Академический Документы
Профессиональный Документы
Культура Документы
Copyright 2003-2010, Hangzhou H3C Technologies Co., Ltd. and its licensors
All Rights Reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior
written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C,
, Aolynk,
, H3Care,
, TOP G,
, IRF, NetPilot, Neocean, NeoVTL,
SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V2G, VnG, PSPT,
XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co.,
Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners.
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Environmental Protection
This product has been designed to comply with the requirements on environmental protection. The
storage, use, and disposal of this product must meet the applicable national laws and regulations.
Preface
The H3C S5120-EI documentation set includes 13 configuration guides, which describe the software
features for the H3C S5120-EI Series Ethernet Switches and guide you through the software configuration
procedures. These configuration guides also provide configuration examples to help you apply software
features to different network scenarios.
This preface includes:
Audience
Conventions
Obtaining Documentation
Documentation Feedback
Audience
This documentation is intended for:
Network planners
Field technical support and servicing engineers
Network administrators working with the S5120-EI series
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention
Description
Boldface
Bold text represents commands and keywords that you enter literally as shown.
italic
Italic text represents arguments that you replace with actual values.
[]
{ x | y | ... }
Braces enclose a set of required syntax choices separated by vertical bars, from
which you select one.
[ x | y | ... ]
{ x | y | ... } *
[ x | y | ... ] *
&<1-n>
The argument or keyword and argument combination before the ampersand (&)
sign can be entered 1 to n times.
GUI conventions
Convention
Description
<>
Button names are inside angle brackets. For example, click <OK>.
[]
Window names, menu items, data table and field names are inside square
brackets. For example, pop up the [New User] window.
Symbols
Convention
Description
Means reader be extremely careful. Improper operation may cause bodily
injury.
Means reader be careful. Improper operation may cause data loss or damage
to equipment.
Means an action or information that needs special attention to ensure successful
configuration or good performance.
Means a complementary description.
Means techniques helpful for you to make configuration with ease.
4
Description
Represents a generic network device, such as a router, switch, or firewall.
Represents a routing-capable device, such as a router or Layer 3 switch.
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router
that supports Layer 2 forwarding and other Layer 2 features.
Hardware specifications
and installation
Software configuration
Documents
Purposes
Marketing brochures
Card datasheets
Quick start
Installation guide
Card manuals
Configuration guides
Command references
Configuration examples
Trap messages
MIB Companion
Release notes
Operations and
maintenance
Obtaining documentation
You can access the most up-to-date H3C product documentation on the World Wide Web at
http://www.h3c.com.
Click the links on the top navigation bar to obtain different categories of product documentation:
[Technical Support & Documents > Technical Documents] Provides hardware installation, software
upgrading, and software feature configuration and maintenance documentation.
[Products & Solutions] Provides information about products and technologies, as well as solutions.
[Technical Support & Documents > Software Download] Provides the documentation released with the
software version.
Documentation feedback
You can e-mail your comments about product documentation to info@h3c.com.
We appreciate your comments.
Table of Contents
Preface 3
Audience 3
Conventions 4
About the H3C S5120-EI documentation set 6
IP routing overview 9
Routing 9
Routing table and FIB table 9
Routing protocol overview 11
Static routing and dynamic routing 11
Routing protocols and routing priority 11
Displaying and maintaining a routing table 12
Acronyms 26
Index 42
IP routing overview
Routing
Routers are responsible for forwarding data packets along networks. Upon receiving a packet, a router
determines the optimal path based on the destination address. When the packet reaches the last router in
the path, it then forwards the packet to the intended destination host.
Routing provides the path information for guiding the forwarded packets.
The term router in this document refers to a router in a generic sense or a Layer 3 switch.
Direct routes: Routes discovered by data link protocols, also known as interface routes.
Dynamic routing protocol is not supported on the S5120-EI Series Ethernet Switches.
Each entry in the FIB table specifies the physical interface to which a packet should travel: the next hop
(the next router), or directly to its intended destination.
