter Y.
The router deletes its main and backup next-startup configuration files and restores the
factory-default configuration.
The current mode is no password recovery. The configuration files will be
deleted, and the system will start up with factory defaults, Are you sure to
continue?[Y/N]Y
Setting...Done.

3.

When the EXTEND-BOOTWARE menu appears again, enter 1 to reboot the router.
The router starts up with the factory-default configuration.

4.

Configure a new console login authentication mode and a new console login password. See
"Configure a new console login authentication mode and a new console login
password.Configure a new console login authentication mode and a new console login
password.".

5.

To make the settings take effect after a reboot, save the running configuration to the
next-startup configuration file.
[HPE] save

51

HPE
MSR954_MSR954P_MSR958-CMW710-R4
11 Release Notes
Software Feature Changes

The information in this document is subject to change without notice.
© Copyright [First Year] 2015, [Current Year] 2016 Hewlett Packard Enterprise Development LP

1

Contents
Release 0411 ················································································10
Release 0410 ················································································10
New feature: Support of multicast for ADVPN ·······································13
Configuring support of multicast for ADVPN ····················································································13
Command reference ···················································································································13

New feature: Application layer state filtering ·········································13
Configuring application layer state filtering ······················································································13
Command reference ···················································································································14

New feature: SIP keepalive ······························································14
Configuring SIP keepalive ············································································································14
Command reference ···················································································································14
New command: options-ping ·································································································14
New command: voice-class sip options-ping ·············································································15

New feature: Multicast fast forwarding ················································16
Configuring multicast fast forwarding ·····························································································16
Command reference ···················································································································16
New command: display multicast fast-forwarding cache······························································16
New command: reset multicast fast-forwarding cache ································································17
New command: display ipv6 multicast fast-forwarding cache ·······················································18
New command: reset ipv6 multicast fast-forwarding cache ··························································20

New feature: Attack defense policy application to a security zone ·············21
Applying an attack defense policy to a security zone ·········································································21
Command reference ···················································································································21

New feature: AAA support for IKE extended authentication ·····················22
Configuring IKE extended authentication ························································································22
Command reference ···················································································································22

New feature: Percentage-based CAR ·················································22
Configuring percentage-based CAR ······························································································22
Command reference ···················································································································22

New feature: Logging OSPF router ID conflict events ·····························23
Logging OSPF router ID conflict events ··························································································23
Command reference ···················································································································23

New feature: AFT ···········································································23
Configuring AFT ························································································································23
Command reference ···················································································································23

New feature: Configuring enhanced CC authentication in FIPS mode ········24
Configuring enhanced CC authentication in FIPS mode ····································································24
Command reference ···················································································································24

New feature: Support of AAA for NETCONF ········································24
Configuring support of AAA for NETCONF ······················································································24
Command reference ···················································································································25

New feature: Mobile IP tunnel interface settings ····································25
Configuring the mobile IP tunnel interface settings ···········································································25
Command reference ···················································································································25
i

New feature: LISP ··········································································26
Configuring LISP························································································································26
Command reference ···················································································································26

New feature: LISP tunnel entries and dynamic mobility···························26
Configuring LISP tunnel entries and dynamic mobility ·······································································26
Command reference ···················································································································26

New feature: Support of IPv6 multicast routing for VPN instances ·············27
Enabling support of IP multicast routing for VPN instances ································································27
Command reference ···················································································································27

New feature: LISP virtual machine multi-hop mobility and DDT ················27
Configuring LISP virtual machine multi-hop mobility and DDT ·····························································27
Command reference ···················································································································27

New feature: LISP NSR ···································································28
Configuring LISP NSR ················································································································28
Command reference ···················································································································28

New feature: PPPoE client support for IPv6 ·········································28
Associating a dial rule with a dialup interface ···················································································28
Command reference ···················································································································28
Specifying an IPv6 prefix for an interface to automatically generate an IPv6 global unicast address ···········29
Command reference ···················································································································29

New feature: DPI engine and content filtering ·······································29
Configuring the DPI engine and content filtering ···············································································29
Command reference ···················································································································29

New feature: IPS ············································································29
Configuring IPS ·························································································································29
Command reference ···················································································································29

New feature: NBAR ········································································30
Configuring NBAR ······················································································································30
Command reference ···················································································································30

New feature: URL filtering ································································30
Configuring URL filtering ·············································································································30
Command reference ···················································································································31

New feature: Local portal Web server ·················································31
Configuring a local portal Web server·····························································································31
Command reference ···················································································································31

New feature: Support of portal for NETCONF ·······································31
New feature: Newly-added MIB objects ···············································31
New feature: IPS, ACG, and SSL VPN licenses ····································32
New feature: Support of NQA for NETCONF ········································32
New feature: Configuring CWMP to support VPN ··································32
Configuring CWMP to support VPN ·······························································································32
Command reference ···················································································································32

New feature: Transceiver module source alarm ····································32
Disabling transceiver module source alarm ·····················································································32
Command reference ···················································································································33
ii

transceiver phony-alarm-disable·····························································································33

New feature: VLAN interface performance optimization ··························33
New feature: NAT support for multicast source address in PIM join/prune
packets ························································································33
New feature: GDOI GM group anti-replay window ·································33
Configuring the anti-replay window for a GDOI GM group ··································································33
Command reference ···················································································································34
client anti-replay window ·······································································································34

New feature: SIP compatibility ··························································35
Configuring SIP compatibility ········································································································35
Command reference ···················································································································35
New command:sip-compatible ·······························································································35

New feature: Voice VLAN ································································36
Configuring a voice VLAN ············································································································36
Configuring a port to operate in automatic voice VLAN assignment mode ······································36
Configuring a port to operate in manual voice VLAN assignment mode ·········································37
Enabling LLDP for automatic IP phone discovery ······································································38
Configuring LLDP to advertise a voice VLAN ············································································39
Configuring CDP to advertise a voice VLAN ·············································································39
Displaying and maintaining voice VLANs ·················································································39
Command reference ···················································································································40

New feature: L2TP-based EAD ·························································40
Enabling L2TP-based EAD ··········································································································40
Command reference ···················································································································41
ppp access-control enable ····································································································41
display ppp access-control interface ·······················································································41

New feature: BFD for an aggregation group ·········································43
Enabling BFD for an aggregation group ··························································································43
Command reference ···················································································································44
link-aggregation bfd ipv4 ·······································································································44

New feature: 4G modem IMSI/SN binding authentication ························45
Command reference ···················································································································45
apn ···································································································································45
apn-profile··························································································································46
apn-profile apply ·················································································································47
attach-format ······················································································································47
authentication-mode ············································································································48

New feature: Media Stream Control (MSC) logging································49
Command reference ···················································································································49
New command: sip log enable ·······························································································49

New feature: IMSI/SN binding authentication········································50
Command reference ···················································································································50
ppp lcp imsi accept ··············································································································50
ppp lcp imsi request ·············································································································51
ppp lcp imsi string················································································································51
ppp lcp sn accept ················································································································52
ppp lcp sn request ···············································································································52
ppp lcp sn string ··················································································································53
ppp user accept-format imsi-sn split ························································································53
ppp user attach-format imsi-sn split·························································································54
ppp user replace ·················································································································55
iii

New feature: Specifying a band for a 4G modem ··································55
Command reference ···················································································································56
lte band ·····························································································································56

New feature: Using tunnel interfaces as OpenFlow ports ························56
New feature: NETCONF support for ACL filtering ··································57
Command reference ···················································································································57
netconf soap http acl ············································································································57
netconf soap https acl ··········································································································58

New feature: WAAS ········································································59
Configuring WAAS ·····················································································································59
Command reference ···················································································································59

New feature: Support for the MKI field in SRTP or SRTCP packets ···········59
Command reference ···················································································································59
New command: mki ·············································································································59

New feature: SIP domain name ·························································60
Command reference ···················································································································60
New command: sip-domain ···································································································60

New feature: Setting the maximum size of advertisement files ·················61
New feature: Support of VCF for NETCONF ········································61
New feature: Support of SNMP for NETCONF ······································61
New feature: Support of file system for NETCONF ································61
New feature: Support of PoE for NETCONF ·········································61
New feature: Support of RMON for NETCONF ·····································62
New feature: Support of policy-based routing for NETCONF ····················62
New feature: Support of BGP for NETCONF ········································62
New feature: Support of OSPF for NETCONF ······································62
New feature: Support of ping for NETCONF ·········································62
New feature: Support of tracert for NETCONF ······································62
New feature: Support of L2VPN for NETCONF ·····································63
New feature: SIP support for VRF ······················································63
Configuring SIP support for VRF ···································································································63
Command reference ···················································································································63

New feature: IKEv2 ·········································································63
Configuring IKEv2 ······················································································································63
Command reference ···················································································································63

New feature: Specifying an IKEv2 profile for an IPsec policy ····················64
Specifying an IKEv2 profile for an IPsec policy·················································································64
Command reference ···················································································································64

New feature: Bidirectional BFD control detection for RIP·························64
Configuring bidirectional BFD control detection for RIP ·····································································64
iv

Command reference ···················································································································64

New feature: OSPF router ID autoconfiguration ····································65
Automatically obtaining an OSPF router ID ·····················································································65
Command reference ···················································································································65

New feature: Associating a static route with a track entry ························65
Associating a static route with a track entry ·····················································································65
Command reference ···················································································································65

New feature: VLAN tag processing rule for incoming traffic ·····················66
Configuring the VLAN tag processing rule for incoming traffic ·····························································66
Command reference ···················································································································66

New feature: IP-based portal-free rule ················································66
Configuring an IP-based portal free-rule ·························································································66
Command reference ···················································································································66

New feature: Portal redirect packet statistics ········································66
Displaying/maintaining portal redirect packet statistics ······································································66
Command reference ···················································································································67

New feature: GDVPN ······································································67
Configuring GDVPN ···················································································································67
Command reference ···················································································································67

New feature: OpenFlow instance ·······················································67
Configuring the OpenFlow instance mode ·······················································································67
Command reference ···················································································································67
Binding an OpenFlow instance to ports ··························································································67
Command reference ···················································································································68
Binding an port to an OpenFlow instance ························································································68
Command reference ···················································································································68

New feature: Enabling the Extended Sequence Number (ESN) feature for an
IPsec transform set ·········································································68
Enabling ESN for an IPsec transform set ························································································68
Command reference ···················································································································68

New feature: Enabling Traffic Flow Confidentiality (TFC) padding for an IPsec
policy ···························································································69
Enabling TFC padding for an IPsec policy ·······················································································69
Command reference ···················································································································69

New feature: SIP session refresh ·······················································69
Enabling SIP session refresh········································································································69
Command reference ···················································································································69
New command: voice-class sip session refresh ·········································································69

Modified feature: User profile ····························································70
Feature change description ··········································································································70

Modified feature: Tunnel interface support for IPsec and VXLAN tunnel modes
··································································································70
1.
2.

Feature change description ···································································································70
Command changes ·············································································································71
1. Modified command: interface tunnel ·················································································71

Modified feature: PKI certificate auto-renewal ·······································71
Feature change description ··········································································································71
v

Command changes ····················································································································71
Modified command: certificate request mode ············································································71
New command: display pki certificate renew-status····································································72

Modified feature: Configuring the PKI entity DN ····································74
Feature change description ··········································································································74
Command changes ····················································································································74
New command: subject-dn ····································································································74

Modified feature: ADVPN ·································································75
Feature change description ··········································································································75
Command changes ····················································································································75
New command: advpn group ·································································································75
2. New command: advpn map group ···················································································76

Modified feature: Telnet redirect ························································77
Feature change description ··········································································································77

Modified feature: DHCP snooping performance optimization ···················77
Feature change description ··········································································································77

Modified feature: OSPF performance optimization ·································78
Feature change description ··········································································································78
Command changes ····················································································································78
Modified command: spf-schedule-interval ················································································78
Modified command: transmit-pacing ························································································78

Modified feature: IP performance optimization ······································79
Feature change description ··········································································································79
Command changes ····················································································································79
New command: tcp mac-record enable····················································································79
New command: tcp mac-record local ······················································································80

Modified feature: AAA ·····································································80
Feature change description ··········································································································80
Command changes ····················································································································81
New command: authorization ike ····························································································81

Modified feature: Configuring a cellular interface for a 3G/4G modem ········82
Feature change description ··········································································································82
Command changes ····················································································································82
New command: rssi ·············································································································82

Modified feature: QoS on VXLAN tunnel interfaces ································83
Feature change description ··········································································································83
Command changes ····················································································································83

Modified feature: Option 60 encapsulation in DHCP replies ·····················83
Feature change description ··········································································································83

Modified feature: MPLS QoS support for matching the EXP field ··············84
Feature change description ··········································································································84
Command changes ····················································································································84
New command: if-match second-mpls-exp ···············································································84

Modified feature: MPLS QoS support for marking the EXP field ················85
Feature change description ··········································································································85
Command changes ····················································································································85
New command: remark second-mpls-exp ················································································85

Modified feature: Automatic configuration ············································86
Feature change description ··········································································································86
vi

Modified feature: User profile ····························································86
Feature change description ··········································································································86
Command change ······················································································································86
Modified command: user-profile ·····························································································86

Modified feature: Default size of the TCP receive and send buffer ············87
Feature change description ··········································································································87
Command changes ····················································································································87
Modified command: tcp window ·····························································································87

Modified feature: Support for per-packet load sharing ····························87
Feature change description ··········································································································87
Command changes ····················································································································88
Modified command: ip load-sharing mode ················································································88

Modified feature: Default user role ·····················································88
Feature change description ··········································································································88
Command changes ····················································································································89
Modified command: role default-role enable ·············································································89

Modified feature: Debugging ·····························································89
Feature change description ··········································································································89
Command changes ····················································································································89
Modified command: debugging ······························································································89

Modified feature: SSH username ·······················································90
Feature change description ··········································································································90
Command changes ····················································································································90
Modified command: ssh user ·································································································90

Modified feature: IS-IS hello packet sending interval ······························91
Feature change description ··········································································································91
Command changes ····················································································································91
Modified command: isis timer hello ·························································································91

Modified feature: 802.1X redirect URL ················································91
Feature change description ··········································································································91
Command changes ····················································································································92
Modified command: dot1x ead-assistant url ··············································································92

Modified feature: Displaying information about NTP servers from the reference
source to the primary NTP server ······················································92
Feature change description ··········································································································92
Command changes ····················································································································92
Modified command: display ntp-service trace ············································································92

Modified feature: Saving, rolling back, and loading the configuration ·········93
Modified feature: Displaying information about SSH users ······················93
Feature change description ··········································································································93
Command changes ····················································································································93
Modified command: display ssh user-information·······································································93

Modified feature: SIP trusted nodes····················································94
Configuring SIP trusted nodes ······································································································94
Command changes ····················································································································94
New command: display voice ip address trusted list ···································································94
New command: ip address trusted authenticate ········································································95

vii

Modified feature: IPsec ESP encryption algorithms ································96
Feature change description ··········································································································96
Command changes ····················································································································96

Modified feature: IPsec ESP authentication algorithms ···························97
Feature change description ··········································································································97
Command changes ····················································································································97

Modified feature: IPsec AH authentication algorithms ·····························98
Feature change description ··········································································································98
Command changes ····················································································································98

Modified feature: Specifying an encryption algorithm for an IKE proposal ···98
Feature change description ··········································································································98
Command changes ····················································································································99

Modified feature: Specifying an authentication algorithm for an IKE proposal
··································································································99
Feature change description ··········································································································99
Command changes ····················································································································99

Modified feature: Generating asymmetric key pairs ······························100
Feature change description ········································································································100
Command changes ··················································································································100

Modified feature: Specifying an ECDSA key pair for certificate request ····100
Feature change description ········································································································100
Command changes ··················································································································100

Modified feature: QoS MIB ·····························································101
Feature change description ········································································································101

Modified feature: Enabling PFS for an IPsec transform set ····················101
Feature change description ········································································································101
Command changes ··················································································································101

Modified feature: Displaying track entry infomration ·····························101
Feature change description ········································································································101
Command changes ··················································································································102
Modified command: display track ··························································································102

Removed feature: Tiny proxy ··························································102
Feature change description ········································································································102
Removed command ·················································································································102
http-proxy ························································································································102

Removed feature: Displaying switching fabric channel usage ················103
Feature change description ········································································································103
Removed command ·················································································································103
display fabric utilization·······································································································103

Release 0408P05·········································································103
New feature: BGP trap support for VRF information ·····························103
New feature: SSH redirect ······························································104
Configuring SSH redirect ···········································································································104
About SSH redirect ············································································································104
Restrictions and guidelines··································································································104
Prerequisites ····················································································································104
viii

Procedure ························································································································105
Command reference ·················································································································106
Modified command: display ssh server ··················································································106
New command: ssh ip alias ·································································································107
New command: ssh redirect disconnect ·················································································108
New command: ssh redirect enable ······················································································109
New command: ssh redirect listen-port ··················································································109
New command: ssh redirect timeout ·····················································································110

Release 0407 ··············································································111
ESS 0404P06··············································································111
ESS 0403 ···················································································111

ix

Release 0411
None.

Release 0410
This release has the following changes:
New feature: Support of multicast for ADVPN
New feature: Application layer state filtering
New feature: SIP keepalive
New feature: Multicast fast forwarding
New feature: Attack defense policy application to a security zone
New feature: AAA support for IKE extended authentication
New feature: Percentage-based CAR
New feature: Logging OSPF router ID conflict events
New feature: AFT
New feature: Configuring enhanced CC authentication in FIPS mode
New feature: Support of AAA for NETCONF
New feature: Mobile IP tunnel interface settings
New feature: LISP
New feature: LISP tunnel entries and dynamic mobility
New feature: Support of IPv6 multicast routing for VPN instances
New feature: LISP virtual machine multi-hop mobility and DDT
New feature: LISP NSR
New feature: PPPoE client support for IPv6
New feature: DPI engine and content filtering
New feature: IPS
New feature: NBAR
New feature: URL filtering
New feature: Local portal Web server
New feature: Support of portal for NETCONF
New feature: Newly-added MIB objects
New feature: IPS, ACG, and SSL VPN licenses
New feature: Support of NQA for NETCONF
New feature: Configuring CWMP to support VPN
New feature: Transceiver module source alarm
New feature: VLAN interface performance optimization
New feature: NAT support for multicast source address in PIM join/prune packets
10

New feature: GDOI GM group anti-replay window
New feature: SIP compatibility
New feature: Voice VLAN
New feature: L2TP-based EAD
New feature: BFD for an aggregation group
New feature: 4G modem IMSI/SN binding authentication
New feature: Media Stream Control (MSC) logging
New feature: IMSI/SN binding authentication
New feature: Specifying a band for a 4G modem
New feature: Using tunnel interfaces as OpenFlow ports
New feature: NETCONF support for ACL filtering
New feature: WAAS
New feature: Support for the MKI field in SRTP or SRTCP packets
New feature: SIP domain name
New feature: Setting the maximum size of advertisement files
New feature: Support of VCF for NETCONF
New feature: Support of SNMP for NETCONF
New feature: Support of file system for NETCONF
New feature: Support of PoE for NETCONF
New feature: Support of RMON for NETCONF
New feature: Support of policy-based routing for NETCONF
New feature: Support of BGP for NETCONF
New feature: Support of OSPF for NETCONF
New feature: Support of ping for NETCONF
New feature: Support of tracert for NETCONF
New feature: Support of L2VPN for NETCONF
New feature: SIP support for VRF
New feature: IKEv2
New feature: Specifying an IKEv2 profile for an IPsec policy
New feature: Bidirectional BFD control detection for RIP
New feature: OSPF router ID autoconfiguration
New feature: Associating a static route with a track entry
New feature: VLAN tag processing rule for incoming traffic
New feature: IP-based portal-free rule
New feature: Portal redirect packet statistics
New feature: GDVPN
New feature: OpenFlow instance
New feature: Enabling the Extended Sequence Number (ESN) feature for an IPsec transform set
New feature: Enabling Traffic Flow Confidentiality (TFC) padding for an IPsec policy
11

New feature: SIP session refresh
Modified feature: User profile
Modified feature: Tunnel interface support for IPsec and VXLAN tunnel modes
Modified feature: PKI certificate auto-renewal
Modified feature: Configuring the PKI entity DN
Modified feature: ADVPN
Modified feature: Telnet redirect
Modified feature: DHCP snooping performance optimization
Modified feature: OSPF performance optimization
Modified feature: IP performance optimization
Modified feature: AAA
Modified feature: Configuring a cellular interface for a 3G/4G modem
Modified feature: QoS on VXLAN tunnel interfaces
Modified feature: Option 60 encapsulation in DHCP replies
Modified feature: MPLS QoS support for matching the EXP field
Modified feature: MPLS QoS support for marking the EXP field
Modified feature: Automatic configuration
Modified feature: User profile
Modified feature: Default size of the TCP receive and send buffer
Modified feature: Support for per-packet load sharing
Modified feature: Default user role
Modified feature: Debugging
Modified feature: SSH username
Modified feature: IS-IS hello packet sending interval
Modified feature: Displaying information about NTP servers from the reference source to the primary
NTP server
Modified feature: Saving, rolling back, and loading the configuration
Modified feature: Displaying information about SSH users
Modified feature: SIP trusted nodes
Modified feature: IPsec ESP encryption algorithms
Modified feature: IPsec ESP authentication algorithms
Modified feature: IPsec AH authentication algorithms
Modified feature: Specifying an encryption algorithm for an IKE proposal
Modified feature: Specifying an authentication algorithm for an IKE proposal
Modified feature: Generating asymmetric key pairs
Modified feature: Specifying an ECDSA key pair for certificate request
Modified feature: QoS MIB
Modified feature: Enabling PFS for an IPsec transform set
Modified feature: Displaying track entry infomration
12

Removed feature: Tiny proxy
Removed feature: Displaying switching fabric channel usage

New feature: Support of multicast for
ADVPN
Configuring support of multicast for ADVPN
For information about this feature, see IPv4/IPv6 PIM and IPv4/IPv6 multicast routing and forwarding
in H3C MSR Router Series Comware 7 IP Multicast Configuration Guide.

Command reference
The following commands were added:


display ipv6 pim nbma-link.



display pim nbma-link.



ipv6 pim nbma-mode.



pim nbma-mode.

ADVPN multicast parameters were added to the following commands:


display ipv6 multicast forwarding df-info.



display ipv6 multicast forwarding-table.



display ipv6 multicast routing-table.



display ipv6 pim df-info.



display ipv6 pim routing-table.



display multicast forwarding df-info.



display multicast forwarding-table.



display multicast routing-table.



display pim df-info.



display pim routing-table.

For information about the commands, see IPv4/IPv6 PIM and IPv4/IPv6 multicast routing and
forwarding commands in H3C MSR Router Series Comware 7 IP Multicast Command Reference.

New feature: Application layer state
filtering
Configuring application layer state filtering
For information about this feature, see ASPF in H3C MSR Router Series Comware 7 Security
Configuration Guide.

13

Command reference
The following keywords were added to the detect command:


dns.



http.



smtp.



action.



drop.

The fields that indicate application layer status were added to the output from the display aspf
policy command.
For information about the commands, see ASPF in H3C MSR Router Series Comware 7 Security
Command Reference.

New feature: SIP keepalive
Configuring SIP keepalive
You can configure in-dialog keepalive and out-of-dialog keepalive.

Command reference
New command: options-ping
Use options-ping to globally enable in-dialog keepalive.
Use undo options-ping to globally disable in-dialog keepalive.

Syntax
options-ping seconds
undo options-ping

Default
In-dialog keepalive is disabled globally.

View
SIP view

Predefined use roles
network-admin

Parameters
seconds: Specifies the global interval for sending OPTIONS messages during a session, in the
range of 60 to 1200 seconds.

Usage guidelines
This command enables the device to periodically send OPTIONS messages at the specified interval
to monitor the status of the remote SIP UA during a session. It does not take effect when the session
refresh negotiation succeeds before a call is established.

14

If you disable this feature, the device does not send OPTIONS messages after a call is established.

Example
# Globally enable in-dialog keepalive and set the interval to 60 seconds for sending OPTIONS
messages during a session.
 system-view
[Sysname] voice-setup
[Sysname-voice] sip
[Sysname-voice-sip] options-ping 60

New command: voice-class sip options-ping
Use voice-class sip options-ping to enable in-dialog keepalive for a VoIP entity.
Use voice-class sip options-ping to disable in-dialog keepalive for a VoIP entity.

Syntax
voice-class sip options-ping { global | seconds }
undo voice-class sip options-ping

Default
A VoIP entity uses the global configuration for in-dialog keepalive.

Views
VoIP entity view

Predefined user roles
network-admin

Parameters
global: Applies the global configuration for in-dialog keepalive to the VoIP entity.
seconds: Specifies the interval for sending OPTIONS messages during a session, in the range of 60
to 1200 seconds.

Usage guidelines
For a VoIP entity, the entity-specific in-dialog keepalive interval takes priority over the global in-dialog
keepalive interval set in SIP view.

Examples
# Enable in-dialog keepalive for VoIP entity 1 and set the interval to 60 seconds for sending
OPTIONS messages during a session.
 system-view
[Sysname] voice-setup
[Sysname-voice] dial-program
[Sysname-voice-dial] entity 1 voip
[Sysname-voice-dial-entity1] voice-class sip options-ping 60

# Apply the global configuration for in-dialog keepalive to VoIP entity 1.
 system-view
[Sysname] voice-setup
[Sysname-voice] dial-program
[Sysname-voice-dial] entity 1 voip
[Sysname-voice-dial-entity1] voice-class sip options-ping global

15

New feature: Multicast fast forwarding
Configuring multicast fast forwarding
In this release, the router supports multicast fast forwarding.

Command reference
New command: display multicast fast-forwarding cache
Use display multicast fast-forwarding cache to display information about multicast fast
forwarding entries.

Syntax
Centralized devices:
display multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache [ source-address |
group-address ] *
Distributed devices in standalone mode:Centralized IRF devices:
display multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache [ source-address |
group-address ] * [ slot slot-number ]
Distributed devices in IRF mode:
display multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache [ source-address |
group-address ] * [ chassis chassis-number slot slot-number ]

Views
Any view

Predefined user roles
network-admin
network-operator

Parameters
vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a
case-sensitive string of 1 to 31 characters. If you do not specify a VPN instance, this command
displays multicast fast forwarding entries on the public network.
source-address: Specifies a multicast source address.
group-address: Specifies a multicast group address in the range of 224.0.1.0 to 239.255.255.255.
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command
displays multicast fast forwarding entries for the MPU. (Distributed devices in standalone mode.)
slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member
device, this command displays multicast fast forwarding entries for the master device. (Centralized
IRF devices.)
chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The
chassis-number argument represents the member ID of the IRF member device. The slot-number
argument represents the slot number of the card. If you do not specify a card, this command displays
multicast fast forwarding entries for the global active MPU. (Distributed devices in IRF mode.)

16

Examples
# Display multicast fast forwarding entries on the public network.
 display multicast fast-forwarding cache
Total 1 entries, 1 matched
(60.1.1.200, 225.0.0.2)
Status : Enabled
Source port: 2001 Destination port: 2002
Protocol : 2 Flag : 0x2
Incoming interface: GigabitEthernet1/0/3
List of 1 outgoing interfaces:
GigabitEthernet1/0/2
Status: Enabled Flag: 0x14

Table 1 Command output
Field

Description

Total 1 entries, 1 matched

Total number of (S, G) entries in the multicast fast forwarding table, and
the total number of matching (S, G) entries.

(60.1.1.200, 225.0.0.2)

(S, G) entry.

Protocol

Protocol number.
Flag of the (S, G) entry or the outgoing interface in the entry.
This field displays one flag or the sum of multiple flags. In this example,
the value 0x2 means that the entry has only one flag 0x2. The value
0x14 means that the interface has flags 0x4 and 0x10.
The following flags are available for an entry:
 0x1—The entry is created because of packets passed through
between cards.
 0x2—The entry is added by multicast forwarding.

Flag

The following flags are available for an outgoing interface:
 0x1—The interface is added to the entry because of packets
passed through between cards.
 0x2—The interface is added to an existing entry.
 0x4—The MAC address of the interface is needed for fast
forwarding.
 0x8—The interface is an outgoing interface associated with the
incoming VLAN or super VLAN interface.
 0x10—The interface is associated with the entry.
 0x20—The interface is to be deleted.

Status

Status of the (S, G) entry or the outgoing interface:
 Enabled—Available.
 Disabled—Unavailable.

Incoming interface

Incoming interface of the (S, G) entry.

List of 1 outgoing interfaces

Outgoing interface list of the (S, G) entry.

New command: reset multicast fast-forwarding cache
Use reset multicast fast-forwarding cache to clear multicast fast forwarding entries.

Syntax
Centralized devices:
17

reset multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache { { source-address |
group-address } * | all }
Distributed devices in standalone mode:Centralized IRF devices:
reset multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache { { source-address |
group-address } * | all } [ slot slot-number ]
Distributed devices in IRF mode:
reset multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache { { source-address |
group-address } * | all } [ chassis chassis-number slot slot-number ]

Views
User view

Predefined user roles
network-admin

Parameters
vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a
case-sensitive string of 1 to 31 characters. If you do not specify a VPN instance, this command
clears multicast fast forwarding entries on the public network.
source-address: Specifies a multicast source address.
group-address: Specifies a multicast group address in the range of 224.0.1.0 to 239.255.255.255.
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command
clears multicast fast forwarding entries for the MPU. (Distributed devices in standalone mode.)
slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member
device, this command clears multicast fast forwarding entries for the master device. (Centralized IRF
devices.)
chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The
chassis-number argument represents the member ID of the IRF member device. The slot-number
argument represents the slot number of the card. If you do not specify a card, this command clears
multicast fast forwarding entries for the global active MPU. (Distributed devices in IRF mode.)

Examples
# Clear all multicast fast forwarding entries on the public network.
 reset multicast fast-forwarding cache all

# Clear the multicast fast forwarding entry for multicast source and group (20.0.0.2, 225.0.0.2) on the
public network.
 reset multicast fast-forwarding cache 20.0.0.2 225.0.0.2

New command: display ipv6 multicast fast-forwarding cache
Use display ipv6 multicast fast-forwarding cache to display information about IPv6 multicast fast
forwarding entries.

Syntax
Centralized devices:
display ipv6 multicast [ vpn-instance
[ ipv6-source-address | ipv6-group-address ] *

vpn-instance-name

]

fast-forwarding

cache

]

fast-forwarding

cache

Distributed devices in standalone mode:Centralized IRF devices:
display ipv6 multicast [ vpn-instance vpn-instance-name
[ ipv6-source-address | ipv6-group-address ] * [ slot slot-number ]
18

Distributed devices in IRF mode:
display ipv6 multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache
[ ipv6-source-address | ipv6-group-address ] * [ chassis chassis-number slot slot-number ]

Views
Any view

Predefined user roles
network-admin
network-operator

Parameters
vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a
case-sensitive string of 1 to 31 characters. If you do not specify a VPN instance, this command
displays IPv6 multicast fast forwarding entries on the public network.
ipv6-source-address: Specifies an IPv6 multicast source address.
ipv6-group-address: Specifies an IPv6 multicast group address. The value range for this argument is
FFxy::/16 (excluding FFx1::/16 and FFx2::/16), where "x" and "y" represent any hexadecimal
numbers from 0 to F.
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command
displays IPv6 multicast fast forwarding entries for the MPU. (Distributed devices in standalone
mode.)
slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member
device, this command displays IPv6 multicast fast forwarding entries for the master device.
(Centralized IRF devices.)
chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The
chassis-number argument represents the member ID of the IRF member device. The slot-number
argument represents the slot number of the card. If you do not specify a card, this command displays
IPv6 multicast fast forwarding entries for the global active MPU. (Distributed devices in IRF mode.)

Examples
# Display IPv6 multicast fast forwarding entries on the public network.
 display ipv6 multicast fast-forwarding cache
Total 1 entries, 1 matched
(FE1F:60::200, FF0E::1)
Status

: Enabled

Source port: 2001

Destination port: 2002

Protocol

Flag

: 2

: 0x2

Incoming Interfacfe: GigabitEthernet1/0/3
List of 1 outgoing interfaces:
GigabitEthernet1/0/2
Status: Enabled

Flag: 0x14

Table 2 Command output
Field

Description

Total 1 entries, 1 matched

Total number of (S, G) entries in the IPv6 multicast fast forwarding
table, and the total number of matching (S, G) entries.

(FE1F:60::200, FF0E::1)

(S, G) entry.

