No part of this manual may be reproduced or transmitted in any form or by any means without prior
written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C, , Aolynk, , H3Care,
SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V
XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co.,
Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners.
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Technical Support
customer_service@h3c.com
http://www.h3c.com
, TOP G, , IRF, NetPilot, Neocean, NeoVTL,
2
G, VnG, PSPT,
About This Manual
Organization
H3C SecPath U200 Series Unified Threat Management Products Installation Manual is organized as
follows:
Chapter Contents
1 Product Overview
2 Interface Modules
3 Preparing for Installation
4 Installing the U200 Series
Device
5 Starting and Configuring
the U200 Series Device
6 Maintaining Software
7 Maintaining Hardware
8 Troubleshooting
Briefly introduces the product specifications, as well as the features
and applications of the H3C SecPath U200 series UTM devices.
Describes the interface cards and interface modules supported by
the H3C SecPath U200 series UTM devices.
Describes the site requirements for installing the H3C SecPath U200
series UTM devices, safety recommendations before and during
installation, and required tools.
Introduces how to install an H3C SecPath U200 series UTM device,
as well as how to connect the power cable, console cable, Ethernet
cable, and interface cable.
Describes how to boot and configure an H3C SecPath U200 serie s
UTM device, including device startup, power-on, and initialization of
system files.
Introduces how to maintain software of the H3C SecPath U200
series UTM devices, including upgrading software and updating
configuration files.
Introduces how to maintain hardware of the H3C SecPath U200
series UTM devices.
Describes some problems you may encounter during installation and
startup of an H3C SecPath U200 series UTM device and how to
solve them.
Appendix Compliance and
Safety Manual
Conventions
The manual uses the following conventions:
Command conventions
Convention Description
Boldface
italic
[ ] Items (keywords or arguments) in square brackets [ ] are optional.
{ x | y | ... }
[ x | y | ... ]
{ x | y | ... } *
This section introduces part of the compliance and safety
precautions that should be followed during the installation and
maintenance of the equipment.
The keywords of a command line are in Boldface.
Command arguments are in italic.
Alternative items are grouped in braces and separated by vertical bars.
One is selected.
Optional alternative items are grouped in square brackets and
separated by vertical bars. One or none is selected.
Alternative items are grouped in braces and separated by vertical bars.
A minimum of one or a maximum of all can be selected.
Convention Description
[ x | y | ... ] *
&<1-n>
# A line starting with the # sign is comments.
Optional alternative items are grouped in square brackets and
separated by vertical bars. Many or none can be selected.
The argument(s) before the ampersand (&) sign can be entered 1 to n
times.
GUI conventions
Convention Description
Boldface
>
Window names, button names, field names, and menu items are in
Boldface. For example, the New User window appears; click OK.
Multi-level menus are separated by angle brackets. For example, File >
Create > Folder.
Symbols
Convention Description
Means reader be extremely careful. Improper operation may cause
bodily injury.
Related Documentation
In addition to this manual, each H3C SecPath Series Security Products documentation set includes the
following:
Manual Description
H3C SecPath Series Security
Products User Manual
Obtaining Documentation
You can access the most up-to-date H3C product documentation on the World Wide Web at this URL:
http://www.h3c.com.
The following are the columns from which you can obtain different categories of product docume ntation:
Means reader be careful. Improper operation may cause data loss or
damage to equipment.
Means a complementary description.
Describes the features, operation fundamentals, and configuration
commands of the H3C SecPath series security products, guides
you to make configuration, and provides configuration examples.
[Products & Solutions]: Provides information about products and technologies.
[Technical Support & Document > Technical Documents]: Provides several categories of product
documentation, such as installation, configuration, and maintenance.
[Technical Support & Document > Software Download]: Provides the documentation released with the
software version.
Documentation Feedback
You can e-mail your comments about product documentation to info@h3c.com.
We appreciate your comments.
Environmental Protection
This product has been designed to comply with the requirements on environmental protection. For the
proper storage, use and disposal of this product, national laws and regulations must be ob served.
Processor and Storages··················································································································1-5
Dimensions and Weight···················································································································1-5
Fixed Interfaces and Slots···············································································································1-6
Power Input ·····································································································································1-6
Operating Environment Specifications ····························································································1-6
Processor and Storages··················································································································1-7
Front Panel LEDs ····························································································································1-7
Fixed Interfaces ·······························································································································1-8
AC Power Input ·····························································································································1-14
Clock··············································································································································1-14
Port Lightning Arrester (Optional)··································································································1-14
Power Lightning Arrester (Optional) ······························································································1-15
Signal Lightning Arrester (Optional) ······························································································1-15
System Software ···························································································································1-16
i
1 Product Overview
Introduction
The H3C SecPath U200 Series Unified Threat Management Products are new-generation UTM devices
designed for enterprise users.
The U200 series comprises three models:
z U200-A: Designed for large- and medium-sized enterprise users
z U200-M: Designed for medium-sized enterprise users
z U200-S: Designed for small- and medium-sized enterprise users
In addition to traditional firewall functions, the U200 series protect network security by providing a wide
range of functions including virtual firewall, security zone, intrusion detection and protection, gateway
anti-virus, anti-spam, P2P traffic control, and URL filtering. With the application specification packet filter
(ASPF) technology, a U200 series device can monitor connection setup processes and illegal
operations, and dynamically filter packets based on ACLs. Moreover, the U200 series support multiple
VPN services including IPSec VPN, L2TP VPN, and GRE VPN, and thereby can be used for
constructing a variety of VPN networks. The series deliver abundant routing capabilities and support
RIP and OSPF. Adopting a high-performance multi-core CPU, the U200-A, U200-M and U200-S can
support up to 10, 8, and 7 GE interfaces respectively, delivering high scalability for user investment
protection.
The U200 series are available with AC power supply to ensure high reliability, fully satisfy requirements
for network maintenance, update, and optimization, support detection of chassis internal temperature,
support network management, and provide a Web management interface.
The U200-A provides two MIM expansion slots for future service expansion. Currently, the slots support
the NSQ1GT2UA0 and NSQ1GP4U0 MIM modules.