Network mask: Specifies, in company with the destination address, the address of the destination
network. A logical AND operation between the destination address and the network mask yields the
address of the destination network. For example, if the destination address is 129.102.8.10 and the
mask 255.255.0.0, the address of the destination network is 129.102.0.0. A network mask is made
of a certain number of consecutive 1s. It can be expressed in dotted decimal format or by the
number of the 1s.
Outbound interface: Specifies the interface through which the IP packets are to be forwarded.
IP address of the next hop: Specifies the address of the next router on the path. If only the outbound
interface is configured, its address will be the IP address of the next hop.
Priority for the route: Routes to the same destination but having different nexthops may have different
priorities and be found by various routing protocols or manually configured. The optimal route is the
one with the highest priority (with the smallest metric).
Based on whether the destination is directly connected to a given router, routes can be divided into:
To prevent the routing table from getting too large, you can configure a default route. All packets without
matching any entry in the routing table will be forwarded through the default route.
In Figure 1, the IP address on each cloud represents the address of the network. Router G is connected to
three networks and therefore has three IP addresses for its three physical interfaces. Its routing table is
shown under the network topology.
Figure 1 A sample routing table
10
Router A
17.0.0.1
Router F
17.0.0.3
17.0.0.0
11.0.0.2
16.0.0.2
Router D
17.0.0.2
16.0.0.0
11.0.0.0
14.0.0.3
11.0.0.1
16.0.0.1
14.0.0.2
Router B
14.0.0.4
Router G
14.0.0.0
15.0.0.2
12.0.0.1
Router E
14.0.0.1
12.0.0.0
15.0.0.0
13.0.0.2
15.0.0.1
12.0.0.2
13.0.0.3
13.0.0.0
13.0.0.1
Router C
Router H
Destination Network
Nexthop
Interface
11.0.0.0
11.0.0.1
12.0.0.0
12.0.0.1
13.0.0.0
12.0.0.2
14.0.0.0
14.0.0.4
15.0.0.0
14.0.0.2
16.0.0.0
14.0.0.2
17.0.0.0
11.0.0.2
The following table lists some routing protocols and the default priorities for routes found by them:
Routing approach
Priority
DIRECT
STATIC
60
UNKNOWN
256
Remarks
Available in
any view
Available in
any view
Available in
any view
Available in
any view
Available in
any view
Available in
user view
Available in
any view
Available in
any view
Available in
any view
Available in
any view
Available in
any view
Available in
any view
Available in
12
To do
Remarks
statistics
all | protocol }
user view
13
The term router in this document refers to a router in a generic sense or a Layer 3 switch.
Default route
If the packets destination address fails to match any entry in the routing table, the packet is discarded.
After a default route is configured on a router, any packet whose destination IP address matches no entry
in the routing table can be forwarded to a designated upstream router.
A router selects the default route only when it cannot find any matching entry in the routing table.
If the destination address of a packet fails to match any entry in the routing table, the router selects
the default route to forward the packet.
If there is no default route and the destination address of the packet fails to match any entry in the
routing table, the packet will be discarded and an ICMP packet will be sent to the source to report
that the destination or the network is unreachable.
You can configure a default route with both the destination and mask being 0.0.0.0. The router forwards
any packet whose destination address fails to match any entry in the routing table to the next hop of the
default static route.
14
While configuring a static route, you can specify either the output interface or the next hop address
depending on the specific occasion. For a NULL0 interface, if the output interface has already been
configured, there is no need to configure the next hop address
In fact, all the route entries must have a next hop address. When forwarding a packet, a router first
searches the routing table for the route to the destination address of the packet. The system can find
the corresponding link layer address and forward the packet only after the next hop address is
specified. The next hop address can not be a local interface IP address; otherwise, the route
configuration will not take effect.
Other attributes:
You can configure different preferences for different static routes so that route management policies
can be applied more flexibly.