Protocol

Protocol number.
19

Field

Description
Flag of the (S, G) entry or the outgoing interface in the entry.
This field displays one flag or the sum of multiple flags. In this example,
the value 0x2 means that the entry has only one flag 0x2. The value
0x14 means that the interface has flags 0x4 and 0x10.
The following flags are available for an entry:
 0x1—The entry is created because of packets passed through
between cards.
 0x2—The entry is added by IPv6 multicast forwarding.

Flag

The following flags are available for an outgoing interface:
 0x1—The interface is added to the entry because of packets
passed through between cards.
 0x2—The interface is added to an existing entry.
 0x4—The MAC address of the interface is needed for fast
forwarding.
 0x8—The interface is an outgoing interface associated with the
incoming VLAN or super VLAN interface.
 0x10—The interface is associated with the entry.
 0x20—The interface is to be deleted.

Status

Status of the (S, G) entry or the outgoing interface:
 Enabled—Available.
 Disabled—Unavailable.

Incoming interface

Incoming interface of the (S, G) entry.

List of 1 outgoing interfaces

Outgoing interface list of the (S, G) entry.

New command: reset ipv6 multicast fast-forwarding cache
Use reset ipv6 multicast fast-forwarding cache to clear IPv6 multicast fast forwarding entries.

Syntax
Centralized devices:
reset ipv6 multicast [ vpn-instance vpn-instance-name
{ { ipv6-source-address | ipv6-group-address } * | all }

]

fast-forwarding

cache

reset ipv6 multicast [ vpn-instance vpn-instance-name ] fast-forwarding
{ { ipv6-source-address | ipv6-group-address } * | all } [ slot slot-number ]

cache

Distributed devices in standalone mode:Centralized IRF devices:

Distributed devices in IRF mode:
reset ipv6 multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache
{ { ipv6-source-address | ipv6-group-address } * | all } [ chassis chassis-number slot slot-number ]

Views
Any view

Predefined user roles
network-admin

Parameters
vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a
case-sensitive string of 1 to 31 characters. If you do not specify a VPN instance, this command
clears IPv6 multicast fast forwarding entries on the public network.
20

ipv6-source-address: Specifies an IPv6 multicast source address.
ipv6-group-address: Specifies an IPv6 multicast group address. The value range for this argument is
FFxy::/16 (excluding FFx1::/16 and FFx2::/16), where "x" and "y" represent any hexadecimal
numbers from 0 to F.
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command
clears IPv6 multicast fast forwarding entries for the MPU. (Distributed devices in standalone mode.)
slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member
device, this command clears IPv6 multicast fast forwarding entries for the master device.
(Centralized IRF devices.)
chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The
chassis-number argument represents the member ID of the IRF member device. The slot-number
argument represents the slot number of the card. If you do not specify a card, this command clears
IPv6 multicast fast forwarding entries for the global active MPU. (Distributed devices in IRF mode.)

Examples
# Clear all IPv6 multicast fast forwarding entries on the public network
 reset ipv6 multicast fast-forwarding cache all

# Clear the IPv6 multicast fast forwarding entry for IPv6 multicast source and group (FE1F:20::2,
FF0E::1) on the public network.
 reset ipv6 multicast fast-forwarding cache fe1f:20::2 ff0e::1

New feature: Attack defense policy
application to a security zone
Applying an attack defense policy to a security
zone
To apply an attack defense policy to a security zone:
Step

Command

Remarks

3.

Enter system view.

system-view

N/A

4.

Enter security zone view.

security-zone name Trust

N/A

5.

Apply an attack defense
policy to the security zone.

attack-defense apply policy
policy-number

By default, a security zone has no
attack defense policy applied.

Command reference
The following commands were newly added:


attack-defense apply policy



blacklist enable



client-verify dns enable



client-verify http enable



client-verify tcp enable

21



display attack-defense flood statistics ip



display attack-defense flood statistics ipv6



display attack-defense scan attacker ip



display attack-defense scan attacker ipv6



display attack-defense scan attacker ipv6



display attack-defense scan victim ipv6



display attack-defense statistics security-zone



reset attack-defense statistics security-zone

For information about the commands, see attack defense commands in H3C MSR Router Series
Comware 7 Security Command Reference.

New feature: AAA support for IKE
extended authentication
Configuring IKE extended authentication
For information about this feature, see AAA configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command reference
The authentication ike command was newly added.
The ike keyword was added to the display local-user, undo local-user, service-type, and undo
service-type commands.
For information about the commands, see AAA commands in H3C MSR Router Series Comware 7
Security Command Reference.

New feature: Percentage-based CAR
Configuring percentage-based CAR
For information about this feature, see QoS in H3C MSR Router Series Comware 7 ACL and QoS
Configuration Guide.

Command reference
The percent car command was added.
For information about the command, see traffic behavior commands in H3C MSR Router Series
Comware 7 ACL and QoS Command Reference.

22

New feature: Logging OSPF router ID
conflict events
Logging OSPF router ID conflict events
For information about this feature, see OSPF configuration in H3C MSR Router Series Comware 7
Layer 3—IP Routing Configuration Guide.

Command reference
The following commands were newly added:


database-filter peer (OSPF view)



ospf database-filter



ospf ttl-security



ttl-security

For information about the commands, see OSPF commands in H3C MSR Router Series Comware 7
Layer 3—IP Routing Command Reference.

New feature: AFT
Configuring AFT
For information about this feature, see AFT in H3C MSR Router Series Comware 7 Layer 3—IP
Services Configuration Guide.

Command reference
For information about the commands, see AFT commands in H3C MSR Router Series Comware 7
Layer 3—IP Services Command Reference.

23

New feature: Configuring enhanced CC
authentication in FIPS mode
Configuring enhanced CC authentication in FIPS
mode
For information about this feature, see IPsec, SSH, SSL, and public key management in H3C MSR
Router Series Comware 7 Security Configuration Guide.

Command reference
The ecdsa keyword was added to the following commands:


scp.



scp ipv6.



sftp.



sftp ipv6.



ssh2.



ssh2 ipv6.

The dhe_rsa_aes_128_cbc_sha and dhe_rsa_aes_256_cbc_sha keywords were removed from
the ciphersuite command in FIPS mode.
The secp192r1 and secp256r1 keywords were added to the public-key local create command.
The public-key local export ecdsa command was added.
For more information about these commands, see IPsec, SSH, SSL, and public key management
commands in H3C MSR Router Series Comware 7 Security Command Reference.

New feature: Support of AAA for
NETCONF
Configuring support of AAA for NETCONF
For information about this feature, see AAA in H3C MSR Router Series Comware 7 Security
Configuration Guide.

24

Command reference
The radius session-control client command was newly added. The security-policy-server
command was deleted.
For information about the command, see AAA commands in H3C MSR Router Series Comware 7
Security Configuration Guide.

New feature: Mobile IP tunnel interface
settings
Configuring the mobile IP tunnel interface settings
Step

Command

Remarks

6.

Enter system view.

system-view

N/A

7.

Enable the mobile router
feature and enter mobile
router view.

ip mobile router

By default, the mobile router
feature is disabled.

8.

Assign a home address to
the mobile router.

address ip-address

By default, the mobile router
does not have any home
addresses.

9.

Specify the IP address of the
home agent for the mobile
router.

home-agent ip-address

By default, no home agent is
specified for the mobile
router.

10. (Optional.) Set the MTU for
the
mobile
IP
tunnel
interface.

tunnel mtu value

By default, the MTU for the
tunnel interface is 64000
bytes.

11. (Optional.) Set the DF bit to 0
for
outgoing
tunneled
packets.

ip df-bit zero

By default, the DF bit of
outgoing tunneled packets is
not set.

12. (Optional.) Apply an IPsec
policy to the mobile IP tunnel
interface.

ipsec policy policy-name

By default, no IPsec policy is
applied to the mobile IP
tunnel interface.

13. (Optional.) Set the TCP MSS
for the mobile IP tunnel
interface.

tcp mss value

By default, no TCP MSS is
set.

Command reference
The following commands were added:


ip df-bit zero



ipsec policy



tcp mss

25

For information about the commands, see NEMO commands in H3C MSR Router Series Comware 7
NEMO Command Reference.

New feature: LISP
Configuring LISP
For information about this feature, see LISP configuration in H3C MSR Router Series Comware 7
LISP Configuration Guide.

Command reference
For information about the commands, see LISP commands in H3C MSR Router Series Comware 7
LISP Command Reference.

New feature: LISP tunnel entries and
dynamic mobility
Configuring LISP tunnel entries and dynamic
mobility
For information about this feature, see LISP configuration in H3C MSR Router Series Comware 7
LISP Configuration Guide.

Command reference
For information about the commands, see LISP commands in H3C MSR Router Series Comware 7
LISP Command Reference.

26

New feature: Support of IPv6 multicast
routing for VPN instances
Enabling support of IP multicast routing for VPN
instances
For information about this feature, see IPv6 multicast routing and forwarding in H3C MSR Router
Series Comware 7 IP Multicast Configuration Guide.

Command reference
The ipv6 multicast routing vpn-instance command was added.
For information about the command, see IPv6 multicast routing and forwarding commands in H3C
MSR Router Series Comware 7 IP Multicast Command Reference.

New feature: LISP virtual machine
multi-hop mobility and DDT
Configuring LISP virtual machine multi-hop
mobility and DDT
For information about this feature, see LISP configuration in H3C MSR Router Series Comware 7
LISP Configuration Guide.

Command reference
The eid-notify command was newly added.
For information about the command, see LISP commands in H3C MSR Router Series Comware 7
LISP Command Reference.

27

New feature: LISP NSR
Configuring LISP NSR
The display system internal lisp forwarding statistics command was added. You can use the
command to display the LISP thread statistics.
The display system internal lisp nsr no-cache command was added. You can use the command
to display the tentative entries created during the NSR active/standby switchover.
The display system internal lisp nsr status command was added. You can use the command to
display the LISP NSR status.

Command reference
The following commands were newly added:


display system internal lisp forwarding statistics



display system internal lisp nsr no-cache



display system internal lisp nsr status

For information about the commands, see LISP probe commands in H3C MSR Router Series
Comware 7 Probe Command Reference.

New feature: PPPoE client support for
IPv6
Associating a dial rule with a dialup interface
For information about this feature, see DDR in H3C MSR Router Series Comware 7 Layer 2—WAN
Access Configuration Guide.

Command reference
The ipv6 keyword is added to the dialer-group rule command. For information about this command,
see DDR commands in H3C MSR Router Series Comware 7 Layer 2—WAN Access Command
Reference.

28

Specifying an IPv6 prefix for an interface to
automatically generate an IPv6 global unicast
address
For information about this feature, see IPv6 basics in H3C MSR Router Series Comware 7 Layer
3—IP Services Configuration Guide.

Command reference
The ipv6 address command is added. For information about the command, see IPv6 basics
commands in H3C MSR Router Series Comware 7 Layer 3—IP Services Command Reference.

New feature: DPI engine and content
filtering
Configuring the DPI engine and content filtering
For information about this feature, see DPI overview and DPI engine in H3C MSR Router Series
Comware 7 DPI Configuration Guide.

Command reference
For information about the commands, see DPI overview and DPI engine commands in H3C MSR
Router Series Comware 7 DPI Command Reference.

New feature: IPS
Configuring IPS
For information about this feature, see IPS configuration in H3C MSR Router Series Comware 7 DPI
Configuration Guide.

Command reference
For information about the commands, see IPS commands in H3C MSR Router Series Comware 7
DPI Command Reference.

29

New feature: NBAR
Configuring NBAR
For information about this feature, see APR in H3C MSR Router Series Comware 7 Security
Configuration Guide.

Command reference
The following new commands were added:


apr signature update.



Description.



Destination.



Direction.



Disable.



display app-group.



display application.



display apr signature information.



include app-group.



nbar application.



nbar protocol-discovery.



service-port.



signature.



source.

For information about the commands, see APR in H3C MSR Router Series Comware 7 Security
Command Reference.

New feature: URL filtering
Configuring URL filtering
For information about this feature, see URL filtering configuration in H3C MSR Router Series
Comware 7 DPI Configuration Guide.

30

Command reference
For information about the commands, see URL filtering commands in H3C MSR Router Series
Comware 7 DPI Command Reference.

New feature: Local portal Web server
Configuring a local portal Web server
For information about this feature, see portal in H3C MSR Router Series Comware 7 Security
Configuration Guide.

Command reference
The following commands were added:


portal local-web-server



default-logon-page



logon-page



tcp-port

The ssid keyword was added to the url-parameter param-name { apmac | original-url |
source-address | source-mac | ssid | value expression } command.
For information about the commands, see portal commands in H3C MSR Router Series Comware 7
Security Command Reference.

New feature: Support of portal for
NETCONF
Support for NETCONF was added to portal.

New feature: Newly-added MIB objects
Event

MIB

added

support

for

the

hh3cWirelessCardCurNetConn MIB objects.

31

hh3cWirelessCardModemMode

and

New feature: IPS, ACG, and SSL VPN
licenses
This release added support for IPS, ACG and SSL VPN licenses.

New feature: Support of NQA for
NETCONF
Support for NETCONF was added to NQA.

New feature: Configuring CWMP to
support VPN
Configuring CWMP to support VPN
For information about this feature, see CWMP configuration in H3C MSR Router Series Comware 7
Network Management and Monitoring Configuration Guide.

Command reference
For information about the commands, see CWMP commands in H3C MSR Router Series Comware
7 Network Management and Monitoring Command Reference.

New feature: Transceiver module source
alarm
Disabling transceiver module source alarm
For information about this feature, see device management in H3C MSR Router Series Comware 7
Fundamentals Configuration Guide.

32

Command reference
transceiver phony-alarm-disable
For information about this command, see device management commands in H3C MSR Router
Series Comware 7 Fundamentals Command Reference.

New feature: VLAN interface performance
optimization
This software version optimized the following items:


VLAN functions used for sending data in the adaption layer.



Processing flow of the RAW functions for sending and receiving data for chips mv88ex, mvcpss,
and bcm5614x.

New feature: NAT support for multicast
source address in PIM join/prune packets
This feature enables the device to act as a NAT gateway and perform NAT on the multicast source
address in PIM join or prune packets based on NAT mappings. Use this feature in a multicast
scenario where the multicast source resides on a private network, multicast receivers reside on
private networks, and PIM-SSM mode is used.

New feature: GDOI GM group anti-replay
window
Configuring the anti-replay window for a GDOI
GM group
Step

Command

Remarks

14. Enter system view.

system-view

N/A

15. Create a GDOI GM group
and enter GDOI GM
group view.

gdoi gm group [ ipv6 ]
group-name

By default, no GDOI GM groups
exist.

33

Step

Command

Remarks

16. (Optional.)
Set
the
anti-replay window size
for the GDOI GM group.

client anti-replay window { sec
seconds | msec milliseconds }

By default, the anti-replay window
size is not set for a GDOI GM group.

Command reference
client anti-replay window
Use client anti-replay window to set the anti-replay window size for a GDOI GM group.
Use undo client anti-replay window to restore the default.

Syntax
client anti-replay window { sec seconds | msec milliseconds }
undo client anti-replay window

Default
The anti-replay window size is not set for a GDOI GM group.

Views
GDOI GM group view

Predefined user roles
network-admin

Parameters
sec seconds: Specifies the anti-replay window size in seconds in the range of 1 to 100.
msec milliseconds: Specifies the anti-replay window size in milliseconds in the range of 100 to
10000.

Usage guidelines
The anti-replay window size set in this command takes priority over the anti-replay window size
obtained from the KS. If you do not configure this command, the anti-replay window size obtained
from the KS is used.
This command must be used together with the Cisco IP-D3P feature.

Examples
# Set the anti-replay window size to 50 seconds for GDOI GM group group1.
 system-view
[Sysname] gdoi gm group group1
[Sysname-gdoi-gm-group-group1] client anti-replay window sec 50

34

New feature: SIP compatibility
Configuring SIP compatibility
If a third-party device does not implement SIP in strict accordance with the RFC standard, you can
configure SIP compatibility for the router to interoperate with the third-party device.
With the sip-compatible t38 command configured, the router excludes :0 from the following SDP
parameters in the originated re-INVITE messages:


T38FaxTranscodingJBIG.



T38FaxTranscodingMMR.



T38FaxFillBitRemoval.

With the sip-compatible x-param command configured, the router adds SDP description
information (a=X-fax and a=X-modem) for fax pass-through and modem pass-through in the
originated re-INVITE messages.
To configure SIP compatibility:
Step

Command

Remarks

17. Enter system view.

system-view

N/A

18. Enter voice view.

voice-setup

N/A

19. Enter SIP view.

sip

N/A

20. Configure SIP compatibility.

sip-compatible { t38 | x-param }

By default, SIP compatibility
is not configured.

Command reference
New command:sip-compatible
Use sip-compatible to configure SIP compatibility with a third-party device.
Use undo sip-compatible to restore the default.

Syntax
sip-compatible { t38 | x-param }
undo sip-compatible { t38 | x-param }

Default
SIP compatibility is not configured.

Views
SIP view

35

Predefined user roles
network-admin

Parameters
t38: Configures SIP compatibility for standard T.38 fax. With this keyword specified, the router
excludes :0 from the following SDP parameters in the originated re-INVITE messages:


T38FaxTranscodingJBIG.



T38FaxTranscodingMMR.



T38FaxFillBitRemoval.

This keyword is required when the router interoperates with a third-party softswitch device to
exchange T.38 fax messages.
x-param: Configures SIP compatibility for fax pass-through and modem pass-through. With this
keyword specified, the router adds SDP description information for fax pass-through and modem
pass-through to outgoing re-INVITE messages. This keyword is required when the router
interoperates with a third-party softswitch device to perform fax pass-through and modem
pass-through.

Usage guidelines
The t38 and x-param keywords can be both configured to interoperate with a third-party softswitch
device.

Examples
# Configure SIP compatibility for standard T.38 fax.
 system-view
[Sysname] voice-setup
[Sysname-voice] sip
[Sysname-voice-sip] sip-compatible t38

New feature: Voice VLAN
Configuring a voice VLAN
Configuring a port to operate in automatic voice VLAN
assignment mode
Step

Command

Remarks

21. Enter system view.

system-view

N/A

22. (Optional.) Set the voice
VLAN aging timer.

voice-vlan aging minutes

By default, the aging timer of
a voice VLAN is 1440
minutes.

23. (Optional.) Enable the
voice
VLAN
security
mode.

voice-vlan security enable

By default, the voice VLAN
security mode is enabled.

36

Step

Command

Remarks

24. (Optional.) Add an OUI
address for voice packet
identification.

voice-vlan mac-address oui mask
oui-mask [ description text ]

By default, system default
OUI addresses exist.






25. Enter interface view.





26. Set the link type of the
port.
27. Configure the port to
operate in automatic
voice VLAN assignment
mode.



Enter Layer 2 Ethernet interface
view:
interface interface-type
interface-number
Enter Layer 2 aggregate interface
view:
interface bridge-aggregation
interface-number
Enter S-channel interface view:
interface s-channel
interface-number.channel-id
Enter S-channel aggregate interface
view:
interface schannel-aggregation
interface-number:channel-id
Enter Layer 2 RPR logical interface
view:
interface rpr-bridge
interface-number

N/A

Set the port link type to trunk:
port link-type trunk
Set the port link type to hybrid:
port link-type hybrid

N/A

voice-vlan mode auto

By default, the automatic
voice VLAN assignment
mode is enabled.
By default, the voice VLAN
feature is disabled on a port.

28. Enable the voice VLAN
feature on the port.

voice-vlan vlan-id enable

Before you execute this
command, make sure the
specified VLAN already
exists.

Configuring a port to operate in manual voice VLAN
assignment mode
Step

Command

Remarks

29. Enter system view.

system-view

N/A

30. (Optional.) Enable the
voice VLAN security
mode.

voice-vlan security enable

By default, the voice VLAN
security mode is enabled.

31. (Optional.) Add an OUI
address for voice packet
identification.

voice-vlan mac-address oui mask
oui-mask [ description text ]

By default, system default OUI
addresses exist.

37

Step

Command





32. Enter interface view.




33. Configure the port to
operate in manual voice
VLAN
assignment
mode.





35. Assign the access,
trunk, or hybrid port to
the voice VLAN.

36. (Optional.)
Configure
the voice VLAN as the
PVID of the trunk or
hybrid port.

37. Enable the voice VLAN
feature on the port.

Enter Layer 2 Ethernet interface view:
interface interface-type
interface-number
Enter Layer 2 aggregate interface
view:
interface bridge-aggregation
interface-number
Enter S-channel interface view:
interface s-channel
interface-number.channel-id
Enter S-channel aggregate interface
view:
interface schannel-aggregation
interface-number:channel-id
Enter Layer 2 RPR logical interface
view:
interface rpr-bridge
interface-number








N/A

By default, a port operates in
automatic voice VLAN
assignment mode.

undo voice-vlan mode auto


34. Set the link type of the
port.

Remarks

Set the port link type to access:
port link-type access
Set the port link type to trunk:
port link-type trunk
Set the port link type to hybrid:
port link-type hybrid

By default, each port is an
access port.

For the access port:
port access vlan vlan-id
For the trunk port:
port trunk permit vlan { vlan-id-list |
all }
For the hybrid port:
port hybrid vlan vlan-id-list { tagged |
untagged }

After you assign an access
port to the voice VLAN, the
voice VLAN becomes the
PVID of the port.

For the trunk port:
port trunk pvid vlan vlan-id
For the hybrid port:
port hybrid pvid vlan vlan-id

This step is required for
untagged incoming voice
traffic and prohibited for
tagged incoming voice traffic.
By default, the voice VLAN
feature is disabled on a port.

voice-vlan vlan-id enable

Before you execute this
command, make sure the
specified VLAN already exists.

Enabling LLDP for automatic IP phone discovery
Step

Command

Remarks

38. Enter system view.

system-view

N/A

39. Enable LLDP for automatic
IP phone discovery.

voice-vlan track lldp

By default, LLDP for automatic IP
phone discovery is disabled.

38

Configuring LLDP to advertise a voice VLAN
For IP phones that support LLDP, the device advertises the voice VLAN information to the IP phones
through LLDP-MED TLVs.
To configure LLDP to advertise a voice VLAN:
Step

Command

Remarks

40. Enter system view.

system-view

N/A

Ethernet

interface interface-type
interface-number

N/A

advertised

lldp tlv-enable med-tlv
network-policy vlan-id

By default, no advertised
voice VLAN ID is configured.

41. Enter Layer 2
interface view.
42. Configure an
voice VLAN ID.

Configuring CDP to advertise a voice VLAN
If an IP phone supports CDP but does not support LLDP, it sends CDP packets to the device to
request the voice VLAN ID. If the IP phone does not receive the voice VLAN ID within a time period,
it sends out untagged voice packets. These untagged voice packets cannot be differentiated from
other types of packets.
You can configure CDP compatibility on the device to enable it to perform the following operations:


Receive and identify CDP packets from the IP phone.



Send CDP packets to the IP phone. The voice VLAN information is carried in the CDP packets.

After receiving the advertised VLAN information, the IP phone starts automatic voice VLAN
configuration. Packets from the IP phone will be transmitted in the dedicated voice VLAN.
To configure CDP to advertise a voice VLAN:
Step

Command

Remarks

43. Enter system view.

system-view

N/A

44. Enable CDP compatibility.

lldp compliance cdp

By default, CDP compatibility
is disabled.

45. Enter Layer 2
interface view.

interface interface-type
interface-number

N/A

46. Configure CDP-compatible
LLDP to operate in TxRx
mode.

lldp compliance admin-status cdp
txrx

By default, CDP-compatible
LLDP operates in disable
mode.

47. Configure an
voice VLAN ID.

cdp voice-vlan vlan-id

By default, no advertised
voice VLAN ID is configured.

Ethernet

advertised

Displaying and maintaining voice VLANs
Execute display commands in any view.

39

Task

Command

Display the voice VLAN state.

display voice-vlan state

Display OUI addresses on a device.

display voice-vlan mac-address

Command reference
The following commands were added:


display voice-vlan mac-address.



display voice-vlan state.



voice-vlan aging.



voice-vlan enable.



voice-vlan mac-address.



voice-vlan mode auto.



voice-vlan security enable.



voice-vlan track lldp.

For more information about these commands, see H3C MSR Series Routers Layer 2—LAN
Switching Command Reference(V7).

New feature: L2TP-based EAD
Enabling L2TP-based EAD
EAD authenticates PPP users that pass the access authentication. PPP users that pass EAD
authentication can access network resources. PPP users that fail EAD authentication can only
access the resources in the quarantine areas.
EAD uses the following procedure:
1.

The iNode client uses L2TP to access the LNS. After the client passes the PPP authentication,
the CAMS/IMC server assigns isolation ACLs to the LNS. The LNS uses the isolation ACLs to
filter incoming packets.

2.

After the IPCP negotiation, the LNS sends the IP address of the CAMS/IMC server to the iNode
client. The server IP address is permitted by the isolation ACLs.

3.

The CAMS/IMC sever authenticates the iNode client and performs security check for the iNode
client. If the iNode client passes security check, the CAMS/IMC server assigns security ACLs
for the iNode client to the LNS. The iNode client can access network resources.

To enable L2TP-based EAD:

40

Step

Command

Remarks

48. Enter system view.

system-view

N/A

49. Create a VT interface and
enter its view

interface virtual-template
virtual-template-number

N/A

50. Enable L2TP-based EAD.

ppp access-control enable

By default, L2TP-based EAD is
disabled.

Command reference
ppp access-control enable
Use ppp access-control enable to enable L2TP-based EAD.
Use undo ppp access-control enable to disable L2TP-based EAD.

Syntax
ppp access-control enable
undo ppp access-control enable

Default
L2TP-based EAD is disabled.

Views
VT interface view

Predefined user roles
network-admin

Usage guidelines
This command does not apply to VA interfaces that already exist in the VT interface. It only applies to
newly created VA interfaces.
Different ACLs are required for different users if the VT interface is used as the access interface for
the LNS.
After L2TP-based EAD is enabled, the LNS transparently passes CAMS/IMC packets to the iNode
client to inform the client of EAD server information, such as the IP address.

Examples
# Enable L2TP-based EAD.
 system-view
[Sysname] interface virtual-template 10
[Sysname-Virtual-Template10] ppp access-control enable

display ppp access-control interface
Use display ppp access-control interface to display access control information for VA interfaces
on a VT interface.
41

Syntax
display ppp access-control interface { interface-type interface-number | interface-name }

Views
Any view

Predefined user roles
network-admin
network-operator

Parameters
interface-type interface-number: Specifies an interface by its type and number.
interface-name: Specifies an interface by its name.

Examples
# Display access control information for VA interfaces on VT interface 2.
 display ppp access-control interface virtual-template 2
Interface: Virtual-Template2:0
User Name: mike
In-bound Policy: acl 3000
Totally 0 packets, 0 bytes, 0% permitted,
Totally 0 packets, 0 bytes, 0% denied.
Interface: Virtual-Template2:1
User Name: tim
In-bound Policy: acl 3001
Totally 0 packets, 0 bytes, 0% permitted,
Totally 0 packets, 0 bytes, 0% denied.

Table 3 Command output
Field

Description

Interface

VA interface that the PPP user accesses.

User Name

Username of the PPP user.

In-bound Policy

Security ACLs for the PPP user.

Totally x packets, x bytes, x% permitted

Total number, data rate, and pass percentage of permitted
packets.

Totally x packets, x bytes, x% denied

Total number, data rate, and reject percentage of denied packets.

42

New feature: BFD for an aggregation
group
Enabling BFD for an aggregation group
BFD for Ethernet link aggregation can monitor member link status in an aggregation group. After you
enable BFD on an aggregate interface, each Selected port in the aggregation group establishes a
BFD session with its peer port. BFD operates differently depending on the aggregation mode.


BFD for static aggregation—When BFD detects a link failure, BFD notifies the Ethernet link
aggregation module that the peer port is unreachable. The local port is placed in Unselected
state. The BFD session between the local and peer ports remains, and the local port keeps
sending BFD packets. When the link is recovered, the local port receives BFD packets from the
peer port, and BFD notifies the Ethernet link aggregation module that the peer port is reachable.
The local port is placed in Selected state again. This mechanism ensures that the local and
peer ports of a static aggregate link have the same aggregation state.



BFD for dynamic aggregation—When BFD detects a link failure, BFD notifies the Ethernet
link aggregation module that the peer port is unreachable. BFD clears the session and stops
sending BFD packets. When the link is recovered and the local port is placed in Selected state
again, the local port establishes a new session with the peer port. BFD notifies the Ethernet link
aggregation module that the peer port is reachable. Because BFD provides fast failure
detection, the local and peer systems of a dynamic aggregate link can negotiate the
aggregation state of their member ports faster.

For more information about BFD, see H3C MSR Router Series Comware 7 High Availability
Configuration Guide.

Configuration restrictions and guidelines
When you enable BFD for an aggregation group, follow these restrictions and guidelines:


Make sure the source and destination IP addresses are consistent at the two ends of an
aggregate link. For example, if you execute link-aggregation bfd ipv4 source 1.1.1.1
destination 2.2.2.2 on the local end, execute link-aggregation bfd ipv4 source 2.2.2.2
destination 1.1.1.1 on the peer end. The source and destination IP addresses cannot be the
same.



The BFD parameters configured on an aggregate interface take effect on all BFD sessions in
the aggregation group. BFD sessions for link aggregation do not support the echo packet mode
and the Demand mode.



As a best practice, do not configure other protocols to collaborate with BFD on a BFD-enabled
aggregate interface.

43



Make sure the number of member ports in a BFD-enabled aggregation group is not larger than
the number of BFD sessions supported by the device. Otherwise, this command might cause
some Selected ports in the aggregation group to change to the Unselected state.

Configuration procedure
To enable BFD for an aggregation group:
Step

Command

Remarks

51. Enter system view.

system-view

N/A

52. Enter Layer 3 aggregate
interface view.

interface route-aggregation
interface-number

N/A
By default, BFD is disabled
for an aggregation group.

53. Enable BFD for the
aggregation group.

link-aggregation bfd ipv4 source
ip-address destination ip-address

The source and destination
IP addresses of BFD
sessions must be unicast
addresses excluding
0.0.0.0.

Command reference
link-aggregation bfd ipv4
Use link-aggregation bfd ipv4 to enable BFD for an aggregation group.
Use undo link-aggregation bfd to disable BFD for an aggregation group.

Syntax
link-aggregation bfd ipv4 source ip-address destination ip-address
undo link-aggregation bfd

Default
BFD is disabled for an aggregation group.

Views
Layer 3 aggregate interface view

Predefined user roles
network-admin

Parameters
source ip-address: Specifies the unicast source IP address of BFD sessions. The source IP address
cannot be 0.0.0.0.
destination ip-address: Specifies the unicast destination IP address of BFD sessions. The
destination IP address cannot be 0.0.0.0.

44

Usage guidelines
Make sure the source and destination IP addresses are consistent at the two ends of an aggregate
link. For example, if you execute link-aggregation bfd ipv4 source 1.1.1.1 destination 2.2.2.2 on
the local end, execute link-aggregation bfd ipv4 source 2.2.2.2 destination 1.1.1.1 on the peer
end. The source and destination IP addresses cannot be the same.
The BFD parameters configured on an aggregate interface take effect on all BFD sessions in the
aggregation group. BFD sessions for link aggregation do not support the echo packet mode and the
Demand mode. For more information about BFD, see H3C MSR Router Series Comware 7 High
Availability Configuration Guide.
As a best practice, do not configure other protocols to collaborate with BFD on a BFD-enabled
aggregate interface.
Make sure the number of member ports in a BFD-enabled aggregation group is not larger than the
number of BFD sessions supported by the device. Otherwise, this command might cause some
Selected ports in the aggregation group to change to the Unselected state.

Examples
# Enable BFD for Layer 3 aggregation group 1, and specify the source and destination IP addresses
as 1.1.1.1 and 2.2.2.2 for BFD sessions.
 system-view
[Sysname] interface route-aggregation 1
[Sysname-Route-Aggregation1] link-aggregation bfd ipv4 source 1.1.1.1 destination 2.2.2.2

New feature: 4G modem IMSI/SN binding
authentication
This feature includes the IMSI/SN information in the 4G dial-up authentication information.

Command reference
apn
Use apn to create an access point name (APN).
Use undo apn to remove an APN.

Syntax
apn { dynamic | static apn }
undo apn

Default
No APN is configured.

45

Views
4G dial-up profile view

Predefined user roles
network-admin

Parameters
dynamic: Uses an APN automatically assigned by the service provider.
static apn: Specifies the APN provided by the service provider. It is a string of 1 to 100 characters.
Whether the string is case-sensitive varies by service providers.