The U200-M provides one MIM expansion slot and currently supports the same MIM as the U200-A
does.
The U200-S provides a mini expansion slot for future service expansion. Currently, the device supports
the 2-GE and NSQ1WLAN0 interface modules.
Features
The U200 series deliver the following features:
Powerful hardware platform
The U200 series perfectly fit in enterprise networks thanks to the adoption of MIPS64-based CPUs and
The CF card is hot-swappable. When the device is reading from or writing to the CF card or performing
any other file system related operation, the CF card LED blinks. Do not unplug the CF card in this state
because doing so can corrupt the file system in it.
AC Power Input
Table 1-14 lists the AC power specifications for the U200 series.
Table 1-14 AC power specifications
Clock
Item
Description
U200-A U200-M U200-S
Rated voltage range
Maximum input current
Maximum power
100 VAC to 240 VAC; 50 Hz or 60 Hz
1.6 A
100 W 54 W
0.6 A
The U200 series are designed with a clock module for providing system time. You can set the system
time at the command line interface.
The clock module can work despite power failure to ensure that the system time is correct at reboot.
With the device powered off, the clock module can work for at least 10 years.
Note that:
z Never replace the clock module battery when power is present on the device.
z The system time gets lost once the clock module battery is removed. You can set it at the
command line interface.
You can use three commands including clock datetime, ock summer-time one-off (or clock summer-time repeating), and clock timezone to complete setting the system time. See the
accompanying documentation for how to do that.
Port Lightning Arrester (Optional)
Before connecting an outdoor Ethernet cable to an Ethernet port, install a port lightning arrester to
protect the device against lightning strikes.
The port lightning arresters available for the U200 series feature these:
1-14
zFor single-port use, maximum discharge current (8/20μs waveform): 5 kA, output voltage
(10/700μs waveform): core-core < 40 V, core-ground < 600 V.
For the installation of the port lightning arrester, refer to the “Installing a Port Lightning Arrester” section
in Chapter 4 “Installing the U200 Series Device.”
Power Lightning Arrester (Optional)
Before connecting an outdoor AC power cable to the device directly, you can connect the AC power
input to a lightning protection busbar to protect the device against lightning strikes. In a heavy lightning
area, you are recommended to install a power lightning arrester.
The lightning arresters available for the U200 series feature these:
zMaximum discharge current of 6500 A, protection for 500 VAC to 220 VAC.
For how to install a power lightning arrester, refer to the “Installing a Power Lightning Arrester
(Optional)” section in Chapter 4 “Installing the U200 Series Device.”
Signal Lightning Arrester (Optional)
Generally, you need to install a signal lightning arrester between a signal cable and the connected
device. This can protect electronic components against surge over-voltage resulting from lightning
strikes or any other interferences, and minimize the impact on the system.
The following are specifications of the three signal lightning arrester options available for the U200
series:
z Maximum discharge current 2.5KA/protection voltage 25V-SMB-75J/SMB-75J-1W-10Mbps.
z Maximum discharge current 2.5KA/protection voltage 25V-BNC-75K/BNC-75K-10MBit/s.
z For U-shape ports, maximum discharge current 3KA/common mode 400 V/differential mode
170V-RJ11
For how to install a signal lightning arrester, refer to the “Installing a Signal Lightning Arrester” section in
Chapter 4 “Installing the U200 Series Device.“
1-15
System Software
The U200 series operate on the H3C Comware V5 or i-Ware software platform, integrating a rich set of
security features including virtual firewall, attack prevention, load balancing, and P2P traffic
management. Combining network and security technologies perfectly, the series can be deployed in
various complex network environments to provide strong security protection.
1-16
Table of Contents
2 Interface Cards and Interface Modules ···································································································2-1
The antenna interface of the NSQ1WLAN0 module supports 2.4 GHz and 5 GHz dual-frequency omni
antennas.
2-6
Figure 2-8 Omni antenna for the NSQ1WLAN0 module
For how to connect the antenna for the NSQ1WLAN0 module, refer to “Connecting an antenna for the
NSQ1WLAN0 module” in Chapter 4 “Installing the U200 Series Device.”
Arranging Slots and Naming Interfaces
Slot Arrangement
The U200 series support interfaces such as console, AUX, Gigabit Ethernet, and WLAN interfaces. This
section describes how these interfaces are numbered.
Naming Interfaces
The interfaces on a U200 series device are named following these conventions:
1) An interface is named in the form of interface-type X/Y, where
z interface-type represents the type of the interface, such as GigabitEthernet.
z X represents the number of the slot in which the interface module is inserted.
z Y represents the number of the interface on the interface module.
2) The interfaces on the same interface module uses the same slot number X.
3) The interfaces of the same type on an interface module are numbered starting with 0 for Y from left
to right.
Examples
1) The five fixed GigabitEthernet interfaces on the U200-S are named as follows:
z GigabitEthernet 0/0
z GigabitEthernet 0/1
z GigabitEthernet 0/2
z GigabitEthernet 0/3
z GigabitEthernet 0/4
2) If a 2GE module is installed on the U200-S, the GigabitEthernet interfaces on the 2GE module are
numbered as follows:
z GigabitEthernet 1/0
z GigabitEthernet 1/1
2-7
3) If an NSQ1WLAN0 module is installed on the U200-S, the WLAN interface on the module is named
as follows:
zWlan Radio 1/0
2-8
Table of Contents
3 Preparing for Installation ··························································································································3-1
Safety Signs ····································································································································3-4
General Safety Recommendations ·································································································3-5
Electricity Safety ······························································································································3-5
Installation Tools, Meters and Devices ···································································································3-5
Installation Accessories Supplied with a U200 Series Device ························································3-5
User supplied tools ··························································································································3-5
Reference ········································································································································3-5
Checklist Before Installation····················································································································3-6
i
3 Preparing for Installation
Environment Requirements
The U200 series are designed for indoor use. To ensure normal operation and prolong service life of the
U200 series devices, the installation site must meet the requirements described in this chapter.
