Академический Документы
Профессиональный Документы
Культура Документы
m
o
c
With any Huawei Career Certification, you have the privilege on http://learning.huawei.com/en to enjoy:
.
i
e
Methods to get the E-learning privilege : submit Huawei Account and email being used for Huawei Account
w
a
u
h
.
g
registration to Learning@huawei.com .
Content: Huawei product training material and Huawei career certification training material
MethodLogon http://learning.huawei.com/en and enter HuaWei Training/Classroom Training ,then you can
r
a
e
download training material in the specific training introduction page.
l
3 Priority to participate in Huawei Online Open Class(LVC) //
: all ICT technical domains like R&S, UC&C, Security,
ContentThe Huawei career certification training covering
p
tprofessional instructors
Storage and so on, which are conducted by Huawei
t
h
MethodThe plan and participate method please refer to LVC Open Courses Schedule
:
s
4Learning Tool: eNSP
e
c
eNSP (Enterprise Network Simulation r
Platform) is a graphical network simulation tool which is developed by
u
Huawei and free of charge. eNSP
o mainly simulates enterprise routers, switches as close to the real hardware as
s
it possible, which makes the e
lab practice available and easy without any real device.
R
In addition, Huawei has built up Huawei Technical Forum which allows candidates to discuss technical issues with
g
Huawei experts , share n
exam experiences with others or be acquainted with Huawei Products(
i
n
http://support.huawei.com/ecommunity/
r
a
Le
e TECHNOLOGIES CO., LTD. Huawei Confidential
HUAWEI
1
r
o
n
i
n
n
e
/
e
r
o
P-1
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
Content
t
t
h
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-2
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
Have idea about the basic concept of the SDH network protection. And understand
:
s
e
n
r
a
g
n
i
Le
o
s
e
References
c
r
u
e
r
o
P-3
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-4
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-5
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
The network topology, the geometrical layout of SDH network nodes and transmission
lines, reflects the physical connection of the network. The network topology is important
in the sense that it determines the performance, reliability and cost-effectiveness of an SDH
:
s
e
network.
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-6
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-7
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
The chain network is simple and economical at the initial application stage of SDH
equipment. For a chain network, its more difficult and more expensive to protect the
traffic, compared with a ring network. The chain network is used in cases where the traffic
:
s
e
is unimportant or where the traffic load is small so that we dont have to care about the
traffic protection.
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-8
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
In the star network, the hub node selects routes and passes through the traffic signals for
all the other nodes. As a result, the hub node is able to manage the bandwidth resources
thoroughly and flexibly. On the other hand, there is the possibility of a potential bottleneck
:
s
e
of bandwidth resources. Besides, the equipment failure of the hub node may result in the
breakdown of the entire network.
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-9
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
A tree structure can be considered as the combination of chain and star structures. It is
suitable for broadcast service. However, due to the bottleneck problem and the optical
power budget limit, it is not suitable for bidirectional traffic.
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-10
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
The ring network is the most widely used network for SDH transmission networks.
In such a structure, any traffic between two adjacent nodes can be directly add/drop
between them. For traffic between two non-adjacent nodes, we have to configure the
:
s
e
add/drop traffic at the source node and the sink node. And the pass-through traffic in
between those two nodes must be created as well.
c
r
u
The ring network is highly survivable. The most obvious advantage of a ring network is its
high survivability that is essential to modern optical networks with large capacity. Thus, the
ring network enjoys very broad applications in SDH networks.
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-11
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
Mesh networks are such communications networks in which many nodes are
interconnected with each other via direct routes. In such topological structure, if direct
routes are used in the interconnection of all the nodes, this structure is considered as an
:
s
e
ideal mesh topology. In a non-ideal mesh topological structure, the service connection
between nodes that are not connected directly is established through route selection and
c
r
u
o
s
e
In a mesh network, no bottle neck problem exists. Since more than one route can be
selected between any nodes, when any equipment fails, services can still be transmitted
smoothly through other routes. Thus, the reliability of service transmission is increased.
However, such networks are more complicated, costly and difficult to manage. Mesh
networks are very suitable for those regions with large traffic.
g
n
i
n
r
a
Le
e
r
o
P-12
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
In selecting a topological structure, many factors should be considered. For example, the
network should be highly survivable, easy to configure, suitable to add new services, and
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-13
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
The advantage of sub-network can simplify the big network, make it easy to maintenance.
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-14
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
The concept of sub-network is introduced in Huawei OptiX series equipment and network
management systems in order to facilitate network topology management, security
management, tributary interface expansion, and traffic management.
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-15
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-16
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-17
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
Modern society is getting more and more dependent on communications with the
development of science and technologies, and so higher requirements to network security
are being brought forward. Thus the concept of survivable network comes into being. The
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-18
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
Please pay attention to that the network can only restore services here. It cannot repair the
failure in the network, which cannot do without human intervention.
So there should have protection channels to carry over the services in the working
:
s
e
channels. The first requirement for survivability of network is there should have protection
routes or standby routes.
c
r
u
A survivability also need something else. Nodes in the network must have the intelligence
to check out the failure occurred and inform corresponding units of doing relative
protection operation. And the nodes also should have powerful cross-connect capability to
implement the protection operation.
g
n
i
o
s
e
For the survivable network, the protection object can be the physical or electronic.
n
r
a
Le
e
r
o
P-19
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-20
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
Unidirectional traffic and bidirectional traffic are named regarding the traffic flow
directions in the ring. A unidirectional ring means that traffic travel in just one direction,
e.g. clockwise or counter-clockwise. While in a bidirectional ring, traffic signals go in two
:
s
e
c
r
u
Protection modes can be divided into two kinds: 1+1 and 1:N. In 1+1 protection mode,
every working system is protected by a dedicated protection system. But in 1:N protection
mode, N systems share one protection system; and when the system is in normal operation,
the protection system can also transmit extra traffic. Thus a higher efficiency can be
obtained than that of 1+1 system.
g
n
i
o
s
e
For multiplex section protection ring, traffic protection is based on multiplex section.
Switching or not is determined by signal qualities of the multiplex section between each
n
r
a
span of nodes.
Le
e
r
o
P-21
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
The network has two channels (two pairs of fibers): working (active) channel and
protection (standby) channel.
When the network is normal (i.e. no failure on working channel), working channel is used
:
s
e
c
r
u
Linear Multiplex Section (MS) protection is one of multiplex section protections. Linear
multiplex section protection switching can be a dedicated or shared protection mechanism.
It protects the multiplex section layer, and applies to point-to-point physical networks. One
protection multiplex section can be used to protect the normal traffic from a number (N) of
working multiplex sections. It cannot protect against node failures. It can operate in a
unidirectional or bidirectional manner, and it can carry extra traffic on the protection
g
n
i
o
s
e
Le
n
r
a
e
r
o
P-22
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
:
s
e
/
/
p:
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-23
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
Out of 1+1 linear multiplex section protections, some modes require APS protocol during
the switching process, some dont require. For 1 1 unidirectional switching, the signal
selection is based on the local conditions and requests. Therefore each end operates
:
s
e
independently of the other end, and bytes K1 and K2 are not needed to coordinate switch
action.
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-24
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
When the network has no failure, N working channels can transmit the normal traffic while
the protection channel transmits extra (unimportant) traffic or it transmits no traffic.
:
s
e
R_LOS alarm and sends a request to NE A to switch the services on the failed channel to
the protection channel.
c
r
u
Upon receiving the request, NE A bridges the service on the failed channel to the
protection channel.
NE B get the information from NE A and switch to select the service from the protection
channel.
NE A switches to select the service from the protection channel. This step completes the
switching of the service on the faulty channel to the protection channel for both directions.
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-25
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
When the working channel 1 repaired, the _RLOS alarm disappears. NE B sets the K1 byte
to Wait-To-Restore (WTR) state. If WTR state lasts for a special time (10 minutes by
default), it switches to select the signal from the working channel and sends No Request
:
s
e
c
r
u
NE A releases the bridge and replies with the same indication on K1 byte. The selector at
the NE A is also released.
o
s
e
Receiving this K1 byte causes the NE B to release the bridge. This step completes the
protection recovery.
g
n
i
n
r
a
Le
e
r
o
P-26
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
:
s
e
higher efficiency can be obtained than that of 1+1 system, but a more complicated APS
protocol is needed. This protection mode mainly protects the normal traffic in case optical
c
r
u
cable of the working multiplex section is cut off or multiplex section performance degrades.