Usage guidelines
You must specify an APN for a 4G dial-up profile.

Examples
# Specify the APN apn1 for the 4G dial-up profile test.
 system-view
[Sysname] apn-profile test
[Sysname-apn-profile-test] apn static apn1

apn-profile
Use apn-profile to create a 4G dial-up profile.
Use undo apn-profile to remove a 4G dial-up profile.

Syntax
apn-profile profile-name
undo apn-profile profile-name

Default
No 4G dial-up profiles are configured.

Views
System view

Predefined user roles
network-admin

Parameters
profile-name: Specifies a 4G dial-up profile name.

Usage guidelines
A 4G dial-up profile takes effect only after you associate the profile with a 4G interface. To remove a
4G dial-up profile, you must first remove the association between the profile and the 4G interface.

Examples
# Create the 4G dial-up profile test.
 system-view

46

[Sysname] apn-profile test

apn-profile apply
Use apn-profile apply to specify a 4G dial-up profile.
Use undo apn-profile apply to restore the default.

Syntax
apn-profile apply profile-name [ backup profile-name ]
undo apn-profile apply

Default
No 4G dial-up profiles are specified.

Views
Eth-channel interface view

Predefined user roles
network-admin

Parameters
profile-name: Specifies a primary 4G dial-up profile name.
backup profile-name: Specifies a backup 4G dial-up profile name.

Usage guidelines
After you specify a 4G dial-up profile for a 4G modem, the 4G modem uses the settings in the profile
to negotiate with the service provider's device.
The primary profile always has priority over the backup profile. For each dialup connection
establishment, the 4G modem uses the backup profile only when it has failed to dial up using the
primary profile.
This command takes effect only on dialup connections initiated after the command is configured. It
does not take effect on a dialup connection that has been established.

Examples
# Specify the primary 4G dial-up profile test and the backup 4G dial-up profile bktest for Eth-channel
interface 2/4/0:0.
 system-view
[Sysname] interface eth-channel 2/4/0:0
[Sysname-Eth-channel2/4/0:0] apn-profile apply test backup bktest

attach-format
Use attach-format to set a separator for the authentication information to be sent.
Use undo attach-format to restore the default.

47

Syntax
attach-format imsi-sn split splitchart
undo attach-format imsi-sn split

Default
No separator is set for the authentication information to be sent.

Views
4G dial-up profile view

Predefined user roles
network-admin

Parameters
split splitchart: Specifies a separator. It can be a letter, a digit, or a sign such as a percent sign (%) or
a pound sign (#).

Usage guidelines
If IMSI/SN binding authentication is enabled, the IMSI/SN information is included in the
authentication information in addition to the username. You need to configure a separator to
separate different types of information. For example, if you specify the separator as #, the
authentication information will be sent in the following format: imsiinfo#sninfo#username.

Examples
# Configure the pound sign (#) as the separator for the authentication information to be sent.
 system-view
[Sysname] apn-profile test
[Sysname-apn-profile-test] attach-format imsi-sn split #

authentication-mode
Use authentication-mode to specify an authentication mode for a 4G dial-up profile.
Use undo authentication-mode to restore the default.

Syntax
authentication-mode { pap | chap| pap-chap } user user-name password { cipher | simple }
password
undo authentication-mode

Default
No authentication mode is configured for a 4G dial-up profile.

Views
4G dial-up profile view

Predefined user roles
network-admin

48

Parameters
chap: Specifies CHAP authentication.
pap: Specifies PAP authentication.
pap-chap: Specifies CHAP or PAP authentication.
user username: Specifies the username for authentication, a case-sensitive string of 1 to 32
characters.
cipher: Specifies a password in encrypted form.
simple: Specifies a password in plaintext form. For security purposes, the password specified in
plaintext form will be stored in encrypted form.
password: Specifies the password. Its plaintext form is a case-sensitive string of 1 to 32 characters.
Its encrypted form is a case-sensitive string of 1 to 73 characters

Examples
# Specify the CHAP authentication mode for the 4G dial-up profile test. Specify the CHAP
authentication username as user1 and the password as 123456.
 system-view
[Sysname] apn-profile test
[Sysname-apn-profile-test] authentication-mode chap user user1 password simple 123456

New feature: Media Stream Control (MSC)
logging
This feature enables the router to generate MSC logs and send the logs to the information center.

Command reference
New command: sip log enable
Use sip log enable to enable Media Stream Control (MSC) logging.
Use undo sip log enable to disable MSC logging.

Syntax
sip log enable
undo sip log enable

Default
MSC logging is disabled.

Views
Voice view
49

Predefined user roles
network-admin

Usage guidelines
This command enables the router to generate MSC logs and send the logs to the information center.
The information center outputs the logs to a destination according to an output rule. For more
information about the information center, see Network Management and Monitoring Configuration
Guide.
MSC logging is used for auditing purposes.

Examples
# Enable MSC logging.
 system-view
[Sysname] voice-setup
[Sysname-voice] sip log enable

New feature: IMSI/SN binding
authentication
This feature enables the device to include the IMSI/SN information in the LCP authentication
information.

Command reference
ppp lcp imsi accept
Use ppp lcp imsi accept to enable the client to accept the IMSI binding authentication requests
from the LNS.
Use undo ppp lcp imsi accept to restore the default.

Syntax
ppp lcp imsi accept
undo ppp lcp imsi accept

Default
The client declines the IMSI binding authentication requests from the LNS.

Views
Interface view

Predefined user roles
network-admin

50

Examples
# Enable the client to accept the IMSI binding authentication requests from the LNS.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp lcp imsi accept

ppp lcp imsi request
Use ppp lcp imsi request to enable the LNS to initiate IMSI binding authentication requests.
Use undo ppp lcp imsi request to restore the default.

Syntax
ppp lcp imsi request
undo ppp lcp imsi request

Default
The LNS does not initiate IMSI binding authentication requests.

Views
Interface view

Predefined user roles
network-admin

Examples
# Enable the LNS to initiate IMSI binding authentication requests.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp lcp imsi request

ppp lcp imsi string
Use ppp lcp imsi string imsi-info to configure the IMSI information on the client.
Use undo ppp lcp imsi string to delete the IMSI information on the client.

Syntax
ppp lcp imsi string imsi-info
undo ppp lcp imsi string

Default
The client automatically obtains the IMSI information from its SIM card.

Views
Interface view

Predefined user roles
network-admin
51

Parameters
imsi-info: Specifies the IMSI information, a case-sensitive string of 1 to 31 characters.

Examples
# Configure the IMSI information as imsi1.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp lcp imsi string imsi1

ppp lcp sn accept
Use ppp lcp sn accept to enable the client to accept the SN binding authentication requests from
the LNS.
Use undo ppp lcp sn accept to restore the default.

Syntax
ppp lcp sn accept
undo ppp lcp sn accept

Default
The client declines the SN binding authentication requests from the LNS.

Views
Interface view

Predefined user roles
network-admin

Examples
# Enable the client to accept the SN binding authentication requests from the LNS.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp lcp sn accept

ppp lcp sn request
Use ppp lcp sn request to enable the LNS to initiate SN binding authentication requests.
Use undo ppp lcp sn request to restore the default.

Syntax
ppp lcp sn request
undo ppp lcp sn request

Default
The LNS does not initiate SN binding authentication requests.

52

Views
Interface view

Predefined user roles
network-admin

Examples
# Enable the LNS to initiate SN binding authentication requests.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp lcp imsi request

ppp lcp sn string
Use ppp lcp sn string sn-info to configure the SN information on the client.
Use undo ppp lcp sn string to delete the SN information on the client.

Syntax
ppp lcp sn string sn-info
undo ppp lcp sn string

Default
The client automatically obtains the SN information from its SIM card.

Views
Interface view

Predefined user roles
network-admin

Parameters
sn-info: Specifies the SN information, a case-sensitive string of 1 to 31 characters.

Examples
# Configure the SN information as sn1.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp lcp sn string sn1

ppp user accept-format imsi-sn split
Use ppp user accept-format imsi-sn split splitchart to configure the separator for the received
authentication information.
Use undo ppp user accept-format to restore the default.

Syntax
ppp user accept-format imsi-sn split splitchart
53

undo ppp user accept-format

Default
No separator is configured for the received authentication information.

Views
Interface view

Predefined user roles
network-admin

Parameters
splitchart: Specifies the separator. The separator contains one character, and it can be a letter, a digit,
or any sign other than the at sign (@), slash (/), and backslash (\).

Usage guidelines
By default, the authentication information contains only the client username. If you include the IMSI
or SN information in the authentication information, you need to configure the separator to separate
different types of information.
If no IMSI/SN information is received from the peer during the authentication process, the IMSI/SN
information split from the received authentication information is used.

Examples
# Configure the pound sign (#) as the separator for the authentication information.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp user accept-format imsi-sn split #

ppp user attach-format imsi-sn split
Use ppp user attach-format imsi-sn split splitchart to configure the separator for the sent
authentication information.
Use undo ppp user attach-format to restore the default.

Syntax
ppp user attach-format imsi-sn split splitchart
undo ppp user attach-format

Default
No separator is configured for the sent authentication information.

Views
Interface view

Predefined user roles
network-admin

54

Parameters
splitchart: Specifies the separator. The separator contains one character, and it can be a letter, a digit,
or any sign other than the at sign (@), slash (/), and backslash (\).

Usage guidelines
By default, the authentication information contains only the client username. If you include the IMSI
or SN information in the authentication information, you need to configure the separator to separate
different types of information.

Examples
# Configure the pound sign (#) as the separator for the sent authentication information.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp user attach-format imsi-sn split #

ppp user replace
Use ppp user replace to replace the client username with the IMSI or SN information for
authentication.
Use undo ppp user replace to restore the default.

Syntax
ppp user replace { imsi | sn }
undo ppp user replace

Default
The client username is used for authentication.

Views
Interface view

Predefined user roles
network-admin

Examples
# Replace the client username with the IMSI information for authentication.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp user replace imsi

New feature: Specifying a band for a 4G
modem
You can specify a band for a 4G modem.

55

Command reference
lte band
Use ite band to specify a band for a 4G modem.
Use undo lte band to restore the default.

Syntax
lte band band-number
undo lte band

Default
The default setting varies by 4G modem model.

Views
Cellular interface view

Predefined user roles
network-admin

Parameters
band-number: Specifies a band for a 4G modem. The available bands vary by modem model.

Usage guidelines
This command is supported only on the following 4G modems:


Sierra MC7354 and MC7304.



Long Sung U8300C, U8300W, and U8300.



WNC DM11-2.

Examples
# Specify band 3 for Cellular 1/0.
 system-view
[Sysname] controller cellular 1/0
[Sysname-Controller-Cellular1/0]lte band 3

New feature: Using tunnel interfaces as
OpenFlow ports
The MSR 2600 routers support using tunnel interfaces as OpenFlow ports.

56

New feature: NETCONF support for ACL
filtering
Support of NETCONF for ACL filtering was added.

Command reference
netconf soap http acl
Use netconf soap http acl to apply an ACL to NETCONF over SOAP over HTTP traffic.
Use undo netconf soap http acl to restore the default.

Syntax
netconf soap http acl { acl-number | name acl-name }
undo netconf soap http acl

Default
No ACL is applied to NETCONF over SOAP over HTTP traffic.

Views
System view

Predefined user roles
network-admin

Parameters
acl-number: Specifies an ACL by its number in the range of 2000 to 2999.
name acl-name: Specifies an ACL by its name. The acl-name argument is a case-insensitive string
of 1 to 63 characters. It must start with an English letter. To avoid confusion, it cannot be all. The
specified ACL must be an existing IPv4 basic ACL.

Usage guidelines
This command is not available in FIPS mode.
Only NETCONF clients permitted by the ACL can access the device through SOAP over HTTP.
If you execute this command multiple times, the most recent configuration takes effect.

Examples
# Use ACL 2001 to allow only NETCONF clients in subnet 10.10.0.0/16 to access the device through
SOAP over HTTP.
 system-view
[Sysname] acl basic 2001
[Sysname-acl-ipv4-basic-2001] rule permit source 10.10.0.0 0.0.255.255

57

[Sysname-acl-ipv4-basic-2001] quit
[Sysname] netconf soap http acl 2001

netconf soap https acl
Use netconf soap https acl to apply an ACL to NETCONF over SOAP over HTTPS traffic.
Use undo netconf soap https acl to restore the default.

Syntax
netconf soap https acl { acl-number | name acl-name }
undo netconf soap https acl

Default
No ACL is applied to NETCONF over SOAP over HTTPS traffic.

Views
System view

Predefined user roles
network-admin

Parameters
acl-number: Specifies an ACL by its number in the range of 2000 to 2999.
name acl-name: Specifies an ACL by its name. The acl-name argument is a case-insensitive string
of 1 to 63 characters. It must start with an English letter. To avoid confusion, it cannot be all. The
specified ACL must be an existing IPv4 basic ACL.

Usage guidelines
Only NETCONF clients permitted by the ACL can access the device through SOAP over HTTPS.
If you execute this command multiple times, the most recent configuration takes effect.

Examples
# Use ACL 2001 to allow only NETCONF clients in subnet 10.10.0.0/16 to access the device through
SOAP over HTTPS.
 system-view
[Sysname] acl basic 2001
[Sysname-acl-ipv4-basic-2001] rule permit source 10.10.0.0 0.0.255.255
[Sysname-acl-ipv4-basic-2001] quit
[Sysname] netconf soap https acl 2001

58

New feature: WAAS
Configuring WAAS
This release added support for the Wide Area Application Services (WAAS) feature in the DATA
image on the following router series:


MSR 800.



MSR 2600.



MSR 3600.



MSR 5600.

Command reference
All commands were newly added.
For more information about the commands, see WAAS commands in H3C MSR Router Series
Comware 7 Layer 3—IP Services Command Reference.

New feature: Support for the MKI field in
SRTP or SRTCP packets
This feature enables the router to add the MKI field to outgoing SRTP or SRTCP packets. You can
set the length of the MKI field.

Command reference
New command: mki
Use mki to add the MKI field to outgoing SRTP or SRTCP packets and set the length of the MKI field.
Use undo mki to restore the default.

Syntax
mki mki-length
undo mki

Default
Outgoing SRTP or SRTCP packets do not carry the MKI field.

Views
SIP view
59

Predefined user roles
network-admin

Parameters
mki-length: Specifies the length of the MKI field, in the range of 1 to 128 bytes.

Usage guidelines
This command takes effect only when SRTP is the media stream protocol for SIP calls. To specify
SRTP as the medial stream protocol for SIP calls, use the srtp command.

Examples
# Add the MKI field to outgoing SRTP or SRTCP packets and set the length of the MKI field to 1 bit.
 system-view
[Sysname] voice-setup
[Sysname-voice] sip
[Sysname-voice-sip] mki 1

New feature: SIP domain name
This feature enables the router to populate the CONTACT header field of outgoing SIP packets with
the router's SIP domain name.

Command reference
New command: sip-domain
Use sip-domain to populate the CONTACT header field of outgoing SIP packets with the router's
SIP domain name.
Use undo sip-domain to restore the default.

Syntax
sip-domain domain-name
undo sip-domain

Default
The router populates the CONTACT header field of an outgoing SIP packet with the IP address of the
outgoing interface.

Views
SIP view

Predefined user roles
network-admin

60

Parameters
domain-name: Specifies the SIP domain name, a case-insensitive string of 1 to 31 characters. Valid
characters are letters, digits, underscore (_), hyphen (-), and dot (.).

Examples
# Populate the CONTACT header field of outgoing SIP packets with the SIP domain name abc.com.
 system-view
[Sysname] voice-setup
[Sysname-voice] sip
[Sysname-voice-sip] sip-domain abc.com

New feature: Setting the maximum size of
advertisement files
You can set the maximum size of advertisement files sent to wireless clients to 10 MB when the
clients access the wireless network.

New feature: Support of VCF for
NETCONF
Support for NETCONF was added to VCF.

New feature: Support of SNMP for
NETCONF
Support for NETCONF was added to SNMP.

New feature: Support of file system for
NETCONF
Support for NETCONF was added to file system.

New feature: Support of PoE for NETCONF
Support for NETCONF was added to PoE.

61

New feature: Support of RMON for
NETCONF
Support for NETCONF was added to RMON.

New feature: Support of policy-based
routing for NETCONF
Support for NETCONF was added to policy-based routing.

New feature: Support of BGP for
NETCONF
Support for NETCONF was added to BGP.

New feature: Support of OSPF for
NETCONF
Support for NETCONF was added to OSPF.

New feature: Support of ping for
NETCONF
Support for NETCONF was added to ping.

New feature: Support of tracert for
NETCONF
Support for NETCONF was added to tracert.

62

New feature: Support of L2VPN for
NETCONF
Support for NETCONF was added to L2VPN.

New feature: SIP support for VRF
Configuring SIP support for VRF
For information about this feature, see SIP configuration in H3C MSR Router Series Comware 7
Voice Configuration Guide.

Command reference
The vpn-instance command was added.
For information about the command, see SIP commands in H3C MSR Router Series Comware 7
Voice Command Reference.

New feature: IKEv2
Configuring IKEv2
For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command reference
For information about the commands, see IPsec commands in H3C MSR Router Series Comware 7
Command Reference.

63

New feature: Specifying an IKEv2 profile
for an IPsec policy
Specifying an IKEv2 profile for an IPsec policy
For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command reference
The ikev2-profile command was added.
For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

New feature: Bidirectional BFD control
detection for RIP
Configuring bidirectional BFD control detection for
RIP
For information about this feature, see RIP configuration in H3C MSR Router Series Comware 7
Layer 3—IP Routing Configuration Guide.

Command reference
The bfd all-interfaces enable, rip bfd, and rip primary-path-detect bfd commands were newly
added.
For information about the commands, see RIP commands in H3C MSR Router Series Comware 7
Layer 3—IP Routing Command Reference.

64

New feature: OSPF router ID
autoconfiguration
Automatically obtaining an OSPF router ID
For information about this feature, see OSPF configuration in H3C MSR Router Series Comware 7
Layer 3—IP Routing Configuration Guide.

Command reference
The display system internal ospf event-log router-id command was newly added and the
auto-select keyword was added to the ospf command.
For information about the commands, see OSPF commands in H3C MSR Router Series Comware 7
Layer 3—IP Routing Command Reference and OSPF probe commands in H3C MSR Router Series
Comware 7 Probe Command Reference.

New feature: Associating a static route
with a track entry
Associating a static route with a track entry
For information about this feature, see static routing configuration in H3C MSR Router Series
Comware 7 Layer 3—IP Routing Configuration Guide.

Command reference
The track keyword was added to the ip route-static command.
For information about the command, see static routing commands in H3C MSR Router Series
Comware 7 Layer 3—IP Routing Command Reference.

65

New feature: VLAN tag processing rule for
incoming traffic
Configuring the VLAN tag processing rule for
incoming traffic
For information about this feature, see H3C MSR Router Series Comware 7 VXLAN Configuration
Guide.

Command reference
The l2vpn rewrite inbound tag command was added. For information about this command, see
H3C MSR Router Series Comware 7 VXLAN Command Reference.

New feature: IP-based portal-free rule
Configuring an IP-based portal free-rule
For information about this feature, see portal authentication configuration in H3C MSR Router Series
Comware 7 Security Configuration Guide.

Command reference
The portal free-rule command was added.
For information about the command, see portal commands in H3C MSR Router Series Comware 7
Security Command Reference.

New feature: Portal redirect packet
statistics
Displaying/maintaining portal redirect packet
statistics
For information about this feature, see portal authentication configuration in H3C MSR Router Series
Comware 7 Security Configuration Guide.

66

Command reference
The display portal redirect statistics and reset portal redirect statistics commands were added.
For information about the commands, see portal commands in H3C MSR Router Series Comware 7
Security Command Reference.

New feature: GDVPN
Configuring GDVPN
For information about this feature, see group domain VPN configuration in H3C MSR Router Series
Comware 7 Security Configuration Guide.

Command reference
For information about the commands, see group domain VPN commands in H3C MSR Router
Series Comware 7 Security Configuration Guide.

New feature: OpenFlow instance
Configuring the OpenFlow instance mode
For information about this feature, see OpenFlow in H3C MSR Router Series Comware 7 OpenFlow
Configuration Guide.

Command reference
The port keyword was added to the classification command.
For information about the command, see OpenFlow commands in H3C MSR Router Series
Comware 7 OpenFlow Command Reference.

Binding an OpenFlow instance to ports
For information about this feature, see OpenFlow in H3C MSR Router Series Comware 7 OpenFlow
Configuration Guide.

67

Command reference
The port command was added.
For information about the command, see OpenFlow commands in H3C MSR Router Series
Comware 7 OpenFlow Command Reference.

Binding an port to an OpenFlow instance
For information about this feature, see OpenFlow in H3C MSR Router Series Comware 7 OpenFlow
Configuration Guide.

Command reference
The openflow-instance command was added.
For information about the command, see OpenFlow commands in H3C MSR Router Series
Comware 7 OpenFlow Command Reference.

New feature: Enabling the Extended
Sequence Number (ESN) feature for an
IPsec transform set
Enabling ESN for an IPsec transform set
For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command reference
The esn enable command was added.
For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

68

New feature: Enabling Traffic Flow
Confidentiality (TFC) padding for an IPsec
policy
Enabling TFC padding for an IPsec policy
For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command reference
The tfc enable command was added.
For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

New feature: SIP session refresh
Enabling SIP session refresh
In this release, you can enable SIP session refresh for a VoIP voice entity.

Command reference
New command: voice-class sip session refresh
Use voice-class sip session refresh to enable SIP session refresh for a VoIP entity.
Use undo voice-class sip session refresh to disable SIP session refresh for a VoIP entity.

Syntax
voice-class sip session refresh [ global ]
undo voice-class sip session refresh

Default
A VoIP entity uses the global configuration for SIP session refresh.

Views
VoIP entity view

69

Predefined user roles
network-admin

Parameters
global: Applies the global configuration for SIP session refresh to the VoIP entity.

Usage guidelines
The configuration for SIP session refresh in VoIP entity view takes priority over that in SIP view.

Examples
# Enable SIP session refresh for VoIP entity 1.
 system-view
[Sysname] voice-setup
[Sysname-voice] dial-program
[Sysname-voice-dial] entity 1 voip
[Sysname-voice-dial-entity1] voice-class sip session refresh

# Apply the global configuration for SIP session refresh to VoIP entity 1.
 system-view
[Sysname] voice-setup
[Sysname-voice] dial-program
[Sysname-voice-dial] entity 1 voip
[Sysname-voice-dial-entity1] voice-class sip session refresh global

Modified feature: User profile
Feature change description
This release added support for QoS policy configuration in user profile view.

Modified feature: Tunnel interface support
for IPsec and VXLAN tunnel modes
1. Feature change description
This release added support for the IPsec tunnel mode and VXLAN tunnel mode on a tunnel interface.

70

2. Command changes
1.

Modified command: interface tunnel

Old syntax
interface tunnel number [ mode { advpn { gre | udp } [ ipv6 ] | ds-lite-aftr | evi | gre [ ipv6 ] |
ipv4-ipv4 | ipv6 | ipv6-ipv4 [ 6to4 | auto-tunnel | isatap ] | mpls-te | nve } ]

New syntax
interface tunnel number [ mode { advpn { gre | udp } [ ipv6 ] | ds-lite-aftr | evi | gre [ ipv6 ] | ipsec
[ ipv6 ] | ipv4-ipv4 | ipv6 | ipv6-ipv4 [ 6to4 | auto-tunnel | isatap ] | mpls-te | nve |vxlan } ]

Views
System view

Change description
The following parameters were added to the command:


mode ipsec: Specifies the IPv4 IPsec tunnel mode.



mode ipsec ipv6: Specifies the IPv6 IPsec tunnel mode.



mode vxlan: Specifies the VXLAN tunnel mode.

Modified feature: PKI certificate
auto-renewal
Feature change description
Support for certificate auto-renewal was added to PKI.

Command changes
Modified command: certificate request mode
Old syntax
certificate request mode { auto [ password { cipher | simple } string ] | manual }

New syntax
certificate request mode { auto [ password { cipher | simple } string | renew-before-expire days
[ reuse-public-key ] [ auto-append common-name ] ] * | manual }

71

Views
PKI domain view

Change description
The following keywords were added to the command:


renew-before-expire days: Configures the system to automatically request a new certificate
the specified number of days before the current certificate expires. The value range for the days
argument is 0 to 365. Value 0 indicates that the request for a new certificate is made when the
old certificate expires, which might cause service interruptions.



reuse-public-key: Reuses the key pair in the old certificate for the new certificate. If you do not
specify this keyword, the system generates a new key pair for the new certificate. The old key
pair is replaced with the new one when the new certificate is received from the CA.



auto-append common-name: Automatically appends random data to the common name of
the PKI entity for the new certificate. If you do not specify this keyword, the common name of
the PKI entity will be unchanged in the new certificate.

New command: display pki certificate renew-status
Use display pki certificate renew-status to display the certificate renewal status for a PKI domain.

Syntax
display pki certificate renew-status [ domain domain-name ]

Views
Any view

Predefined user roles
network-admin
network-operator

Parameters
domain-name: Specifies a PKI domain by its name, a case-insensitive string of 1 to 31 characters.
The domain name cannot contain the special characters listed in 错误!未找到引用源。. If you do not
specify a domain name, this command displays the certificate renewal status for all PKI domains.
Special characters
Character name

Symbol

Character name

Symbol

Tilde

~

Dot

.

Asterisk

*

Left angle bracket

<

Backslash

\

Right angle bracket

>

Vertical bar

|

Quotation marks

"

Colon

:

Apostrophe

'

72

Examples
# Display the certificate renewal status for all PKI domains.
 display pki certificate renew-status
Domain name: domain1
Renew time:

03:12:05 2015/12/07

Renew public key:
Key type: RSA
Time when key pair created: 15:40:48 2015/05/12
Key code:
30819F300D06092A864886F70D010101050003818D0030818902818100DAA4AAFEFE04C2C9
667269BB8226E26331E30F41A8FF922C7338208097E84332610632B49F75DABF6D871B80CE
C1BA2B75020077C74745C933E2F390DC0B39D35B88283D700A163BB309B19F8F87216A44AB
FBF6A3D64DEB33E5CEBF2BCF26296778A26A84F4F4C5DBF8B656ACFA62CD96863474899BC1
2DA4C04EF5AE0835090203010001

The command output indicates that the reuse-public-key keyword was not configured for PKI
domain domain1 and a new key pair was created for the new certificate.
# Display the certificate renewal status for PKI domain domain1.
 display pki certificate renew-status domain1
Domain name: domain1
Renew time:

03:12:05 2013/12/07

Renew public key:
Key type: RSA
Time when

key pair created: 15:40:48 2013/05/12

Key code:
30819F300D06092A864886F70D010101050003818D0030818902818100DAA4AAFEFE04C2C9
667269BB8226E26331E30F41A8FF922C7338208097E84332610632B49F75DABF6D871B80CE
C1BA2B75020077C74745C933E2F390DC0B39D35B88283D700A163BB309B19F8F87216A44AB
FBF6A3D64DEB33E5CEBF2BCF26296778A26A84F4F4C5DBF8B656ACFA62CD96863474899BC1
2DA4C04EF5AE0835090203010001

Command output
Field

Description

Renew time

Time when a new certificate will be requested.

Renew public key

Information about the new key pair created for the
certificate.

Key type

Key pair type, which can be RSA, DSA, or ECDSA.

Time when key pair created

Time when the key pair was created.

Key code

Public key data.

73

Modified feature: Configuring the PKI
entity DN
Feature change description
Support for the subject-dn command was added to PKI. You can use the command to configure the
full subject DN string. Each attribute can be specified multiple times with different values.

Command changes
New command: subject-dn
Use subject-dn to configure the DN for a PKI entity.
Use undo subject-dn to restore the default.

Syntax
subject-dn dn-string
undo subject-dn

Default
No DN is configured for a PKI entity.

Views
PKI entity view

Default command level
network-admin

Parameters
dn-string: Specifies the DN for the PKI entity, a case-insensitive string of 1 to 255 characters.

Usage guidelines
The subject DN string is a sequence of attribute=value pairs separated by commas. Each attribute
can be specified multiple times with different values. Supported DN attributes are:


CN—Common-name.



C—Country code.



L—Locality.



O—Organization.



OU—Organization unit.



ST—State or province.
74

After this command is configured, the following commands do not take effect:


common-name



country



locality



organization



organization-unit



state

If you configure this command multiple times, the most recent configuration takes effect.

Examples
# Configure the DN for PKI entity en.
 system-view
[Sysname] pki entity en
[Sysname-pki-entity-en] subject-dn
CN=test,C=CN,O=abc,OU=rdtest,OU=rstest,ST=countryA,L=pukras

Modified feature: ADVPN
Feature change description
In this release, you can configure ADVPN group names and ADVPN group-to-QoS policy mappings.

Command changes
New command: advpn group
Use advpn group to configure an ADVPN group name.
Use undo advpn group to restore the default.

Syntax
advpn group group-name
undo advpn group

Default
No ADVPN group name is configured.

Views
Tunnel interface view

Predefined user roles
network-admin
75

Parameters
group-name: Specifies the ADVPN group name. The group name is a case-insensitive string of 1 to
63 characters that can include only letters, digits, and dots (.).

Usage guidelines
This command must be configured on the tunnel interface of a spoke. The spoke sends the ADVPN
group name in a hub-spoke tunnel establishment request to a hub. The hub looks for an ADVPN
group-to-QoS policy mapping that matches the ADVPN group name. If a matching mapping is found,
the hub applies the QoS policy in the mapping to the hub-spoke tunnel. If no match is found, the hub
does not apply a QoS policy to the hub-spoke tunnel.
If you modify the ADVPN group name after the tunnel is established, the spoke will inform the hub of
the modification. The hub will look for an ADVPN group-to-QoS policy mapping that matches the new
ADVPN group name and apply the QoS policy in the new mapping.
As a best practice, do not configure an ADVPN group name and apply a QoS policy on the same
tunnel interface.

Examples
# Configure aaa as the ADVPN group name.
 system-view
[Sysname] interface tunnel1 mode advpn gre
[Sysname-Tunnel1] advpn group aaa

2.

New command: advpn map group

Use advpn map group to configure a mapping between an ADVPN group and a QoS policy.
Use undo advpn map group to delete a mapping between an ADVPN group and a QoS policy.

Syntax
advpn map group group-name qos-policy policy-name outbound
undo advpn map group group-name

Default
No ADVPN group-to-QoS policy mappings are configured.

Views
Tunnel interface view

Predefined user roles
network-admin

Parameters
group-name: Specifies the ADVPN group name. The group name is a case-insensitive string of 1 to
63 characters that can include only letters, digits, and dots (.).
qos-policy policy-name: Specifies the QoS policy name, a case-sensitive string of 1 to 31
characters.
76

outbound: Applies the QoS policy to the outbound direction.

Usage guidelines
This command must be configured on the tunnel interface of a hub. After receiving a hub-spoke
tunnel establishment request from a spoke, the hub looks for an ADVPN group-to-QoS policy
mapping that matches the ADVPN group name carried in the request. If a matching mapping is found,
the hub applies the QoS policy in the mapping to the hub-spoke tunnel.
You can configure multiple ADVPN group-to-QoS policy mappings on a tunnel interface.
You can map multiple ADVPN groups to a QoS policy. You can map an ADVPN group to only one
QoS policy.
As a best practice, do not configure an ADVPN group-to-QoS policy mapping and apply a QoS policy
on the same tunnel interface.

Examples
# Configure a mapping between ADVPN group aaa and QoS policy bbb on Tunnel1.
 system-view
[Sysname] interface Tunnel1 mode advpn gre
[Sysname-Tunnel1] advpn map group aaa qos-policy bbb outbound

Modified feature: Telnet redirect
Feature change description
In this release, a Telnet redirect user is authenticated by using the authentication settings for the TTY
line. The device displays only Telnet redirect authentication information and the authentication result.
It does not display the copyright statement.
Support for Telnet redirect authentication was removed from MSR56 routers.

Modified feature: DHCP snooping
performance optimization
Feature change description
On a Layer 3 physical interface without subinterface, link aggregation, or snooping configured, the
dhcp snooping enable command was optimized to cause only a slight impact on receiving
non-DHCP packets. If you configure other services on the interface, the performance varies with the
services you configure.

77

Modified feature: OSPF performance
optimization
Feature change description
You can set a fixed OSPF SPF calculation interval in the range of 0 to 10000 milliseconds.
The value range for the LSU packet sending interval was changed to 0 to 1000 milliseconds.