Ventilation Requirements
The fans of a U200 series device draw air in through the inlet vents on the left and out through the
exhaust vents on the right. Take the U200-S as an example.
Figure 3-1 Air flow design of the U200 series
Make sure that:
There is at least 10 cm (3.94 in.) of clearance around the air intake and the air exhaust for heat
dissipation of the chassis.
A ventilation system is available at the installation site.
Temperature and Humidity Requirements
The equipment room must maintain proper humidity to prevent poor insulation, electricity creepage and
corrosion accompanying high humidity, and to prevent washer contraction and electrostatic discharge
accompanying low humidity. In dry environments where relative humidity is very low, electrostatic
discharge (ESD) is more likely to happen causing the complementary metal-oxide-semiconductor
(CMOS) circuitry to fail.
A proper temperature condition must also be maintained to prevent premature material aging and
degraded reliability accompanying high temperature conditions.
Table 3-1 lists the temperature and humidity requirements.
Table 3-1 Temperature and humidity requirements in the equipment room
Temperature Relative humidity
0°C to 45°C (32°F to 113°F) 10% to 95% (noncondensing)
3-1
Cleanness Requirements
Dust concentration limits
Dust is hazardous to the operating safety of devices. Dust buildup on chassis may result in static
absorption, causing poor contact of metal components or points. When indoor humidity is extremely low,
this is more likely to happen, shortening the useful life of the devices and causing communication
failures.
Table 3-2 lists the dust concentration limits in the equipment room.
Table 3-2 Dust concentration limits in the equipment room
Diameter (μm) 0.5 1 3 5
Concentration
limit (particles/m
3
)
1.4 × 10
7
7 × 105 2.4 × 105 1.3 × 105
Harmful gas concentration limits
Besides, the equipment room should meet the rigorous limits on salt, acid and sulfide to eliminate
corrosion and premature aging of some parts, as shown
Table 3-3 Harmful gas concentration limits
Gas Max (mg/m3)
SO2 0.2
H2S 0.006
NH3 0.05
Cl2 0.01
Electrostatic Discharge Prevention
Table 3-3.
Sources and damages of static electricity
By design, a U200 series device is ESD preventative; but excessive buildup of static electricity can still
damage the card circuitry and even the entire device.
On the communication network connected to a U200 series device, static electricity is primarily
introduced from the outside electrical fields, such as the outdoor high-voltage power cabling and
lightning, and from the inside system, such as the indoor environment, floor materials and the chassis
frame.
Measures against ESD
To protect your device against electrostatic discharge (ESD), follow these guidelines:
Ensure that the device and the floor are well grounded.
Ensure that he equipment room is as dust free as possible.
Maintain adequate humidity and temperature.
Wear an ESD-preventive wrist strap and clothes before touching a circuit board.
Place removed cards (mini interface cards, MIM modules, or CF cards) upward on an antistatic
workbench or into a static shielded bag.
3-2
Hold a card, module, or circuit board by its edges when observing or moving it, avoiding direct
contact with the components on it.
Use of an ESD-preventive wrist strap
Follow these steps to wear an ESD-preventive wrist strap:
Step1 Put the ESD-preventive wrist strap around your wrist.
Step2 Tighten the fastener to ensure good skin contact.
Step3 Attach the alligator clip to the ESD-preventive wrist strap.
The equipment and the floor are well grounded.
The equipment room is as dust free as possible.
Appropriate humidity and temperature are maintained.
Wear an ESD-preventive wrist strap or clothes when
ESD prevention
working with a circuit board.
Place a removed mini interface module, CF card, or
MIM upward on an antistatic workbench or put it away
in an antistatic bag.
Hold a card, module, or circuit board by its edges,
avoiding touching the electronic components on it.
Take effective measures against interference from the
power grid.
Separate the protection ground of the device from the
EMI prevention
grounding device or lightning protection grounding
device as far as possible.
Keep the device far away from radio stations, radar,
and high-frequency devices working at high current.
Use electromagnetic shielding when necessary.
The PGND cable of the chassis is well grounded.
The earth point of the power socket is securely
connected to the earth ground.
Port lightning arresters are installed as necessary.
Lightning protection
(Optional)
A power lightning arrester is installed as necessary.
(Optional)
Signal lightning arresters are installed at the input ends
of external signal cables as necessary. (Optional)
Use of an uninterrupted power supply (UPS) is
recommended.
Electricity safety
Locate the emergency power switch in the equipment
room before installation and maintenance so that you
can switch power off quickly in case of an electrical
accident.
The workbench is sturdy enough to support the weight
Workbench
of the device and installation accessories.
The workbench is well grounded.
3-6
Item Requirements
Install the device in an open rack if possible. If you
install the device in a closed cabinet, make sure that the
cabinet has a good ventilation system.
Rack-mounting
requirements
The rack is sturdy enough to support the weight of the
device and installation accessories.
The size of the rack is appropriate for the device.
The front and rear of the rack are at least 0.8 m (31.50
in.) away from walls or other devices.
Safety
precautions
Tools
Reference
The device is far away from moist areas and heat sources.
You have identified the emergency power switch in the equipment room.
Installation accessories supplied with the device are complete and in good
condition.
User-supplied tools are available.
Documentation shipped with the device is complete.
You have access to the online documentation.