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-27
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
Answer
Linear 1+1 MS
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-28
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
:
s
e
basically the same as that of unidirectional path protection ring, except that in two-fiber
bidirectional path protection ring, the route of receiving signals is consistent with that of
sending signals
c
r
u
o
s
e
g
n
i
n
r
a
Le
e
r
o
P-29
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
The orderwires can be passed through used the backboard in the dual slots
When we are facing the sub-rack, the left hand side is the West line board, the right hand
side is the East line board
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-30
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
On each fiber, half the channels are defined as working channels and half are defined as
protection channels. The normal traffic carried on working channels in one fiber are
protected by the protection channels in another fiber traveling in the opposite direction
:
s
e
around the ring. This permits the bidirectional transport of normal traffic. Only one set of
overhead channels is used on each fiber.
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-31
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
For example, a STM-16 system shall assign #1--- #8VC4 as the working channels, #9---#16
as the protection channels. One fiber of #9---#16 are to protect #1---#8 of another fiber.
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-32
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
For two-fiber bidirectional multiplex section protection rings, as their traffic have uniform
routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the
total capacity is closely related to the traffic distribution mode and quantity of nodes on
:
s
e
the ring.
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-33
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
When a node determines that a switch is required, it sources the appropriate bridge
request in the K-bytes in both directions, i.e. the short path and long path.
The destination node is the node that is adjacent to the source node across the failed span.
:
s
e
When a node that is not the destination nodes receives a higher priority bridge request, it
enters the appropriate pass-through state. In this way, the switching nodes can maintain
c
r
u
direct K-byte communication on the long path. Note that in the case of a bidirectional
failure such as a cable cut, the destination node would have detected the failure itself and
sourced a bridge request in the opposite direction around the ring.
o
s
e
When the destination node receives the bridge request, it performs the bridge and bridges
the channels that were entering the failed span onto the protection channels in the
opposite direction. In addition, for signal fail-ring switches, the node also performs the
g
n
i
n
r
a
Le
e
r
o
P-34
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-35
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
APS requests are also initiated based on multiplex section and equipment performance
criteria detected by the NE. All the working and protection channels are monitored
regardless of the failure or degradation conditions (i.e. after a switch has been completed,
:
s
e
all appropriate performance monitoring is continued). The NE initiates the following bridge
requests automatically: Signal Failure (SF), Signal Degrade (SD), Reverse Request (RR), and
c
r
u
Wait to Restore (WTR). The bridge requests are transmitted from NE to NE (not from NMS
to NE).
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-36
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
The APS controller is responsible for generating and terminating the APS information
carried in the K1K2 bytes and implementing the APS algorithm. With the switching state of
each NE, the APS controller status is also changed.
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-37
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
For two-fiber bidirectional multiplex section protection rings, as their traffic have uniform
routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the
total capacity is closely related to the traffic distribution mode and quantity of nodes on
:
s
e
the ring. The network capacity for two-fiber bidirectional multiplex section ring is
*M*STM-N (M is the number of nodes on the ring, STM-N is the STM level). If we count
c
r
u
the protection channels as well, the maximum traffic load that a two-fiber bidirectional MS
shared protection ring can carry is M*STM-N. Nevertheless, half of the traffic would not be
protected in case of fiber failures.
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-38
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
Four-fiber MS shared protection rings require four fibers for each span of the ring.
Working and protection channels are carried over different fibers: two multiplex sections
transmitting in opposite directions carry the working channels while two multiplex sections,
:
s
e
also transmitting in opposite directions, carry the protection channels. This permits the
bidirectional transport of normal traffic. The multiplex section overhead is dedicated to
c
r
u
either working or protection channels since working and protection channels are not
transported over the same fibers.
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-39
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
In the normal situation, the services will be transmitted on the working fibers
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-40
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
When the fibers between two nodes broken, the switching will happen between these
two nodes
In the other sections, the services will be transmit on the original routes
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-41
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
When all the fibers between two NEs broken, the ring switch happens
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-42
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
APS requests are also initiated based on multiplex section and equipment performance
criteria detected by the NE. All the working and protection channels are monitored
regardless of the failure or degradation conditions (i.e. after a switch has been completed,
:
s
e
all appropriate performance monitoring is continued). The NE initiates the following bridge
requests automatically: Signal Failure (SF), Signal Degrade (SD), Reverse Request (RR), and
c
r
u
Wait to Restore (WTR). The bridge requests are transmitted from NE to NE (not from NMS
to NE).
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-43
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-44
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
For four-fiber bidirectional multiplex section protection rings, as their traffic have uniform
routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the
total capacity is closely related to the traffic distribution mode and quantity of nodes on
:
s
e
the ring. The network capacity for four-fiber bidirectional multiplex section ring is M*STMN (M is the number of nodes on the ring; STM-N is the STM level). If we count the
c
r
u
protection channels as well, the maximum traffic load that a four-fiber bidirectional MS
shared protection ring can carry is 2*M*STM-N. Nevertheless, half of the traffic would not
be protected in case of fiber failures.
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-45
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
K1 bits 1-4 carry bridge request codes. K1 bits 5-8 carry the destination node ID for the
bridge request code indicated in K1 bits 1-4.
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-46
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
As network structures are becoming more and more complicated, the sub-network
connection protection (SNCP) is the only traffic protection mode that can be adapted to
various network topological structures with a fast switching time.
The protection mechanism of SNCP is similar to the PP ring. But for SNCP, the protection
function will be completed in the cross-connect unit not PDH unit.
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-47
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
As shown in the figure , SNCP uses the 1+1 protection mode. Traffics are simultaneously
sent on both the working and protection sub-network connection. When the working subnetwork connection fails, or when its performance deteriorates to a certain level, at the
:
s
e
receiving end of the sub-network connection, the signal from the protection sub-network
connection is selected according to the preference selection rule. Switching usually takes
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-48
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-49
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
The protection mechanism of SNCP ring is concurrent sending in the transmitting end and
selective receiving in the receiving end.
Here is a ring chain combination network with 5 nodes. The ring network is SNCP ring.
Suppose that there have E1 services from node A to the end node of the chain. The
services will concurrently sent to both working SNC and protection SNC. After passing
:
s
e
c
r
u
through subnetwork1 and subnetwork2 separately, they both reach node C. there is a
selector in node C, the SNC termination node. Normally, node C will receive the service
from the working SNC, then pass through to the line unit in the chain.
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-50
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
TU-LOP: tributary unit loss of pointer, a consecutive of 8 frames receives invalid pointers or
:
s
e
NDF.
c
r
u
HP-TIM: higher order path trace identifier mismatch, what J1 should receive is not
consistent with it actually receives, generating this alarm in this terminal.
o
s
e
HP-SLM: higher order path signal label mismatch, what C2 should receive is not consistent
with it actually receives, generating this alarm in this terminal.
g
n
i
n
r
a
Le
e
r
o
P-51
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
t
t
h
If the signal failure recovers in any way, node C would switch back to receive services from
working SNC after 10 minutes.
:
s
e
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-52
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-53
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-54
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-55
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
o
P-56
m
o
c
.
i
e
w
a
u
h
.
g
n
ni
r
a
le
/
/
p:
:
s
e
t
t
h
c
r
u
g
n
i
o
s
e
n
r
a
Le
e
r
Mo
e
/
m
o
c
.
h
.
ng
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
ii
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
Table of Contents
Course Instruction ........................................................................................................................ 1
About this course .........................................................................................................................1
Course objectives ........................................................................................................................1
Learning Notes.............................................................................................................................1
Relevant Materials .......................................................................................................................1
i
e
aw
u
h
.
g
n
i
n
ar
Chapter 2 EVPL Service Configuration using Station by Station Method (PORT-Shared) .......20
2.1 Laboratory Network Topology Introduction ......................................................................... 20
2.2 Service Requirements ........................................................................................................ 21
2.3 Parameters Description ...................................................................................................... 21
2.4 Configuration Procedure ..................................................................................................... 25
2.5 Test Service Configuration ................................................................................................. 48
e
l
//
:
p
tt
Chapter 3 EVPL Service Configuration using Station by Station Method (VCTRUNK Shared)50
3.1 Laboratory Network Topology Introduction ......................................................................... 50
3.2 Service Requirements ........................................................................................................ 51
3.3 Parameters Description ...................................................................................................... 51
3.4 Configuration Procedure ..................................................................................................... 54
3.5 Test Service Configuration ................................................................................................. 67
c
r
u
o
s
e
R
:
s
e
n
r
a
g
n
i
Le
o
c
.
e
/
m
e
r
Mo
o
c
.
e
/
m
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
iv
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
Course Instruction
About this course
This course is applicable to Huawei OptiX OSN 3500 product;
This course is mainly used for OptiX OSN 3500 Transmission Network
Academy Certification Training purpose.