Command changes
Modified command: spf-schedule-interval
Old syntax
spf-schedule-interval { maximum-interval [ minimum-interval [ incremental-interval ] ] }

New syntax
spf-schedule-interval { maximum-interval [ minimum-interval [ incremental-interval ] ] | millisecond
interval }

Views
OSPF view

Change description
The millisecond interval argument was added to the command. You can specify this argument to set
a fixed OSPF SPF calculation interval in the range of 0 to 10000 milliseconds.

Modified command: transmit-pacing
Syntax
transmit-pacing interval interval count count

Views
OSPF view

Change description
Before modification: The value range for the interval argument was 10 to 1000 milliseconds.
After modification: The value range for the interval argument is 0 to 1000 milliseconds.

78

Modified feature: IP performance
optimization
Feature change description
The device supports recording MAC addresses in TCP packets. You can also configure the device to
record the MAC address of the local device in TCP packets.

Command changes
New command: tcp mac-record enable
Use tcp mac-record enable to enable MAC address recording in TCP packets.
Use undo tcp mac-record enable to disable MAC address recording in TCP packets.

Syntax
tcp mac-record enable
undo tcp mac-record enable

Default
MAC address recording in TCP packets is disabled.

Views
Interface view

Default command level
network-admin

Usage guidelines
This feature records the MAC address of the packet originator in a TCP option. When an attack
occurs, the administrator can quickly locate the attack source according to the recorded MAC
addresses.

Examples
# Enable MAC address recording in TCP packets on GigabitEthernet 1/0/1.
 system-view
[Sysname] interface GigabitEthernet 0/1
[Sysname-GigabitEthernet0/1] tcp mac-record enable

79

New command: tcp mac-record local
Use tcp mac-record local to record the MAC address of the local device in TCP packets.
Use undo tcp mac-record local to restore the default.

Syntax
tcp mac-record local mac-address
undo tcp mac-record local

Default
The destination MAC address is recorded.

Views
System view

Default command level
network-admin

Parameters
mac-address: Specifies the MAC address of the local device. The MAC address cannot be all 0s,
broadcast MAC address, or multicast MAC address.

Usage guidelines
To make this command take effect, you must enable MAC address recording in TCP packets by
using the tcp mac-record enable command.

Examples
# Record the MAC address of the local device 0605-0403-0201 in TCP packets.
 system-view
[Sysname] tcp mac-record local 0605-0403-0201

Modified feature: AAA
Feature change description
Starting from this software version, you can configure the authorization method for IKE extended
authentication.

80

Command changes
New command: authorization ike
Use authorization ike to configure the authorization method for IKE extended authentication.
Use undo authorization ike to restore the default.

Syntax
In non-FIPS mode:
authorization ike { local [ none ] | none | radius-scheme radius-scheme-name [ local ] [ none ] }
undo authorization ike
In FIPS mode:
authorization ike { local | radius-scheme radius-scheme-name [ local ] }
undo authorization ike

Default
The default authorization method for the ISP domain is used for IKE extended authentication.

Views
ISP domain view

Predefined user roles
network-admin

Parameters
local: Performs local authorization.
none: Does not perform authorization.
radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive
string of 1 to 32 characters.

Examples
# In ISP domain test, perform local authorization for IKE extended authentication.
 system-view
[Sysname] domain test
[Sysname-isp-test] authorization ike local

# In ISP domain test, use RADIUS scheme rd as the primary authorization method and local
authorization as the backup authorization method for IKE extended authentication.
 system-view
[Sysname] domain test
[Sysname-isp-test] authorization ike radius-scheme rd local

81

Modified feature: Configuring a cellular
interface for a 3G/4G modem
Feature change description
In this release, you can set the RSSI thresholds for a 3G/4G modem.

Command changes
New command: rssi
Use rssi to set the RSSI thresholds for a 3G/4G modem.
Use undo rssi to restore the default.

Syntax
rssi { 1xrtt | evdo | gsm | lte } { low lowthreshold | medium mediumthreshold } *
undo rssi { 1xrtt | evdo | gsm | lte } [ low | medium ]

Default
The lower and upper thresholds for a 3G/4G modem are –150 dBm and 0 dBm, respectively.

Views
Cellular interface view

Predefined user roles
network-admin

Parameters
1xrtt: Specifies the 1xRTT mode.
evdo: Specifies the EVDO mode.
gsm: Specifies the GSM mode.
lte: Specifies the LTE mode.
low lowthreshold: Specifies the lower RSSI threshold value in the range of 0 to 150, which represent
a lower RSSI threshold in the range of –150 dBm to 0 dBm. The value of lowthreshold cannot be
smaller than the value of mediumthreshold because the system automatically adds a negative sign
to the RSSI thresholds.
medium mediumthreshold: Specifies the upper RSSI threshold value in the range of 0 to 150, which
represent an upper RSSI threshold in the range of –150 dBm to 0 dBm.

82

Usage guidelines
The device performs the following operations based on the actual RSSI of the 3G/4G modem:


Sends a trap that indicates high RSSI when the RSSI exceeds the upper threshold.



Sends a trap that indicates normal RSSI when the RSSI is between the lower threshold and
upper threshold (included).



Sends a trap that indicates low RSSI when the RSSI drops to or below the lower threshold.



Sends a trap that indicates low RSSI every 10 minutes when the RSSI remains equal to or
smaller than the lower threshold.

To view the RSSI change information for a 3G/4G modem, use the display cellular command.

Examples
# Set the lower threshold for a 3G/4G modem in GSM mode to –110 dBm.
 system-view
[Sysname] interface cellular 0/0
[Sysname-Cellular0/0] rssi gsm low 110

Modified feature: QoS on VXLAN tunnel
interfaces
Feature change description
This software version added support for QoS in the outbound direction of VXLAN tunnel interfaces.

Command changes
None.

Modified feature: Option 60 encapsulation
in DHCP replies
Feature change description
Disabling Option 60 encapsulation in DHCP replies.

83

Modified feature: MPLS QoS support for
matching the EXP field
Feature change description
In this release, MPLS QoS supports matching the EXP fields in both the topmost (first) MPLS label
and the second MPLS label.

Command changes
New command: if-match second-mpls-exp
Use if-match second-mpls-exp to define a criterion to match the EXP field in the second MPLS
label.
Use undo if-match second-mpls-exp to delete the match criterion.

Syntax
if-match [ not ] second-mpls-exp exp-value&<1-8>
undo if-match [ not ] second-mpls-exp exp-value&<1-8>

Default
No criterion is defined to match the EXP field in the second MPLS label.

Views
Traffic class view

Predefined user roles
network-admin

Parameters
not: Matches packets not conforming to the specified criterion.
exp-value&<1-8>: Specifies a space-separated list of up to eight EXP values. The value range for
the exp-value argument is 0 to 7. If the same MPLS EXP value is specified multiple times, the system
considers them as one. If a packet matches one of the defined MPLS EXP values, it matches the
if-match clause.

Examples
# Define a criterion to match packets with EXP value 3 or 4 in the second MPLS label.
 system-view
[Sysname] traffic classifier database
[Sysname-classifier-database] if-match second-mpls-exp 3 4

84

Modified feature: MPLS QoS support for
marking the EXP field
Feature change description
In this release, MPLS QoS supports marking the EXP fields in both the topmost (first) MPLS label
and the second MPLS label.

Command changes
New command: remark second-mpls-exp
Use remark second-mpls-exp to configure an EXP value marking action for the second MPLS label
in a traffic behavior.
Use undo remark second-mpls-exp to delete the action.

Syntax
remark second-mpls-exp second-mpls-exp-value
undo remark second-mpls-exp second-mpls-exp-value

Default
No EXP value marking action for the second MPLS label is configured in a traffic behavior.

Views
Traffic behavior view

Predefined user roles
network-admin

Parameters
second-mpls-exp-value: Specifies an EXP value for the second MPLS label, in the range of 0 to 7.

Examples
# Define a traffic behavior to mark packets with EXP value 3 for the second MPLS label.
 system-view
[Sysname] traffic behavior b1
[Sysname-behavior-b1] remark second-mpls-exp 3

85

Modified feature: Automatic configuration
Feature change description
A limit was added to the number of automatic attempts. After the limit is reached, the automatic
configuration process ends.
If you set the limit to 0, only one automatic configuration attempt is allowed.

Modified feature: User profile
Feature change description
In this release, the user profile name supports using dots (.).

Command change
Modified command: user-profile
Syntax
user-profile profile-name
undo user-profile profile-name

Views
System view

Change description
Before modification: The user profile name is a case-sensitive string of 1 to 31 characters. Valid
characters are letters, digits, and underscores (_), and the name must start with an English letter.
After modification: The user profile name is a case-sensitive string of 1 to 31 characters. Valid
characters are letters, digits, underscores (_), and dots (.), and the name must start with an English
letter.

86

Modified feature: Default size of the TCP
receive and send buffer
Feature change description
The default value for the TCP receive and send buffer size was changed to 63 KB.

Command changes
Modified command: tcp window
Syntax
tcp window window-size
undo tcp window

Views
System view

Change description
Before modification: The default value for the window-size argument was 64 KB.
After modification: The default value for the window-size argument is 63 KB.

Modified feature: Support for per-packet
load sharing
Feature change description
The per-packet keyword was added to the ip load-sharing mode command to support per-packet
load sharing.

87

Command changes
Modified command: ip load-sharing mode
Old syntax
Centralized devices:
ip load-sharing mode per-flow [ dest-ip | dest-port | ip-pro | src-ip | src-port ] * ]
Centralized IRF devices–Distributed devices–In standalone mode:
ip load-sharing mode per-flow [ dest-ip | dest-port | ip-pro | src-ip | src-port ] * ] [ slot
slot-number ]
Distributed devices–In IRF mode:
ip load-sharing mode per-flow [ dest-ip | dest-port | ip-pro | src-ip | src-port ] * ] [ chassis
chassis-number slot slot-number ]

New syntax
Centralized devices:
ip load-sharing mode { per-flow [ [ dest-ip | dest-port | ip-pro | src-ip | src-port ] * ] | per-packet }
Centralized IRF devices–Distributed devices–In standalone mode:
ip load-sharing mode { per-flow [ dest-ip | dest-port | ip-pro | src-ip | src-port ] * ] | per-packet }
Distributed devices–In IRF mode:
ip load-sharing mode { per-flow [ dest-ip | dest-port | ip-pro | src-ip | src-port ] * ] | per-packet }

Views
System view

Change description
The per-packet keyword was added to the ip load-sharing mode command to support per-packet
load sharing.

Modified feature: Default user role
Feature change description
The default user role can be changed. The role-name argument was added to the role default-role
enable command for specifying a user role as the default user role.

88

Command changes
Modified command: role default-role enable
Old syntax
role default-role enable
undo role default-role enable

New syntax
role default-role enable [ role-name ]
undo role default-role enable

Views
System view

Change description
Before modification: The default user role is network-operator.
After modification: The role-name argument was added to specify any user role that exists in the
system as the default user role. The argument is a case-sensitive string of 1 to 63 characters. If you
do not specify this argument, the default user role is network-operator.

Modified feature: Debugging
Feature change description
The all keyword and the timeout time option were removed from the debugging command. You can
no longer use the debugging all command to enable debugging for all modules or specify the
timeout time for the debugging all command.

Command changes
Modified command: debugging
Old syntax
debugging { all [ timeout time ] | module-name [ option ] }
undo debugging { all | module-name [ option ] }

New syntax
debugging module-name [ option ]
89

undo debugging module-name [ option ]

Views
User view

Change description
The following parameters were removed from the debugging command:


all: Enables debugging for all modules.

timeout time: Specifies the timeout time for the debugging all command. The system automatically
executes the undo debugging all command after the timeout time. The time argument is in the
range of 1 to 1440 minutes. If you do not specify a timeout time, you must manually execute the
undo debugging all command to disable debugging for all modules.

Modified feature: SSH username
Feature change description
In this release, an SSH username cannot be a, al, all, or include the following characters:
\|/:*?<>
The at sign (@) can only be used in the username format pureusername@domain when the
username contains an ISP domain name.

Command changes
Modified command: ssh user
Syntax
In non-FIPS mode:
ssh user username service-type { all | netconf | scp | sftp | stelnet } authentication-type
{ password | { any | password-publickey | publickey } assign { pki-domain domain-name |
publickey keyname } }
undo ssh user username
In FIPS mode:
ssh user username service-type { all | netconf | scp | sftp | stelnet } authentication-type
{ password | password-publickey assign { pki-domain domain-name | publickey keyname } }
undo ssh user username

Views
System view
90

Change description
Before modification: The username argument is a case-insensitive string of 1 to 80 characters. If the
username contains an ISP domain name, use the format pureusername@domain.
After modification: The username argument is a case-insensitive string of 1 to 80 characters,
excluding

a,

al,

all,

and

the

following

characters:

\|/:*?<>
The at sign (@) can only be used in the username format pureusername@domain when the
username contains an ISP domain name. The pure username can contain 1 to 55 characters and the
domain name can contain 1 to 24 characters. The whole username cannot exceed 80 characters.

Modified feature: IS-IS hello packet
sending interval
Feature change description
The value range of the interval for sending hello packets was changed to 1 to 255 seconds.

Command changes
Modified command: isis timer hello
Syntax
isis timer hello seconds [ level-1 | level-2 ]
undo isis timer hello [ level-1 | level-2 ]

Views
Interface view

Change description
The value range for the seconds argument was changed to 1 to 255 seconds.

Modified feature: 802.1X redirect URL
Feature change description
The value range for the url-string argument was changed to 1 to 256 characters for the dot1x
ead-assistant url command.

91

Command changes
Modified command: dot1x ead-assistant url
Syntax
dot1x ead-assistant url url-string

Views
System view

Change description
Before modification: The value range for the url-string argument is 1 to 64 characters.
After modification: The value range for the url-string argument is 1 to 256 characters.

Modified feature: Displaying information
about NTP servers from the reference
source to the primary NTP server
Feature change description
You can specify a source interface for tracing NTP servers from the reference source to the primary
NTP server.

Command changes
Modified command: display ntp-service trace
Old syntax
display ntp-service trace

New syntax
display ntp-service trace [ source interface-type interface-number ]

Views
Any view

Change description
The source interface-type interface-number option was added to the display ntp-service trace
command.
92

Modified feature: Saving, rolling back, and
loading the configuration
The following configuration guidelines were added when you use NETCONF to save, roll back, or
load the configuration:


The save, rollback, and load operations supplement NETCONF requests. Performing the
operations might consume a lot of system resources.



Do not perform the save, rollback, or load operation when another user is performing the
operation. If multiple users simultaneously perform the save, rollback, or load operation, the
result returned to each user might be inconsistent with the user request.

Modified feature: Displaying information
about SSH users
Feature change description
In this release, the display ssh user-information command does not display the public key name
for an SSH user that uses password authentication.

Command changes
Modified command: display ssh user-information
Syntax
display ssh user-information [ username ]

Views
Any view

Change description
Before modification: The User-public-key-name field in the command output displays null for an
SSH user that uses password authentication.
After modification: The User-public-key-name field in the command output is blank for an SSH user
that uses password authentication.

93

Modified feature: SIP trusted nodes
Configuring SIP trusted nodes
In this release, you can enable the trusted node feature by using the ip address trusted
authenticate command. You also can display information about SIP trusted nodes by using the
display voice ip address trusted list command.

Command changes
The display voice ip address trusted list and ip address trusted authenticate commands were
added.

New command: display voice ip address trusted list
Use display voice ip address trusted list to display information about trusted nodes.

Syntax
display voice ip address trusted list

Views
Any view

Predefined user roles
network-admin
network-operator

Usage guidelines
This command displays trusted nodes in the trusted node list and call destination IP addresses.

Examples
# Display information about trusted nodes.
 display voice ip address trusted list
IP address trusted authentication: Enabled
VoIP entity IP addresses:
Entity tag

State

SIP IP address

----------

-----

--------------

20

Up

192.168.4.110

53232

Down

192.168.4.210

55555

Up

192.168.4.210

9613

Up

192.168.4.125

IP address trusted list:

94

192.168.4.0 255.255.255.0
192.168.5.120 255.255.255.255

Command output
Field

Description

IP address trusted authentication

Whether IP address trusted authentication is enabled:
 Enabled.
 Disabled.

VoIP entity IP addresses

Trusted IP addresses for VoIP entities.

Entity tag

Tag of a VoIP entity.

State

Status of a VoIP entity:
 Up.
 Down.

SIP IP address

Call destination IP address of a VoIP entity.

IP address trusted list

List of trusted nodes.

New command: ip address trusted authenticate
Use ip address trusted authenticate to enable IP address trusted authentication.
Use undo ip address trusted authenticate to disable IP address trusted authentication.

Syntax
ip address trusted authenticate
undo ip address trusted authenticate

Default
IP address trusted authentication is disabled. All nodes are regarded as trusted, and the device
accepts calls from any nodes.

Views
SIP view

Predefined user roles
network-admin

Usage guidelines
After you enable this feature, the device accepts calls only from trusted nodes.
For calls to be successfully established, configure the proxy server, registrars, the DNS server, and
the MWI server as trusted nodes.

Examples
# Enable IP address trusted authentication.
 system-view
[Sysname] voice-setup
[Sysname-voice] sip

95

[Sysname-voice-sip] ip address trusted authenticate

Modified feature: IPsec ESP encryption
algorithms
Feature change description
Support for the following IPsec ESP encryption algorithms was added in high encryption mode:


AES algorithm in CTR mode.



Camellia algorithm in CBC mode.



GMAC algorithm.



GCM algorithm.



SM1 algorithm in CBC mode.



SM4 algorithm.

For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command changes
The following arguments were added to the esp encryption-algorithm command:


aes-ctr-128.



aes-ctr-192.



aes-ctr-256.



camellia-cbc-128.



camellia-cbc-192.



camellia-cbc-256.



gmac-128.



gmac-192.



gmac-256.



gcm-128.



gcm-192.



gcm-256.



sm1-cbc-128.



sm1-cbc-192.



sm1-cbc-256.
96



sm4-cbc.

For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

Modified feature: IPsec ESP
authentication algorithms
Feature change description
Support for the following IPsec ESP authentication algorithms was added:


AES-XCBC-MAC.



HMAC-SHA-25.



HMAC-SHA-384.



HMAC-SHA-512.



HMAC-SM3.

For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command changes
The following arguments were added to the esp authentication-algorithm command:


aes-xcbc-mac.



sha256.



sha384.



sha512.



sm3.

For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

97

Modified feature: IPsec AH authentication
algorithms
Feature change description
Support for the following IPsec AH authentication algorithms was added:


AES-XCBC-MAC.



HMAC-SHA-256.



HMAC-SHA-384.



HMAC-SHA-512.



HMAC-SM3.

For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command changes
The following arguments were added to the ah authentication-algorithm command:


aes-xcbc-mac.



sha256.



sha384.



sha512.



sm3.

For more information about the command, see IPsec commands in H3C MSR Router Series
Comware 7 Security Command Reference.

Modified feature: Specifying an encryption
algorithm for an IKE proposal
Feature change description
In this release, you can specify the following encryption algorithms for an IKE proposal:


sm1-cbc-128.



sm1-cbc-192.

98



sm1-cbc-256.

For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command changes
The following keywords were added to the encryption-algorithm command:


sm1-cbc-128.



sm1-cbc-192.



sm1-cbc-256.

For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

Modified feature: Specifying an
authentication algorithm for an IKE
proposal
Feature change description
In this release, you can specify the sm3 authentication algorithm for an IKE proposal.
For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command changes
The sm3 argument was added to the authentication-algorithm command.
For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

99

Modified feature: Generating asymmetric
key pairs
Feature change description
In this release, you can generate ECDSA key pairs by using the secp384r1 elliptic curve.
For information about this feature, see public key management in H3C MSR Router Series Comware
7 Security Configuration Guide.

Command changes
The secp384r1 keyword was added to the public-key local create command.
For information about the command, see public key management commands in H3C MSR Router
Series Comware 7 Command Reference.

Modified feature: Specifying an ECDSA
key pair for certificate request
Feature change description
In this release, you can specify an ECDSA key pair with a specific key length for certificate request.
Supported key lengths are:


192 bits.



256 bits.



384 bits.

For information about this feature, see PKI in H3C MSR Router Series Comware 7 Security
Configuration Guide.

Command changes
The following keywords were added to the public-key ecdsa name command:


secp192r1.



secp256r1.



secp384r1.
100

For information about the command, see PKI commands in H3C MSR Router Series Comware 7
Command Reference.

Modified feature: QoS MIB
Feature change description
In this release, QoS MIB information changed.

Modified feature: Enabling PFS for an
IPsec transform set
Feature change description
In this release, you can enable PFS using 256-bit or 384-bit ECP Diffie-Hellman group for an IPsec
transform set.
For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command changes
The dh-group19 and dh-group20 keywords were added to the pfs command.
For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

Modified feature: Displaying track entry
infomration
Feature change description
The following fields were added to the output of the display track command:


IP route.



VPN instance name.



Protocol.

101



Nexthop interface.

Command changes
Modified command: display track
Syntax
display track { track-entry-number | all }

Views
Any view

Change description
The following fields were added to the command output:


IP route.



VPN instance name.



Protocol.



Nexthop interface.

Removed feature: Tiny proxy
Feature change description
The tiny proxy feature was removed.

Removed command
http-proxy
Syntax
http-proxy
undo http-proxy

Views
System view

102

Removed feature: Displaying switching
fabric channel usage
Feature change description
Support for displaying switching fabric channel usage on interface cards was removed.

Removed command
display fabric utilization
Syntax
In standalone mode:
display fabric utilization [ slot slot-number ]
In IRF mode:
display fabric utilization [ chassis chassis-number slot slot-number ]

Views
Any view

Release 0408P05
This release has the following changes:
New feature: BGP trap support for VRF information
New feature: SSH redirect

New feature: BGP trap support for VRF
information
VRF information is added to BGP traps as the context name.

103

New feature: SSH redirect
Configuring SSH redirect
About SSH redirect
SSH redirect provides redirect service for Stelnet clients. An Stelnet client can access a destination
device by using the IP address of the SSH redirect server instead of the IP address of the destination
device.
As shown in Figure 1, a user can log in to the SSH redirect server (Device) through Stelnet, and then
access the destination device (Device A).
To access Device A, perform the following tasks on the PC:
1.

Launch an SSH client software on the PC to establish a connection.

2.

Configure connection parameters according to the authentication method.

3.

Enter IP address 192.168.1.1 and listening port 4001 of the SSH redirect server.

4.

When the login prompt appears on the PC, press Enter to enter user view of Device A.

Figure 1 Logging in to Device A through the SSH redirect server
192.168.1.1/24

Port 4001
Async1/2

SSH client

Console

SSH redirect server
Device

Device A

Restrictions and guidelines
The device (SSH redirect server) allows only one login to the same destination device at a time.

Prerequisites
Before you configure SSH redirect, complete the following tasks:


Use an asynchronous interface of the SSH redirect server to connect to the console port or AUX
port of the destination device. An asynchronous interface can be a dedicated asynchronous
interface or a synchronous/asynchronous serial interface operating in asynchronous mode.



If the SSH redirect server is connected to the AUX port of the destination device, perform the
following tasks:
a. Log in to the destination device through the console port.
b. Disable login authentication for the AUX line.

104

Procedure
Configuring the asynchronous serial interface
Step

Command

54. Enter system view.

system-view


55. Enter
synchronous/asynchronous
serial interface view or
asynchronous interface view.


56. Set the operating mode to
flow mode.

Enter
synchronous/asynchronous
serial interface view and
configure it to operate in
asynchronous mode:
a. interface serial
interface-number
b. physical-mode async
Enter asynchronous interface
view:
interface async
interface-number

async-mode flow

Remarks
N/A

To use a
synchronous/asynchronous
serial interface, you must use a
connector to connect the
interface to the destination
device.

By default, an asynchronous
serial interface operates in
protocol mode.
By default, level detection is
enabled.

57. (Optional.) Disable level
detection.

undo detect dsr-dtr

Whether this command is
required depends on the
destination device.

58. Return to system view.

quit

N/A

Configuring the AUX/TTY user line
Step

Command

Remarks

59. Enter AUX or TTY line view.

line { first-number1
[ last-number1 ] | { aux | tty }
first-number2 [ last-number2 ] }

N/A

60. (Optional.) Enable the
terminal service.

shell

By default, the terminal service is
enabled on all user lines.
By default, the transmission rate
is 9600 bps.

61. Set the transmission rate.

speed speed-value

62. Enable stop bit setting
consistency detection.

stopbit-error intolerance

The user line must use the same
transmission rate as the
destination device.
By default, stop bit setting
consistency detection is disabled.
By default, the number of stop bits
is 1.

63. Specify the number of stop
bits.

stopbits { 1 | 1.5 | 2 }

105

Set the same number of stop bits
for the user line on the SSH
redirect server as the destination
device.

Configuring SSH redirect
Step

Command

Remarks

64. Enable SSH redirect.

ssh redirect enable

By default, SSH redirect is
disabled.

65. (Optional.) Specify an SSH
redirect listening port.

ssh redirect listen-port
port-number

By default, the listening port
number of SSH redirect is the
absolute user line number plus
4000.

66. (Optional.) Set the
idle-timeout timer for the
redirected connection.

ssh redirect timeout time

The default idle-timeout timer is
360 seconds.

67. (Optional.) Terminate the
redirected SSH connection.

ssh redirect disconnect

N/A

68. Return to system view.

quit

N/A

69. (Optional.) Associate the
SSH redirect listening port
with an IP address.

ssh ip alias ip-address
port-number

By default, an SSH redirect
listening port is not associated
with an IP address.

Command reference
Modified command: display ssh server
Old syntax
display ssh server { session | status }

New syntax
Centralized devices:
display ssh server { session | status }
Distributed devices in standalone mode/centralized devices in IRF mode:
display ssh server { session [ slot slot-number [ cpu cpu-number ] ] | status }
Distributed devices in IRF mode:
display ssh server { session [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] |
status }

Views
Any view

Command change description
After modification, parameters were added to the command and the parameters available for a
device vary by device type.


slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command
displays the SSH server sessions for all cards. (Distributed devices in standalone mode.)

106



slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a
member device, this command displays the SSH server sessions for all member devices.
(Centralized IRF devices, IRF 3 incapable.)



slot slot-number: Specifies an IRF member device by its member ID or specifies a PEX by its
virtual slot number. On an IRF 2 fabric, this command displays the SSH server sessions for all
member devices if you do not specify a member device. On an IRF 3 system, this command
displays the SSH server sessions for all IRF 2 member devices and PEXs if you do not specify
an IRF 2 member device or PEX. (Centralized IRF devices, IRF 3 capable.)



chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The
chassis-number argument represents the member ID of the IRF member device. The
slot-number argument represents the slot number of the card. If you do not specify a card, this
command displays the SSH server sessions for all cards. (Distributed devices–In IRF mode,
IRF 3 incapable.)



chassis chassis-number slot slot-number: Specifies a card on an IRF member device or
specifies a PEX. The chassis-number argument represents the member ID of the IRF member
device or the virtual chassis number of the PEX. The slot-number argument represents the slot
number of the card or PEX. On an IRF 2 fabric, this command displays the SSH server sessions
for all member devices if you do not specify a member device. On an IRF 3 system, this
command displays the SSH server sessions for all IRF 2 member devices and PEXs if you do
not specify a member device or PEX. (Distributed devices–In IRF mode, IRF 3 capable.)



cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs
are available on the specified slot.

New command: ssh ip alias
Use ssh ip alias to associate an SSH redirect listening port with an IP address.
Use undo ssh ip alias to delete the IP address associated with the SSH redirect listening port.

Syntax
ssh ip alias ip-address port-number
undo ssh ip alias ip-address

Default
An SSH redirect listening port is not associated with an IP address.

Views
System view

Predefined user roles
network-admin

107

Parameters
ip-address: Specifies the IP address to be associated with the SSH redirect listening port. The IP
address cannot be the address of an interface on the device, but can be on the same subnet as the
device.
port-number: Specifies an SSH redirect listening port number in the range of 4000 to 50000.

Usage guidelines
The SSH redirect server can provide the SSH redirect service after SSH redirect is enabled and an
SSH redirect listening port is configured. The SSH client can use the ssh2 ip address port number
command to access the destination device. The ip address argument and the port number argument
specify the IP address of the SSH redirect server and the SSH redirect listening port, respectively.
After the ssh ip alias command is configured, the client can use the ssh2 ip address command to
access the destination device. The ip address argument specifies the IP address associated with the
SSH redirect listening port.
If you specify multiple SSH redirect listening ports for an IP address, the most recent configuration
takes effect.

Examples
# Associate SSH redirect listening port 2000 with IP address 1.1.1.1.
 system-view
[Sysname] ssh ip alias 1.1.1.1 4000

New command: ssh redirect disconnect
Use ssh redirect disconnect to terminate the redirected SSH connection.

Syntax
ssh redirect disconnect

Views
AUX line view
TTY line view

Predefined user roles
network-admin

Examples
# Manually terminate the redirected SSH connection on TTY line 1.
 system-view
[Sysname] line tty 1
[Sysname-line-tty1] ssh redirect disconnect

108

New command: ssh redirect enable
Use ssh redirect enable to enable SSH redirect for a user line.
Use undo ssh redirect enable to disable SSH redirect for a user line.

Syntax
ssh redirect enable
undo ssh redirect enable

Default
SSH redirect is disabled for a user line.

Views
AUX line view
TTY line view

Predefined user roles
network-admin

Usage guidelines
Configure the user line connected to the destination device to use the same transmission rate and
number of stop bits as the destination device. To change the transmission rate for the user line, use
the speed command.
To identify whether the user line and the destination device are using the same number of stop bits,
use the stopbit-error intolerance command. To change the number of stop bits, use the stopbits
command.
For more information about the transmission rate and stop bits, see the login management
configuration in Fundamentals Configuration Guide.

Examples
# Enable SSH redirect on TTY line 7.
 system-view
[Sysname] line tty 7
[Sysname-line-tty7] ssh redirect enable

New command: ssh redirect listen-port
Use ssh redirect listen-port to set a listening port of SSH redirect.
Use undo ssh redirect listen-port to restore the default.

Syntax
ssh redirect listen-port port-number
undo ssh redirect listen-port
109

Default
The SSH redirect listening port number is the absolute user line number plus 4000.

Views
AUX line view
TTY line view

Predefined user roles
network-admin

Parameters
port-number: Specifies the number of the SSH redirect listening port, in the range of 4000 to 50000.

Usage guidelines
The device redirects only SSH connection requests destined for the SSH redirect listening port.

Examples
# Set the SSH redirect listening port number to 5000 on TTY line 1.
 system-view
[Sysname] line tty 1
[Sysname-line-tty1] ssh redirect listen-port 5000

New command: ssh redirect timeout
Use ssh redirect timeout to set the idle-timeout timer for the redirected SSH connection.
Use undo ssh redirect timeout to restore the default.

Syntax
ssh redirect timeout time
undo ssh redirect timeout

Default
The idle-timeout timer is 360 seconds.

Views
AUX line view
TTY line view

Predefined user roles
network-admin

Parameters
time: Specifies the idle-timeout timer in seconds. The value range is 0 to 86400. To disable the
timeout mechanism, set the timeout timer to 0.

110

Usage guidelines
If no data is received from the SSH client before the timer expires, the user line terminates the
redirected connection.