3-7
Table of Contents
4 Installing the UTM Device·························································································································4-1
Preparations············································································································································4-1
Installation Flowchart ······························································································································4-1
Mounting a U200 Series Device ·············································································································4-1
Mounting a U200 Series Device on a Workbench ··········································································4-1
Rack-Mounting a U200 Series Device ····························································································4-2
Installing Generic Modules······················································································································4-4
PGND Cable Connection ························································································································4-4
Importance of PGND Cable Connection ·························································································4-4
Connecting the PGND Cable ··········································································································4-4
Installing a Port Lightning Arrester (Optional)·························································································4-6
Precautions······································································································································4-7
Installing a Power Lightning Arrester (Lightning Protection Busbar) (Optional) ·····································4-7
Selecting and Installing a Signal Lightning Arrester (Optional)·······························································4-8
Connecting the Power Cable ··················································································································4-9
Power Supply Port and PGND Terminal ·························································································4-9
Connecting the AC Power Cord ····································································································4-10
Connecting Interface Cables·················································································································4-11
Connecting the Console Cable······································································································4-11
Connecting an Ethernet Cable to the 2GE Module ·······································································4-12
Connecting an Ethernet Cable to the NSQ1GT2UA0 Module ······················································4-13
Connecting an SFP Module in the NSQ1GP4U0 Module ·····························································4-13
Connecting an Antenna for the NSQ1WLAN0 Module ·································································4-14
Verifying Installation······························································································································4-14
i
4 Installing the UTM Device
Preparations
Before installing the device, make sure that:
z You have read through Chapter 3 “Preparing for Installation.”
z All the requirements mentioned in Chapter 3 “Preparing for Installation” are satisfied.
Installation Flowchart
Figure 4-1 Installation flowchart
Mounting a U200 Series Device
You can mount a U200 series device on a workbench or in a rack.
Mounting a U200 Series Device on a Workbench
If a 19-inch rack is not available, you can mount a U200 series device on a clean workbench. During
installation, make sure:
4-1
zLength and width of the workbench are larger than the distance between the feet of the device. See
Table 4-1 for the dimensions of the U200 series devices.
Table 4-1 Dimensions of the U200 series devices
Item
U200-A U200-M U200-S
Dimensions without
feet or rack-mounting
brackets (H × W × D)
44.2 × 442 × 400 mm (1.74 × 17.40 × 15.75
in.)
Make sure that:
z The workbench is steady and well grounded.
z The workbench is sturdy enough to support the weight of the device and installation accessories.
z There is at least 10 cm (3.94 in.) of clearance around the device for heat dissipation.
z No heavy object is placed on the device for fear of device damage and poor heat dissipation.
Rack-Mounting a U200 Series Device
Installing an N68 rack
A U200 series device can be installed in an H3C N68 rack. For how to install an N68 rack, see N68
Cabinet Installation Guide.
Attaching rack-mounting brackets onto the device
Description
43.6 × 300 × 260 mm (1.72
× 11.81 × 10.24 in.)
The rack-mounting brackets for the U200-S are different from those used for the U200-A and the
U200-M as shown in
Figure 4-2 and Figure 4-3.
Figure 4-2 Rack-mounting brackets for the U200-S
(1) Left front rack-mounting bracket (2) Right front rack-mounting bracket
4-2
Figure 4-3 Rack-mounting brackets for the U200-A/U200-M
(1) Left front rack-mounting bracket (2) Right front rack-mounting bracket
Before mounting the device in a rack, attach the rack-mounting brackets securely to the left and right
front sides of the device, the U200-S for example, as shown in
Figure 4-4.
Figure 4-4 Attach front rack-mounting brackets to the U200-S
Mounting the device in a rack
Follow these steps to mount the device in a rack:
Step1 Check that the rack is well grounded and steady.
Step2 Fix the device in the rack horizontally and securely by fastening the mounting brackets onto the front
rack posts with pan-head screws. The size of the pan-head screws should satisfy the installation
requirements (maximally M6) and the surfaces of the screws should be anti-rust treated.
Take the U200-S for example:
4-3
Figure 4-5 Mount the device in the rack
Installing Generic Modules
Generic modules include CF card, mini interface cards and MIM modules. For their installation
procedures, see Chapter 7 “Maintaining Hardware.”
PGND Cable Connection
Importance of PGND Cable Connection
Correct connection of the protection ground (PGND) on the device chassis is an essential safeguard
against lightning strikes and EMI. You need to correctly connect the PGND cable when installing or
using the device.
The power input end of a U200 series device is equipped with a noise filter. The neutral ground of the
power input end is directly connected to the chassis and is called PGND (also called the chassis
ground). You need to securely connect the PGND cable to the earth ground to safely lead induced
current and leakage current to the ground and reduce the EMS of the device. The PGND cable can also
protect the device against high lightning voltage induced from external network lines.
Connecting the PGND Cable
The grounding screw of a U200 series device is located on the rear chassis panel and is marked with a
grounding symbol, as shown in
Figure 4-6.
4-4
Figure 4-6 Connect the PGND cable
(1) Grounding screw hole (2) OT terminal
(3) Grounding screw (4) PGND cable
(5) Grounding symbol
Follow these steps to connect the PGND cable, taking the U200-S for example:
Step1 Remove the grounding screw from the device chassis.
Step2 Put the supplied OT terminal of the PGND cable on the grounding screw.
Step3 Fasten the grounding screw, which is attached with the OT terminal of the PGND cable, into the
grounding screw hole with a screwdriver.
Step4 Connect the other end of the PGND cable to the ground. If no grounding bar is available, connect the
naked part of the PGND cable to the ground directly. If a grounding bar is available, connect the PGND
cable to the grounding bar as follows:
1) Use a cable stripper to strip off the insulation rubber about 15 mm (0.59 in.) from the PGND cable.
2) Wrap the naked part onto the grounding post of the grounding bar.
3) Fix the PGND cable onto the grounding post with a hex nut.
Figure 4-7 Connect the PGND cable to a grounding bar
(1) Hex nut (2) PGND cable
(3) Naked part of the PGND cable (4) Grounding post
(5) Grounding bar
z The resistance between the device chassis and the ground must be less than 5 ohms.
z Use the PGND cable provided with your U200 series device for effective chassis grounding.
Otherwise, the device may not be effectively grounded and thus be prone to damages.
4-5
Installing a Port Lightning Arrester (Optional)
z You need to install lightning arresters only for 10/100 Mbps RJ-45 Ethernet ports.
z The U200 series devices are not shipped with lightning arresters for ports in case of standard
configuration. You can purchase one if needed.
Before connecting an outdoor Ethernet cable to an Ethernet port, install a port lightning arrester to
protect the device against lightning strikes.