Course objectives
u
h
.
g
n
i
e
aw
To get familiarize with the hardware device through the basic equipment
configuration operation;
To get familiarize with the theory of Ethernet Service through different
Ethernet service configuration;
To get familiarize with U2000 station by station configuration method for
EPL, EVPL, EPLAN and EVPLAN;
To get familiarize with U2000 trail configuration method for EPL and
EVPL.
i
n
ar
e
l
//
Learning Notes
:
s
e
:
p
tt
According to lab equipment availability, this lab experiment will be carried out
in group rotation. You should be well prepared before the lab experiment in
order to save time. There will be 5 sets of OptiX OSN 3500 and 1 set U2000
NMS computer. For the ID of each NE, please refer to the actual NE ID
allocation.
Le
n
r
a
g
n
i
c
r
u
o
s
e
R
o
c
.
Before doing any service configuration for this practice guide, you should be
familiar with the basic operation of U2000 and PDH service configuration.
Relevant Materials
OptiX OSN 3500 product documentation
e
/
m
e
r
Mo
e
/
m
u
h
.
g
n
i
e
aw
i
n
ar
Network Elements
#5
NE B
#5
NE C
NE D
c
r
u
o
s
e
R
NE E
n
r
a
g
n
i
:
s
e
e
l
//
NE A
:
p
tt
#5
#5
#5
Le
2
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
ea
i
n
r
i
n
ar
e
l
//
:
s
e
:
p
tt
c
r
u
o
s
e
R
Parameter
ng
i
e
aw
NE A
NE C
Board
N2EFS4
N2EFS4
Port
PORT1
PORT1
Enabled/Disabled
Enable
Enable
Entry Detection
Enable
Enable
TAG
Access
Access
Default VLAN ID
100
100
Port Type
PE
PE
e
r
Mo
NE A
NE C
Board
N2EFS4
N2EFS4
Internal Port
VCTRUNK1
VCTRUNK1
Bound Path
VC4-4:VC12-1VC12-3
VC4-4:VC12-1VC12-3
Entry Detection
Enable
Enable
TAG
Tag Aware
Tag Aware
Port Type
PE
PE
N2EFS4
Service Type
EPL
:
p
tt
PORT1
Source C-VLAN
c
r
u
o
s
e
R
Sink Port
:
s
e
n
r
a
e
l
//
Bidirectional
Source Port
(e.g. 1,3-6)
i
n
ar
Service Direction
g
n
i
u
h
.
g
n
i
e
aw
Null
VCRTUNK1
Null
Le
4
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
/
m
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
c
r
u
o
s
e
R
:
s
e
:
p
tt
n
r
a
g
n
i
Le
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
6The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 1 need to be enabled manually
by double-click on the Enabled/Disabled tab for Port 1 and select
Enabled as shown below.
:
s
e
After selecting, click the Apply button at the right bottom of the panel.
c
r
u
o
s
e
R
a
e
L
rn
g
n
i
8At the TAG column, double-click and select Access for Port 1
follow by changing the Default VLAN ID to 100. After done selecting,
remember to click on the Apply button at the bottom right of the panel
to activate the changes.
6
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
2As shown on the diagram below, at this moment there is not any
service at this board. Click on the New button to create a new Ethernet
Line service.
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
8
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
c
r
u
o
s
e
R
:
s
e
7Finally the Ethernet Line service has been successfully created and
the Ethernet service will be displayed in the Ethernet Line panel.
n
r
a
g
n
i
Le
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
3There should not have any service created yet at the SDH Service
Configuration panel. Click on the Create button to create a new SDH
service.
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
10
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
4At the Create SDH service panel, select the correct information from
the options. (In this case, VC4-4 is selected for N2EFS4 board because
only VC4-4 can support for VC-12 level virtual concatenation). After
obtaining display as shown below, (The Source Slot and the Sink Slot
position have to be the same as the actual board slot number), click
OK.
o
c
.
e
/
m
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
5At this moment, the system will show a newly created SDH service on
the panel, the necessary configuration at NE A station is done, you can
now close the NE explorer of NE A.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
11
e
r
Mo
Configuration at NE B
At station NE B, there is no add/drop of Ethernet service, therefore
station NE B only need to create a pass-through SDH service.
Configuration service steps is the same as previous, therefore only final
result of the configured service is shown at diagram below.
o
c
.
e
/
m
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
Configuration at NE C
:
s
e
Le
n
r
a
g
n
i
c
r
u
o
s
e
R
12
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
i
e
aw
u
h
.
g
n
i
n
ar
e
l
//
:
s
e
:
p
tt
Le
n
r
a
g
n
i
c
r
u
o
s
e
R
6The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 1 need to be enabled manually
by double-click on the Enabled/Disabled tab for Port 1 and select
Enabled as shown below.
After selecting, click the Apply button at the right bottom of the panel.
8At the TAG column, double-click and select Access for Port 1
follow by changing the Default VLAN ID to 100. After done selecting,
13
e
r
Mo
remember to click on the Apply button at the bottom right of the panel
to activate the changes.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
o
c
.
e
/
m
e
r
Mo
and the below diagram will be shown. Click on the >> button to bound
the timeslot needed to VCTRUNK1. At this time, we click 3 times on the
>> button, as we have assigned 3 timeslots at the beginning of the
configuration which is VC4-4:VC12:1~3; total of 3 VC12s. Make sure the
correct timeslot is bounded then click on the OK button at the bottom
right of the panel and return to the Create Ethernet Line configuration
panel .
o
c
.
e
/
m
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
15
e
r
Mo
e
/
m
u
h
.
g
n
i
n
ar
e
l
//
c
r
u
o
s
e
R
:
s
e
:
p
tt
n
r
a
g
n
i
Le
16
Confidential Information of Huawei. No Spreading without Permission
o
c
.
i
e
aw
7Finally the Ethernet Line service has been successfully created and
the Ethernet service will be displayed in the Ethernet Line panel .
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
3There should not have any service created yet at the SDH Service
Configuration panel. Click on the Create button to create a new SDH
service.
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
17
e
r
Mo
4At the Create SDH service panel, select the correct information from
the options. (In this case, VC4-4 is selected for N2EFS4 board because
only VC4-4 can support for VC-12 level virtual concatenation). After
obtaining display as shown below, (The Source Slot and the Sink Slot
position have to be the same as the actual board slot number), click
OK.
o
c
.
e
/
m
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
5At this moment, the system will show a newly created SDH service on
the panel, all the necessary configuration at NE C station is done, you
can now close the NE explorer of NE C.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
18
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
o
c
.
:
p
tt
Le
19
e
/
m
e
r
Mo
e
/
m
i
e
aw
The basic topology is form from a four NEs two-fiber bidirectional multiplex
section protection ring with a non-protection chain. Pair slot of slot #7 and
#12 is used in each NE in the ring network; slot #7 is connected to slot #12 in
the next NE. A non-protection chain is form from NE A slot #6 connected to
NE E slot #12.
u
h
.
g
n
i
n
ar
One N2EFS4 board is configured in every NE and the actual slot number for
each board is shown as follows. The slot number can be flexibly adjusted
according to actual configuration situation.
NE A
#5
NE B
#5
NE C
c
r
u
o
s
e
R
NE D
NE E
n
r
a
g
n
i
e
l
//
Network Elements
:
s
e
#5
:
p
tt
#5
#5
Le
20
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
r
Mo
o
c
.
e
/
m
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
:
s
e
c
r
u
o
s
e
R
Use VC-12 timeslot number 4 of VC4 number 1 for SDH link between
NE A and NE BVC4-1:VC12:4.