Examples
# Set the idle-timeout timer to 200 seconds for the redirected SSH connection.
 system-view
[Sysname] line tty 1
[Sysname-line-tty1] ssh redirect timeout 200

Release 0407
None

ESS 0404P06
None

ESS 0403
None

111

HPE
MSR954_MSR954P_MSR958-CMW710-R4
11 Release Notes
Software Feature Changes

The information in this document is subject to change without notice.
© Copyright [First Year] 2015, [Current Year] 2016 Hewlett Packard Enterprise Development LP

Contents
Release 0411 ················································································ 10
Release 0410 ················································································ 10
New feature: Support of multicast for ADVPN ······································· 13
Configuring support of multicast for ADVPN ···················································································· 13
Command reference ··················································································································· 13

New feature: Application layer state filtering ········································· 13
Configuring application layer state filtering ······················································································ 13
Command reference ··················································································································· 13

New feature: SIP keepalive ······························································ 14
Configuring SIP keepalive ············································································································ 14
Command reference ··················································································································· 14
New command: options-ping ································································································· 14
New command: voice-class sip options-ping ············································································· 15

New feature: Multicast fast forwarding ················································ 15
Configuring multicast fast forwarding ····························································································· 15
Command reference ··················································································································· 16
New command: display multicast fast-forwarding cache······························································ 16
New command: reset multicast fast-forwarding cache ································································ 17
New command: display ipv6 multicast fast-forwarding cache ······················································· 18
New command: reset ipv6 multicast fast-forwarding cache ·························································· 20

New feature: Attack defense policy application to a security zone ············· 21
Applying an attack defense policy to a security zone ········································································· 21
Command reference ··················································································································· 21

New feature: AAA support for IKE extended authentication ····················· 22
Configuring IKE extended authentication ························································································ 22
Command reference ··················································································································· 22

New feature: Percentage-based CAR ················································· 22
Configuring percentage-based CAR ······························································································ 22
Command reference ··················································································································· 22

New feature: Logging OSPF router ID conflict events ····························· 23
Logging OSPF router ID conflict events ·························································································· 23
Command reference ··················································································································· 23

New feature: AFT ··········································································· 23
Configuring AFT ························································································································ 23
Command reference ··················································································································· 23

New feature: Configuring enhanced CC authentication in FIPS mode ········ 23
Configuring enhanced CC authentication in FIPS mode ···································································· 23
Command reference ··················································································································· 24

New feature: Support of AAA for NETCONF ········································ 24
Configuring support of AAA for NETCONF ······················································································ 24
Command reference ··················································································································· 24

New feature: Mobile IP tunnel interface settings ···································· 24
Configuring the mobile IP tunnel interface settings ··········································································· 24
Command reference ··················································································································· 25
i

New feature: LISP ·········································································· 25
Configuring LISP························································································································ 25
Command reference ··················································································································· 25

New feature: LISP tunnel entries and dynamic mobility··························· 26
Configuring LISP tunnel entries and dynamic mobility ······································································· 26
Command reference ··················································································································· 26

New feature: Support of IPv6 multicast routing for VPN instances ············· 26
Enabling support of IP multicast routing for VPN instances ································································ 26
Command reference ··················································································································· 26

New feature: LISP virtual machine multi-hop mobility and DDT ················ 26
Configuring LISP virtual machine multi-hop mobility and DDT ····························································· 26
Command reference ··················································································································· 26

New feature: LISP NSR ··································································· 27
Configuring LISP NSR ················································································································ 27
Command reference ··················································································································· 27

New feature: PPPoE client support for IPv6 ········································· 27
Associating a dial rule with a dialup interface ··················································································· 27
Command reference ··················································································································· 27
Specifying an IPv6 prefix for an interface to automatically generate an IPv6 global unicast address ··········· 27
Command reference ··················································································································· 28

New feature: DPI engine and content filtering ······································· 28
Configuring the DPI engine and content filtering ··············································································· 28
Command reference ··················································································································· 28

New feature: IPS ············································································ 28
Configuring IPS ························································································································· 28
Command reference ··················································································································· 28

New feature: NBAR ········································································ 28
Configuring NBAR ······················································································································ 28
Command reference ··················································································································· 28

New feature: URL filtering ································································ 29
Configuring URL filtering ············································································································· 29
Command reference ··················································································································· 29

New feature: Local portal Web server ················································· 29
Configuring a local portal Web server····························································································· 29
Command reference ··················································································································· 29

New feature: Support of portal for NETCONF ······································· 30
New feature: Newly-added MIB objects ··············································· 30
New feature: IPS, ACG, and SSL VPN licenses ···································· 30
New feature: Support of NQA for NETCONF ········································ 30
New feature: Configuring CWMP to support VPN ·································· 30
Configuring CWMP to support VPN ······························································································· 30
Command reference ··················································································································· 30

New feature: Transceiver module source alarm ···································· 31
Disabling transceiver module source alarm ····················································································· 31
Command reference ··················································································································· 31
ii

transceiver phony-alarm-disable····························································································· 31

New feature: VLAN interface performance optimization ·························· 31
New feature: NAT support for multicast source address in PIM join/prune
packets ························································································ 31
New feature: GDOI GM group anti-replay window ································· 31
Configuring the anti-replay window for a GDOI GM group ·································································· 31
Command reference ··················································································································· 32
client anti-replay window ······································································································· 32

New feature: SIP compatibility ·························································· 33
Configuring SIP compatibility ········································································································ 33
Command reference ··················································································································· 33
New command:sip-compatible ······························································································· 33

New feature: Voice VLAN ································································ 34
Configuring a voice VLAN ············································································································ 34
Configuring a port to operate in automatic voice VLAN assignment mode ······································ 34
Configuring a port to operate in manual voice VLAN assignment mode ········································· 35
Enabling LLDP for automatic IP phone discovery ······································································ 36
Configuring LLDP to advertise a voice VLAN ············································································ 37
Configuring CDP to advertise a voice VLAN ············································································· 37
Displaying and maintaining voice VLANs ················································································· 37
Command reference ··················································································································· 38

New feature: L2TP-based EAD ························································· 38
Enabling L2TP-based EAD ·········································································································· 38
Command reference ··················································································································· 39
ppp access-control enable ···································································································· 39
display ppp access-control interface ······················································································· 39

New feature: BFD for an aggregation group ········································· 41
Enabling BFD for an aggregation group ·························································································· 41
Command reference ··················································································································· 42
link-aggregation bfd ipv4 ······································································································· 42

New feature: 4G modem IMSI/SN binding authentication ························ 43
Command reference ··················································································································· 43
apn ··································································································································· 43
apn-profile·························································································································· 44
apn-profile apply ················································································································· 44
attach-format ······················································································································ 45
authentication-mode ············································································································ 46

New feature: Media Stream Control (MSC) logging································ 47
Command reference ··················································································································· 47
New command: sip log enable ······························································································· 47

New feature: IMSI/SN binding authentication········································ 48
Command reference ··················································································································· 48
ppp lcp imsi accept ·············································································································· 48
ppp lcp imsi request ············································································································· 48
ppp lcp imsi string················································································································ 49
ppp lcp sn accept ················································································································ 49
ppp lcp sn request ··············································································································· 50
ppp lcp sn string ·················································································································· 50
ppp user accept-format imsi-sn split ························································································ 51
ppp user attach-format imsi-sn split························································································· 52
ppp user replace ················································································································· 53
iii

New feature: Specifying a band for a 4G modem ·································· 53
Command reference ··················································································································· 53
lte band ····························································································································· 53

New feature: Using tunnel interfaces as OpenFlow ports ························ 54
New feature: NETCONF support for ACL filtering ·································· 54
Command reference ··················································································································· 54
netconf soap http acl ············································································································ 54
netconf soap https acl ·········································································································· 55

New feature: WAAS ········································································ 56
Configuring WAAS ····················································································································· 56
Command reference ··················································································································· 56

New feature: Support for the MKI field in SRTP or SRTCP packets ··········· 56
Command reference ··················································································································· 57
New command: mki ············································································································· 57

New feature: SIP domain name ························································· 57
Command reference ··················································································································· 57
New command: sip-domain ··································································································· 57

New feature: Setting the maximum size of advertisement files ················· 58
New feature: Support of VCF for NETCONF ········································ 58
New feature: Support of SNMP for NETCONF ······································ 58
New feature: Support of file system for NETCONF ································ 59
New feature: Support of PoE for NETCONF ········································· 59
New feature: Support of RMON for NETCONF ····································· 59
New feature: Support of policy-based routing for NETCONF ···················· 59
New feature: Support of BGP for NETCONF ········································ 59
New feature: Support of OSPF for NETCONF ······································ 59
New feature: Support of ping for NETCONF ········································· 59
New feature: Support of tracert for NETCONF ······································ 59
New feature: Support of L2VPN for NETCONF ····································· 60
New feature: SIP support for VRF ······················································ 60
Configuring SIP support for VRF ··································································································· 60
Command reference ··················································································································· 60

New feature: IKEv2 ········································································· 60
Configuring IKEv2 ······················································································································ 60
Command reference ··················································································································· 60

New feature: Specifying an IKEv2 profile for an IPsec policy ···················· 60
Specifying an IKEv2 profile for an IPsec policy················································································· 60
Command reference ··················································································································· 60

New feature: Bidirectional BFD control detection for RIP························· 61
Configuring bidirectional BFD control detection for RIP ····································································· 61
iv

Command reference ··················································································································· 61

New feature: OSPF router ID autoconfiguration ···································· 61
Automatically obtaining an OSPF router ID ····················································································· 61
Command reference ··················································································································· 61

New feature: Associating a static route with a track entry ························ 61
Associating a static route with a track entry ····················································································· 61
Command reference ··················································································································· 62

New feature: VLAN tag processing rule for incoming traffic ····················· 62
Configuring the VLAN tag processing rule for incoming traffic ····························································· 62
Command reference ··················································································································· 62

New feature: IP-based portal-free rule ················································ 62
Configuring an IP-based portal free-rule ························································································· 62
Command reference ··················································································································· 62

New feature: Portal redirect packet statistics ········································ 62
Displaying/maintaining portal redirect packet statistics ······································································ 62
Command reference ··················································································································· 63

New feature: GDVPN ······································································ 63
Configuring GDVPN ··················································································································· 63
Command reference ··················································································································· 63

New feature: OpenFlow instance ······················································· 63
Configuring the OpenFlow instance mode ······················································································· 63
Command reference ··················································································································· 63
Binding an OpenFlow instance to ports ·························································································· 63
Command reference ··················································································································· 63
Binding an port to an OpenFlow instance ························································································ 64
Command reference ··················································································································· 64

New feature: Enabling the Extended Sequence Number (ESN) feature for an
IPsec transform set ········································································· 64
Enabling ESN for an IPsec transform set ························································································ 64
Command reference ··················································································································· 64

New feature: Enabling Traffic Flow Confidentiality (TFC) padding for an IPsec
policy ··························································································· 64
Enabling TFC padding for an IPsec policy ······················································································· 64
Command reference ··················································································································· 64

New feature: SIP session refresh ······················································· 65
Enabling SIP session refresh········································································································ 65
Command reference ··················································································································· 65
New command: voice-class sip session refresh ········································································· 65

Modified feature: User profile ···························································· 66
Feature change description ·········································································································· 66

Modified feature: Tunnel interface support for IPsec and VXLAN tunnel modes
·································································································· 66
1.
2.

Feature change description ··································································································· 66
Command changes ············································································································· 66
1. Modified command: interface tunnel ················································································· 66

Modified feature: PKI certificate auto-renewal ······································· 67
Feature change description ·········································································································· 67
v

Command changes ···················································································································· 67
Modified command: certificate request mode ············································································ 67
New command: display pki certificate renew-status···································································· 67

Modified feature: Configuring the PKI entity DN ···································· 69
Feature change description ·········································································································· 69
Command changes ···················································································································· 69
New command: subject-dn ···································································································· 69

Modified feature: ADVPN ································································· 70
Feature change description ·········································································································· 70
Command changes ···················································································································· 71
New command: advpn group ································································································· 71
2. New command: advpn map group ··················································································· 72

Modified feature: Telnet redirect ························································ 73
Feature change description ·········································································································· 73

Modified feature: DHCP snooping performance optimization ··················· 73
Feature change description ·········································································································· 73

Modified feature: OSPF performance optimization ································· 73
Feature change description ·········································································································· 73
Command changes ···················································································································· 73
Modified command: spf-schedule-interval ················································································ 73
Modified command: transmit-pacing ························································································ 74

Modified feature: IP performance optimization ······································ 74
Feature change description ·········································································································· 74
Command changes ···················································································································· 74
New command: tcp mac-record enable···················································································· 74
New command: tcp mac-record local ······················································································ 75

Modified feature: AAA ····································································· 76
Feature change description ·········································································································· 76
Command changes ···················································································································· 76
New command: authorization ike ···························································································· 76

Modified feature: Configuring a cellular interface for a 3G/4G modem ········ 77
Feature change description ·········································································································· 77
Command changes ···················································································································· 77
New command: rssi ············································································································· 77

Modified feature: QoS on VXLAN tunnel interfaces ································ 78
Feature change description ·········································································································· 78
Command changes ···················································································································· 78

Modified feature: Option 60 encapsulation in DHCP replies ····················· 79
Feature change description ·········································································································· 79

Modified feature: MPLS QoS support for matching the EXP field ·············· 79
Feature change description ·········································································································· 79
Command changes ···················································································································· 79
New command: if-match second-mpls-exp ··············································································· 79

Modified feature: MPLS QoS support for marking the EXP field ················ 80
Feature change description ·········································································································· 80
Command changes ···················································································································· 80
New command: remark second-mpls-exp ················································································ 80

Modified feature: Automatic configuration ············································ 81
Feature change description ·········································································································· 81
vi

Modified feature: User profile ···························································· 81
Feature change description ·········································································································· 81
Command change ······················································································································ 81
Modified command: user-profile ····························································································· 81

Modified feature: Default size of the TCP receive and send buffer ············ 82
Feature change description ·········································································································· 82
Command changes ···················································································································· 82
Modified command: tcp window ····························································································· 82

Modified feature: Support for per-packet load sharing ···························· 82
Feature change description ·········································································································· 82
Command changes ···················································································································· 82
Modified command: ip load-sharing mode ················································································ 82

Modified feature: Default user role ····················································· 83
Feature change description ·········································································································· 83
Command changes ···················································································································· 83
Modified command: role default-role enable ············································································· 83

Modified feature: Debugging ····························································· 84
Feature change description ·········································································································· 84
Command changes ···················································································································· 84
Modified command: debugging ······························································································ 84

Modified feature: SSH username ······················································· 85
Feature change description ·········································································································· 85
Command changes ···················································································································· 85
Modified command: ssh user ································································································· 85

Modified feature: IS-IS hello packet sending interval ······························ 86
Feature change description ·········································································································· 86
Command changes ···················································································································· 86
Modified command: isis timer hello ························································································· 86

Modified feature: 802.1X redirect URL ················································ 86
Feature change description ·········································································································· 86
Command changes ···················································································································· 86
Modified command: dot1x ead-assistant url ·············································································· 86

Modified feature: Displaying information about NTP servers from the reference
source to the primary NTP server ······················································ 87
Feature change description ·········································································································· 87
Command changes ···················································································································· 87
Modified command: display ntp-service trace ············································································ 87

Modified feature: Saving, rolling back, and loading the configuration ········· 87
Modified feature: Displaying information about SSH users ······················ 88
Feature change description ·········································································································· 88
Command changes ···················································································································· 88
Modified command: display ssh user-information······································································· 88

Modified feature: SIP trusted nodes···················································· 88
Configuring SIP trusted nodes ······································································································ 88
Command changes ···················································································································· 89
New command: display voice ip address trusted list ··································································· 89
New command: ip address trusted authenticate ········································································ 90

vii

Modified feature: IPsec ESP encryption algorithms ································ 91
Feature change description ·········································································································· 91
Command changes ···················································································································· 91

Modified feature: IPsec ESP authentication algorithms ··························· 92
Feature change description ·········································································································· 92
Command changes ···················································································································· 92

Modified feature: IPsec AH authentication algorithms ····························· 92
Feature change description ·········································································································· 92
Command changes ···················································································································· 93

Modified feature: Specifying an encryption algorithm for an IKE proposal ··· 93
Feature change description ·········································································································· 93
Command changes ···················································································································· 93

Modified feature: Specifying an authentication algorithm for an IKE proposal
·································································································· 94
Feature change description ·········································································································· 94
Command changes ···················································································································· 94

Modified feature: Generating asymmetric key pairs ································ 94
Feature change description ·········································································································· 94
Command changes ···················································································································· 94

Modified feature: Specifying an ECDSA key pair for certificate request ······ 95
Feature change description ·········································································································· 95
Command changes ···················································································································· 95

Modified feature: QoS MIB ······························································· 95
Feature change description ·········································································································· 95

Modified feature: Enabling PFS for an IPsec transform set ······················ 96
Feature change description ·········································································································· 96
Command changes ···················································································································· 96

Modified feature: Displaying track entry infomration ······························· 96
Feature change description ·········································································································· 96
Command changes ···················································································································· 96
Modified command: display track ···························································································· 96

Removed feature: Tiny proxy ···························································· 97
Feature change description ·········································································································· 97
Removed command ··················································································································· 97
http-proxy ·························································································································· 97

Removed feature: Displaying switching fabric channel usage ·················· 97
Feature change description ·········································································································· 97
Removed command ··················································································································· 98
display fabric utilization········································································································· 98

Release 0408P05··········································································· 98
New feature: BGP trap support for VRF information ······························· 98
New feature: SSH redirect ································································ 98
Configuring SSH redirect ············································································································· 98
About SSH redirect ·············································································································· 98
Restrictions and guidelines···································································································· 99
Prerequisites ······················································································································ 99
viii

Procedure ·························································································································· 99
Command reference ················································································································· 101
Modified command: display ssh server ·················································································· 101
New command: ssh ip alias ································································································· 102
New command: ssh redirect disconnect ················································································· 103
New command: ssh redirect enable ······················································································ 103
New command: ssh redirect listen-port ·················································································· 104
New command: ssh redirect timeout ····················································································· 105

Release 0407 ·············································································· 105
ESS 0404P06·············································································· 105
ESS 0403 ··················································································· 105

ix

Release 0411
None.

Release 0410
This release has the following changes:
New feature: Support of multicast for ADVPN
New feature: Application layer state filtering
New feature: SIP keepalive
New feature: Multicast fast forwarding
New feature: Attack defense policy application to a security zone
New feature: AAA support for IKE extended authentication
New feature: Percentage-based CAR
New feature: Logging OSPF router ID conflict events
New feature: AFT
New feature: Configuring enhanced CC authentication in FIPS mode
New feature: Support of AAA for NETCONF
New feature: Mobile IP tunnel interface settings
New feature: LISP
New feature: LISP tunnel entries and dynamic mobility
New feature: Support of IPv6 multicast routing for VPN instances
New feature: LISP virtual machine multi-hop mobility and DDT
New feature: LISP NSR
New feature: PPPoE client support for IPv6
New feature: DPI engine and content filtering
New feature: IPS
New feature: NBAR
New feature: URL filtering
New feature: Local portal Web server
New feature: Support of portal for NETCONF
New feature: Newly-added MIB objects
New feature: IPS, ACG, and SSL VPN licenses
New feature: Support of NQA for NETCONF
New feature: Configuring CWMP to support VPN
New feature: Transceiver module source alarm
New feature: VLAN interface performance optimization
New feature: NAT support for multicast source address in PIM join/prune packets
10

New feature: GDOI GM group anti-replay window
New feature: SIP compatibility
New feature: Voice VLAN
New feature: L2TP-based EAD
New feature: BFD for an aggregation group
New feature: 4G modem IMSI/SN binding authentication
New feature: Media Stream Control (MSC) logging
New feature: IMSI/SN binding authentication
New feature: Specifying a band for a 4G modem
New feature: Using tunnel interfaces as OpenFlow ports
New feature: NETCONF support for ACL filtering
New feature: WAAS
New feature: Support for the MKI field in SRTP or SRTCP packets
New feature: SIP domain name
New feature: Setting the maximum size of advertisement files
New feature: Support of VCF for NETCONF
New feature: Support of SNMP for NETCONF
New feature: Support of file system for NETCONF
New feature: Support of PoE for NETCONF
New feature: Support of RMON for NETCONF
New feature: Support of policy-based routing for NETCONF
New feature: Support of BGP for NETCONF
New feature: Support of OSPF for NETCONF
New feature: Support of ping for NETCONF
New feature: Support of tracert for NETCONF
New feature: Support of L2VPN for NETCONF
New feature: SIP support for VRF
New feature: IKEv2
New feature: Specifying an IKEv2 profile for an IPsec policy
New feature: Bidirectional BFD control detection for RIP
New feature: OSPF router ID autoconfiguration
New feature: Associating a static route with a track entry
New feature: VLAN tag processing rule for incoming traffic
New feature: IP-based portal-free rule
New feature: Portal redirect packet statistics
New feature: GDVPN
New feature: OpenFlow instance
New feature: Enabling the Extended Sequence Number (ESN) feature for an IPsec transform set
New feature: Enabling Traffic Flow Confidentiality (TFC) padding for an IPsec policy
11

New feature: SIP session refresh
Modified feature: User profile
Modified feature: Tunnel interface support for IPsec and VXLAN tunnel modes
Modified feature: PKI certificate auto-renewal
Modified feature: Configuring the PKI entity DN
Modified feature: ADVPN
Modified feature: Telnet redirect
Modified feature: DHCP snooping performance optimization
Modified feature: OSPF performance optimization
Modified feature: IP performance optimization
Modified feature: AAA
Modified feature: Configuring a cellular interface for a 3G/4G modem
Modified feature: QoS on VXLAN tunnel interfaces
Modified feature: Option 60 encapsulation in DHCP replies
Modified feature: MPLS QoS support for matching the EXP field
Modified feature: MPLS QoS support for marking the EXP field
Modified feature: Automatic configuration
Modified feature: User profile
Modified feature: Default size of the TCP receive and send buffer
Modified feature: Support for per-packet load sharing
Modified feature: Default user role
Modified feature: Debugging
Modified feature: SSH username
Modified feature: IS-IS hello packet sending interval
Modified feature: Displaying information about NTP servers from the reference source to the primary
NTP server
Modified feature: Saving, rolling back, and loading the configuration
Modified feature: Displaying information about SSH users
Modified feature: SIP trusted nodes
Modified feature: IPsec ESP encryption algorithms
Modified feature: IPsec ESP authentication algorithms
Modified feature: IPsec AH authentication algorithms
Modified feature: Specifying an encryption algorithm for an IKE proposal
Modified feature: Specifying an authentication algorithm for an IKE proposal
Modified feature: Generating asymmetric key pairs
Modified feature: Specifying an ECDSA key pair for certificate request
Modified feature: QoS MIB
Modified feature: Enabling PFS for an IPsec transform set
Modified feature: Displaying track entry infomration
12

Removed feature: Tiny proxy
Removed feature: Displaying switching fabric channel usage

New feature: Support of multicast for ADVPN
Configuring support of multicast for ADVPN
For information about this feature, see IPv4/IPv6 PIM and IPv4/IPv6 multicast routing and forwarding
in H3C MSR Router Series Comware 7 IP Multicast Configuration Guide.

Command reference
The following commands were added:


display ipv6 pim nbma-link.



display pim nbma-link.



ipv6 pim nbma-mode.



pim nbma-mode.

ADVPN multicast parameters were added to the following commands:


display ipv6 multicast forwarding df-info.



display ipv6 multicast forwarding-table.



display ipv6 multicast routing-table.



display ipv6 pim df-info.



display ipv6 pim routing-table.



display multicast forwarding df-info.



display multicast forwarding-table.



display multicast routing-table.



display pim df-info.



display pim routing-table.

For information about the commands, see IPv4/IPv6 PIM and IPv4/IPv6 multicast routing and
forwarding commands in H3C MSR Router Series Comware 7 IP Multicast Command Reference.

New feature: Application layer state filtering
Configuring application layer state filtering
For information about this feature, see ASPF in H3C MSR Router Series Comware 7 Security
Configuration Guide.

Command reference
The following keywords were added to the detect command:


dns.



http.



smtp.



action.
13



drop.

The fields that indicate application layer status were added to the output from the display aspf
policy command.
For information about the commands, see ASPF in H3C MSR Router Series Comware 7 Security
Command Reference.

New feature: SIP keepalive
Configuring SIP keepalive
You can configure in-dialog keepalive and out-of-dialog keepalive.

Command reference
New command: options-ping
Use options-ping to globally enable in-dialog keepalive.
Use undo options-ping to globally disable in-dialog keepalive.

Syntax
options-ping seconds
undo options-ping

Default
In-dialog keepalive is disabled globally.

View
SIP view

Predefined use roles
network-admin

Parameters
seconds: Specifies the global interval for sending OPTIONS messages during a session, in the
range of 60 to 1200 seconds.

Usage guidelines
This command enables the device to periodically send OPTIONS messages at the specified interval
to monitor the status of the remote SIP UA during a session. It does not take effect when the session
refresh negotiation succeeds before a call is established.
If you disable this feature, the device does not send OPTIONS messages after a call is established.

Example
# Globally enable in-dialog keepalive and set the interval to 60 seconds for sending OPTIONS
messages during a session.
 system-view
[Sysname] voice-setup
[Sysname-voice] sip
[Sysname-voice-sip] options-ping 60

14

New command: voice-class sip options-ping
Use voice-class sip options-ping to enable in-dialog keepalive for a VoIP entity.
Use voice-class sip options-ping to disable in-dialog keepalive for a VoIP entity.

Syntax
voice-class sip options-ping { global | seconds }
undo voice-class sip options-ping

Default
A VoIP entity uses the global configuration for in-dialog keepalive.

Views
VoIP entity view

Predefined user roles
network-admin

Parameters
global: Applies the global configuration for in-dialog keepalive to the VoIP entity.
seconds: Specifies the interval for sending OPTIONS messages during a session, in the range of 60
to 1200 seconds.

Usage guidelines
For a VoIP entity, the entity-specific in-dialog keepalive interval takes priority over the global in-dialog
keepalive interval set in SIP view.

Examples
# Enable in-dialog keepalive for VoIP entity 1 and set the interval to 60 seconds for sending
OPTIONS messages during a session.
 system-view
[Sysname] voice-setup
[Sysname-voice] dial-program
[Sysname-voice-dial] entity 1 voip
[Sysname-voice-dial-entity1] voice-class sip options-ping 60

# Apply the global configuration for in-dialog keepalive to VoIP entity 1.
 system-view
[Sysname] voice-setup
[Sysname-voice] dial-program
[Sysname-voice-dial] entity 1 voip
[Sysname-voice-dial-entity1] voice-class sip options-ping global

New feature: Multicast fast forwarding
Configuring multicast fast forwarding
In this release, the router supports multicast fast forwarding.

15

Command reference
New command: display multicast fast-forwarding cache
Use display multicast fast-forwarding cache to display information about multicast fast
forwarding entries.

Syntax
Centralized devices:
display multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache [ source-address |
group-address ] *
Distributed devices in standalone mode:Centralized IRF devices:
display multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache [ source-address |
group-address ] * [ slot slot-number ]
Distributed devices in IRF mode:
display multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache [ source-address |
group-address ] * [ chassis chassis-number slot slot-number ]

Views
Any view

Predefined user roles
network-admin
network-operator

Parameters
vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a
case-sensitive string of 1 to 31 characters. If you do not specify a VPN instance, this command
displays multicast fast forwarding entries on the public network.
source-address: Specifies a multicast source address.
group-address: Specifies a multicast group address in the range of 224.0.1.0 to 239.255.255.255.
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command
displays multicast fast forwarding entries for the MPU. (Distributed devices in standalone mode.)
slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member
device, this command displays multicast fast forwarding entries for the master device. (Centralized
IRF devices.)
chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The
chassis-number argument represents the member ID of the IRF member device. The slot-number
argument represents the slot number of the card. If you do not specify a card, this command displays
multicast fast forwarding entries for the global active MPU. (Distributed devices in IRF mode.)

Examples
# Display multicast fast forwarding entries on the public network.
 display multicast fast-forwarding cache
Total 1 entries, 1 matched
(60.1.1.200, 225.0.0.2)
Status : Enabled
Source port: 2001 Destination port: 2002
Protocol : 2 Flag : 0x2
Incoming interface: GigabitEthernet1/0/3

16

List of 1 outgoing interfaces:
GigabitEthernet1/0/2
Status: Enabled Flag: 0x14

Table 1 Command output
Field

Description

Total 1 entries, 1 matched

Total number of (S, G) entries in the multicast fast forwarding table, and
the total number of matching (S, G) entries.

(60.1.1.200, 225.0.0.2)

(S, G) entry.

Protocol

Protocol number.
Flag of the (S, G) entry or the outgoing interface in the entry.
This field displays one flag or the sum of multiple flags. In this example,
the value 0x2 means that the entry has only one flag 0x2. The value
0x14 means that the interface has flags 0x4 and 0x10.
The following flags are available for an entry:
 0x1—The entry is created because of packets passed through
between cards.
 0x2—The entry is added by multicast forwarding.

Flag

The following flags are available for an outgoing interface:
 0x1—The interface is added to the entry because of packets
passed through between cards.
 0x2—The interface is added to an existing entry.
 0x4—The MAC address of the interface is needed for fast
forwarding.
 0x8—The interface is an outgoing interface associated with the
incoming VLAN or super VLAN interface.
 0x10—The interface is associated with the entry.
 0x20—The interface is to be deleted.

Status

Status of the (S, G) entry or the outgoing interface:
 Enabled—Available.
 Disabled—Unavailable.

Incoming interface

Incoming interface of the (S, G) entry.

List of 1 outgoing interfaces

Outgoing interface list of the (S, G) entry.

New command: reset multicast fast-forwarding cache
Use reset multicast fast-forwarding cache to clear multicast fast forwarding entries.

Syntax
Centralized devices:
reset multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache { { source-address |
group-address } * | all }
Distributed devices in standalone mode:Centralized IRF devices:
reset multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache { { source-address |
group-address } * | all } [ slot slot-number ]
Distributed devices in IRF mode:
reset multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache { { source-address |
group-address } * | all } [ chassis chassis-number slot slot-number ]

17

Views
User view

Predefined user roles
network-admin

Parameters
vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a
case-sensitive string of 1 to 31 characters. If you do not specify a VPN instance, this command
clears multicast fast forwarding entries on the public network.
source-address: Specifies a multicast source address.
group-address: Specifies a multicast group address in the range of 224.0.1.0 to 239.255.255.255.
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command
clears multicast fast forwarding entries for the MPU. (Distributed devices in standalone mode.)
slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member
device, this command clears multicast fast forwarding entries for the master device. (Centralized IRF
devices.)
chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The
chassis-number argument represents the member ID of the IRF member device. The slot-number
argument represents the slot number of the card. If you do not specify a card, this command clears
multicast fast forwarding entries for the global active MPU. (Distributed devices in IRF mode.)

Examples
# Clear all multicast fast forwarding entries on the public network.
 reset multicast fast-forwarding cache all

# Clear the multicast fast forwarding entry for multicast source and group (20.0.0.2, 225.0.0.2) on the
public network.
 reset multicast fast-forwarding cache 20.0.0.2 225.0.0.2

New command: display ipv6 multicast fast-forwarding cache
Use display ipv6 multicast fast-forwarding cache to display information about IPv6 multicast fast
forwarding entries.

Syntax
Centralized devices:
display ipv6 multicast [ vpn-instance
[ ipv6-source-address | ipv6-group-address ] *

vpn-instance-name

]

fast-forwarding

cache

]

fast-forwarding

cache

Distributed devices in standalone mode:Centralized IRF devices:
display ipv6 multicast [ vpn-instance vpn-instance-name
[ ipv6-source-address | ipv6-group-address ] * [ slot slot-number ]
Distributed devices in IRF mode:
display ipv6 multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache
[ ipv6-source-address | ipv6-group-address ] * [ chassis chassis-number slot slot-number ]

Views
Any view

Predefined user roles
network-admin
network-operator
18

Parameters
vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a
case-sensitive string of 1 to 31 characters. If you do not specify a VPN instance, this command
displays IPv6 multicast fast forwarding entries on the public network.
ipv6-source-address: Specifies an IPv6 multicast source address.
ipv6-group-address: Specifies an IPv6 multicast group address. The value range for this argument is
FFxy::/16 (excluding FFx1::/16 and FFx2::/16), where "x" and "y" represent any hexadecimal
numbers from 0 to F.
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command
displays IPv6 multicast fast forwarding entries for the MPU. (Distributed devices in standalone
mode.)
slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member
device, this command displays IPv6 multicast fast forwarding entries for the master device.
(Centralized IRF devices.)
chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The
chassis-number argument represents the member ID of the IRF member device. The slot-number
argument represents the slot number of the card. If you do not specify a card, this command displays
IPv6 multicast fast forwarding entries for the global active MPU. (Distributed devices in IRF mode.)

Examples
# Display IPv6 multicast fast forwarding entries on the public network.
 display ipv6 multicast fast-forwarding cache
Total 1 entries, 1 matched
(FE1F:60::200, FF0E::1)
Status

: Enabled

Source port: 2001

Destination port: 2002

Protocol

Flag

: 2

: 0x2

Incoming Interfacfe: GigabitEthernet1/0/3
List of 1 outgoing interfaces:
GigabitEthernet1/0/2
Status: Enabled

Flag: 0x14

Table 2 Command output
Field

Description

Total 1 entries, 1 matched

Total number of (S, G) entries in the IPv6 multicast fast forwarding
table, and the total number of matching (S, G) entries.

(FE1F:60::200, FF0E::1)

(S, G) entry.

Protocol

Protocol number.
Flag of the (S, G) entry or the outgoing interface in the entry.
This field displays one flag or the sum of multiple flags. In this example,
the value 0x2 means that the entry has only one flag 0x2. The value
0x14 means that the interface has flags 0x4 and 0x10.