The specifications of the port lightning arrester available for the U200 series are as follows:
z Single port
z Maximum discharge current (8/20μs waveform): 5 kA
z Output voltage (10/700μs waveform): core-core < 40 V, core-ground < 600 V
Tools Required
z Phillips or flat-blade screwdriver
z Multimeter
z Diagonal pliers
Installation Procedure
Follow these steps to install a port lightning arrester:
Step1 Use a double-faced adhesive tape to stick the port lightning arrester to the device. The port lightning
arrester should be as close to the grounding screw as possible.
Step2 Cut short the grounding cable of the port lightning arrester according to its distance to the grounding
screw. Then, fix the grounding cable onto the grounding screw of the device.
Step3 Use the multimeter to check the connection between the grounding cable of the port lightning arrester
and the grounding screw of the device.
Step4 Follow the instructions accompanying the lightning arrester to connect the lightning arrester with a
conversion cable. When doing that, connect the external cable to the IN end while the network
conversion cable to the OUT end. Check that the status of the LEDs on the connected interface module
is normal.
Read the instructions carefully before installing a port lightning arrester.
Step5 Bundle the cables with cable ties neatly.
4-6
Figure 4-8 Install a port lightning arrester
Indoor Ethernet cables
Outdoor Ethernet cable
UTM device
Port lightning arrester
(stuck on the chassis)
Grounding cable of the
lightning arrester
Rack
Power input
Conversion cable
Grounding screw of the device
Precautions
To ensure the performance of a port lightning arrester, follow these guidelines:
zCorrectly connect the IN and OUT ends of the port lightning arrester.
Connect the IN end to the external cable and the OUT end to the Ethernet port of the device.
zEnsure that the port lightning arrester is well grounded.
Make sure that the grounding cable of the port lightning arrester be as short as possible and be well
connected to the grounding screw of the device. You need to check with a multimeter after
connection.
zInstall a lightning arrester for every port connected to an outdoor cable.
Installing a Power Lightning Arrester (Lightning Protection Busbar)
(Optional)
The U200 series devices are not shipped with lightning arresters for power supplies. You can purchase
one if needed.
Before connecting an outdoor AC power source directly to the device, install a lightning protection
busbar at the AC power input end and then connect the AC power cord to a lightning protection busbar
to protect the device against lightning strikes. You can use cable ties and screws to fasten the lightning
protection busbar on the rack, the workbench, or the wall in the equipment room.
4-7
Figure 4-9 Install a power lightning arrester
When connecting a power lightning arrester, follow these guidelines:
1) Make sure that the protection wire (PE) terminal of the power lightning arrester is well grounded
before using it.
2) After the AC power cord of the device is plugged into the multi-purpose socket of the power
lightning arrester (or a socket on a lightning protection busbar), check that the green LED is on and
the red LED is off to make sure that lightning protection can function normally.
3) If the red LED lights, identify the alarm cause and clear the alarm promptly. The red LED may light
because poor connection of the grounding cable or the live and zero wires are connected reversely.
To identify the alarm cause, you can use a multimeter to examine the polarity at the multi-purpose
socket of the power lightning arrester.
zIf the live and zero wires are on the left and right respectively (supposing that you are facing the
socket), the PE terminal of the power lightning arrester is not grounded.
zIf the live and zero wires are on the right and left respectively (supposing that you are facing the
socket), the polarity of the power socket of the power lightning arrester is reversed. In this case,
open the power socket to correct the polarity. If the red LED is still ON, you can determine that the
PE terminal of the power lightning arrester is not grounded.
Selecting and Installing a Signal Lightning Arrester (Optional)
The U200 series devices are not shipped with lightning arresters for signal components. You can
purchase one if needed.
Generally, before connecting a signal cable to a device, you need to connect the cable with a signal
lightning arrester to protect the device against transient overvoltage resulting from lightning strikes or
other interferences.
4-8
Serially connected to a signal cable, a signal lightning arrester must satisfy the requirements of network
performance indexes such as data transmission bandwidth, as well as the lightning protection
performance requirement. Therefore, before installing a signal lightning arrester, you need to consider
such performance indexes of the lightning arrester as lightning protection, bandwidth, transmission loss,
and port type.
Three signal lightning arrester options are available for the U200 series. Their specifications are as
follows:
z Maximum discharge current 2.5KA/protection voltage 25V–SMB-75J/SMB-75J–1W–10Mbps
z Maximum discharge current 2.5KA/protection voltage 25V–BNC-75K/BNC-75K–10Mbps
z Use with U-shape ports, maximum discharge current 3KA/common-mode 400V/differential mode
170V–RJ-11
zThe signal lightning arrester should be grounded as near as possible. The grounding resistance
must be less than 4 ohms. The grounding resistance must be less than 1 ohm if there are special
grounding requirements.
zConnect the grounding cable to the special-purpose grounding cable of the signal lightning arrester
and connect it to the earthing network, instead of connecting it to the lightning rod or lightning strip.
Connecting the Power Cable
Power Supply Port and PGND Terminal
A U200 series device only supports AC power input. The AC power socket and power switch are
located on the left of the front panel, as shown in
Figure 4-10 AC power socket of the U200-S
Figure 4-11 AC power socket of the U200-A/U200-M
Figure 4-10 and Figure 4-11.
For the specifications of the AC power socket, see
4-9
Table 4-2.
Table 4-2 Technical specifications of the AC power socket
Item
Rated voltage range 100 VAC to 240 VAC, 50 Hz or 60 Hz
Maximum input current 2 A 1.5 A
Maximum power 100 W 54 W
Connecting the AC Power Cord
AC power supply
Rated voltage range: 100 VAC to 240 VAC, 50 Hz or 60 Hz.
AC power socket
z Use a three-terminal, single-phase power connector with a grounding contact
z Ground the power supply reliably. Normally, the grounding contact of the power supply system in a
building was buried during construction and cabling.
zBefore connecting the AC power cord, make sure that the power supply of the building is well
grounded.
Specification
U200-A U200-M U200-S
Connection procedure
Follow these steps to connect the AC power cord:
Step1 Make sure that the PGND terminal is securely connected to the ground.