Le
21
e
r
Mo
NE A
NE B
Board
N2EFS4
N2EFS4
Port
PORT2
PORT1
Enabled/Disabled
Enabled
Enabled
Entry Detection
Enabled
Disabled
TAG
Tag Aware
Tag Aware
PE
PE
e
/
m
Default VLAN ID
Port Type
ni
ng
r
a
e
NE A
Board
N2EFS4
Internal Port
VCTRUNK2
Bound Path
VC4-4:VC12-4
Entry Detection
Enabled
TAG
:
s
e
e
l
//
:
p
tt
Default VLAN ID
100
Port Type
PE
i
e
aw
NE B
N2EFS4
VCTRUNK2
VC4-4:VC12-1
Disabled
Access
c
r
u
o
s
e
R
i
n
ar
u
h
.
g
n
o
c
.
Tag Aware
PE
Board
N2EFS4
Service Type
EPL
Service Direction
Bidirectional
Source Port
PORT2
Source Port
C-VLAN(e.g.1,3-6)
100
Sink Port
VCRTUNK2
100
22
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
Board
N2EFS4
Service Type
EPL
Service Direction
Bidirectional
Source Port
PORT1
Source Port
C-VLAN(e.g.1,3-6)
100
Sink Port
VCRTUNK2
100
Le
ar
ni
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
Use VC-12 timeslot number 1 of VC4 number 1 for SDH link between
NE A and NE DVC4-1:VC12:1.
e
l
//
:
s
e
:
p
tt
c
r
u
o
s
e
R
Parameters
ng
e
/
m
NE A
NE D
Board
N2EFS4
N2EFS4
Port
PORT2
PORT1
Enabled/Disabled
Enabled
Enabled
Entry Detection
Enabled
Disabled
TAG
Tag Aware
Tag Aware
PE
PE
Default VLAN ID
Port Type
23
e
r
Mo
NE A
Board
N2EFS4
N2EFS4
Internal Port
VCTRUNK3
VCTRUNK1
Bound Path
VC4-4:VC12-5
VC4-4:VC12-1
Entry Detection
Enabled
Disabled
TAG
Access
Tag Aware
Default VLAN ID
200
Port Type
PE
Service Type
EPL
:
p
tt
Service Direction
Bidirectional
ni
r
a
e
PORT2
200
Sink Port
VCRTUNK3
ng
i
e
aw
e
l
//
N2EFS4
c
r
u
o
s
e
R
o
c
.
Board
:
s
e
e
/
m
i
n
ar
Source Port
u
h
.
g
n
PE
Parameters
NE D
200
Board
N2EFS4
Service Type
EPL
Service Direction
Bidirectional
Source Port
PORT1
200
Sink Port
VCRTUNK3
200
24
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
25
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
6The diagram below shows the 4 external port of the Ethernet board,
:
s
e
c
r
u
o
s
e
R
After selecting, click the Apply button at the right bottom of the panel.
a
e
L
rn
g
n
i
26
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
27
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
28
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
c
r
u
o
s
e
R
:
s
e
7Finally the Ethernet Line service has been successfully created and
the Ethernet service will be displayed in the Ethernet Line panel.
n
r
a
g
n
i
Le
29
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
30
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
11The Ethernet Line service has been successfully created and you
will see 3 EPL Ethernet service in the Ethernet Line panel.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
31
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
Configuration.
e
l
//
c
r
u
o
s
e
R
:
s
e
:
p
tt
n
r
a
g
n
i
Le
32
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
4At the Create SDH service panel, select the correct information from
the options for NE A. (In this case, VC4-4 is selected for N2EFS4 board
because only VC4-4 can support for VC-12 level virtual concatenation).
After obtaining display as shown below, (The Source Slot and the
e
/
m
Sink Slot position have to be the same as the actual board slot
number), click OK.
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
5Then, configure SDH service for Ne D as shown below and click OK.
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
33
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
n
ar
Configuration at NE B
i
e
aw
e
l
//
ng
i
n
r
c
r
u
o
s
e
R
:
s
e
:
p
tt
a
e
L
34
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
Le
n
r
a
g
n
i
c
r
u
o
s
e
R
6The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 1 need to be enabled manually
by double-click on the Enabled/Disabled tab for Port 1 and select
Enabled as shown below.
After selecting, click the Apply button at the right bottom of the panel.
35
e
r
Mo
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
36
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
/
m
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
37
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
c
r
u
o
s
e
R
ni
ng
r
a
e
:
s
e
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
39
e
r
Mo
4At the Create SDH service panel, select the correct information from
the options for NE B. (In this case, VC4-4 is selected for N2EFS4 board
because only VC4-4 can support for VC-12 level virtual concatenation).
After obtaining display as shown below, (The Source Slot and the
e
/
m
Sink Slot position have to be the same as the actual board slot
number), click OK.
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
5The SDH service has been successfully created and the SDH service
is shown as below in the panel.
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
40
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
Configuration at NE D
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
41
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
6The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 1 need to be enabled manually
:
s
e
c
r
u
o
s
e
R
After selecting, click the Apply button at the right bottom of the panel.
n
r
a
g
n
i
7Next, click on the TAG Attributes tab. At the Entry Detection column,
change the Entry Detection of Port 1 to Disabled.
Le
42
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
i
e
aw
u
h
.
g
n
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
o
c
.
Le
43
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
e
r
Mo
e
/
m
i
e
aw
u
h
.
g
n
i
n
ar
e
l
//
:
p
tt
:
s
e
Configuration.
n
r
a
g
n
i
c
r
u
o
s
e
R
o
c
.
Le
45
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
4At the Create SDH service panel, select the correct information from
the options for NE D. (In this case, VC4-4 is selected for N2EFS4 board
e
l
//
because only VC4-4 can support for VC-12 level virtual concatenation).
After obtaining display as shown below, (The Source Slot and the
Sink Slot position have to be the same as the actual board slot
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
46
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
5The SDH service has been successfully created and the SDH service
is shown as below in the panel.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
47
e
r
Mo
i
e
aw
Two PCs are needed to test the connectivity, connect two PCs to port 2 of
Ethernet board in NE A and port 1 of Ethernet board in NE B each.
u
h
.
g
n
PCs with IP addresses of 188.20.7.100 and 188.20.7.101 were used for the
ping test in this case. The results below show the EPL service is working
normally.
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
48
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
/
m
e
r
Mo
Two PCs are needed to test the connectivity, connect two PCs to port 2 of
Ethernet board in NE A and port 1 of Ethernet board in NE D each.
PCs with IP addresses of 188.20.7.100 and 188.20.7.101 were used for the
ping test in this case. The results below show the EPL service is working
normally.
o
c
.
e
/
m
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
49
e
r
Mo
u
h
.
g
n
i
e
aw
One N2EFS4 board is configured in every NE and the actual slot number for
each board is shown as follows. The slot number can be flexibly adjusted
according to actual configuration situation.
NE A
#5
NE B
#5
NE C
#5
c
r
u
o
s
e
R
NE E
n
r
a
e
l
//
NE D
g
n
i
i
n
ar
Network Elements
:
s
e
#5
:
p
tt
#5
Le
50
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
/
m
e
r
Mo
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
Le
n
r
a
g
n
i
:
s
e
NE A and NE B VC4-1:VC12:1-3
c
r
u
o
s
e
R
Parameters
NE A
NE B
Board
N2EFS4
N2EFS4
Port
PORT1
PORT1
Enabled/Disabled
Enabled
Enabled
Entry Detection
Enabled
Enabled
TAG
Access
Access
Default VLAN ID
100
100
Port Type
PE
PE
o
c
.
51
e
/
m
e
r
Mo
NE A
NE B
Boards
N2EFS4
N2EFS4
Internal Port
VCTRUNK1
VCTRUNK1
Bound Path
VC4-4:VC12-1~3
VC4-4:VC12-1~3
Entry Detection
Enabled
Enabled
TAG
Tag Aware
Tag Aware
PE
PE
Default VLAN ID
Port Type
u
h
.
g
n
e
/
m
o
c
.
i
e
aw
i
n
ar
Board
N2EFS4
Service Type
EPL
Service Direction
Bidirectional
Source Port
PORT1
:
s
e
Source Port
C-VLAN(e.g.1,3-6)
c
r
u
o
s
e
R
Sink Port
Sink C-VLAN
e
l
//
:
p
tt
100
VCRTUNK1
100
(e.g. 1,3-6)
ea
rn
g
n
i
Use VC-12 timeslot number 4-6 of VC4 number 1 for SDH link
between NE A and NE BVC4-1:VC12:4-6.