Configuration procedure
Follow these steps to configure a static route:
To do
Remarks
system-view
Required
2. Configure a static
route
3. Configure the
default preference
for static routes
ip route-static default-preference
default-preference-value
Optional
60 by default
When configuring a static route, the static route does not take effect if you specify the next hop address first and
then configure it as the IP address of a local interface.
If you do not specify the preference when configuring a static route, the default preference will be used.
Reconfiguring the default preference applies only to newly created static routes.
If the destination IP address and mask are both configured as 0.0.0.0 with the ip route-static command, the
route is the default route.
15
When the track entry is positive, the static route's nexthop is reachable and the static route takes
effect.
When the track entry is negative, the static route's nexthop is unreachable and the static route is
invalid. For details about track, refer to Track Configuration in the High Availability Configuration
Guide.
Network requirements
To detect the reachability of a static route's nexthop through a Track entry, you need to create a Track
first. For detailed Track configuration procedure, refer to Track Configuration in the High Availability
Configuration Guide.
Configuration procedure
Follow these steps to detect the reachability of a static route's nexthop through Track:
To do
Remarks
system-view
Required
Not configured
by default
To configure this feature for an existing static route, associate the static route with a track entry. For a non-existent
static route, configure it and associate it with a Track entry.
If a static route needs route recursion, the associated track entry must monitor the nexthop of the recursive route
instead of that of the static route; otherwise, a valid route may be mistakenly considered invalid.
display current-configuration
display ip routing-table
16
Remarks
Available in
any view
To do
Remarks
Available In
system view
Configuration procedure
1.
2.
17
3.
The default gateways for hosts A, B and C are 1.1.2.3, 1.1.6.1 and 1.1.3.1, respectively. The configuration
procedure is omitted.
4.
Proto
0.0.0.0/0
Routes : 7
Pre
Cost
NextHop
Interface
Static 60
1.1.4.2
Vlan500
1.1.2.0/24
Direct 0
1.1.2.3
Vlan300
1.1.2.3/32
Direct 0
127.0.0.1
InLoop0
1.1.4.0/30
Direct 0
1.1.4.1
Vlan500
1.1.4.1/32
Direct 0
127.0.0.1
InLoop0
127.0.0.0/8
Direct 0
127.0.0.1
InLoop0
127.0.0.1/32
Direct 0
127.0.0.1
InLoop0
Cost
NextHop
Interface
Routes : 10
Destination/Mask
Proto
Pre
1.1.2.0/24
Static 60
1.1.4.1
Vlan500
1.1.3.0/24
Static 60
1.1.5.6
Vlan600
1.1.4.0/30
Direct 0
1.1.4.2
Vlan500
1.1.4.2/32
Direct 0
127.0.0.1
InLoop0
1.1.5.4/30
Direct 0
1.1.5.5
Vlan600
1.1.5.5/32
Direct 0
127.0.0.1
InLoop0
127.0.0.0/8
Direct 0
127.0.0.1
InLoop0
127.0.0.1/32
Direct 0
127.0.0.1
InLoop0
1.1.6.0/24
Direct 0
1.1.6.1
Vlan100
1.1.6.1/32
Direct 0
127.0.0.1
InLoop0
Use the ping command on Host B to check reachability to Host A, assuming Windows XP runs on the
two hosts.
C:\Documents and Settings\Administrator>ping 1.1.2.2
18
<1 ms
<1 ms
<1 ms
1.1.6.1
<1 ms
<1 ms
<1 ms
1.1.4.1
1 ms
<1 ms
<1 ms
1.1.2.2
Trace complete.
19
The term router in this document refers to either a router in a generic sense or a Layer 3 switch running routing
protocols.
Configuration prerequisites
Remarks
system-view
2. Configure an IPv6
static route
Required
20
To do
Remarks
preference preference-value ]
Remarks
Use the undo ipv6 route-static command to delete a single IPv6 static route. The delete ipv6 staticroutes all command deletes all IPv6 static routes including the default route.
For more information about the display ipv6 routing-table protocol static [ inactive | verbose ]
command, refer to IP Routing Table Commands in the Layer 3 - IP Routing Command Reference.
21
Configuration procedure
1.