Step2 Connect one end of the supplied AC power cord to the power socket on the device, and the other end to
the power supply.
Step3 Check the status of the PWR LED on the front panel of the device. For the status of the power LED, see
Table 4-3.
Table 4-3 Status of the power LED
Status Description
Off No power supply is available or the power module is faulty.
On The power module works abnormally.
Take the U200-S for example:
4-10
Figure 4-12 Connect the AC power cord
(1) AC power socket (100 VAC to 240 VAC, 50/60 Hz, 1.5 A) (2) AC power connector
(3) AC power cord
Connecting Interface Cables
Connecting the Console Cable
Follow these steps to connect the console cable:
Step1 Select a configuration terminal.
The configuration terminal can be a standard ASCII terminal with an RS232 serial port, or a common
PC.
Step2 Connect the console cable.
Disconnect the power supply to the device. Connect the RJ-45 connector of the console cable to the
console port on the device, and the DB-9 (female) connector to the serial port on the configuration
terminal.
Step3 Power on the device after verifying the connection.
Verify the connection and power on the device. The configuration terminal displays the startup banner
of the UTM device if the connection is correct. For details, see the “Powering on the Device” section in
Chapter 5 “Starting and Configuring the U200 Series Device”.
Take the U200-S for example:
Figure 4-13 Connect the console cable
(1) Console port (CONSOLE) (2) RJ-45 connector (3) Console cable
(4) DB-9 (female) connector (5) Serial port on the configuration terminal
4-11
When connecting a PC to the device with the console cable, first connect the DB-9 connector to the
serial port on the PC, and then the RJ-45 connector to the console port on the device.
Connecting Ethernet Cables
Connecting an electrical Ethernet port
Step1 Connect one end of an Ethernet cable to an electrical Ethernet port on the UTM device and the other
end to the Ethernet port on the peer device. Because a 10/100/1000 Mbps fixed electrical Ethernet port
supports MDI/MDIX autosensing, you can use a straight-through cable or crossover cable to connect
the port.
Step2 Check the status of the LED of the fixed Ethernet port after power-on. For the status of the LED, see
Table 4-4.
Table 4-4 Status of the LED
LED Color Status
Off No link is present.
LINK
On A link is present.
Off No data is being transmitted or received.
ACT
Blinking Data is being transmitted or received.
Connecting an Ethernet Cable to the 2GE Module
You can connect a port on the 2GE module with a straight-through cable or crossover cable as follows:
Step1 Power off the device and then install the module into the corresponding interface module slot. For the
installation of a 2GE interface module, see the “Installing a Mini Card” section in Chapter 7 “Maintaining
Hardware.”
Step2 Use a straight-through or crossover network cable to connect an interface.
zTo connect the device to a PC or another UTM device, use a crossover cable. Connect one end of
the network cable to the Ethernet interface of the 2GE, module and the other end to the Ethernet
port on the PC or UTM device.
zTo connect the device to a hub or a LAN switch, use a straight-through cable. Connect one end of
the network cable to the Ethernet interface of 2GE, and the other end to the Ethernet port on the
hub or LAN switch.
Step3 Check that the connection is correct as follows:
zCheck the status LED of the interface module slot on the front panel: If the LED is on, the power-on
self test (POST) succeeds and the module is working normally; if the LED is off, POST fails and you
need to contact your sales agent for help.
4-12
zCheck that the status of the LEDs for the connected port is correct. For description of the LEDs on
the 2GE module, see Table 2-1 in Chapter 2 “Interface Modules.”
Currently, the U200-S supports only the 2GE interface module.
Connecting an Ethernet Cable to the NSQ1GT2UA0 Module
See the “Connecting an Ethernet Cable to the 2GE Module” section for reference.
Currently, the U200-A and the U200-M support only the NSQ1GT2UA0 interface module.
Connecting an SFP Module in the NSQ1GP4U0 Module
The NSQ1GP4U0 module can work with SFP optical modules or optical-to-electrical SFP modules.
zThe SFP optical modules are connected with optical fibers. See the “Interface cable” subsection in
the section talking about the NSQ1GP4U0 module in Chapter 2 “Interface Modules” for more
information about optical fibers.
zThe optical-to-electrical SFP modules are connected with straight-through or crossover Ethernet
cables. For how to connect an Ethernet cable, see the “
Module” section on page
4-12.
This section only covers how to connect an SFP optical module.
Follow these steps to connect an optical fiber to the NSQ1GP4U0 module:
Step1 Install the NSQ1GP4U0 module into the intended slot in the chassis. For the installation procedures,
see the “Installing a MIM Module” section in Chapter 7 “Maintaining Hardware.”
Step2 Insert an SFP module into an SFP interface on the NSQ1GP4U0 module.
Step3 Identify the Rx and Tx ports on the SFP module. Plug the LC connector at one end of one fiber cable
into the Rx port of the module and the LC connector at the other end into the Tx port of the peer device.
Plug the LC connector at one end of another fiber cable into the Tx port of the module and the LC
connector at the other end to the Rx port of the peer device.
Connecting an Ethernet Cable to the 2GE
Step4 Check the following after fiber cable connection:
zCheck the status of the corresponding slot LED on the front panel of the U200 series device. If the
LED is on, POST succeeds and the module works normally; if the LED is off, POST fails and you
need to contact your local sales agent.
4-13
zCheck the status of the LINK/ACT LED on the module panel. If the LED is on, an optical link is
present; if the LED is off, no optical link is present. In the latter case, the Rx and Tx ports may be
connected incorrectly, and you can try to change the positions of the LC connectors of the two fiber
optical cables at one end to remove the fault.
zNever stare into an open SFP interface on the interface module, because invisible rays may be
emitted from the SFP interface.
zCover the dust cover if no optical fiber connector is connected to the SFP interface.
Connecting an Antenna for the NSQ1WLAN0 Module
The NSQ1WLAN0 works with an antenna, which can be a 2.4 GHz or 5 GHz dual-frequency omni
antenna. For details about the supported antenna, see “Interface Cable” in the section talking about the
NSQ1WLAN0 module in Chapter 2 “Interface Modules.”