52
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
NE A
Board
N2EFS4
N2EFS4
Port
PORT2
PORT2
Enabled/Disabled
Enabled
Enabled
Entry Detection
Enabled
Enabled
TAG
Access
Access
Default VLAN ID
200
200
Port Type
PE
PE
Internal Port
VCTRUNK1
Bound Path
VC4-4:VC12-1~3
VC4-4:VC12-1~3
Entry Detection
Enabled
Enabled
TAG
Tag Aware
Tag Aware
PE
PE
:
s
e
c
r
u
o
s
e
R
:
p
tt
N2EFS4
VCTRUNK1
a
e
L
e
l
//
i
e
aw
NE B
N2EFS4
Port Type
rn
o
c
.
Board
Default VLAN ID
g
n
i
i
n
ar
NE A
e
/
m
u
h
.
g
n
NE B
Board
N2EFS4
Service Type
EPL
Service Direction
Bidirectional
Source Port
PORT2
Source Port
C-VLAN(e.g.1,3-6)
200
Sink Port
VCTRUNK1
Sink C-VLAN
200
(e.g. 1,3-6)
53
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
ni
ng
r
a
e
c
r
u
o
s
e
R
:
s
e
e
r
Mo
e
/
m
6The diagram below shows the 4 external port of the Ethernet board,
o
c
.
all the ports are disabled by default. Port 1 and Port 2 needs to be
enabled manually by double-click on the Enabled/Disabled tab for Port
1 and 2 and select Enabled as shown below.
i
e
aw
After selecting, click the Apply button at the right bottom of the panel.
u
h
.
g
n
i
n
ar
7
Click on the TAG Attributes tab, change the TAG to Access for Port
1 and Port 2 follow by changing the Default VLAN ID to 100 for Port 1
and VLAN ID to 200 for Port 2. Click Apply button to activate
changes.
e
l
//
c
r
u
o
s
e
R
:
s
e
:
p
tt
n
r
a
g
n
i
Le
55
e
r
Mo
2On the panel, select New button to create new EVPL service
between NE A and NE B for company H. In the Create Ethernet Service
configuration panel, select PORT 1 as Source Port, VCTRUNK1 as
Sink Port and type in 100 for the Source VLAN and Sink VLAN as shown
below.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
56
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
57
e
r
Mo
7Now, configure EVPL service for company G. Click New button and
select PORT2 as Source Port , VCTRUNK1 as Sink Port and type in
200 for the Source VLAN and Sink VLAN as shown below.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
8Finally the Ethernet Line service has been successfully created and
the Ethernet service for both company H and G will be displayed in the
Ethernet Line panel.
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
58
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
c
r
u
o
s
e
R
:
s
e
:
p
tt
n
r
a
g
n
i
Le
59
e
r
Mo
4At the Create SDH service panel, select the correct information from
the options for NE A as shown below. (In this case, VC4-4 is selected for
N2EFS4 board because only VC4-4 can support for VC-12 level virtual
concatenation). Click OK . (The Source Slot and the Sink Slot
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
60
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
Configuration at NE B
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
c
r
u
o
s
e
R
:
s
e
:
p
tt
n
r
a
g
n
i
Le
61
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
6The diagram below shows the 4 external port of the Ethernet board,
:
p
tt
all the ports are disabled by default. Port 1 and Port 2 need to be
enabled manually by double-click on the Enabled/Disabled tab for Port
:
s
e
After selecting, click the Apply button at the right bottom of the panel.
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
62
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
7Click on the TAG Attributes tab, change the TAG to Access for Port 1
and Port 2 follow by changing the Default VLAN ID to 100 for Port 1 and
VLAN ID to 200 for Port 2. Click Apply button to activate changes.
e
/
m
i
e
aw
u
h
.
g
n
i
n
ar
e
l
//
:
p
tt
2To create a new Ethernet Line service for company H, click New and
select PORT 1 as Source Port and VCTRUNK1 as Sink Port. Type 100
as the Source and Sink VLAN ID.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
o
c
.
Le
63
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
Le
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
64
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
6Now create a new Ethernet Line service for company G. Click New
again at the Create Ethernet Line service panel. (As both company H
and G are sharing the same VCTRUNK1, therefore there is no need to
bound path for company G again).
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
7Finally the Ethernet Line service has been successfully created and
the Ethernet service will be displayed in the Ethernet Line panel .
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
65
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
c
r
u
o
s
e
R
:
s
e
e
l
//
:
p
tt
n
r
a
g
n
i
Le
66
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
4At the Create SDH service panel, select the correct information from
the options as according to the diagram below. (In this case, VC4-4 is
selected for N2EFS4 board because only VC4-4 can support for VC-12
level virtual concatenation). Click OK when done.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
e
r
Mo
In order for us to test for the Ethernet service configuration for company H,
two PCs are needed. Each PC is connected to port 1 of NE A and NE B. In
the command prompt, use the ping command to test whether the services
are configured successfully.
PCs with IP addresses of 188.20.7.100 and 188.20.7.101 were used for the
ping test in this case. The results below show the EPL service is working
normally.
o
c
.
e
/
m
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
Le
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
68
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
69
e
r
Mo
u
h
.
g
n
i
e
aw
i
n
ar
NE A
#5
NE B
#5
NE C
NE D
c
r
u
o
s
e
R
NE E
n
r
a
g
n
i
e
l
//
Network Elements
:
s
e
#5
:
p
tt
#5
#5
Le
70
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
/
m
e
r
Mo
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
c
r
u
o
s
e
R
Use VC12 timeslot number 1 to 3 of VC4 number 1 for SDH link between
NE A and NE BVC4-1:VC12:1-3, and between NE A and NE D
VC4-1:VC12:1-3.
Le
n
r
a
g
n
i
o
c
.
71
e
/
m
e
r
Mo
NEA
N2EFS4
N2EFS4
N2EFS4
Port
PORT1
PORT1
PORT1
Enabled/Disabled
Enabled
Enabled
Enabled
Working Mode
Auto-Negotiation
Auto-Negotiation
Auto-Negotiation
Maximum Frame
Length
1522
1522
1522
Entry Detection
Enabled
Enabled
TAG
Tag Aware
Port Type
PE
Le
i
n
ar
PE
e
l
//
NEA
:
p
tt
Board
N2EFS4
PE
Port
VCTRUNK1
NEB
NED
N2EFS4
N2EFS4
VCTRUNK
2
VCTRUNK1
VCTRUNK1
Enabled
Enabled
Enabled
Enabled
TAG
Tag Aware
Tag Aware
Tag Aware
Tag Aware
Bound Path
VC4-4:VC1
2-1
VC12-3
VC4-4:VC
12-4
VC12-6
VC4-4:VC121VC12-3
VC4-4:VC121VC12-3
Port Type
PE
PE
PE
PE
c
r
u
o
s
e
R
u
h
.
g
n
Enabled
:
s
e
Board
N2EFS4
VB Name
VB1
Bridge Type
IEEE 802.1d
72
Confidential Information of Huawei. No Spreading without Permission
e
/
m
o
c
.
i
e
aw
Entry
Detection
n
r
a
NED
Board
Parameters
g
n
i
NEB
e
r
Mo
Parameters
Bridge Learning Mode
SVL
Ingress Filter
Disabled
VB Mount Port
PORT1VCTRUNK1VCTRUNK2
Hub/Spoke
PORT1
Hub
VCTRUNK1
Hub
VCTRUNK2
Hub
o
c
.
u
h
.
g
n
Service Type
EPL
Direction
Bidirectional
PORT1
Source C-VLAN
c
r
u
o
s
e
R
:
s
e
i
n
ar
e
l
//
:
p
tt
Source Port
Sink Port
i
e
aw
Board
(e.g. 1,3-6)
e
/
m
VCRTUNK1
ni
ng
r
a
e
Board
N2EFS4
Service Type
EPL
Direction
Bidirectional
Source Port
PORT1
Source C-VLAN
(e.g. 1,3-6)
Sink Port
VCRTUNK1
73
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
ng
i
n
r
c
r
u
o
s
e
R
:
s
e
a
e
L
e
r
Mo
e
/
m
6The diagram below shows the 4 external port of the Ethernet board,
o
c
.
all the ports are disabled by default. Port 1 need to be enabled manually
by double-click on the Enabled/Disabled tab for Port 1 and select
Enabled as shown below.
i
e
aw
After selecting, click the Apply button at the right bottom of the panel.
u
h
.
g
n
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
75
e
r
Mo
2At the Ethernet LAN service panel, click New, (When the bridge
adopts the SVL learning mode, all the VLANs share the same MAC
address table. That is, the bridge learns and forwards the packets
according to the MAC address of the user packets only. The information
in the VLAN tags of the user packets, however, is not considered in the
learning and forwarding process.) Take note that the VB name must be
set, the VB name AB_LAN was set as shown below. Select the correct
parameters and click Configure Mount.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
3AT the panel, click Configure Mount button and select PORT1,
VCTRUNK1 and VCTRUNK by clicking the >> button. Click OK when
finish.