Flag

The following flags are available for an entry:
 0x1—The entry is created because of packets passed through
between cards.
 0x2—The entry is added by IPv6 multicast forwarding.
The following flags are available for an outgoing interface:
 0x1—The interface is added to the entry because of packets
passed through between cards.
19

Field

Description






0x2—The interface is added to an existing entry.
0x4—The MAC address of the interface is needed for fast
forwarding.
0x8—The interface is an outgoing interface associated with the
incoming VLAN or super VLAN interface.
0x10—The interface is associated with the entry.
0x20—The interface is to be deleted.

Status

Status of the (S, G) entry or the outgoing interface:
 Enabled—Available.
 Disabled—Unavailable.

Incoming interface

Incoming interface of the (S, G) entry.

List of 1 outgoing interfaces

Outgoing interface list of the (S, G) entry.

New command: reset ipv6 multicast fast-forwarding cache
Use reset ipv6 multicast fast-forwarding cache to clear IPv6 multicast fast forwarding entries.

Syntax
Centralized devices:
reset ipv6 multicast [ vpn-instance vpn-instance-name
{ { ipv6-source-address | ipv6-group-address } * | all }

]

fast-forwarding

cache

reset ipv6 multicast [ vpn-instance vpn-instance-name ] fast-forwarding
{ { ipv6-source-address | ipv6-group-address } * | all } [ slot slot-number ]

cache

Distributed devices in standalone mode:Centralized IRF devices:

Distributed devices in IRF mode:
reset ipv6 multicast [ vpn-instance vpn-instance-name ] fast-forwarding cache
{ { ipv6-source-address | ipv6-group-address } * | all } [ chassis chassis-number slot slot-number ]

Views
Any view

Predefined user roles
network-admin

Parameters
vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a
case-sensitive string of 1 to 31 characters. If you do not specify a VPN instance, this command
clears IPv6 multicast fast forwarding entries on the public network.
ipv6-source-address: Specifies an IPv6 multicast source address.
ipv6-group-address: Specifies an IPv6 multicast group address. The value range for this argument is
FFxy::/16 (excluding FFx1::/16 and FFx2::/16), where "x" and "y" represent any hexadecimal
numbers from 0 to F.
slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command
clears IPv6 multicast fast forwarding entries for the MPU. (Distributed devices in standalone mode.)
slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member
device, this command clears IPv6 multicast fast forwarding entries for the master device.
(Centralized IRF devices.)

20

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The
chassis-number argument represents the member ID of the IRF member device. The slot-number
argument represents the slot number of the card. If you do not specify a card, this command clears
IPv6 multicast fast forwarding entries for the global active MPU. (Distributed devices in IRF mode.)

Examples
# Clear all IPv6 multicast fast forwarding entries on the public network
 reset ipv6 multicast fast-forwarding cache all

# Clear the IPv6 multicast fast forwarding entry for IPv6 multicast source and group (FE1F:20::2,
FF0E::1) on the public network.
 reset ipv6 multicast fast-forwarding cache fe1f:20::2 ff0e::1

New feature: Attack defense policy application to a
security zone
Applying an attack defense policy to a security zone
To apply an attack defense policy to a security zone:
Step

Command

Remarks

1.

Enter system view.

system-view

N/A

2.

Enter security zone view.

security-zone name Trust

N/A

3.

Apply an attack defense
policy to the security zone.

attack-defense apply policy
policy-number

By default, a security zone has no
attack defense policy applied.

Command reference
The following commands were newly added:


attack-defense apply policy



blacklist enable



client-verify dns enable



client-verify http enable



client-verify tcp enable



display attack-defense flood statistics ip



display attack-defense flood statistics ipv6



display attack-defense scan attacker ip



display attack-defense scan attacker ipv6



display attack-defense scan attacker ipv6



display attack-defense scan victim ipv6



display attack-defense statistics security-zone



reset attack-defense statistics security-zone

For information about the commands, see attack defense commands in H3C MSR Router Series
Comware 7 Security Command Reference.

21

New feature: AAA support for IKE extended
authentication
Configuring IKE extended authentication
For information about this feature, see AAA configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command reference
The authentication ike command was newly added.
The ike keyword was added to the display local-user, undo local-user, service-type, and undo
service-type commands.
For information about the commands, see AAA commands in H3C MSR Router Series Comware 7
Security Command Reference.

New feature: Percentage-based CAR
Configuring percentage-based CAR
For information about this feature, see QoS in H3C MSR Router Series Comware 7 ACL and QoS
Configuration Guide.

Command reference
The percent car command was added.
For information about the command, see traffic behavior commands in H3C MSR Router Series
Comware 7 ACL and QoS Command Reference.

22

New feature: Logging OSPF router ID conflict events
Logging OSPF router ID conflict events
For information about this feature, see OSPF configuration in H3C MSR Router Series Comware 7
Layer 3—IP Routing Configuration Guide.

Command reference
The following commands were newly added:


database-filter peer (OSPF view)



ospf database-filter



ospf ttl-security



ttl-security

For information about the commands, see OSPF commands in H3C MSR Router Series Comware 7
Layer 3—IP Routing Command Reference.

New feature: AFT
Configuring AFT
For information about this feature, see AFT in H3C MSR Router Series Comware 7 Layer 3—IP
Services Configuration Guide.

Command reference
For information about the commands, see AFT commands in H3C MSR Router Series Comware 7
Layer 3—IP Services Command Reference.

New feature: Configuring enhanced CC authentication in
FIPS mode
Configuring enhanced CC authentication in FIPS mode
For information about this feature, see IPsec, SSH, SSL, and public key management in H3C MSR
Router Series Comware 7 Security Configuration Guide.

23

Command reference
The ecdsa keyword was added to the following commands:


scp.



scp ipv6.



sftp.



sftp ipv6.



ssh2.



ssh2 ipv6.

The dhe_rsa_aes_128_cbc_sha and dhe_rsa_aes_256_cbc_sha keywords were removed from
the ciphersuite command in FIPS mode.
The secp192r1 and secp256r1 keywords were added to the public-key local create command.
The public-key local export ecdsa command was added.
For more information about these commands, see IPsec, SSH, SSL, and public key management
commands in H3C MSR Router Series Comware 7 Security Command Reference.

New feature: Support of AAA for NETCONF
Configuring support of AAA for NETCONF
For information about this feature, see AAA in H3C MSR Router Series Comware 7 Security
Configuration Guide.

Command reference
The radius session-control client command was newly added. The security-policy-server
command was deleted.
For information about the command, see AAA commands in H3C MSR Router Series Comware 7
Security Configuration Guide.

New feature: Mobile IP tunnel interface settings
Configuring the mobile IP tunnel interface settings
Step

Command

Remarks

4.

Enter system view.

system-view

N/A

5.

Enable the mobile router
feature and enter mobile
router view.

ip mobile router

By default, the mobile router
feature is disabled.

24

Step

Command

Remarks

6.

Assign a home address to
the mobile router.

address ip-address

By default, the mobile router
does not have any home
addresses.

7.

Specify the IP address of the
home agent for the mobile
router.

home-agent ip-address

By default, no home agent is
specified for the mobile
router.

(Optional.) Set the MTU for
the
mobile
IP
tunnel
interface.

tunnel mtu value

By default, the MTU for the
tunnel interface is 64000
bytes.

(Optional.) Set the DF bit to 0
for
outgoing
tunneled
packets.

ip df-bit zero

By default, the DF bit of
outgoing tunneled packets is
not set.

10. (Optional.) Apply an IPsec
policy to the mobile IP tunnel
interface.

ipsec policy policy-name

By default, no IPsec policy is
applied to the mobile IP
tunnel interface.

11. (Optional.) Set the TCP MSS
for the mobile IP tunnel
interface.

tcp mss value

By default, no TCP MSS is
set.

8.

9.

Command reference
The following commands were added:


ip df-bit zero



ipsec policy



tcp mss

For information about the commands, see NEMO commands in H3C MSR Router Series Comware 7
NEMO Command Reference.

New feature: LISP
Configuring LISP
For information about this feature, see LISP configuration in H3C MSR Router Series Comware 7
LISP Configuration Guide.

Command reference
For information about the commands, see LISP commands in H3C MSR Router Series Comware 7
LISP Command Reference.

25

New feature: LISP tunnel entries and dynamic mobility
Configuring LISP tunnel entries and dynamic mobility
For information about this feature, see LISP configuration in H3C MSR Router Series Comware 7
LISP Configuration Guide.

Command reference
For information about the commands, see LISP commands in H3C MSR Router Series Comware 7
LISP Command Reference.

New feature: Support of IPv6 multicast routing for VPN
instances
Enabling support of IP multicast routing for VPN instances
For information about this feature, see IPv6 multicast routing and forwarding in H3C MSR Router
Series Comware 7 IP Multicast Configuration Guide.

Command reference
The ipv6 multicast routing vpn-instance command was added.
For information about the command, see IPv6 multicast routing and forwarding commands in H3C
MSR Router Series Comware 7 IP Multicast Command Reference.

New feature: LISP virtual machine multi-hop mobility
and DDT
Configuring LISP virtual machine multi-hop mobility and DDT
For information about this feature, see LISP configuration in H3C MSR Router Series Comware 7
LISP Configuration Guide.

Command reference
The eid-notify command was newly added.
For information about the command, see LISP commands in H3C MSR Router Series Comware 7
LISP Command Reference.
26

New feature: LISP NSR
Configuring LISP NSR
The display system internal lisp forwarding statistics command was added. You can use the
command to display the LISP thread statistics.
The display system internal lisp nsr no-cache command was added. You can use the command
to display the tentative entries created during the NSR active/standby switchover.
The display system internal lisp nsr status command was added. You can use the command to
display the LISP NSR status.

Command reference
The following commands were newly added:


display system internal lisp forwarding statistics



display system internal lisp nsr no-cache



display system internal lisp nsr status

For information about the commands, see LISP probe commands in H3C MSR Router Series
Comware 7 Probe Command Reference.

New feature: PPPoE client support for IPv6
Associating a dial rule with a dialup interface
For information about this feature, see DDR in H3C MSR Router Series Comware 7 Layer 2—WAN
Access Configuration Guide.

Command reference
The ipv6 keyword is added to the dialer-group rule command. For information about this command,
see DDR commands in H3C MSR Router Series Comware 7 Layer 2—WAN Access Command
Reference.

Specifying an IPv6 prefix for an interface to automatically generate
an IPv6 global unicast address
For information about this feature, see IPv6 basics in H3C MSR Router Series Comware 7 Layer
3—IP Services Configuration Guide.

27

Command reference
The ipv6 address command is added. For information about the command, see IPv6 basics
commands in H3C MSR Router Series Comware 7 Layer 3—IP Services Command Reference.

New feature: DPI engine and content filtering
Configuring the DPI engine and content filtering
For information about this feature, see DPI overview and DPI engine in H3C MSR Router Series
Comware 7 DPI Configuration Guide.

Command reference
For information about the commands, see DPI overview and DPI engine commands in H3C MSR
Router Series Comware 7 DPI Command Reference.

New feature: IPS
Configuring IPS
For information about this feature, see IPS configuration in H3C MSR Router Series Comware 7 DPI
Configuration Guide.

Command reference
For information about the commands, see IPS commands in H3C MSR Router Series Comware 7
DPI Command Reference.

New feature: NBAR
Configuring NBAR
For information about this feature, see APR in H3C MSR Router Series Comware 7 Security
Configuration Guide.

Command reference
The following new commands were added:


apr signature update.

28



Description.



Destination.



Direction.



Disable.



display app-group.



display application.



display apr signature information.



include app-group.



nbar application.



nbar protocol-discovery.



service-port.



signature.



source.

For information about the commands, see APR in H3C MSR Router Series Comware 7 Security
Command Reference.

New feature: URL filtering
Configuring URL filtering
For information about this feature, see URL filtering configuration in H3C MSR Router Series
Comware 7 DPI Configuration Guide.

Command reference
For information about the commands, see URL filtering commands in H3C MSR Router Series
Comware 7 DPI Command Reference.

New feature: Local portal Web server
Configuring a local portal Web server
For information about this feature, see portal in H3C MSR Router Series Comware 7 Security
Configuration Guide.

Command reference
The following commands were added:


portal local-web-server
29



default-logon-page



logon-page



tcp-port

The ssid keyword was added to the url-parameter param-name { apmac | original-url |
source-address | source-mac | ssid | value expression } command.
For information about the commands, see portal commands in H3C MSR Router Series Comware 7
Security Command Reference.

New feature: Support of portal for NETCONF
Support for NETCONF was added to portal.

New feature: Newly-added MIB objects
Event

MIB

added

support

for

the

hh3cWirelessCardModemMode

and

hh3cWirelessCardCurNetConn MIB objects.

New feature: IPS, ACG, and SSL VPN licenses
This release added support for IPS, ACG and SSL VPN licenses.

New feature: Support of NQA for NETCONF
Support for NETCONF was added to NQA.

New feature: Configuring CWMP to support VPN
Configuring CWMP to support VPN
For information about this feature, see CWMP configuration in H3C MSR Router Series Comware 7
Network Management and Monitoring Configuration Guide.

Command reference
For information about the commands, see CWMP commands in H3C MSR Router Series Comware
7 Network Management and Monitoring Command Reference.

30

New feature: Transceiver module source alarm
Disabling transceiver module source alarm
For information about this feature, see device management in H3C MSR Router Series Comware 7
Fundamentals Configuration Guide.

Command reference
transceiver phony-alarm-disable
For information about this command, see device management commands in H3C MSR Router
Series Comware 7 Fundamentals Command Reference.

New feature: VLAN interface performance optimization
This software version optimized the following items:


VLAN functions used for sending data in the adaption layer.



Processing flow of the RAW functions for sending and receiving data for chips mv88ex, mvcpss,
and bcm5614x.

New feature: NAT support for multicast source address
in PIM join/prune packets
This feature enables the device to act as a NAT gateway and perform NAT on the multicast source
address in PIM join or prune packets based on NAT mappings. Use this feature in a multicast
scenario where the multicast source resides on a private network, multicast receivers reside on
private networks, and PIM-SSM mode is used.

New feature: GDOI GM group anti-replay window
Configuring the anti-replay window for a GDOI GM group
Step

Command

Remarks

12. Enter system view.

system-view

N/A

13. Create a GDOI GM group
and enter GDOI GM
group view.

gdoi gm group [ ipv6 ]
group-name

By default, no GDOI GM groups
exist.

31

Step

Command

Remarks

14. (Optional.)
Set
the
anti-replay window size
for the GDOI GM group.

client anti-replay window { sec
seconds | msec milliseconds }

By default, the anti-replay window
size is not set for a GDOI GM group.

Command reference
client anti-replay window
Use client anti-replay window to set the anti-replay window size for a GDOI GM group.
Use undo client anti-replay window to restore the default.

Syntax
client anti-replay window { sec seconds | msec milliseconds }
undo client anti-replay window

Default
The anti-replay window size is not set for a GDOI GM group.

Views
GDOI GM group view

Predefined user roles
network-admin

Parameters
sec seconds: Specifies the anti-replay window size in seconds in the range of 1 to 100.
msec milliseconds: Specifies the anti-replay window size in milliseconds in the range of 100 to
10000.

Usage guidelines
The anti-replay window size set in this command takes priority over the anti-replay window size
obtained from the KS. If you do not configure this command, the anti-replay window size obtained
from the KS is used.
This command must be used together with the Cisco IP-D3P feature.

Examples
# Set the anti-replay window size to 50 seconds for GDOI GM group group1.
 system-view
[Sysname] gdoi gm group group1
[Sysname-gdoi-gm-group-group1] client anti-replay window sec 50

32

New feature: SIP compatibility
Configuring SIP compatibility
If a third-party device does not implement SIP in strict accordance with the RFC standard, you can
configure SIP compatibility for the router to interoperate with the third-party device.
With the sip-compatible t38 command configured, the router excludes :0 from the following SDP
parameters in the originated re-INVITE messages:


T38FaxTranscodingJBIG.



T38FaxTranscodingMMR.



T38FaxFillBitRemoval.

With the sip-compatible x-param command configured, the router adds SDP description
information (a=X-fax and a=X-modem) for fax pass-through and modem pass-through in the
originated re-INVITE messages.
To configure SIP compatibility:
Step

Command

Remarks

15. Enter system view.

system-view

N/A

16. Enter voice view.

voice-setup

N/A

17. Enter SIP view.

sip

N/A

18. Configure SIP compatibility.

sip-compatible { t38 | x-param }

By default, SIP compatibility
is not configured.

Command reference
New command:sip-compatible
Use sip-compatible to configure SIP compatibility with a third-party device.
Use undo sip-compatible to restore the default.

Syntax
sip-compatible { t38 | x-param }
undo sip-compatible { t38 | x-param }

Default
SIP compatibility is not configured.

Views
SIP view

Predefined user roles
network-admin
33

Parameters
t38: Configures SIP compatibility for standard T.38 fax. With this keyword specified, the router
excludes :0 from the following SDP parameters in the originated re-INVITE messages:


T38FaxTranscodingJBIG.



T38FaxTranscodingMMR.



T38FaxFillBitRemoval.

This keyword is required when the router interoperates with a third-party softswitch device to
exchange T.38 fax messages.
x-param: Configures SIP compatibility for fax pass-through and modem pass-through. With this
keyword specified, the router adds SDP description information for fax pass-through and modem
pass-through to outgoing re-INVITE messages. This keyword is required when the router
interoperates with a third-party softswitch device to perform fax pass-through and modem
pass-through.

Usage guidelines
The t38 and x-param keywords can be both configured to interoperate with a third-party softswitch
device.

Examples
# Configure SIP compatibility for standard T.38 fax.
 system-view
[Sysname] voice-setup
[Sysname-voice] sip
[Sysname-voice-sip] sip-compatible t38

New feature: Voice VLAN
Configuring a voice VLAN
Configuring a port to operate in automatic voice VLAN assignment mode
Step

Command

Remarks

19. Enter system view.

system-view

N/A

20. (Optional.) Set the voice
VLAN aging timer.

voice-vlan aging minutes

By default, the aging timer of
a voice VLAN is 1440
minutes.

21. (Optional.) Enable the
voice
VLAN
security
mode.

voice-vlan security enable

By default, the voice VLAN
security mode is enabled.

22. (Optional.) Add an OUI
address for voice packet
identification.

voice-vlan mac-address oui mask
oui-mask [ description text ]

By default, system default
OUI addresses exist.

34

Step

Command





23. Enter interface view.





24. Set the link type of the
port.
25. Configure the port to
operate in automatic
voice VLAN assignment
mode.



Remarks

Enter Layer 2 Ethernet interface
view:
interface interface-type
interface-number
Enter Layer 2 aggregate interface
view:
interface bridge-aggregation
interface-number
Enter S-channel interface view:
interface s-channel
interface-number.channel-id
Enter S-channel aggregate interface
view:
interface schannel-aggregation
interface-number:channel-id
Enter Layer 2 RPR logical interface
view:
interface rpr-bridge
interface-number

N/A

Set the port link type to trunk:
port link-type trunk
Set the port link type to hybrid:
port link-type hybrid

N/A

voice-vlan mode auto

By default, the automatic
voice VLAN assignment
mode is enabled.
By default, the voice VLAN
feature is disabled on a port.

26. Enable the voice VLAN
feature on the port.

voice-vlan vlan-id enable

Before you execute this
command, make sure the
specified VLAN already
exists.

Configuring a port to operate in manual voice VLAN assignment mode
Step

Command

Remarks

27. Enter system view.

system-view

N/A

28. (Optional.) Enable the
voice VLAN security
mode.

voice-vlan security enable

By default, the voice VLAN
security mode is enabled.

29. (Optional.) Add an OUI
address for voice packet
identification.

voice-vlan mac-address oui mask
oui-mask [ description text ]

By default, system default OUI
addresses exist.

35

Step

Command





30. Enter interface view.




31. Configure the port to
operate in manual voice
VLAN
assignment
mode.





33. Assign the access,
trunk, or hybrid port to
the voice VLAN.

34. (Optional.)
Configure
the voice VLAN as the
PVID of the trunk or
hybrid port.

35. Enable the voice VLAN
feature on the port.

Enter Layer 2 Ethernet interface view:
interface interface-type
interface-number
Enter Layer 2 aggregate interface
view:
interface bridge-aggregation
interface-number
Enter S-channel interface view:
interface s-channel
interface-number.channel-id
Enter S-channel aggregate interface
view:
interface schannel-aggregation
interface-number:channel-id
Enter Layer 2 RPR logical interface
view:
interface rpr-bridge
interface-number








N/A

By default, a port operates in
automatic voice VLAN
assignment mode.

undo voice-vlan mode auto


32. Set the link type of the
port.

Remarks

Set the port link type to access:
port link-type access
Set the port link type to trunk:
port link-type trunk
Set the port link type to hybrid:
port link-type hybrid

By default, each port is an
access port.

For the access port:
port access vlan vlan-id
For the trunk port:
port trunk permit vlan { vlan-id-list |
all }
For the hybrid port:
port hybrid vlan vlan-id-list { tagged |
untagged }

After you assign an access
port to the voice VLAN, the
voice VLAN becomes the
PVID of the port.

For the trunk port:
port trunk pvid vlan vlan-id
For the hybrid port:
port hybrid pvid vlan vlan-id

This step is required for
untagged incoming voice
traffic and prohibited for
tagged incoming voice traffic.
By default, the voice VLAN
feature is disabled on a port.

voice-vlan vlan-id enable

Before you execute this
command, make sure the
specified VLAN already exists.

Enabling LLDP for automatic IP phone discovery
Step

Command

Remarks

36. Enter system view.

system-view

N/A

37. Enable LLDP for automatic
IP phone discovery.

voice-vlan track lldp

By default, LLDP for automatic IP
phone discovery is disabled.

36

Configuring LLDP to advertise a voice VLAN
For IP phones that support LLDP, the device advertises the voice VLAN information to the IP phones
through LLDP-MED TLVs.
To configure LLDP to advertise a voice VLAN:
Step

Command

Remarks

38. Enter system view.

system-view

N/A

Ethernet

interface interface-type
interface-number

N/A

advertised

lldp tlv-enable med-tlv
network-policy vlan-id

By default, no advertised
voice VLAN ID is configured.

39. Enter Layer 2
interface view.
40. Configure an
voice VLAN ID.

Configuring CDP to advertise a voice VLAN
If an IP phone supports CDP but does not support LLDP, it sends CDP packets to the device to
request the voice VLAN ID. If the IP phone does not receive the voice VLAN ID within a time period,
it sends out untagged voice packets. These untagged voice packets cannot be differentiated from
other types of packets.
You can configure CDP compatibility on the device to enable it to perform the following operations:


Receive and identify CDP packets from the IP phone.



Send CDP packets to the IP phone. The voice VLAN information is carried in the CDP packets.

After receiving the advertised VLAN information, the IP phone starts automatic voice VLAN
configuration. Packets from the IP phone will be transmitted in the dedicated voice VLAN.
To configure CDP to advertise a voice VLAN:
Step

Command

Remarks

41. Enter system view.

system-view

N/A

42. Enable CDP compatibility.

lldp compliance cdp

By default, CDP compatibility
is disabled.

43. Enter Layer 2
interface view.

interface interface-type
interface-number

N/A

44. Configure CDP-compatible
LLDP to operate in TxRx
mode.

lldp compliance admin-status cdp
txrx

By default, CDP-compatible
LLDP operates in disable
mode.

45. Configure an
voice VLAN ID.

cdp voice-vlan vlan-id

By default, no advertised
voice VLAN ID is configured.

Ethernet

advertised

Displaying and maintaining voice VLANs
Execute display commands in any view.

37

Task

Command

Display the voice VLAN state.

display voice-vlan state

Display OUI addresses on a device.

display voice-vlan mac-address

Command reference
The following commands were added:


display voice-vlan mac-address.



display voice-vlan state.



voice-vlan aging.



voice-vlan enable.



voice-vlan mac-address.



voice-vlan mode auto.



voice-vlan security enable.



voice-vlan track lldp.

For more information about these commands, see H3C MSR Series Routers Layer 2—LAN
Switching Command Reference(V7).

New feature: L2TP-based EAD
Enabling L2TP-based EAD
EAD authenticates PPP users that pass the access authentication. PPP users that pass EAD
authentication can access network resources. PPP users that fail EAD authentication can only
access the resources in the quarantine areas.
EAD uses the following procedure:
1.

The iNode client uses L2TP to access the LNS. After the client passes the PPP authentication,
the CAMS/IMC server assigns isolation ACLs to the LNS. The LNS uses the isolation ACLs to
filter incoming packets.

2.

After the IPCP negotiation, the LNS sends the IP address of the CAMS/IMC server to the iNode
client. The server IP address is permitted by the isolation ACLs.

3.

The CAMS/IMC sever authenticates the iNode client and performs security check for the iNode
client. If the iNode client passes security check, the CAMS/IMC server assigns security ACLs
for the iNode client to the LNS. The iNode client can access network resources.

To enable L2TP-based EAD:
Step

Command

Remarks

46. Enter system view.

system-view

N/A

38

Step

Command

Remarks

47. Create a VT interface and
enter its view

interface virtual-template
virtual-template-number

N/A

48. Enable L2TP-based EAD.

ppp access-control enable

By default, L2TP-based EAD is
disabled.

Command reference
ppp access-control enable
Use ppp access-control enable to enable L2TP-based EAD.
Use undo ppp access-control enable to disable L2TP-based EAD.

Syntax
ppp access-control enable
undo ppp access-control enable

Default
L2TP-based EAD is disabled.

Views
VT interface view

Predefined user roles
network-admin

Usage guidelines
This command does not apply to VA interfaces that already exist in the VT interface. It only applies to
newly created VA interfaces.
Different ACLs are required for different users if the VT interface is used as the access interface for
the LNS.
After L2TP-based EAD is enabled, the LNS transparently passes CAMS/IMC packets to the iNode
client to inform the client of EAD server information, such as the IP address.

Examples
# Enable L2TP-based EAD.
 system-view
[Sysname] interface virtual-template 10
[Sysname-Virtual-Template10] ppp access-control enable

display ppp access-control interface
Use display ppp access-control interface to display access control information for VA interfaces
on a VT interface.

39

Syntax
display ppp access-control interface { interface-type interface-number | interface-name }

Views
Any view

Predefined user roles
network-admin
network-operator

Parameters
interface-type interface-number: Specifies an interface by its type and number.
interface-name: Specifies an interface by its name.

Examples
# Display access control information for VA interfaces on VT interface 2.
 display ppp access-control interface virtual-template 2
Interface: Virtual-Template2:0
User Name: mike
In-bound Policy: acl 3000
Totally 0 packets, 0 bytes, 0% permitted,
Totally 0 packets, 0 bytes, 0% denied.
Interface: Virtual-Template2:1
User Name: tim
In-bound Policy: acl 3001
Totally 0 packets, 0 bytes, 0% permitted,
Totally 0 packets, 0 bytes, 0% denied.

Table 3 Command output
Field

Description

Interface

VA interface that the PPP user accesses.

User Name

Username of the PPP user.

In-bound Policy

Security ACLs for the PPP user.

Totally x packets, x bytes, x% permitted

Total number, data rate, and pass percentage of permitted
packets.

Totally x packets, x bytes, x% denied

Total number, data rate, and reject percentage of denied packets.

40

New feature: BFD for an aggregation group
Enabling BFD for an aggregation group
BFD for Ethernet link aggregation can monitor member link status in an aggregation group. After you
enable BFD on an aggregate interface, each Selected port in the aggregation group establishes a
BFD session with its peer port. BFD operates differently depending on the aggregation mode.


BFD for static aggregation—When BFD detects a link failure, BFD notifies the Ethernet link
aggregation module that the peer port is unreachable. The local port is placed in Unselected
state. The BFD session between the local and peer ports remains, and the local port keeps
sending BFD packets. When the link is recovered, the local port receives BFD packets from the
peer port, and BFD notifies the Ethernet link aggregation module that the peer port is reachable.
The local port is placed in Selected state again. This mechanism ensures that the local and
peer ports of a static aggregate link have the same aggregation state.



BFD for dynamic aggregation—When BFD detects a link failure, BFD notifies the Ethernet
link aggregation module that the peer port is unreachable. BFD clears the session and stops
sending BFD packets. When the link is recovered and the local port is placed in Selected state
again, the local port establishes a new session with the peer port. BFD notifies the Ethernet link
aggregation module that the peer port is reachable. Because BFD provides fast failure
detection, the local and peer systems of a dynamic aggregate link can negotiate the
aggregation state of their member ports faster.

For more information about BFD, see H3C MSR Router Series Comware 7 High Availability
Configuration Guide.

Configuration restrictions and guidelines
When you enable BFD for an aggregation group, follow these restrictions and guidelines:


Make sure the source and destination IP addresses are consistent at the two ends of an
aggregate link. For example, if you execute link-aggregation bfd ipv4 source 1.1.1.1
destination 2.2.2.2 on the local end, execute link-aggregation bfd ipv4 source 2.2.2.2
destination 1.1.1.1 on the peer end. The source and destination IP addresses cannot be the
same.



The BFD parameters configured on an aggregate interface take effect on all BFD sessions in
the aggregation group. BFD sessions for link aggregation do not support the echo packet mode
and the Demand mode.



As a best practice, do not configure other protocols to collaborate with BFD on a BFD-enabled
aggregate interface.



Make sure the number of member ports in a BFD-enabled aggregation group is not larger than
the number of BFD sessions supported by the device. Otherwise, this command might cause
some Selected ports in the aggregation group to change to the Unselected state.

41

Configuration procedure
To enable BFD for an aggregation group:
Step

Command

Remarks

49. Enter system view.

system-view

N/A

50. Enter Layer 3 aggregate
interface view.

interface route-aggregation
interface-number

N/A
By default, BFD is disabled
for an aggregation group.

51. Enable BFD for the
aggregation group.

link-aggregation bfd ipv4 source
ip-address destination ip-address

The source and destination
IP addresses of BFD
sessions must be unicast
addresses excluding
0.0.0.0.

Command reference
link-aggregation bfd ipv4
Use link-aggregation bfd ipv4 to enable BFD for an aggregation group.
Use undo link-aggregation bfd to disable BFD for an aggregation group.

Syntax
link-aggregation bfd ipv4 source ip-address destination ip-address
undo link-aggregation bfd

Default
BFD is disabled for an aggregation group.

Views
Layer 3 aggregate interface view

Predefined user roles
network-admin

Parameters
source ip-address: Specifies the unicast source IP address of BFD sessions. The source IP address
cannot be 0.0.0.0.
destination ip-address: Specifies the unicast destination IP address of BFD sessions. The
destination IP address cannot be 0.0.0.0.

Usage guidelines
Make sure the source and destination IP addresses are consistent at the two ends of an aggregate
link. For example, if you execute link-aggregation bfd ipv4 source 1.1.1.1 destination 2.2.2.2 on
the local end, execute link-aggregation bfd ipv4 source 2.2.2.2 destination 1.1.1.1 on the peer
end. The source and destination IP addresses cannot be the same.

42

The BFD parameters configured on an aggregate interface take effect on all BFD sessions in the
aggregation group. BFD sessions for link aggregation do not support the echo packet mode and the
Demand mode. For more information about BFD, see H3C MSR Router Series Comware 7 High
Availability Configuration Guide.
As a best practice, do not configure other protocols to collaborate with BFD on a BFD-enabled
aggregate interface.
Make sure the number of member ports in a BFD-enabled aggregation group is not larger than the
number of BFD sessions supported by the device. Otherwise, this command might cause some
Selected ports in the aggregation group to change to the Unselected state.

Examples
# Enable BFD for Layer 3 aggregation group 1, and specify the source and destination IP addresses
as 1.1.1.1 and 2.2.2.2 for BFD sessions.
 system-view
[Sysname] interface route-aggregation 1
[Sysname-Route-Aggregation1] link-aggregation bfd ipv4 source 1.1.1.1 destination 2.2.2.2

New feature: 4G modem IMSI/SN binding authentication
This feature includes the IMSI/SN information in the 4G dial-up authentication information.

Command reference
apn
Use apn to create an access point name (APN).
Use undo apn to remove an APN.

Syntax
apn { dynamic | static apn }
undo apn

Default
No APN is configured.

Views
4G dial-up profile view

Predefined user roles
network-admin

Parameters
dynamic: Uses an APN automatically assigned by the service provider.

43

static apn: Specifies the APN provided by the service provider. It is a string of 1 to 100 characters.
Whether the string is case-sensitive varies by service providers.

Usage guidelines
You must specify an APN for a 4G dial-up profile.