Follow these steps to install an antenna to the NSQ1WLAN0 module:
Step1 Install the NSQ1WLAN0 module into the corresponding slot. For the installation procedures, see
“Installing a Mini Card” in Chapter 7 “Maintaining Hardware”.
Step2 Fasten the antenna to the antenna interface by rotating the antenna clockwise.
Verifying Installation
Each time you power on your UTM device during installation, verify that:
zEnough space is available around the device for heat-dissipation and the workbench or rack is
sturdy enough.
z The power source meets the requirements of the device.
z The PGND cable of the device is correctly connected.
z The device is correctly connected to other devices, the configuration terminal for example.
To ensure performance and normal operation of your device, verify that all requirements are met after
installing it.
4-14
Table of Contents
5 Starting and Configuring the UTM Device ······························································································5-1
Setting Up a Configuration Environment·································································································5-1
Connecting a U200 Series Device to a Configuration Terminal······················································5-1
Setting the Parameters for the Console Terminal···········································································5-1
Power-On of the Device··························································································································5-4
Checklist Before Device Power-On·································································································5-4
Powering On the Device··················································································································5-4
Checklist/Operations After Power-On ·····························································································5-4
Startup Process·······································································································································5-5
Configuration Fundamentals···················································································································5-7
Command Line Interface·························································································································5-7
Features of the Command Line Interface························································································5-7
Management of Commands············································································································5-7
Logging In to a U200 Series Device Through a Web Browser·······························································5-8
i
5 Starting and Configuring the UTM Device
You can use only the console port to make initial configuration of a U200 series device.
Setting Up a Configuration Environment
Connecting a U200 Series Device to a Configuration Terminal
For how to connect a U200 series device to the configuration terminal, refer to “Connecting the Console
Cable” in Chapter 4 “Installing the U200 Series Device.“
and enter a connection name in the Connection Description dialog box, as shown below.
Figure 5-1 Create a connection
Step2 Select a connection port. Select a serial port from the Connect using drop-down list in the Connect to
dialog box, as shown below. Be sure to select the serial port to which the console cable is actually
connected.
5-1
Figure 5-2 Select a port for local configuration connection
Step3 Set serial port parameters.
Set the properties of the serial port in the COM1 Properties dialog box, as shown in
Table 5-1 Set serial port parameters
Item Value
Bits per second
Data bits
Parity
Stop bits
Flow control
To use the default settings, click Restore Defaults.
9600 bps (default)
8
None
1
None
Figure 5-3.
5-2
Figure 5-3 Set serial port parameters
Step4 Click OK after setting the serial port parameters to enter the HyperTerminal window, as shown below.
Figure 5-4 HyperTerminal window
Step5 Set HyperTerminal properties. In the HyperTerminal window, select File > Properties from the menu,
and select the Settings tab to enter the properties setting dialog box, as shown belo w . Select VT100 or
Auto detect from the Emulation drop-down list, and click OK to return to the HyperTerminal window.
5-3
Figure 5-5 Set the terminal type
Power-On of the Device
Checklist Before Device Power-On
Before powering on the device, check that:
z The power cord and ground cable are correctly connected.
z The voltage of the power source conforms to voltage requirement of the device.
z The console cable is correctly connected, the configuration terminal or PC is powered on, and the
emulation program is properly configured.
zIf an external CF card is needed to store applications, the CF card is properly installed.
Powering On the Device
Step1 Turn on the power source.
Step2 Turn on the power switch on the device.
Checklist/Operations After Power-On
After powering on the device, check that:
1) The LEDs on the front panel are normal.
The following table describes normal LED state s after the device is powered on.
5-4
Table 5-2 Normal LED states upon device power-on
LED State Meaning
PWR (green)
SLOT1/SLOT2/SLOT (green) On
SYS (green)
CF (green)
2) The fans work normally.
3) The buzzer beeps at power-on.
4) The configuration terminal displays information normally. You can see the startup window on the
local configuration terminal. For more information, see “
5) After the power-on self-test (POST), the system prompts you to press Enter. When the command
line prompt appears, the UTM device is ready to configure.
Startup Process
On
Slow blinking (1 Hz)
On
The power module is supplying power
normally.
A module is installed in the slot and
operating normally.
The mainboard is operating normally as
configured.
The host detects that the external CF card
works normally. In this state, you can
remove the CF card.
Startup Process” on page 5-5.
After power-on, the UTM device initializes its memory, and then runs the extended BootWare. The
following information appears on the terminal screen, taking the U200-A for example:
The information displayed on the terminal may vary with different BootWare versions.
Compiled Date : May 7 2008
CPU Type : XLS208
CPU L1 Cache : 32KB
CPU Clock Speed : 750MHz
Memory Type : DDR2 SDRAM
Memory Size : 1024MB
Memory Speed : 533MHz
5-5
BootWare Size : 1536KB
Flash Size : 32MB
CPLD Version : 1.0
PCB Version : Ver.A
BootWare Validating...
Press Ctrl+B to enter extended boot menu...
Press Ctrl+B at this prompt to enter the extended BootWare menu, or let the system start to
decompress the application program.
zTo enter the extended BootWare menu, press Ctrl+B as prompted within four seconds; otherwise,
the system will proceed with application decompression.
zIf you want to enter the extended BootWare menu after the system starts application
decompression, you need to restart the UTM device.
Starting to get the main application file--flash:/main.bin!................
This prompt indicates that the UTM device has entered user view and is ready to configure.
Configuration Fundamentals
The section covers the generic procedures that you need to follow to configure a U200 series device.
Step1 Before configuring the device, you should summarize the networking requirements, including the
networking objective, role of the device in the network, division of subnets, W A N type and tra nsmission
medium, network security policy and network reliability.
Step2 Based on the above requirements, draw a clear, complete network diagram.
Step3 Configure the WAN interface of the UTM device. First, configure the physical operating parameters (for
example, the baud rate and synchronous clock) of the interface according to the transmission medium
of the WAN. In the case of a dial-up interface, you also need to configure DCC parameters. Then,
configure the WAN type, data link layer protocol encapsulated on the interface, and related operating
parameters.