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
76
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
/
m
e
r
Mo
4After mounting the VB, return to Create Ethernet LAN service and
click Configuration button to bound path into VCTRUNK1 and
VCTRUNK2. You can select between VCTRUNK1 and VCTRUNK2 at
the Configuration Ports section.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
77
e
r
Mo
e
/
m
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
:
s
e
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
78
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
79
e
r
Mo
4Next, create a SDH service to NE D.. Fill in the correct options and
click OK to confirm.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
80
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
Configuration at NE B
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
81
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
After selecting, click the Apply button at the right bottom of the panel.
c
r
u
o
s
e
R
:
s
e
7Next, at the TAG Attributes tab, change the Entry Detection for Port
1 to Disabled.
a
e
L
rn
g
n
i
8Finally, click on Internal Port and change the Entry Detection for
VCTRUNK1 to Disabled.
82
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
83
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
n
r
a
g
n
i
e
l
//
:
p
tt
c
r
u
o
s
e
R
:
s
e
Le
84
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
i
e
aw
u
h
.
g
n
i
n
ar
e
l
//
:
p
tt
:
s
e
Configuration.
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
85
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
4At the Create SDH service panel, select the correct parameters as
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
86
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
5The SDH service has been successfully created and the SDH service
is shown as below in the panel.
e
/
m
o
c
.
u
h
.
g
n
i
n
ar
e
l
//
Configuration at NE D
i
e
aw
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
87
e
r
Mo
e
/
m
i
e
aw
u
h
.
g
n
i
n
ar
e
l
//
:
p
tt
c
r
u
o
s
e
R
:
s
e
n
r
a
g
n
i
Le
88
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
r
Mo
7Next, at the TAG Attributes tab, change the Port 1 Entry Detection to
Disabled.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
c
r
u
o
s
e
R
:
s
e
:
p
tt
n
r
a
g
n
i
o
c
.
Le
89
e
/
m
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
90
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
i
e
aw
u
h
.
g
n
i
n
ar
e
l
//
:
s
e
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
91
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
4At the Create SDH service panel, select the correct parameters from
i
n
ar
the options for NE D. (In this case, VC4-4 is selected for N2EFS4 board
because only VC4-4 can support for VC-12 level virtual concatenation).
e
l
//
After obtaining display as shown below, (The source board and the
sink board position have to be the same as the actual board slot
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
92
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
6 The SDH service has been successfully created and the SDH
service is shown as below in the panel.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
93
e
r
Mo
Two PCs are needed to test the connectivity, connect two PCs to port 1 of
Ethernet board in NE A and port 1 of Ethernet board in NE B each.
u
h
.
g
n
i
n
ar
e
l
//
n
r
a
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
94
Confidential Information of Huawei. No Spreading without Permission
o
c
.
i
e
aw
PCs with IP addresses of 188.20.7.100 and 188.20.7.101 were used for the
ping test in this case. The results below show the EPL service is working
normally.
g
n
i
e
/
m
e
r
Mo
Again, two PCs are needed to test the connectivity, connect two PCs to port
2 of Ethernet board in NE A and port 1 of Ethernet board in NE D each.
PCs with IP addresses of 188.20.7.100 and 188.20.7.101 were used for the
ping test in this case. The results below show the EPL service is working
normally.
o
c
.
e
/
m
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
95
e
r
Mo
Again, two PCs are needed to test the connectivity, connect two PCs to port
1 of Ethernet board in NE B and port 1 of Ethernet board in NE D each.
PCs with IP addresses of 188.20.7.100 and 188.20.7.101 were used for the
ping test in this case. The results below show the EPL service is working
normally.
o
c
.
e
/
m
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
96
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
i
e
aw
u
h
.
g
n
i
n
ar
NE A
#5
NE B
#5
c
r
u
o
s
e
R
NE D
NE E
n
r
a
:
p
tt
NE C
g
n
i
e
l
//
Network Elements
:
s
e
o
c
.
#5
#5
#5
Le
97
e
r
Mo
5.2Service Requirement
Headquarters of company H, H1 is located at NE A while branches of
company H, H2 and H3 are located at NE B and NE D respectively. This is
the same for company G, headquarters G1 is located at NE A and its
branches G2 and G3 are located at NE B and NE D respectively. The
headquarters need to have Ethernet service communication with their
respective branches; furthermore the branches need to have Ethernet
service communication between branches within the same company. Each
of the company needed a bandwidth of 6Mbits/s.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
c
r
5.3Parameters Description
u
o
s
e
R
g
n
i
n
r
a
e
o
c
.
e
/
m
e
r
Mo
u
h
.
g
n
i
n
ar
c
r
u
o
s
e
R
Port
ng
ni
r
a
e
:
p
tt
:
s
e
NEA
N2EFS4
NEB
N2EFS4
NED
N2EFS4
PORT
2
PORT
1
PORT1
PORT2
PORT
1
Enabled/Disabled
Enabled
Enabled
Enabled
Enabled
Entry Detection
Enabled
Enabled
Disabled
Disabled
TAG
Access
Access
Tag Aware
Tag Aware
Default VLAN
100
200
Port Type
PE
PE
PE
PE
PORT
2
NEA
Board
N2EFS4
Port
VCTRUNK1
VCTRUNK2
NEB
o
c
.
i
e
aw
e
l
//
e
/
m
NED
N2EFS4
N2EFS4
VCTRUNK1
VCTRUNK1
99
e
r
Mo
Parameters
Enabled
Disabled
Disabled
TAG
Access
Access
Tag Aware
Tag Aware
Default VLAN
100
100
Bound Path
VC4-4:VC1
2-1
VC12-3
VC4-4:VC1
2-4
VC12-6
VC4-4:VC121VC12-3
VC4-4:VC121VC12-3
PE
PE
PE
PE
N2EFS4
N2EFS4
NEB
e
l
//
NED
N2EFS4
Port
VCTRUNK3
VCTRUNK4
VCTRUNK2
VCTRUNK2
Entry
Detection
Enabled
Enabled
Disabled
Disabled
TAG
Access
Access
Tag Aware
Tag Aware
c
r
u
o
s
e
R
Port Type
Le
i
n
ar
NEA
Board
Bound Path
n
r
a
u
h
.
g
n
:
s
e
:
p
tt
200
200
VC4-4:VC1
2-7
VC12-9
VC4-4:VC1
2-10
VC12-12
VC4-4:VC124VC12-6
VC4-4:VC124VC12-6
PE
PE
PE
PE
Board
N2EFS4
VB Name
VB1
Bridge Type
IEEE 802.1q
IVL
Ingress Filter
Enabled
100
e
/
m
o
c
.
i
e
aw
Default VLAN
NED
Enabled
Parameters
g
n
i
NEB
Entry
Detection
Port Type
NEA
e
r
Mo
Parameters
VB Mount Port
PORT1PORT2VCTRUNK1VCTRUNK2
VCTRUNK3VCTRUNK4
VLAN
Filtering
Hub/Spoke
VLAN
Filtering
VLAN ID
100
200
Forwarding
Physical
Port
PORT1VCTRUNK1 PORT2VCTRUNK3
VCTRUNK2
VCTRUNK4
PORT1
Hub
PORT2
Hub
VCTRUNK1
Hub
VCTRUNK2
Hub
VCTRUNK3
Hub
VCTRUNK4
Hub
Board
c
r
u
o
s
e
R
Service Type
Le
ar
ni
i
n
ar
e
l
//
:
p
tt
:
s
e
Parameters
ng
u
h
.
g
n
i
e
aw
Direction
Bidirectional
Source Port
PORT1
Source C-VLAN
(e.g. 1,3-6)
Sink Port
o
c
.