Examples
# Specify the APN apn1 for the 4G dial-up profile test.
 system-view
[Sysname] apn-profile test
[Sysname-apn-profile-test] apn static apn1

apn-profile
Use apn-profile to create a 4G dial-up profile.
Use undo apn-profile to remove a 4G dial-up profile.

Syntax
apn-profile profile-name
undo apn-profile profile-name

Default
No 4G dial-up profiles are configured.

Views
System view

Predefined user roles
network-admin

Parameters
profile-name: Specifies a 4G dial-up profile name.

Usage guidelines
A 4G dial-up profile takes effect only after you associate the profile with a 4G interface. To remove a
4G dial-up profile, you must first remove the association between the profile and the 4G interface.

Examples
# Create the 4G dial-up profile test.
 system-view
[Sysname] apn-profile test

apn-profile apply
Use apn-profile apply to specify a 4G dial-up profile.
Use undo apn-profile apply to restore the default.

Syntax
apn-profile apply profile-name [ backup profile-name ]
44

undo apn-profile apply

Default
No 4G dial-up profiles are specified.

Views
Eth-channel interface view

Predefined user roles
network-admin

Parameters
profile-name: Specifies a primary 4G dial-up profile name.
backup profile-name: Specifies a backup 4G dial-up profile name.

Usage guidelines
After you specify a 4G dial-up profile for a 4G modem, the 4G modem uses the settings in the profile
to negotiate with the service provider's device.
The primary profile always has priority over the backup profile. For each dialup connection
establishment, the 4G modem uses the backup profile only when it has failed to dial up using the
primary profile.
This command takes effect only on dialup connections initiated after the command is configured. It
does not take effect on a dialup connection that has been established.

Examples
# Specify the primary 4G dial-up profile test and the backup 4G dial-up profile bktest for Eth-channel
interface 2/4/0:0.
 system-view
[Sysname] interface eth-channel 2/4/0:0
[Sysname-Eth-channel2/4/0:0] apn-profile apply test backup bktest

attach-format
Use attach-format to set a separator for the authentication information to be sent.
Use undo attach-format to restore the default.

Syntax
attach-format imsi-sn split splitchart
undo attach-format imsi-sn split

Default
No separator is set for the authentication information to be sent.

Views
4G dial-up profile view

45

Predefined user roles
network-admin

Parameters
split splitchart: Specifies a separator. It can be a letter, a digit, or a sign such as a percent sign (%) or
a pound sign (#).

Usage guidelines
If IMSI/SN binding authentication is enabled, the IMSI/SN information is included in the
authentication information in addition to the username. You need to configure a separator to
separate different types of information. For example, if you specify the separator as #, the
authentication information will be sent in the following format: imsiinfo#sninfo#username.

Examples
# Configure the pound sign (#) as the separator for the authentication information to be sent.
 system-view
[Sysname] apn-profile test
[Sysname-apn-profile-test] attach-format imsi-sn split #

authentication-mode
Use authentication-mode to specify an authentication mode for a 4G dial-up profile.
Use undo authentication-mode to restore the default.

Syntax
authentication-mode { pap | chap| pap-chap } user user-name password { cipher | simple }
password
undo authentication-mode

Default
No authentication mode is configured for a 4G dial-up profile.

Views
4G dial-up profile view

Predefined user roles
network-admin

Parameters
chap: Specifies CHAP authentication.
pap: Specifies PAP authentication.
pap-chap: Specifies CHAP or PAP authentication.
user username: Specifies the username for authentication, a case-sensitive string of 1 to 32
characters.
cipher: Specifies a password in encrypted form.

46

simple: Specifies a password in plaintext form. For security purposes, the password specified in
plaintext form will be stored in encrypted form.
password: Specifies the password. Its plaintext form is a case-sensitive string of 1 to 32 characters.
Its encrypted form is a case-sensitive string of 1 to 73 characters

Examples
# Specify the CHAP authentication mode for the 4G dial-up profile test. Specify the CHAP
authentication username as user1 and the password as 123456.
 system-view
[Sysname] apn-profile test
[Sysname-apn-profile-test] authentication-mode chap user user1 password simple 123456

New feature: Media Stream Control (MSC) logging
This feature enables the router to generate MSC logs and send the logs to the information center.

Command reference
New command: sip log enable
Use sip log enable to enable Media Stream Control (MSC) logging.
Use undo sip log enable to disable MSC logging.

Syntax
sip log enable
undo sip log enable

Default
MSC logging is disabled.

Views
Voice view

Predefined user roles
network-admin

Usage guidelines
This command enables the router to generate MSC logs and send the logs to the information center.
The information center outputs the logs to a destination according to an output rule. For more
information about the information center, see Network Management and Monitoring Configuration
Guide.
MSC logging is used for auditing purposes.

Examples
# Enable MSC logging.
47

 system-view
[Sysname] voice-setup
[Sysname-voice] sip log enable

New feature: IMSI/SN binding authentication
This feature enables the device to include the IMSI/SN information in the LCP authentication
information.

Command reference
ppp lcp imsi accept
Use ppp lcp imsi accept to enable the client to accept the IMSI binding authentication requests
from the LNS.
Use undo ppp lcp imsi accept to restore the default.

Syntax
ppp lcp imsi accept
undo ppp lcp imsi accept

Default
The client declines the IMSI binding authentication requests from the LNS.

Views
Interface view

Predefined user roles
network-admin

Examples
# Enable the client to accept the IMSI binding authentication requests from the LNS.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp lcp imsi accept

ppp lcp imsi request
Use ppp lcp imsi request to enable the LNS to initiate IMSI binding authentication requests.
Use undo ppp lcp imsi request to restore the default.

Syntax
ppp lcp imsi request
undo ppp lcp imsi request

48

Default
The LNS does not initiate IMSI binding authentication requests.

Views
Interface view

Predefined user roles
network-admin

Examples
# Enable the LNS to initiate IMSI binding authentication requests.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp lcp imsi request

ppp lcp imsi string
Use ppp lcp imsi string imsi-info to configure the IMSI information on the client.
Use undo ppp lcp imsi string to delete the IMSI information on the client.

Syntax
ppp lcp imsi string imsi-info
undo ppp lcp imsi string

Default
The client automatically obtains the IMSI information from its SIM card.

Views
Interface view

Predefined user roles
network-admin

Parameters
imsi-info: Specifies the IMSI information, a case-sensitive string of 1 to 31 characters.

Examples
# Configure the IMSI information as imsi1.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp lcp imsi string imsi1

ppp lcp sn accept
Use ppp lcp sn accept to enable the client to accept the SN binding authentication requests from
the LNS.
Use undo ppp lcp sn accept to restore the default.

49

Syntax
ppp lcp sn accept
undo ppp lcp sn accept

Default
The client declines the SN binding authentication requests from the LNS.

Views
Interface view

Predefined user roles
network-admin

Examples
# Enable the client to accept the SN binding authentication requests from the LNS.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp lcp sn accept

ppp lcp sn request
Use ppp lcp sn request to enable the LNS to initiate SN binding authentication requests.
Use undo ppp lcp sn request to restore the default.

Syntax
ppp lcp sn request
undo ppp lcp sn request

Default
The LNS does not initiate SN binding authentication requests.

Views
Interface view

Predefined user roles
network-admin

Examples
# Enable the LNS to initiate SN binding authentication requests.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp lcp imsi request

ppp lcp sn string
Use ppp lcp sn string sn-info to configure the SN information on the client.
Use undo ppp lcp sn string to delete the SN information on the client.

50

Syntax
ppp lcp sn string sn-info
undo ppp lcp sn string

Default
The client automatically obtains the SN information from its SIM card.

Views
Interface view

Predefined user roles
network-admin

Parameters
sn-info: Specifies the SN information, a case-sensitive string of 1 to 31 characters.

Examples
# Configure the SN information as sn1.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp lcp sn string sn1

ppp user accept-format imsi-sn split
Use ppp user accept-format imsi-sn split splitchart to configure the separator for the received
authentication information.
Use undo ppp user accept-format to restore the default.

Syntax
ppp user accept-format imsi-sn split splitchart
undo ppp user accept-format

Default
No separator is configured for the received authentication information.

Views
Interface view

Predefined user roles
network-admin

Parameters
splitchart: Specifies the separator. The separator contains one character, and it can be a letter, a digit,
or any sign other than the at sign (@), slash (/), and backslash (\).

51

Usage guidelines
By default, the authentication information contains only the client username. If you include the IMSI
or SN information in the authentication information, you need to configure the separator to separate
different types of information.
If no IMSI/SN information is received from the peer during the authentication process, the IMSI/SN
information split from the received authentication information is used.

Examples
# Configure the pound sign (#) as the separator for the authentication information.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp user accept-format imsi-sn split #

ppp user attach-format imsi-sn split
Use ppp user attach-format imsi-sn split splitchart to configure the separator for the sent
authentication information.
Use undo ppp user attach-format to restore the default.

Syntax
ppp user attach-format imsi-sn split splitchart
undo ppp user attach-format

Default
No separator is configured for the sent authentication information.

Views
Interface view

Predefined user roles
network-admin

Parameters
splitchart: Specifies the separator. The separator contains one character, and it can be a letter, a digit,
or any sign other than the at sign (@), slash (/), and backslash (\).

Usage guidelines
By default, the authentication information contains only the client username. If you include the IMSI
or SN information in the authentication information, you need to configure the separator to separate
different types of information.

Examples
# Configure the pound sign (#) as the separator for the sent authentication information.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp user attach-format imsi-sn split #

52

ppp user replace
Use ppp user replace to replace the client username with the IMSI or SN information for
authentication.
Use undo ppp user replace to restore the default.

Syntax
ppp user replace { imsi | sn }
undo ppp user replace

Default
The client username is used for authentication.

Views
Interface view

Predefined user roles
network-admin

Examples
# Replace the client username with the IMSI information for authentication.
 system-view
[Sysname] interface virtual-template 1
[Sysname-Virtual-Template1] ppp user replace imsi

New feature: Specifying a band for a 4G modem
You can specify a band for a 4G modem.

Command reference
lte band
Use ite band to specify a band for a 4G modem.
Use undo lte band to restore the default.

Syntax
lte band band-number
undo lte band

Default
The default setting varies by 4G modem model.

Views
Cellular interface view

53

Predefined user roles
network-admin

Parameters
band-number: Specifies a band for a 4G modem. The available bands vary by modem model.

Usage guidelines
This command is supported only on the following 4G modems:


Sierra MC7354 and MC7304.



Long Sung U8300C, U8300W, and U8300.



WNC DM11-2.

Examples
# Specify band 3 for Cellular 1/0.
 system-view
[Sysname] controller cellular 1/0
[Sysname-Controller-Cellular1/0]lte band 3

New feature: Using tunnel interfaces as OpenFlow ports
The MSR 2600 routers support using tunnel interfaces as OpenFlow ports.

New feature: NETCONF support for ACL filtering
Support of NETCONF for ACL filtering was added.

Command reference
netconf soap http acl
Use netconf soap http acl to apply an ACL to NETCONF over SOAP over HTTP traffic.
Use undo netconf soap http acl to restore the default.

Syntax
netconf soap http acl { acl-number | name acl-name }
undo netconf soap http acl

Default
No ACL is applied to NETCONF over SOAP over HTTP traffic.

Views
System view
54

Predefined user roles
network-admin

Parameters
acl-number: Specifies an ACL by its number in the range of 2000 to 2999.
name acl-name: Specifies an ACL by its name. The acl-name argument is a case-insensitive string
of 1 to 63 characters. It must start with an English letter. To avoid confusion, it cannot be all. The
specified ACL must be an existing IPv4 basic ACL.

Usage guidelines
This command is not available in FIPS mode.
Only NETCONF clients permitted by the ACL can access the device through SOAP over HTTP.
If you execute this command multiple times, the most recent configuration takes effect.

Examples
# Use ACL 2001 to allow only NETCONF clients in subnet 10.10.0.0/16 to access the device through
SOAP over HTTP.
 system-view
[Sysname] acl basic 2001
[Sysname-acl-ipv4-basic-2001] rule permit source 10.10.0.0 0.0.255.255
[Sysname-acl-ipv4-basic-2001] quit
[Sysname] netconf soap http acl 2001

netconf soap https acl
Use netconf soap https acl to apply an ACL to NETCONF over SOAP over HTTPS traffic.
Use undo netconf soap https acl to restore the default.

Syntax
netconf soap https acl { acl-number | name acl-name }
undo netconf soap https acl

Default
No ACL is applied to NETCONF over SOAP over HTTPS traffic.

Views
System view

Predefined user roles
network-admin

Parameters
acl-number: Specifies an ACL by its number in the range of 2000 to 2999.

55

name acl-name: Specifies an ACL by its name. The acl-name argument is a case-insensitive string
of 1 to 63 characters. It must start with an English letter. To avoid confusion, it cannot be all. The
specified ACL must be an existing IPv4 basic ACL.

Usage guidelines
Only NETCONF clients permitted by the ACL can access the device through SOAP over HTTPS.
If you execute this command multiple times, the most recent configuration takes effect.

Examples
# Use ACL 2001 to allow only NETCONF clients in subnet 10.10.0.0/16 to access the device through
SOAP over HTTPS.
 system-view
[Sysname] acl basic 2001
[Sysname-acl-ipv4-basic-2001] rule permit source 10.10.0.0 0.0.255.255
[Sysname-acl-ipv4-basic-2001] quit
[Sysname] netconf soap https acl 2001

New feature: WAAS
Configuring WAAS
This release added support for the Wide Area Application Services (WAAS) feature in the DATA
image on the following router series:


MSR 800.



MSR 2600.



MSR 3600.



MSR 5600.

Command reference
All commands were newly added.
For more information about the commands, see WAAS commands in H3C MSR Router Series
Comware 7 Layer 3—IP Services Command Reference.

New feature: Support for the MKI field in SRTP or SRTCP
packets
This feature enables the router to add the MKI field to outgoing SRTP or SRTCP packets. You can
set the length of the MKI field.

56

Command reference
New command: mki
Use mki to add the MKI field to outgoing SRTP or SRTCP packets and set the length of the MKI field.
Use undo mki to restore the default.

Syntax
mki mki-length
undo mki

Default
Outgoing SRTP or SRTCP packets do not carry the MKI field.

Views
SIP view

Predefined user roles
network-admin

Parameters
mki-length: Specifies the length of the MKI field, in the range of 1 to 128 bytes.

Usage guidelines
This command takes effect only when SRTP is the media stream protocol for SIP calls. To specify
SRTP as the medial stream protocol for SIP calls, use the srtp command.

Examples
# Add the MKI field to outgoing SRTP or SRTCP packets and set the length of the MKI field to 1 bit.
 system-view
[Sysname] voice-setup
[Sysname-voice] sip
[Sysname-voice-sip] mki 1

New feature: SIP domain name
This feature enables the router to populate the CONTACT header field of outgoing SIP packets with
the router's SIP domain name.

Command reference
New command: sip-domain
Use sip-domain to populate the CONTACT header field of outgoing SIP packets with the router's
SIP domain name.
Use undo sip-domain to restore the default.
57

Syntax
sip-domain domain-name
undo sip-domain

Default
The router populates the CONTACT header field of an outgoing SIP packet with the IP address of the
outgoing interface.

Views
SIP view

Predefined user roles
network-admin

Parameters
domain-name: Specifies the SIP domain name, a case-insensitive string of 1 to 31 characters. Valid
characters are letters, digits, underscore (_), hyphen (-), and dot (.).

Examples
# Populate the CONTACT header field of outgoing SIP packets with the SIP domain name abc.com.
 system-view
[Sysname] voice-setup
[Sysname-voice] sip
[Sysname-voice-sip] sip-domain abc.com

New feature: Setting the maximum size of advertisement
files
You can set the maximum size of advertisement files sent to wireless clients to 10 MB when the
clients access the wireless network.

New feature: Support of VCF for NETCONF
Support for NETCONF was added to VCF.

New feature: Support of SNMP for NETCONF
Support for NETCONF was added to SNMP.

58

New feature: Support of file system for NETCONF
Support for NETCONF was added to file system.

New feature: Support of PoE for NETCONF
Support for NETCONF was added to PoE.

New feature: Support of RMON for NETCONF
Support for NETCONF was added to RMON.

New feature: Support of policy-based routing for
NETCONF
Support for NETCONF was added to policy-based routing.

New feature: Support of BGP for NETCONF
Support for NETCONF was added to BGP.

New feature: Support of OSPF for NETCONF
Support for NETCONF was added to OSPF.

New feature: Support of ping for NETCONF
Support for NETCONF was added to ping.

New feature: Support of tracert for NETCONF
Support for NETCONF was added to tracert.

59

New feature: Support of L2VPN for NETCONF
Support for NETCONF was added to L2VPN.

New feature: SIP support for VRF
Configuring SIP support for VRF
For information about this feature, see SIP configuration in H3C MSR Router Series Comware 7
Voice Configuration Guide.

Command reference
The vpn-instance command was added.
For information about the command, see SIP commands in H3C MSR Router Series Comware 7
Voice Command Reference.

New feature: IKEv2
Configuring IKEv2
For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command reference
For information about the commands, see IPsec commands in H3C MSR Router Series Comware 7
Command Reference.

New feature: Specifying an IKEv2 profile for an IPsec
policy
Specifying an IKEv2 profile for an IPsec policy
For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command reference
The ikev2-profile command was added.
60

For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

New feature: Bidirectional BFD control detection for RIP
Configuring bidirectional BFD control detection for RIP
For information about this feature, see RIP configuration in H3C MSR Router Series Comware 7
Layer 3—IP Routing Configuration Guide.

Command reference
The bfd all-interfaces enable, rip bfd, and rip primary-path-detect bfd commands were newly
added.
For information about the commands, see RIP commands in H3C MSR Router Series Comware 7
Layer 3—IP Routing Command Reference.

New feature: OSPF router ID autoconfiguration
Automatically obtaining an OSPF router ID
For information about this feature, see OSPF configuration in H3C MSR Router Series Comware 7
Layer 3—IP Routing Configuration Guide.

Command reference
The display system internal ospf event-log router-id command was newly added and the
auto-select keyword was added to the ospf command.
For information about the commands, see OSPF commands in H3C MSR Router Series Comware 7
Layer 3—IP Routing Command Reference and OSPF probe commands in H3C MSR Router Series
Comware 7 Probe Command Reference.

New feature: Associating a static route with a track entry
Associating a static route with a track entry
For information about this feature, see static routing configuration in H3C MSR Router Series
Comware 7 Layer 3—IP Routing Configuration Guide.

61

Command reference
The track keyword was added to the ip route-static command.
For information about the command, see static routing commands in H3C MSR Router Series
Comware 7 Layer 3—IP Routing Command Reference.

New feature: VLAN tag processing rule for incoming
traffic
Configuring the VLAN tag processing rule for incoming traffic
For information about this feature, see H3C MSR Router Series Comware 7 VXLAN Configuration
Guide.

Command reference
The l2vpn rewrite inbound tag command was added. For information about this command, see
H3C MSR Router Series Comware 7 VXLAN Command Reference.

New feature: IP-based portal-free rule
Configuring an IP-based portal free-rule
For information about this feature, see portal authentication configuration in H3C MSR Router Series
Comware 7 Security Configuration Guide.

Command reference
The portal free-rule command was added.
For information about the command, see portal commands in H3C MSR Router Series Comware 7
Security Command Reference.

New feature: Portal redirect packet statistics
Displaying/maintaining portal redirect packet statistics
For information about this feature, see portal authentication configuration in H3C MSR Router Series
Comware 7 Security Configuration Guide.

62

Command reference
The display portal redirect statistics and reset portal redirect statistics commands were added.
For information about the commands, see portal commands in H3C MSR Router Series Comware 7
Security Command Reference.

New feature: GDVPN
Configuring GDVPN
For information about this feature, see group domain VPN configuration in H3C MSR Router Series
Comware 7 Security Configuration Guide.

Command reference
For information about the commands, see group domain VPN commands in H3C MSR Router
Series Comware 7 Security Configuration Guide.

New feature: OpenFlow instance
Configuring the OpenFlow instance mode
For information about this feature, see OpenFlow in H3C MSR Router Series Comware 7 OpenFlow
Configuration Guide.

Command reference
The port keyword was added to the classification command.
For information about the command, see OpenFlow commands in H3C MSR Router Series
Comware 7 OpenFlow Command Reference.

Binding an OpenFlow instance to ports
For information about this feature, see OpenFlow in H3C MSR Router Series Comware 7 OpenFlow
Configuration Guide.

Command reference
The port command was added.
For information about the command, see OpenFlow commands in H3C MSR Router Series
Comware 7 OpenFlow Command Reference.
63

Binding an port to an OpenFlow instance
For information about this feature, see OpenFlow in H3C MSR Router Series Comware 7 OpenFlow
Configuration Guide.

Command reference
The openflow-instance command was added.
For information about the command, see OpenFlow commands in H3C MSR Router Series
Comware 7 OpenFlow Command Reference.

New feature: Enabling the Extended Sequence Number
(ESN) feature for an IPsec transform set
Enabling ESN for an IPsec transform set
For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command reference
The esn enable command was added.
For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

New feature: Enabling Traffic Flow Confidentiality (TFC)
padding for an IPsec policy
Enabling TFC padding for an IPsec policy
For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command reference
The tfc enable command was added.
For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

64

New feature: SIP session refresh
Enabling SIP session refresh
In this release, you can enable SIP session refresh for a VoIP voice entity.

Command reference
New command: voice-class sip session refresh
Use voice-class sip session refresh to enable SIP session refresh for a VoIP entity.
Use undo voice-class sip session refresh to disable SIP session refresh for a VoIP entity.

Syntax
voice-class sip session refresh [ global ]
undo voice-class sip session refresh

Default
A VoIP entity uses the global configuration for SIP session refresh.

Views
VoIP entity view

Predefined user roles
network-admin

Parameters
global: Applies the global configuration for SIP session refresh to the VoIP entity.

Usage guidelines
The configuration for SIP session refresh in VoIP entity view takes priority over that in SIP view.

Examples
# Enable SIP session refresh for VoIP entity 1.
 system-view
[Sysname] voice-setup
[Sysname-voice] dial-program
[Sysname-voice-dial] entity 1 voip
[Sysname-voice-dial-entity1] voice-class sip session refresh

# Apply the global configuration for SIP session refresh to VoIP entity 1.
 system-view
[Sysname] voice-setup
[Sysname-voice] dial-program
[Sysname-voice-dial] entity 1 voip
[Sysname-voice-dial-entity1] voice-class sip session refresh global

65

Modified feature: User profile
Feature change description
This release added support for QoS policy configuration in user profile view.

Modified feature: Tunnel interface support for IPsec and
VXLAN tunnel modes
1.

Feature change description

This release added support for the IPsec tunnel mode and VXLAN tunnel mode on a tunnel interface.

2.

Command changes
1.

Modified command: interface tunnel

Old syntax
interface tunnel number [ mode { advpn { gre | udp } [ ipv6 ] | ds-lite-aftr | evi | gre [ ipv6 ] |
ipv4-ipv4 | ipv6 | ipv6-ipv4 [ 6to4 | auto-tunnel | isatap ] | mpls-te | nve } ]

New syntax
interface tunnel number [ mode { advpn { gre | udp } [ ipv6 ] | ds-lite-aftr | evi | gre [ ipv6 ] | ipsec
[ ipv6 ] | ipv4-ipv4 | ipv6 | ipv6-ipv4 [ 6to4 | auto-tunnel | isatap ] | mpls-te | nve |vxlan } ]

Views
System view

Change description
The following parameters were added to the command:


mode ipsec: Specifies the IPv4 IPsec tunnel mode.



mode ipsec ipv6: Specifies the IPv6 IPsec tunnel mode.



mode vxlan: Specifies the VXLAN tunnel mode.

66

Modified feature: PKI certificate auto-renewal
Feature change description
Support for certificate auto-renewal was added to PKI.

Command changes
Modified command: certificate request mode
Old syntax
certificate request mode { auto [ password { cipher | simple } string ] | manual }

New syntax
certificate request mode { auto [ password { cipher | simple } string | renew-before-expire days
[ reuse-public-key ] [ auto-append common-name ] ] * | manual }

Views
PKI domain view

Change description
The following keywords were added to the command:


renew-before-expire days: Configures the system to automatically request a new certificate
the specified number of days before the current certificate expires. The value range for the days
argument is 0 to 365. Value 0 indicates that the request for a new certificate is made when the
old certificate expires, which might cause service interruptions.



reuse-public-key: Reuses the key pair in the old certificate for the new certificate. If you do not
specify this keyword, the system generates a new key pair for the new certificate. The old key
pair is replaced with the new one when the new certificate is received from the CA.



auto-append common-name: Automatically appends random data to the common name of
the PKI entity for the new certificate. If you do not specify this keyword, the common name of
the PKI entity will be unchanged in the new certificate.

New command: display pki certificate renew-status
Use display pki certificate renew-status to display the certificate renewal status for a PKI domain.

Syntax
display pki certificate renew-status [ domain domain-name ]

67

Views
Any view

Predefined user roles
network-admin
network-operator

Parameters
domain-name: Specifies a PKI domain by its name, a case-insensitive string of 1 to 31 characters.
The domain name cannot contain the special characters listed in Error! Reference source not
found.. If you do not specify a domain name, this command displays the certificate renewal status
for all PKI domains.
Special characters
Character name

Symbol

Character name

Symbol

Tilde

~

Dot

.

Asterisk

*

Left angle bracket

<

Backslash

\

Right angle bracket

>

Vertical bar

|

Quotation marks

"

Colon

:

Apostrophe

'

Examples
# Display the certificate renewal status for all PKI domains.
 display pki certificate renew-status
Domain name: domain1
Renew time:

03:12:05 2015/12/07

Renew public key:
Key type: RSA
Time when key pair created: 15:40:48 2015/05/12
Key code:
30819F300D06092A864886F70D010101050003818D0030818902818100DAA4AAFEFE04C2C9
667269BB8226E26331E30F41A8FF922C7338208097E84332610632B49F75DABF6D871B80CE
C1BA2B75020077C74745C933E2F390DC0B39D35B88283D700A163BB309B19F8F87216A44AB
FBF6A3D64DEB33E5CEBF2BCF26296778A26A84F4F4C5DBF8B656ACFA62CD96863474899BC1
2DA4C04EF5AE0835090203010001

The command output indicates that the reuse-public-key keyword was not configured for PKI
domain domain1 and a new key pair was created for the new certificate.
# Display the certificate renewal status for PKI domain domain1.
 display pki certificate renew-status domain1
Domain name: domain1
Renew time:

03:12:05 2013/12/07

Renew public key:
Key type: RSA
Time when

key pair created: 15:40:48 2013/05/12

68

Key code:
30819F300D06092A864886F70D010101050003818D0030818902818100DAA4AAFEFE04C2C9
667269BB8226E26331E30F41A8FF922C7338208097E84332610632B49F75DABF6D871B80CE
C1BA2B75020077C74745C933E2F390DC0B39D35B88283D700A163BB309B19F8F87216A44AB
FBF6A3D64DEB33E5CEBF2BCF26296778A26A84F4F4C5DBF8B656ACFA62CD96863474899BC1
2DA4C04EF5AE0835090203010001

Command output
Field

Description

Renew time

Time when a new certificate will be requested.

Renew public key

Information about the new key pair created for the
certificate.

Key type

Key pair type, which can be RSA, DSA, or ECDSA.

Time when key pair created

Time when the key pair was created.

Key code

Public key data.

Modified feature: Configuring the PKI entity DN
Feature change description
Support for the subject-dn command was added to PKI. You can use the command to configure the
full subject DN string. Each attribute can be specified multiple times with different values.

Command changes
New command: subject-dn
Use subject-dn to configure the DN for a PKI entity.
Use undo subject-dn to restore the default.

Syntax
subject-dn dn-string
undo subject-dn

Default
No DN is configured for a PKI entity.

Views
PKI entity view

69

Default command level
network-admin

Parameters
dn-string: Specifies the DN for the PKI entity, a case-insensitive string of 1 to 255 characters.

Usage guidelines
The subject DN string is a sequence of attribute=value pairs separated by commas. Each attribute
can be specified multiple times with different values. Supported DN attributes are:


CN—Common-name.



C—Country code.



L—Locality.



O—Organization.



OU—Organization unit.



ST—State or province.

After this command is configured, the following commands do not take effect:


common-name



country



locality



organization



organization-unit



state

If you configure this command multiple times, the most recent configuration takes effect.

Examples
# Configure the DN for PKI entity en.
 system-view
[Sysname] pki entity en
[Sysname-pki-entity-en] subject-dn
CN=test,C=CN,O=abc,OU=rdtest,OU=rstest,ST=countryA,L=pukras

Modified feature: ADVPN
Feature change description
In this release, you can configure ADVPN group names and ADVPN group-to-QoS policy mappings.

70

Command changes
New command: advpn group
Use advpn group to configure an ADVPN group name.
Use undo advpn group to restore the default.

Syntax
advpn group group-name
undo advpn group

Default
No ADVPN group name is configured.

Views
Tunnel interface view

Predefined user roles
network-admin

Parameters
group-name: Specifies the ADVPN group name. The group name is a case-insensitive string of 1 to
63 characters that can include only letters, digits, and dots (.).

Usage guidelines
This command must be configured on the tunnel interface of a spoke. The spoke sends the ADVPN
group name in a hub-spoke tunnel establishment request to a hub. The hub looks for an ADVPN
group-to-QoS policy mapping that matches the ADVPN group name. If a matching mapping is found,
the hub applies the QoS policy in the mapping to the hub-spoke tunnel. If no match is found, the hub
does not apply a QoS policy to the hub-spoke tunnel.
If you modify the ADVPN group name after the tunnel is established, the spoke will inform the hub of
the modification. The hub will look for an ADVPN group-to-QoS policy mapping that matches the new
ADVPN group name and apply the QoS policy in the new mapping.
As a best practice, do not configure an ADVPN group name and apply a QoS policy on the same
tunnel interface.

Examples
# Configure aaa as the ADVPN group name.
 system-view
[Sysname] interface tunnel1 mode advpn gre
[Sysname-Tunnel1] advpn group aaa

71

2.

New command: advpn map group

Use advpn map group to configure a mapping between an ADVPN group and a QoS policy.
Use undo advpn map group to delete a mapping between an ADVPN group and a QoS policy.

Syntax
advpn map group group-name qos-policy policy-name outbound
undo advpn map group group-name

Default
No ADVPN group-to-QoS policy mappings are configured.

Views
Tunnel interface view

Predefined user roles
network-admin

Parameters
group-name: Specifies the ADVPN group name. The group name is a case-insensitive string of 1 to
63 characters that can include only letters, digits, and dots (.).
qos-policy policy-name: Specifies the QoS policy name, a case-sensitive string of 1 to 31
characters.
outbound: Applies the QoS policy to the outbound direction.

Usage guidelines
This command must be configured on the tunnel interface of a hub. After receiving a hub-spoke
tunnel establishment request from a spoke, the hub looks for an ADVPN group-to-QoS policy
mapping that matches the ADVPN group name carried in the request. If a matching mapping is found,
the hub applies the QoS policy in the mapping to the hub-spoke tunnel.
You can configure multiple ADVPN group-to-QoS policy mappings on a tunnel interface.
You can map multiple ADVPN groups to a QoS policy. You can map an ADVPN group to only one
QoS policy.
As a best practice, do not configure an ADVPN group-to-QoS policy mapping and apply a QoS policy
on the same tunnel interface.

Examples
# Configure a mapping between ADVPN group aaa and QoS policy bbb on Tunnel1.
 system-view
[Sysname] interface Tunnel1 mode advpn gre
[Sysname-Tunnel1] advpn map group aaa qos-policy bbb outbound

72

Modified feature: Telnet redirect
Feature change description
In this release, a Telnet redirect user is authenticated by using the authentication settings for the TTY
line. The device displays only Telnet redirect authentication information and the authentication result.
It does not display the copyright statement.
Support for Telnet redirect authentication was removed from MSR56 routers.

Modified feature: DHCP snooping performance
optimization
Feature change description
On a Layer 3 physical interface without subinterface, link aggregation, or snooping configured, the
dhcp snooping enable command was optimized to cause only a slight impact on receiving
non-DHCP packets. If you configure other services on the interface, the performance varies with the
services you configure.

Modified feature: OSPF performance optimization
Feature change description
You can set a fixed OSPF SPF calculation interval in the range of 0 to 10000 milliseconds.
The value range for the LSU packet sending interval was changed to 0 to 1000 milliseconds.