2.
3.
Configure the IPv6 addresses of all the hosts based upon the network diagram, configure the default
gateway of Host A as 1::1, that of Host B as 2::1, and that of Host C as 3::1.
4.
Routes : 5
Destination
: :: /128
NextHop
: FE80::510A:0:8D7:1
Preference
Protocol
: 60
Interface
: Vlan-interface200
Cost
: 0
Destination
: ::1/128
Protocol
: Direct
NextHop
: ::1
Preference
: 0
Interface
: InLoop0
Cost
: 0
Destination
: 1:: /64
Protocol
: Direct
NextHop
: 1::1
Preference
: 0
Interface
: Vlan-interface100
Cost
: 0
Destination
: 1::1/128
Protocol
: Direct
NextHop
: ::1
Preference
: 0
Interface
: InLoop0
Cost
: 0
Destination
: FE80::/10
Protocol
: Direct
NextHop
: ::
Preference
: 0
Interface
: NULL0
Cost
: 0
22
: Static
time = 63 ms
time = 62 ms
time = 62 ms
time = 63 ms
time = 63 ms
23
Troubleshoot online
You will find support tools posted on the web site at http://www.h3cnetworks.com/ under
Support, Knowledgebase. The Knowledgebase helps you troubleshoot H3C products. This
query-based interactive tool contains thousands of technical solutions.
24
To send a product directly to 3Com for repair, you must first obtain a return authorization number (RMA).
Products sent to 3Com, without authorization numbers clearly marked on the outside of the package, will
be returned to the sender unopened, at the senders expense. If your product is registered and under
warranty, you can obtain an RMA number online at http://www.h3cnetworks.com under
support, Repair & Replacement Request. First time users will need to apply for a user name and
password.
Contact us
3Com offers telephone, e-mail and internet access to technical support and repair services. To access
these services for your region, use the appropriate telephone number, URL or e-mail address.
Find
a
current
directory
of
contact
information
posted
on
the
web
http://www.h3cnetworks.com under Support, Technical Support Contact.
25
site
at
Acronyms
#ABCDEFGHIKLMNOPQRSTUVWXZ
Acronym
Full spelling
#
10GE
Return
Ten-GigabitEthernet
Return
AAA
ABC
ABR
AC
Alternating Current
ACK
Acknowledgement
ACL
ACS
Auto-Configuration Server
ADSL
AES
AF
Assured Forwarding
AFI
ALG
AM
Accounting Management
AMB
ANSI
AP
Access Point
ARP
AS
Autonomous System
ASBR
ASCII
ASE
ASIC
ASM
Any-Source Multicast
ASN
AT
Advanced Technology
AT
Adjacency Table
ATM
Acronym
Full spelling
AUX
Auxiliary (port)
AVF
Return
BAS
BC
Bearer Control
BDR
BE
Best Effort
BFD
BGP
BIMS
BOOTP
Bootstrap Protocol
BPDU
BRI
BSR
Bootstrap Router
BT
BitTorrent
BS
BSR State
BT
Burst Tolerance
Return
C-BSR
C-RP
CA
Call Appearance
CA
Certificate Authority
CAR
CBS
CBT
Core-Based Tree
CBQ
CBR
CBT
Core-Based Tree
CCITT
CCM
CDP
CE
CF-Card
CFD
CFM
27
Acronym