VCRTUNK1
101
e
/
m
e
r
Mo
Board
N2EFS4
Service Type
EPL
Direction
Bidirectional
Source Port
PORT2
e
/
m
o
c
.
Source C-VLAN
(e.g. 1,3-6)
Sink Port
u
h
.
g
n
VCRTUNK2
i
n
ar
e
l
//
Board
N2EFS4
Service Type
EPL
:
p
tt
Direction
Bidirectional
Source Port
:
s
e
Source C-VLAN
(e.g. 1,3-6)
c
r
u
o
s
e
R
Sink Port
i
e
aw
PORT1
VCRTUNK1
Le
ar
ni
ng
Parameters
Board
N2EFS4
Service Type
EPL
Direction
Bidirectional
Source Port
PORT2
Source C-VLAN
(e.g. 1,3-6)
Sink Port
VCRTUNK2
102
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
c
r
u
o
s
e
R
:
s
e
:
p
tt
n
r
a
g
n
i
Le
103
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
After selecting, click the Apply button at the right bottom of the panel.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
7
Click on the TAG Attributes tab, change the TAG to Access for Port
1 follow by changing the Default VLAN ID to 100 and change the TAG
to Access for Port 2 follow by changing the Default VLAN ID to 200.
Click Apply button to activate changes.
Le
104
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
8Select Internal Port, at the TAG Attributes tab, change the TAG to
Access for VCTRUNK 1, 2, 3 and 4 follow by assigning VLAN ID of 100,
100, 200 and 200 by sequence. Click OK.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
105
e
r
Mo
2 At the Ethernet LAN service panel, click New, (When the bridge
adopts the SVL learning mode, all the VLANs share the same MAC
address table. That is, the bridge learns and forwards the packets
according to the MAC address of the user packets only. The information
in the VLAN tags of the user packets, however, is not considered in the
learning and forwarding process.) Take note that the VB name must be
set, the VB name AB_LAN was set as shown below. Select the correct
parameters and click Configure Mount.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
106
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
/
m
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
107
e
r
Mo
e
/
m
i
e
aw
7The configured service will be shown on the panel together with the
detail of the service as shown below.
u
h
.
g
n
i
n
ar
e
l
//
:
s
e
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
108
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
r
Mo
9At the Create VLAN panel, select Forwarding Ports for company G
with the same VLAN group (100). Select PORT1, VCTRUNK1,
VCTRUNK2 by clicking >> button. Insert VLAN ID of 100. Click
Apply when done.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
109
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
3At the SDH Service Configuration panel, click Apply button to create
cross-connection service for company G at NE D.
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
110
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
111
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
112
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
Configuration at NE B
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
ng
i
n
r
c
r
u
o
s
e
R
:
s
e
a
e
L
e
r
Mo
e
/
m
o
c
.
shown below.
i
e
aw
After selecting, click the Apply button at the right bottom of the panel.
u
h
.
g
n
i
n
ar
e
l
//
:
p
tt
8Select Internal Port. On the TAG Attributes tab, change the Entry
Detection of VCTRUNK1 and 2 to Disabled.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
114
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
2To create a new Ethernet Line service for company G, select Port 1 as
Source Port and VCTRUNK1 as Sink Port as shown below.
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
115
e
r
Mo
3As shown in the diagram below, the bound path is empty; we need to
bind VC12 into VCTRUNK1. Select VCTRUNK1 and click >> three
times to bound 3 VC-12 into VCTRUNK1. Click OK when done.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
116
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
i
e
aw
u
h
.
g
n
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
o
c
.
:
p
tt
Le
117
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
118
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
i
e
aw
u
h
.
g
n
i
n
ar
e
l
//
:
p
tt
:
s
e
Configuration.
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
119
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
120
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
121
e
r
Mo
Configuration at NE D
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
ng
i
n
r
c
r
u
o
s
e
R
:
s
e
a
e
L
e
r
Mo
e
/
m
o
c
.
shown below.
i
e
aw
After selecting, click the Apply button at the right bottom of the panel.
u
h
.
g
n
i
n
ar
e
l
//
:
p
tt
8Select Internal Port. On the TAG Attributes tab, change the Entry
Detection of VCTRUNK1 and 2 to Disabled.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
123
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
2To create a new Ethernet Line service for company G, select PORT1
as Source Port and VCTRUNK1 as Sink Port as shown below.
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
124
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
3As shown in the diagram below, the bound path is empty; we need to
bind VC12 into VCTRUNK1. Click Configure, select VCTRUNK1 and
click >> three times to bound 3 VC-12 into VCTRUNK1. Click OK
when done.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
125
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
126
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
127
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
e
l
//
:
p
tt
Le
128
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
129
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
130
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
Two PCs are needed to test the connectivity, connect two PCs to port 1 of
Ethernet board in NE A and port 1 of Ethernet board in NE B each.
i
e
aw
PCs with IP addresses of 188.20.7.100 and 188.20.7.101 were used for the
ping test in this case. The results below show the EPL service is working
normally.
u
h
.
g
n
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
o
c
.
:
p
tt
Le
131
e
/
m
e
r
Mo
Two PCs are needed to test the connectivity, connect two PCs to port 1 of
Ethernet board in NE A and port 1 of Ethernet board in NE D each.
PCs with IP addresses of 188.20.7.100 and 188.20.7.101 were used for the
ping test in this case. The results below show the EPL service is working
normally.
o
c
.
e
/
m
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
132
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
Again, two PCs are needed to test the connectivity, connect two PCs to port
1 of Ethernet board in NE B and port 1 of Ethernet board in NE D each.
PCs with IP addresses of 188.20.7.100 and 188.20.7.101 were used for the
ping test in this case. The results below show the EPL service is working
normally.
o
c
.
e
/
m
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
Le
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
133
e
r
Mo
u
h
.
g
n
n
r
a
g
n
i
i
n
ar
Network Elements
NE A
#5
NE B
#5
NE C
#5
NE D
#5
NE E
c
r
u
o
s
e
R
:
s
e
#5
i
e
aw
e
l
//
:
p
tt
Le
134
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
/
m
e
r
Mo
6.2Service Requirement
Service requirement descriptionCompany H has two branches located at
NE A and NE C needed an Ethernet service communication with 6Mbits/s
bandwidth.
o
c
.
e
/
m
u
h
.
g
n
6.3Parameters Description
Le
n
r
a
i
n
ar
e
l
//
:
s
e
:
p
tt
c
r
u
o
s
e
R
Parameter
g
n
i
i
e
aw
NE A
NE C
Board
N2EFS4
N2EFS4
Port
PORT1
PORT1
Enabled/Disabled
Enable
Enable
Entry Detection
Enable
Enable
TAG
Access
Access
Default VLAN ID
100
100
Port Type
PE
PE
135
e
r
Mo
NE A
NE C
Board
N2EFS4
N2EFS4
Internal Port
VCTRUNK1
VCTRUNK1
Bound Path
VC4-4:VC12-1VC12-3
VC4-4:VC12-1VC12-3
Entry
Detection
Enable
Enable
TAG
Tag Aware
Tag Aware
Port Type
PE
PE
e
l
//
Board
N2EFS4
Service Type
EPL
:
p
tt
Service Direction
Source Port
:
s
e
Source C-VLAN
(e.g. 1,3-6)
c
r
u
o
s
e
R
Sink Port
Bidirectional
n
r
a
i
n
ar
g
n
i
u
h
.
g
n
i
e
aw
PORT1
Null
VCRTUNK1
Null
Le
136
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
/
m
e
r
Mo
6.4Configuration Procedure
Configure SDH Trail
1Login to U2000 Main Topology.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
3At the Create SDH Trail panel, select Level as VC4 Server Trail.
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
137
e
r
Mo
4Double click on the Source and Sink NE. The detailed information will be
shown as below. Click OK when finish.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
5System prompt will show that the configuration is successful. Confirm and
close the system prompt dialog box.
:
s
e
:
p
tt
c
r
u
o
s
e
R
OK when finish.
n
r
a
g
n
i
Le
138
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
9After configuring all the VC4 service, click Cancel to quit the Create
SDH Service Trail.