Command changes
Modified command: spf-schedule-interval
Old syntax
spf-schedule-interval { maximum-interval [ minimum-interval [ incremental-interval ] ] }

New syntax
spf-schedule-interval { maximum-interval [ minimum-interval [ incremental-interval ] ] | millisecond
interval }
73

Views
OSPF view

Change description
The millisecond interval argument was added to the command. You can specify this argument to set
a fixed OSPF SPF calculation interval in the range of 0 to 10000 milliseconds.

Modified command: transmit-pacing
Syntax
transmit-pacing interval interval count count

Views
OSPF view

Change description
Before modification: The value range for the interval argument was 10 to 1000 milliseconds.
After modification: The value range for the interval argument is 0 to 1000 milliseconds.

Modified feature: IP performance optimization
Feature change description
The device supports recording MAC addresses in TCP packets. You can also configure the device to
record the MAC address of the local device in TCP packets.

Command changes
New command: tcp mac-record enable
Use tcp mac-record enable to enable MAC address recording in TCP packets.
Use undo tcp mac-record enable to disable MAC address recording in TCP packets.

Syntax
tcp mac-record enable
undo tcp mac-record enable

Default
MAC address recording in TCP packets is disabled.

74

Views
Interface view

Default command level
network-admin

Usage guidelines
This feature records the MAC address of the packet originator in a TCP option. When an attack
occurs, the administrator can quickly locate the attack source according to the recorded MAC
addresses.

Examples
# Enable MAC address recording in TCP packets on GigabitEthernet 1/0/1.
 system-view
[Sysname] interface GigabitEthernet 0/1
[Sysname-GigabitEthernet0/1] tcp mac-record enable

New command: tcp mac-record local
Use tcp mac-record local to record the MAC address of the local device in TCP packets.
Use undo tcp mac-record local to restore the default.

Syntax
tcp mac-record local mac-address
undo tcp mac-record local

Default
The destination MAC address is recorded.

Views
System view

Default command level
network-admin

Parameters
mac-address: Specifies the MAC address of the local device. The MAC address cannot be all 0s,
broadcast MAC address, or multicast MAC address.

Usage guidelines
To make this command take effect, you must enable MAC address recording in TCP packets by
using the tcp mac-record enable command.

Examples
# Record the MAC address of the local device 0605-0403-0201 in TCP packets.
 system-view
[Sysname] tcp mac-record local 0605-0403-0201

75

Modified feature: AAA
Feature change description
Starting from this software version, you can configure the authorization method for IKE extended
authentication.

Command changes
New command: authorization ike
Use authorization ike to configure the authorization method for IKE extended authentication.
Use undo authorization ike to restore the default.

Syntax
In non-FIPS mode:
authorization ike { local [ none ] | none | radius-scheme radius-scheme-name [ local ] [ none ] }
undo authorization ike
In FIPS mode:
authorization ike { local | radius-scheme radius-scheme-name [ local ] }
undo authorization ike

Default
The default authorization method for the ISP domain is used for IKE extended authentication.

Views
ISP domain view

Predefined user roles
network-admin

Parameters
local: Performs local authorization.
none: Does not perform authorization.
radius-scheme radius-scheme-name: Specifies a RADIUS scheme by its name, a case-insensitive
string of 1 to 32 characters.

Examples
# In ISP domain test, perform local authorization for IKE extended authentication.
 system-view

76

[Sysname] domain test
[Sysname-isp-test] authorization ike local

# In ISP domain test, use RADIUS scheme rd as the primary authorization method and local
authorization as the backup authorization method for IKE extended authentication.
 system-view
[Sysname] domain test
[Sysname-isp-test] authorization ike radius-scheme rd local

Modified feature: Configuring a cellular interface for a
3G/4G modem
Feature change description
In this release, you can set the RSSI thresholds for a 3G/4G modem.

Command changes
New command: rssi
Use rssi to set the RSSI thresholds for a 3G/4G modem.
Use undo rssi to restore the default.

Syntax
rssi { 1xrtt | evdo | gsm | lte } { low lowthreshold | medium mediumthreshold } *
undo rssi { 1xrtt | evdo | gsm | lte } [ low | medium ]

Default
The lower and upper thresholds for a 3G/4G modem are –150 dBm and 0 dBm, respectively.

Views
Cellular interface view

Predefined user roles
network-admin

Parameters
1xrtt: Specifies the 1xRTT mode.
evdo: Specifies the EVDO mode.
gsm: Specifies the GSM mode.
lte: Specifies the LTE mode.
77

low lowthreshold: Specifies the lower RSSI threshold value in the range of 0 to 150, which represent
a lower RSSI threshold in the range of –150 dBm to 0 dBm. The value of lowthreshold cannot be
smaller than the value of mediumthreshold because the system automatically adds a negative sign
to the RSSI thresholds.
medium mediumthreshold: Specifies the upper RSSI threshold value in the range of 0 to 150, which
represent an upper RSSI threshold in the range of –150 dBm to 0 dBm.

Usage guidelines
The device performs the following operations based on the actual RSSI of the 3G/4G modem:


Sends a trap that indicates high RSSI when the RSSI exceeds the upper threshold.



Sends a trap that indicates normal RSSI when the RSSI is between the lower threshold and
upper threshold (included).



Sends a trap that indicates low RSSI when the RSSI drops to or below the lower threshold.



Sends a trap that indicates low RSSI every 10 minutes when the RSSI remains equal to or
smaller than the lower threshold.

To view the RSSI change information for a 3G/4G modem, use the display cellular command.

Examples
# Set the lower threshold for a 3G/4G modem in GSM mode to –110 dBm.
 system-view
[Sysname] interface cellular 0/0
[Sysname-Cellular0/0] rssi gsm low 110

Modified feature: QoS on VXLAN tunnel interfaces
Feature change description
This software version added support for QoS in the outbound direction of VXLAN tunnel interfaces.

Command changes
None.

78

Modified feature: Option 60 encapsulation in DHCP
replies
Feature change description
Disabling Option 60 encapsulation in DHCP replies.

Modified feature: MPLS QoS support for matching the
EXP field
Feature change description
In this release, MPLS QoS supports matching the EXP fields in both the topmost (first) MPLS label
and the second MPLS label.

Command changes
New command: if-match second-mpls-exp
Use if-match second-mpls-exp to define a criterion to match the EXP field in the second MPLS
label.
Use undo if-match second-mpls-exp to delete the match criterion.

Syntax
if-match [ not ] second-mpls-exp exp-value&<1-8>
undo if-match [ not ] second-mpls-exp exp-value&<1-8>

Default
No criterion is defined to match the EXP field in the second MPLS label.

Views
Traffic class view

Predefined user roles
network-admin

Parameters
not: Matches packets not conforming to the specified criterion.
79

exp-value&<1-8>: Specifies a space-separated list of up to eight EXP values. The value range for
the exp-value argument is 0 to 7. If the same MPLS EXP value is specified multiple times, the system
considers them as one. If a packet matches one of the defined MPLS EXP values, it matches the
if-match clause.

Examples
# Define a criterion to match packets with EXP value 3 or 4 in the second MPLS label.
 system-view
[Sysname] traffic classifier database
[Sysname-classifier-database] if-match second-mpls-exp 3 4

Modified feature: MPLS QoS support for marking the
EXP field
Feature change description
In this release, MPLS QoS supports marking the EXP fields in both the topmost (first) MPLS label
and the second MPLS label.

Command changes
New command: remark second-mpls-exp
Use remark second-mpls-exp to configure an EXP value marking action for the second MPLS label
in a traffic behavior.
Use undo remark second-mpls-exp to delete the action.

Syntax
remark second-mpls-exp second-mpls-exp-value
undo remark second-mpls-exp second-mpls-exp-value

Default
No EXP value marking action for the second MPLS label is configured in a traffic behavior.

Views
Traffic behavior view

Predefined user roles
network-admin

Parameters
second-mpls-exp-value: Specifies an EXP value for the second MPLS label, in the range of 0 to 7.
80

Examples
# Define a traffic behavior to mark packets with EXP value 3 for the second MPLS label.
 system-view
[Sysname] traffic behavior b1
[Sysname-behavior-b1] remark second-mpls-exp 3

Modified feature: Automatic configuration
Feature change description
A limit was added to the number of automatic attempts. After the limit is reached, the automatic
configuration process ends.
If you set the limit to 0, only one automatic configuration attempt is allowed.

Modified feature: User profile
Feature change description
In this release, the user profile name supports using dots (.).

Command change
Modified command: user-profile
Syntax
user-profile profile-name
undo user-profile profile-name

Views
System view

Change description
Before modification: The user profile name is a case-sensitive string of 1 to 31 characters. Valid
characters are letters, digits, and underscores (_), and the name must start with an English letter.
After modification: The user profile name is a case-sensitive string of 1 to 31 characters. Valid
characters are letters, digits, underscores (_), and dots (.), and the name must start with an English
letter.

81

Modified feature: Default size of the TCP receive and
send buffer
Feature change description
The default value for the TCP receive and send buffer size was changed to 63 KB.

Command changes
Modified command: tcp window
Syntax
tcp window window-size
undo tcp window

Views
System view

Change description
Before modification: The default value for the window-size argument was 64 KB.
After modification: The default value for the window-size argument is 63 KB.

Modified feature: Support for per-packet load sharing
Feature change description
The per-packet keyword was added to the ip load-sharing mode command to support per-packet
load sharing.

Command changes
Modified command: ip load-sharing mode
Old syntax
Centralized devices:
ip load-sharing mode per-flow [ dest-ip | dest-port | ip-pro | src-ip | src-port ] * ]
82

Centralized IRF devices–Distributed devices–In standalone mode:
ip load-sharing mode per-flow [ dest-ip | dest-port | ip-pro | src-ip | src-port ] * ] [ slot
slot-number ]
Distributed devices–In IRF mode:
ip load-sharing mode per-flow [ dest-ip | dest-port | ip-pro | src-ip | src-port ] * ] [ chassis
chassis-number slot slot-number ]

New syntax
Centralized devices:
ip load-sharing mode { per-flow [ [ dest-ip | dest-port | ip-pro | src-ip | src-port ] * ] | per-packet }
Centralized IRF devices–Distributed devices–In standalone mode:
ip load-sharing mode { per-flow [ dest-ip | dest-port | ip-pro | src-ip | src-port ] * ] | per-packet }
Distributed devices–In IRF mode:
ip load-sharing mode { per-flow [ dest-ip | dest-port | ip-pro | src-ip | src-port ] * ] | per-packet }

Views
System view

Change description
The per-packet keyword was added to the ip load-sharing mode command to support per-packet
load sharing.

Modified feature: Default user role
Feature change description
The default user role can be changed. The role-name argument was added to the role default-role
enable command for specifying a user role as the default user role.

Command changes
Modified command: role default-role enable
Old syntax
role default-role enable
undo role default-role enable

New syntax
role default-role enable [ role-name ]
83

undo role default-role enable

Views
System view

Change description
Before modification: The default user role is network-operator.
After modification: The role-name argument was added to specify any user role that exists in the
system as the default user role. The argument is a case-sensitive string of 1 to 63 characters. If you
do not specify this argument, the default user role is network-operator.

Modified feature: Debugging
Feature change description
The all keyword and the timeout time option were removed from the debugging command. You can
no longer use the debugging all command to enable debugging for all modules or specify the
timeout time for the debugging all command.

Command changes
Modified command: debugging
Old syntax
debugging { all [ timeout time ] | module-name [ option ] }
undo debugging { all | module-name [ option ] }

New syntax
debugging module-name [ option ]
undo debugging module-name [ option ]

Views
User view

Change description
The following parameters were removed from the debugging command:


all: Enables debugging for all modules.

timeout time: Specifies the timeout time for the debugging all command. The system automatically
executes the undo debugging all command after the timeout time. The time argument is in the
range of 1 to 1440 minutes. If you do not specify a timeout time, you must manually execute the
undo debugging all command to disable debugging for all modules.
84

Modified feature: SSH username
Feature change description
In this release, an SSH username cannot be a, al, all, or include the following characters:
\|/:*?<>
The at sign (@) can only be used in the username format pureusername@domain when the
username contains an ISP domain name.

Command changes
Modified command: ssh user
Syntax
In non-FIPS mode:
ssh user username service-type { all | netconf | scp | sftp | stelnet } authentication-type
{ password | { any | password-publickey | publickey } assign { pki-domain domain-name |
publickey keyname } }
undo ssh user username
In FIPS mode:
ssh user username service-type { all | netconf | scp | sftp | stelnet } authentication-type
{ password | password-publickey assign { pki-domain domain-name | publickey keyname } }
undo ssh user username

Views
System view

Change description
Before modification: The username argument is a case-insensitive string of 1 to 80 characters. If the
username contains an ISP domain name, use the format pureusername@domain.
After modification: The username argument is a case-insensitive string of 1 to 80 characters,
excluding

a,

al,

all,

and

the

following

characters:

\|/:*?<>
The at sign (@) can only be used in the username format pureusername@domain when the
username contains an ISP domain name. The pure username can contain 1 to 55 characters and the
domain name can contain 1 to 24 characters. The whole username cannot exceed 80 characters.

85

Modified feature: IS-IS hello packet sending interval
Feature change description
The value range of the interval for sending hello packets was changed to 1 to 255 seconds.

Command changes
Modified command: isis timer hello
Syntax
isis timer hello seconds [ level-1 | level-2 ]
undo isis timer hello [ level-1 | level-2 ]

Views
Interface view

Change description
The value range for the seconds argument was changed to 1 to 255 seconds.

Modified feature: 802.1X redirect URL
Feature change description
The value range for the url-string argument was changed to 1 to 256 characters for the dot1x
ead-assistant url command.

Command changes
Modified command: dot1x ead-assistant url
Syntax
dot1x ead-assistant url url-string

Views
System view

Change description
Before modification: The value range for the url-string argument is 1 to 64 characters.
86

After modification: The value range for the url-string argument is 1 to 256 characters.

Modified feature: Displaying information about NTP
servers from the reference source to the primary NTP
server
Feature change description
You can specify a source interface for tracing NTP servers from the reference source to the primary
NTP server.

Command changes
Modified command: display ntp-service trace
Old syntax
display ntp-service trace

New syntax
display ntp-service trace [ source interface-type interface-number ]

Views
Any view

Change description
The source interface-type interface-number option was added to the display ntp-service trace
command.

Modified feature: Saving, rolling back, and loading the
configuration
The following configuration guidelines were added when you use NETCONF to save, roll back, or
load the configuration:


The save, rollback, and load operations supplement NETCONF requests. Performing the
operations might consume a lot of system resources.

87



Do not perform the save, rollback, or load operation when another user is performing the
operation. If multiple users simultaneously perform the save, rollback, or load operation, the
result returned to each user might be inconsistent with the user request.

Modified feature: Displaying information about SSH
users
Feature change description
In this release, the display ssh user-information command does not display the public key name
for an SSH user that uses password authentication.

Command changes
Modified command: display ssh user-information
Syntax
display ssh user-information [ username ]

Views
Any view

Change description
Before modification: The User-public-key-name field in the command output displays null for an
SSH user that uses password authentication.
After modification: The User-public-key-name field in the command output is blank for an SSH user
that uses password authentication.

Modified feature: SIP trusted nodes
Configuring SIP trusted nodes
In this release, you can enable the trusted node feature by using the ip address trusted
authenticate command. You also can display information about SIP trusted nodes by using the
display voice ip address trusted list command.

88

Command changes
The display voice ip address trusted list and ip address trusted authenticate commands were
added.

New command: display voice ip address trusted list
Use display voice ip address trusted list to display information about trusted nodes.

Syntax
display voice ip address trusted list

Views
Any view

Predefined user roles
network-admin
network-operator

Usage guidelines
This command displays trusted nodes in the trusted node list and call destination IP addresses.

Examples
# Display information about trusted nodes.
 display voice ip address trusted list
IP address trusted authentication: Enabled
VoIP entity IP addresses:
Entity tag

State

SIP IP address

----------

-----

--------------

20

Up

192.168.4.110

53232

Down

192.168.4.210

55555

Up

192.168.4.210

9613

Up

192.168.4.125

IP address trusted list:
192.168.4.0 255.255.255.0
192.168.5.120 255.255.255.255

Command output
Field

Description

IP address trusted authentication

Whether IP address trusted authentication is enabled:
 Enabled.
 Disabled.

VoIP entity IP addresses

Trusted IP addresses for VoIP entities.

89

Field

Description

Entity tag

Tag of a VoIP entity.

State

Status of a VoIP entity:
 Up.
 Down.

SIP IP address

Call destination IP address of a VoIP entity.

IP address trusted list

List of trusted nodes.

New command: ip address trusted authenticate
Use ip address trusted authenticate to enable IP address trusted authentication.
Use undo ip address trusted authenticate to disable IP address trusted authentication.

Syntax
ip address trusted authenticate
undo ip address trusted authenticate

Default
IP address trusted authentication is disabled. All nodes are regarded as trusted, and the device
accepts calls from any nodes.

Views
SIP view

Predefined user roles
network-admin

Usage guidelines
After you enable this feature, the device accepts calls only from trusted nodes.
For calls to be successfully established, configure the proxy server, registrars, the DNS server, and
the MWI server as trusted nodes.

Examples
# Enable IP address trusted authentication.
 system-view
[Sysname] voice-setup
[Sysname-voice] sip
[Sysname-voice-sip] ip address trusted authenticate

90

Modified feature: IPsec ESP encryption algorithms
Feature change description
Support for the following IPsec ESP encryption algorithms was added in high encryption mode:


AES algorithm in CTR mode.



Camellia algorithm in CBC mode.



GMAC algorithm.



GCM algorithm.



SM1 algorithm in CBC mode.



SM4 algorithm.

For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command changes
The following arguments were added to the esp encryption-algorithm command:


aes-ctr-128.



aes-ctr-192.



aes-ctr-256.



camellia-cbc-128.



camellia-cbc-192.



camellia-cbc-256.



gmac-128.



gmac-192.



gmac-256.



gcm-128.



gcm-192.



gcm-256.



sm1-cbc-128.



sm1-cbc-192.



sm1-cbc-256.



sm4-cbc.

For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.
91

Modified feature: IPsec ESP authentication algorithms
Feature change description
Support for the following IPsec ESP authentication algorithms was added:


AES-XCBC-MAC.



HMAC-SHA-25.



HMAC-SHA-384.



HMAC-SHA-512.



HMAC-SM3.

For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command changes
The following arguments were added to the esp authentication-algorithm command:


aes-xcbc-mac.



sha256.



sha384.



sha512.



sm3.

For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

Modified feature: IPsec AH authentication algorithms
Feature change description
Support for the following IPsec AH authentication algorithms was added:


AES-XCBC-MAC.



HMAC-SHA-256.



HMAC-SHA-384.



HMAC-SHA-512.



HMAC-SM3.

92

For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command changes
The following arguments were added to the ah authentication-algorithm command:


aes-xcbc-mac.



sha256.



sha384.



sha512.



sm3.

For more information about the command, see IPsec commands in H3C MSR Router Series
Comware 7 Security Command Reference.

Modified feature: Specifying an encryption algorithm for
an IKE proposal
Feature change description
In this release, you can specify the following encryption algorithms for an IKE proposal:


sm1-cbc-128.



sm1-cbc-192.



sm1-cbc-256.

For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command changes
The following keywords were added to the encryption-algorithm command:


sm1-cbc-128.



sm1-cbc-192.



sm1-cbc-256.

For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

93

Modified feature: Specifying an authentication algorithm
for an IKE proposal
Feature change description
In this release, you can specify the sm3 authentication algorithm for an IKE proposal.
For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command changes
The sm3 argument was added to the authentication-algorithm command.
For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

Modified feature: Generating asymmetric key pairs
Feature change description
In this release, you can generate ECDSA key pairs by using the secp384r1 elliptic curve.
For information about this feature, see public key management in H3C MSR Router Series Comware
7 Security Configuration Guide.

Command changes
The secp384r1 keyword was added to the public-key local create command.
For information about the command, see public key management commands in H3C MSR Router
Series Comware 7 Command Reference.

94

Modified feature: Specifying an ECDSA key pair for
certificate request
Feature change description
In this release, you can specify an ECDSA key pair with a specific key length for certificate request.
Supported key lengths are:


192 bits.



256 bits.



384 bits.

For information about this feature, see PKI in H3C MSR Router Series Comware 7 Security
Configuration Guide.

Command changes
The following keywords were added to the public-key ecdsa name command:


secp192r1.



secp256r1.



secp384r1.

For information about the command, see PKI commands in H3C MSR Router Series Comware 7
Command Reference.

Modified feature: QoS MIB
Feature change description
In this release, QoS MIB information changed.

95

Modified feature: Enabling PFS for an IPsec transform
set
Feature change description
In this release, you can enable PFS using 256-bit or 384-bit ECP Diffie-Hellman group for an IPsec
transform set.
For information about this feature, see IPsec configuration in H3C MSR Router Series Comware 7
Security Configuration Guide.

Command changes
The dh-group19 and dh-group20 keywords were added to the pfs command.
For information about the command, see IPsec commands in H3C MSR Router Series Comware 7
Security Command Reference.

Modified feature: Displaying track entry infomration
Feature change description
The following fields were added to the output of the display track command:


IP route.



VPN instance name.



Protocol.



Nexthop interface.

Command changes
Modified command: display track
Syntax
display track { track-entry-number | all }

Views
Any view

96

Change description
The following fields were added to the command output:


IP route.



VPN instance name.



Protocol.



Nexthop interface.

Removed feature: Tiny proxy
Feature change description
The tiny proxy feature was removed.

Removed command
http-proxy
Syntax
http-proxy
undo http-proxy

Views
System view

Removed feature: Displaying switching fabric channel
usage
Feature change description
Support for displaying switching fabric channel usage on interface cards was removed.

97

Removed command
display fabric utilization
Syntax
In standalone mode:
display fabric utilization [ slot slot-number ]
In IRF mode:
display fabric utilization [ chassis chassis-number slot slot-number ]

Views
Any view

Release 0408P05
This release has the following changes:
New feature: BGP trap support for VRF information
New feature: SSH redirect

New feature: BGP trap support for VRF information
VRF information is added to BGP traps as the context name.

New feature: SSH redirect
Configuring SSH redirect
About SSH redirect
SSH redirect provides redirect service for Stelnet clients. An Stelnet client can access a destination
device by using the IP address of the SSH redirect server instead of the IP address of the destination
device.
As shown in Figure 1, a user can log in to the SSH redirect server (Device) through Stelnet, and then
access the destination device (Device A).
To access Device A, perform the following tasks on the PC:
1.

Launch an SSH client software on the PC to establish a connection.
98

2.

Configure connection parameters according to the authentication method.

3.

Enter IP address 192.168.1.1 and listening port 4001 of the SSH redirect server.

4.

When the login prompt appears on the PC, press Enter to enter user view of Device A.

Figure 1 Logging in to Device A through the SSH redirect server
Port 4001

192.168.1.1/24

Async1/2
SSH client

Console

SSH redirect server
Device

Device A

Restrictions and guidelines
The device (SSH redirect server) allows only one login to the same destination device at a time.

Prerequisites
Before you configure SSH redirect, complete the following tasks:


Use an asynchronous interface of the SSH redirect server to connect to the console port or AUX
port of the destination device. An asynchronous interface can be a dedicated asynchronous
interface or a synchronous/asynchronous serial interface operating in asynchronous mode.



If the SSH redirect server is connected to the AUX port of the destination device, perform the
following tasks:
a. Log in to the destination device through the console port.
b. Disable login authentication for the AUX line.

Procedure
Configuring the asynchronous serial interface
Step

Command

52. Enter system view.

system-view


53. Enter
synchronous/asynchronous
serial interface view or
asynchronous interface view.


54. Set the operating mode to
flow mode.

Enter
synchronous/asynchronous
serial interface view and
configure it to operate in
asynchronous mode:
a. interface serial
interface-number
b. physical-mode async
Enter asynchronous interface
view:
interface async
interface-number

async-mode flow

99

Remarks
N/A

To use a
synchronous/asynchronous
serial interface, you must use a
connector to connect the
interface to the destination
device.

By default, an asynchronous
serial interface operates in

protocol mode.
By default, level detection is
enabled.

55. (Optional.) Disable level
detection.

undo detect dsr-dtr

Whether this command is
required depends on the
destination device.

56. Return to system view.

quit

N/A

Configuring the AUX/TTY user line
Step

Command

Remarks

57. Enter AUX or TTY line view.

line { first-number1
[ last-number1 ] | { aux | tty }
first-number2 [ last-number2 ] }

N/A

58. (Optional.) Enable the
terminal service.

shell

By default, the terminal service is
enabled on all user lines.
By default, the transmission rate
is 9600 bps.

59. Set the transmission rate.

speed speed-value

60. Enable stop bit setting
consistency detection.

stopbit-error intolerance

The user line must use the same
transmission rate as the
destination device.
By default, stop bit setting
consistency detection is disabled.
By default, the number of stop bits
is 1.

61. Specify the number of stop
bits.

stopbits { 1 | 1.5 | 2 }

Set the same number of stop bits
for the user line on the SSH
redirect server as the destination
device.

Step

Command

Remarks

62. Enable SSH redirect.

ssh redirect enable

By default, SSH redirect is
disabled.

63. (Optional.) Specify an SSH
redirect listening port.

ssh redirect listen-port
port-number

By default, the listening port
number of SSH redirect is the
absolute user line number plus
4000.

64. (Optional.) Set the
idle-timeout timer for the
redirected connection.

ssh redirect timeout time

The default idle-timeout timer is
360 seconds.

65. (Optional.) Terminate the
redirected SSH connection.

ssh redirect disconnect

N/A

66. Return to system view.

quit

N/A

67. (Optional.) Associate the
SSH redirect listening port
with an IP address.

ssh ip alias ip-address
port-number

By default, an SSH redirect
listening port is not associated
with an IP address.

Configuring SSH redirect

100

Command reference
Modified command: display ssh server
Old syntax
display ssh server { session | status }

New syntax
Centralized devices:
display ssh server { session | status }
Distributed devices in standalone mode/centralized devices in IRF mode:
display ssh server { session [ slot slot-number [ cpu cpu-number ] ] | status }
Distributed devices in IRF mode:
display ssh server { session [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] |
status }

Views
Any view

Command change description
After modification, parameters were added to the command and the parameters available for a
device vary by device type.


slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command
displays the SSH server sessions for all cards. (Distributed devices in standalone mode.)



slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a
member device, this command displays the SSH server sessions for all member devices.
(Centralized IRF devices, IRF 3 incapable.)



slot slot-number: Specifies an IRF member device by its member ID or specifies a PEX by its
virtual slot number. On an IRF 2 fabric, this command displays the SSH server sessions for all
member devices if you do not specify a member device. On an IRF 3 system, this command
displays the SSH server sessions for all IRF 2 member devices and PEXs if you do not specify
an IRF 2 member device or PEX. (Centralized IRF devices, IRF 3 capable.)



chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The
chassis-number argument represents the member ID of the IRF member device. The
slot-number argument represents the slot number of the card. If you do not specify a card, this
command displays the SSH server sessions for all cards. (Distributed devices–In IRF mode,
IRF 3 incapable.)



chassis chassis-number slot slot-number: Specifies a card on an IRF member device or
specifies a PEX. The chassis-number argument represents the member ID of the IRF member
device or the virtual chassis number of the PEX. The slot-number argument represents the slot
101

number of the card or PEX. On an IRF 2 fabric, this command displays the SSH server sessions
for all member devices if you do not specify a member device. On an IRF 3 system, this
command displays the SSH server sessions for all IRF 2 member devices and PEXs if you do
not specify a member device or PEX. (Distributed devices–In IRF mode, IRF 3 capable.)


cpu cpu-number: Specifies a CPU by its number. This option is available only if multiple CPUs
are available on the specified slot.

New command: ssh ip alias
Use ssh ip alias to associate an SSH redirect listening port with an IP address.
Use undo ssh ip alias to delete the IP address associated with the SSH redirect listening port.

Syntax
ssh ip alias ip-address port-number
undo ssh ip alias ip-address

Default
An SSH redirect listening port is not associated with an IP address.

Views
System view

Predefined user roles
network-admin

Parameters
ip-address: Specifies the IP address to be associated with the SSH redirect listening port. The IP
address cannot be the address of an interface on the device, but can be on the same subnet as the
device.
port-number: Specifies an SSH redirect listening port number in the range of 4000 to 50000.

Usage guidelines
The SSH redirect server can provide the SSH redirect service after SSH redirect is enabled and an
SSH redirect listening port is configured. The SSH client can use the ssh2 ip address port number
command to access the destination device. The ip address argument and the port number argument
specify the IP address of the SSH redirect server and the SSH redirect listening port, respectively.
After the ssh ip alias command is configured, the client can use the ssh2 ip address command to
access the destination device. The ip address argument specifies the IP address associated with the
SSH redirect listening port.
If you specify multiple SSH redirect listening ports for an IP address, the most recent configuration
takes effect.

Examples
# Associate SSH redirect listening port 2000 with IP address 1.1.1.1.
102

 system-view
[Sysname] ssh ip alias 1.1.1.1 4000

New command: ssh redirect disconnect
Use ssh redirect disconnect to terminate the redirected SSH connection.

Syntax
ssh redirect disconnect

Views
AUX line view
TTY line view

Predefined user roles
network-admin

Examples
# Manually terminate the redirected SSH connection on TTY line 1.
 system-view
[Sysname] line tty 1
[Sysname-line-tty1] ssh redirect disconnect

New command: ssh redirect enable
Use ssh redirect enable to enable SSH redirect for a user line.
Use undo ssh redirect enable to disable SSH redirect for a user line.

Syntax
ssh redirect enable
undo ssh redirect enable

Default
SSH redirect is disabled for a user line.

Views
AUX line view
TTY line view

Predefined user roles
network-admin

Usage guidelines
Configure the user line connected to the destination device to use the same transmission rate and
number of stop bits as the destination device. To change the transmission rate for the user line, use
the speed command.
103

To identify whether the user line and the destination device are using the same number of stop bits,
use the stopbit-error intolerance command. To change the number of stop bits, use the stopbits
command.
For more information about the transmission rate and stop bits, see the login management
configuration in Fundamentals Configuration Guide.

Examples
# Enable SSH redirect on TTY line 7.
 system-view
[Sysname] line tty 7
[Sysname-line-tty7] ssh redirect enable

New command: ssh redirect listen-port
Use ssh redirect listen-port to set a listening port of SSH redirect.
Use undo ssh redirect listen-port to restore the default.

Syntax
ssh redirect listen-port port-number
undo ssh redirect listen-port

Default
The SSH redirect listening port number is the absolute user line number plus 4000.

Views
AUX line view
TTY line view

Predefined user roles
network-admin

Parameters
port-number: Specifies the number of the SSH redirect listening port, in the range of 4000 to 50000.

Usage guidelines
The device redirects only SSH connection requests destined for the SSH redirect listening port.

Examples
# Set the SSH redirect listening port number to 5000 on TTY line 1.
 system-view
[Sysname] line tty 1
[Sysname-line-tty1] ssh redirect listen-port 5000

104

New command: ssh redirect timeout
Use ssh redirect timeout to set the idle-timeout timer for the redirected SSH connection.
Use undo ssh redirect timeout to restore the default.

Syntax
ssh redirect timeout time
undo ssh redirect timeout

Default
The idle-timeout timer is 360 seconds.

Views
AUX line view
TTY line view

Predefined user roles
network-admin

Parameters
time: Specifies the idle-timeout timer in seconds. The value range is 0 to 86400. To disable the
timeout mechanism, set the timeout timer to 0.

Usage guidelines
If no data is received from the SSH client before the timer expires, the user line terminates the
redirected connection.

Examples
# Set the idle-timeout timer to 200 seconds for the redirected SSH connection.
 system-view
[Sysname] line tty 1
[Sysname-line-tty1] ssh redirect timeout 200

Release 0407
None

ESS 0404P06
None

ESS 0403
105

None

106



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : Yes
Author                          : jiahua 01654
Create Date                     : 2016:11:29 16:28:46-07:00
Modify Date                     : 2016:11:29 16:28:46-07:00
Title                           : 
Tagged PDF                      : Yes
XMP Toolkit                     : Adobe XMP Core 5.4-c005 78.147326, 2012/08/23-13:03:03
Metadata Date                   : 2016:11:29 16:28:46-07:00
Creator Tool                    : Adobe Acrobat Pro 11.0.17
Format                          : application/pdf
Creator                         : jiahua 01654
Document ID                     : uuid:65d823bd-b051-4f4b-aa80-8cab2e288b64
Instance ID                     : uuid:10291d73-d1fa-40a0-a89f-a3fa07d73d34
Producer                        : Adobe Acrobat Pro 11.0.17
Page Count                      : 274
EXIF Metadata provided by EXIF.tools

Navigation menu