Full spelling
CHAP
CIDR
CIR
CIST
CLI
CLV
Code/Length/Value
CLNP
CPE
CPOS
Channelized POS
CPS
CPU
CQ
Custom Queuing
CR
Carriage Return
CRC
CRL
CR-LSP
CR-LDP
CSMA/CD
CSNP
CSPF
CST
CT
Call Transfer
CV
Connectivity Verification
CVLAN
Return
DAD
DAR
DCE
DD
Database Description
DDN
DES
DHCP
DiffServ
Differentiated Service
DIS
DLCI
28
Acronym
Full spelling
DLDP
DN
Distinguished name
DNS
DoD
Downstream on Demand
DoS
Denial of Service
DR
Designated Router
DSA
DSCP
DSP
DSTE
DiffServ Aware TE
DTE
DU
Downstream Unsolicited
DUID
DUID-LL
D-V
DVMRP
DWDM
Return
EACL
Enhanced ACL
EAD
EAP
EAPOL
EAPOR
EBGP
EBS
EF
Expedited Forwarding
EGP
ES
End System
ES-IS
Return
FCoE
FC
Forwarding Class
FCS
FDB
Forwarding Database
FDDI
29
Acronym
Full spelling
FDI
FEC
FFD
FF
Fixed filter
FG
Forwarding Group
FIB
FIFO
FQDN
FR
Frame Relay
FRR
Fast Reroute
FRTT
FSM
FT
Functional Test
FTP
Return
GARP
GE
Gigabit Ethernet
GR
Graceful Restart
GRE
GTS
GVRP
Return
HA
High Availability
HABP
HDLC
HEC
HMAC
HO-DSP
HoPE
Hierarchy of PE
HoVPN
Hierarchy of VPN
HQoS
HSB
Hot Standby
HTTP
HTTPS
HTTP Security
H-VPLS
Hierarchy of VPLS
30
Acronym
Full spelling
HVRP
HWTACACS
Return
IA
IANA
IBGP
IBM
ICMP
ICPIF
ICMPv6
ID
Identification/Identity
IDI
IDP
IEEE
IETF
IGMP
IGMP-Snooping
IGP
IIH
ILM
ILS
iMC
IN
Intelligent Network
IntServ
Integrated Service
IP
Internet Protocol
IPC
Inter-Process Communication
IPng
IP Next Generation
IPSec
IP Security
IPTN
IPv6
IPX
IRDP
IRF
IS
Intermediate System
ISATAP
31
Acronym
Full spelling
ISDN
IS-IS
ISO
ISP
ISSU
IST
ITU-T
Return
KB
Kilobyte
KEK
Key-encrypting key
Return
L2TP
L2VPN
L3VPN
LACP
LACPDU
LAN
LAPB
LB
Loopback
LBM
Loopback Message
LBR
Loopback Reply
LCP
LDAP
LDP
LER
LFIB
LIB
LLC
LLDP
LLDPDU
LLS
Link-Local Signaling
LLSP-CDP
LOC
Loss of continuity
LOG
Call Logging
32
Acronym
Full spelling
LR
Line Rate
LRTT
LS
Link State
LSA
LSAck
LSDB
LSP
LSPAGENT
LSPDU
LSPM
LSR
LSR
LSR-ID
LSU
LT
Linktrace
LTM
Lintrace Message
LTR
LVF
Return
MA
Maintenance Association
MAC
MAD
Multi-Active Detection
MAFV
MAN
MaxBC
MBGP
MCE
MD
MD5
Message-Digest 5
MDI
MDS
Message-Digest Algorithm 5
MDT
MD5
Message-Digest Algorithm 5
MED
Multi-Exit Discriminator
MEP
33
Acronym
Full spelling
MFF
MGV
MIB
MIP
MLD
MLD-Snooping
MMC
Meet-Me Conference
MODEM
Modulator/Demodulator
MOS
MP
MP-BGP
MPE
Middle-level PE
MP-group
MPLS
MPLSFW
MPM
MSC
MSDP
MSOH
MSTI
MSTP
MT
Multicast Tunnel
MTBF
MTI
MTTR
MTU
MVRF
Return
NA
Neighbor Advertisement
NAPT
NAPT-PT
NAS
NAT
NBMA
NBT
34
Acronym
Full spelling
NCP
ND
Neighborhood discovery
NDA
NDC
NDP
NET
NetBIOS
NHLFE
NLB
NLPID
NLRI
NMS
NPDU
NPE
NQA
NS
Neighbor Solicitation
NSAP
NSC
NetStream Collector
N-SEL
NSAP Selector
NSR
Non-Stop Routing
NSSA
Not-So-Stubby Area