139
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
2At the Create EPL panel, select Port as Port Usage Strategy and double
click on NE A.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
140
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
3At the NE A board slot panel, select the slot 5-N2EFS4 board, and then
select Port 1. Click OK to return to the Create Ethernet Service panel and
double click on NE B to select as Sink NE.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
4At NE B NE panel, select N2EFS4 board at slot number 5 and select Port
1. Click OK when done.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
141
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
6Select 3 for bandwidth and VC-12 for X. Click Next when done.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
142
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
7At the Port Attribute Setting, change TAG of Port 1 and Port 2 to Access
and change the Default VLAN to 100.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
8System prompt will show that the configuration is successful. Confirm and
close the system prompt dialog box.
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
143
e
r
Mo
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
144
Confidential Information of Huawei. No Spreading without Permission
o
c
.
e
/
m
e
r
Mo
e
/
m
i
e
aw
The basic topology is form from a four NEs two-fiber bidirectional multiplex
section protection ring with a non-protection chain. Pair slot of slot #7 and
#12 is used in each NE in the ring network; slot #7 is connected to slot #12 in
the next NE. A non-protection chain is form from NE A slot #6 connected to
NE E slot #12.
u
h
.
g
n
i
n
ar
One N2EFS4 board is configured in every NE and the actual slot number for
each board is shown as follows. The slot number can be flexibly adjusted
according to actual configuration situation
NE A
#5
NE B
#5
NE C
c
r
u
o
s
e
R
NE D
NE E
n
r
a
g
n
i
e
l
//
Network Elements
:
s
e
#5
o
c
.
:
p
tt
#5
#5
Le
145
e
r
Mo
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
ng
ni
r
a
e
:
s
e
NE A and NE B VC4-1:VC12:1-3
c
r
u
o
s
e
R
NE A
NE B
Board
N2EFS4
N2EFS4
Port
PORT1
PORT1
Enabled/Disabled
Enabled
Enabled
Entry Detection
Enabled
Enabled
TAG
Tag Aware
Tag Aware
Default VLAN ID
100
100
Port Type
PE
PE
o
c
.
e
/
m
e
r
Mo
Parameters
NE A
NE B
Board
N2EFS4
N2EFS4
Internal Port
VCTRUNK1
VCTRUNK1
Bound Path
VC4-4:VC12-1~3
VC4-4:VC12-1~3
Entry
Detection
Enabled
Enabled
TAG
Tag Aware
Tag Aware
PE
PE
Default VLAN
ID
Port Type
u
h
.
g
n
e
/
m
o
c
.
i
e
aw
i
n
ar
Board
N2EFS4
Service Type
EPL
Service Direction
Bidirectional
Source Port
PORT1
:
s
e
:
p
tt
Source Port
C-VLAN(e.g.1,3-6)
100
Sink Port
VCRTUNK1
Sink C-VLAN
100
c
r
u
o
s
e
R
e
l
//
(e.g. 1,3-6)
Le
n
r
a
g
n
i
Use VC-12 timeslot number 4-6 of VC4 number 1 for SDH link
between NE A and NE BVC4-1:VC12:4-6.
147
e
r
Mo
NE A
Board
N2EFS4
N2EFS4
Port
PORT2
PORT2
Enabled/Disabled
Enabled
Enabled
Entry Detection
Enabled
Enabled
TAG
Access
Access
Default VLAN ID
200
200
Port Type
PE
PE
Internal Port
VCTRUNK1
Bound Path
VC4-4:VC12-1~3
VC4-4:VC12-1~3
Entry Detection
Enabled
Enabled
TAG
Tag Aware
Tag Aware
PE
PE
:
s
e
c
r
u
o
s
e
R
ea
e
l
//
:
p
tt
i
e
aw
NE B
N2EFS4
Port Type
i
n
r
o
c
.
Board
Default VLAN ID
ng
i
n
ar
NE A
e
/
m
u
h
.
g
n
NE B
N2EFS4
VCTRUNK1
Board
N2EFS4
Service Type
EPL
Service Direction
Bidirectional
Source Port
PORT2
Source Port
C-VLAN(e.g.1,3-6)
200
Sink Port
VCTRUNK1
Sink C-VLAN
200
(e.g. 1,3-6)
148
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
s
e
:
p
tt
3Enter Create SDH Trail panel, select the level as VC4 Server Trail.
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
149
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
5System prompt will show that the configuration is successful. Confirm and
close the system prompt dialog box.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
150
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
151
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
9After all the VC4 server trail were successfully configured, click Cancel
to exit SDH service trail panel.
:
s
e
n
r
a
g
n
i
c
r
u
o
s
e
R
Le
152
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
:
p
tt
3At the NE A NE panel, select the N2EFS4 board and select Port 1. Click
OK when done. Now, double click on NE B to select the Sink Port.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
153
e
r
Mo
4At NE B NE panel, select N2EFS4 board at slot number 5 and select Port
1. Click OK when done.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
5At the Trunk Link Strategy option, select Create Trunk Link Automatically
select 3 for bandwidth and VC-12. At the VLAN ID tab, enter 100 as the
VLAN ID. Click Next when done.
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
154
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
6AT the Port Attributes Setting, change Port 1 and Port2 TAG to TAG
Aware. Click Finish.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
7System prompt will show that the configuration is successful. Confirm and
close the system prompt dialog box.
c
r
u
o
s
e
R
:
s
e
:
p
tt
8At the Create EVPL panel, continue to create service for company G,
double click on NE A to be selected as Source.
n
r
a
g
n
i
Le
155
e
r
Mo
9At the NE A NE panel, select the N2EFS4 board at slot number 5 and
select Port 2. Click OK when done. Now, double click on NE B to select the
Sink Port.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
10At the board slot panel of NE B, select N1EFS4 board at slot 5 and select
Port 2, click OK when done.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
156
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
11At the Trunk Link Strategy option, select Use existing Trunk Link select
3 for bandwidth and VC-12. At the VLAN ID tab, enter 200 as the VLAN
ID. Click Next when done.
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
e
l
//
12At the Port Attributes Setting, change Port 1 and Port2 TAG to TAG
Aware. Click Finish.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
157
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
When all the configuration has been completed, the configurations have to
be tested to make sure it works. As in the configuration, the Ports TAG
Attributes were set as Tag Aware; we need to change the Port as Access
to enable communication between two PCs.
i
n
ar
e
l
//
In order for us to test, two PCs are needed. Each PC is connected to port 1 of
NE A and NE C. In the command prompt, use the ping command to test
whether the services are configured successfully.
:
p
tt
PCs with IP addresses of 188.20.7.100 and 188.20.7.101 were used for the
ping test in this case. Assign a VLAN ID of 100 to the Port. The results
below show the EPL service is working normally.
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
Le
158
Confidential Information of Huawei. No Spreading without Permission
e
r
Mo
e
/
m
o
c
.
u
h
.
g
n
i
e
aw
i
n
ar
PCs with IP addresses of 129.9.0.149 and 129.9.0.147 were used for the
ping test in this case. Assign a VLAN ID of 200 to the Port. The results
below show the EPL service is working normally.
e
l
//
n
r
a
g
n
i
c
r
u
o
s
e
R
:
s
e
:
p
tt
Le
159
m
o
c
With any Huawei Career Certification, you have the privilege on http://learning.huawei.com/en to enjoy:
.
i
e
Methods to get the E-learning privilege : submit Huawei Account and email being used for Huawei Account
w
a
u
h
.
g
registration to Learning@huawei.com .
Content: Huawei product training material and Huawei career certification training material
MethodLogon http://learning.huawei.com/en and enter HuaWei Training/Classroom Training ,then you can
r
a
e
download training material in the specific training introduction page.
l
3 Priority to participate in Huawei Online Open Class(LVC) //
: all ICT technical domains like R&S, UC&C, Security,
ContentThe Huawei career certification training covering
p
tprofessional instructors
Storage and so on, which are conducted by Huawei
t
h
MethodThe plan and participate method please refer to LVC Open Courses Schedule
:
s
4Learning Tool: eNSP
e
c
eNSP (Enterprise Network Simulation r
Platform) is a graphical network simulation tool which is developed by
u
Huawei and free of charge. eNSP
o mainly simulates enterprise routers, switches as close to the real hardware as
s
it possible, which makes the e
lab practice available and easy without any real device.
R
In addition, Huawei has built up Huawei Technical Forum which allows candidates to discuss technical issues with
g
Huawei experts , share n
exam experiences with others or be acquainted with Huawei Products(
i
n
http://support.huawei.com/ecommunity/
r
a
Le
e TECHNOLOGIES CO., LTD. Huawei Confidential
HUAWEI
1
r
o
n
i
n
n
e
/