NTDP
NTK
Need to Know
NTP
Return
OAM
OAMPDU
OC-3
OC-3
OID
Object Identifier
OL
Optical Line
OOB
Out of Band
OS
Operating system
OSI
ORF
OSPF
35
Acronym
Full spelling
OUI
Return
Provider
P2MP
Point to MultiPoint
P2P
Point To Point
PAP
PAFV
PBR
Policy-Based Route
PCB
PCM
PD
PDU
PE
PGV
PHP
PHY
Physical Layer
PIM
PIM-DM
PIM-SM
PIR
PKCS
PKI
PLR
PMTU
Path MTU
PoE
POP
Point Of Presence
POS
PPP
Point-to-Point Protocol
PPTP
PPVPN
PQ
Priority Queuing
PRC
PRI
PS
Protection Switching
PSE
36
Acronym
Full spelling
PSNP
PTMP or P2MP
Point-to-Multipoint
PTP or P2P
Point-to-Point
PVC
PW
Pseudo wires
PXE
Return
QACL
QoS/ACL
QinQ
802.1Q in 802.1Q
QoS
Quality of Service
QQIC
QRV
Return
RA
RADIUS
RALM
RAM
Random-Access Memory
RD
Routing Domain
RD
Router Distinguisher
RED
RFC
RIB
RID
Router ID
RIP
RIPng
RM
Route Management
RMON
Remote Monitoring
ROM
RP
Rendezvous Point
RPC
RPF
RPR
RPT
RR
Route Reflector
RRPP
37
Acronym
Full spelling
RRPPD
RS
Router Solicitation
RSA
Revest-Shamir-Adleman Algorithm
RSB
RSOH
RSTP
RSVP
RSVP-TE
RT
Route Target
RTCP
RTE
RTP
RTP
Return
SA
SAFI
SBM
SCEP
SCFF
SD
Signal Degrade
SDH
SE
Shared explicit
SEL
Selector
SETS
SF
Sampling Frequency
SFM
Source-Filtered Multicast
SFTP
Secure FTP
SHA1
Share-MDT
SIP
Site-of-Origin
Site-of-Origin
SLA
SMB
SMTP
SNAP
38
Acronym
Full spelling
SNMP
SNP
SNPA
SOH
Section Overhead
SONET
SOO
Site-of-Origin
SP
SPE
SPF
SPT
SRPT
SRPU
SSH
Secure Shell
SSM
SSM
Source-Specific Multicast
ST
Shared Tree
STelnet
Secure Telnet
STM-1
STM-16
STM-16c
STM-4c
STP
SVC
SVLAN
Switch-MDT
SYN
Synchronize
Return
TA
Terminal Adapter
TACACS
TDM
TCP
TCN
TE
Traffic Engineering
TEDB
TFTP
39
Acronym
Full spelling
TLS
TLV
Type-Length-Value
ToS
Type of Service
TP
Traffic Policing
TPID
TRIP
Trigger RIP
TS
Traffic Shaping
TTL
Time to Live
TTY
Return
U/L
Universal/Local
UDP
UPE
Under-layer PE or User-end PE
URL
URPF
USM
Return
VBR
VCI
VE
Virtual Ethernet
VF
Virtual Forwarder
VFS
VLAN
VLL
VOD
Video On Demand
VoIP
Voice over IP
VOS
VPDN
VPDN
VPI
VPLS
VPN
VRID
Virtual Router ID
VRRP
VSI
40
Acronym
Full spelling
VT
Virtual Tributary
VTY
Return
WAN
WFQ
WINS
WLAN
WRED
WRR
WTR
Wait-to-Restore
WWW
X
XGE
Return
Ten-GigabitEthernet
Z
ZBR
Return
Zone Border Router
41
Index
IPv6 static routing
configuring
basic static route ............................................ 17
features ........................................................ 20
detecting
maintaining
displaying
network management
features
IP routing
procedure
FIB table......................................................... 9
overview ........................................................ 9
protocols ....................................................... 11
routing
IPv6
43