Step4 Configure the IP addresses of all the interfaces on the device according to the division of the subnets.
Step5 Configure routes. If it is necessary to enable a dynamic routing protocol, you need to configure related
operating parameters of the protocol.
Step6 Perform security configuration for the device if necessary.
Step7 Perform reliability configuration for the device if necessary.
For the configuration details of the protocols or functions of the device, refer to the related user
manuals.
Command Line Interface
Features of the Command Line Interface
A U200 series device is available with the command line interface (CLI) for you to configure, manage,
and maintain the device.
The CLI provides the following functions:
z Allows you to perform local configuration through the console port.
z Allows you to perform the local or remote configuration and directly log in to and manage other
UTM devices by using the telnet command.
z Provides online help, which is available by entering “?”.
z Provides network diagnostic tools, such as Tracert and Ping, for quick diagnosis of network
connectivity.
z Provides all kinds of detailed debugging information to help diagnose network faults.
z Supports the auto-complete function. If you enter a conflict-free part of a command, the command
will be interpreted. For example, you just need to enter dis for the display command.
zSupports the suggest function. For example, if you type dis and press Tab, all the commands
started with “dis” will be displayed.
Management of Commands
The command line interface of the UTM device provides plenty of configuration commands. All the
commands are grouped in system view. Each group corresponds to a view. You can switch between
different configuration views with commands. Normally, only certain commands can be executed in a
5-7
particular view. However, some commonly used commands, such as ping and display
current-configuration, can be executed in any view .
Logging In to a U200 Series Device Through a Web Browser
A U200 series device supports Web-based network management, which allows you to manage and
maintain the device with ease.
Your UTM device was delivered with the default Web logging information. You can use this default
information to log in to the Web page of your device. The default Web logging information includes:
z User name: admin
z Password: admin
z IP address: 192.168.0.1
Follow these steps to log in to your UTM device through a Web br owser:
Step1 Connect the UTM device.
Connect GigabitEthernet 0/0 of the UTM device to a PC using an Ethernet cable. For the connection of
the Ethernet cable, refer to “Connecting Ethernet Cables” in Chapter 4 “Installing the U200 Series
Device.”
Step2 Configure an IP address for the PC, ensuring the PC and the UTM device can ping through each other.
Set the IP address to any one but 192.168.0.1 within the range of 192.168.0.0/24. For example, set the
address to 192.168.0.2.
Step3 Launch the Web browser and input the login information.
Launch the Web browser on the PC. You are recommended to use IE 5.0 or a later version. Type
192.168.0.1 in the address bar and press Enter. The login dialog box appears, as shown in
Figure 5-6.
In this dialog box, enter your user name (admin), password (admin), verify code (which must b e exactly
the same as the displayed code string), language, and click Login.
Files Managed by a U200 Series Device························································································6-1
BootWare Program File···················································································································6-1
Application File································································································································6-1
Configuration Files···························································································································6-2
Software Maintenance Methods······································································································6-3
BootWare Main Menu······················································································································6-4
Serial Submenu·······························································································································6-6
Ethernet Submenu···························································································································6-7
File Control Submenu······················································································································6-8
BootWare Operation Submenu·······································································································6-8
Storage Device Operation Submenu·······························································································6-9
Upgrading BootWare and Application Through a Serial Interface··························································6-9
Introduction to Xmodem··················································································································6-9
Modifying Serial Interface Parameters··························································································6-10
Upgrading the Application·············································································································6-12
Upgrading BootWare·····················································································································6-13
Upgrading the Application Using TFTP·································································································6-15
Upgrading the Application Using TFTP on the BootWare Menu···················································6-15
Upgrading/Backing Up the Application with TFTP at the Command Line Interface ·····················6-18
Upgrading the Application with FTP······································································································6-20
Upgrading the Application with FTP on the BootWare Menu························································6-20
Upgrading the Application with FTP at the Command Line Interface···········································6-21
Maintaining Application and Configuration Files···················································································6-26
Displaying All Files ························································································································6-26
Setting the Application File Type···································································································6-27
Deleting a File································································································································6-28
Specifying a Configuration File for Next Startup···········································································6-29
Dealing With Password Loss················································································································6-30
BootWare Password Loss and Modification··················································································6-30
User Password Loss······················································································································6-30
Super Password Loss····················································································································6-31
Backing Up and Restoring BootWare···································································································6-32
Backing Up the Full BootWare ······································································································6-32
Restoring the Full BootWare ·········································································································6-33
Upgrading/Managing Configuration through the Web Interface···························································6-34
Introduction····································································································································6-34
Upgrading Software Through the Web Interface···········································································6-36
Upgrading the Signature Database and Maintaining Configuration Files·····································6-37
i
6 Maintaining Software
Overview
Files Managed by a U200 Series Device
Three types of files need to be managed on a U200 series device. They are:
z BootWare program file
z Application file
z Configuration file
BootWare Program File
The BootWare program file is used for booting applications upon device startup and is saved in flash
memory. A full BootWare program file includes two segments: basic and extended.
z Basic segment of BootWare is used to finish basic system initializa t i on.
z Extended segment of BootWare provides abundant human-computer interaction (HCI) functions
and can be used to upgrade the applications and boot the system.
zAfter the basic segment is booted, you can load and upgrade the extended segment on the menu
of the basic segment.
Application File
A U200 serie s device supports the Dual Image function. By default, the system defines three application
files for booting.
z Main application file
z Backup application file
z Secure application file
The three kinds of application files are stored in flash memory.
If you have loaded the three application files into flash memory, the system will boot using these three
files in order. For more information about application files, refer to the "
Configuration Files” section on page
The following gives the default names and types of the application files and their priorities for booting.
Maintaining Application and
6-26.
zMain application file. The default name is main.bin, and the file type is M. It is the default application
file used for booting.
zBackup application file. The default name is backup.bin, and the file type is B. When the system
fails to boot with the main application file, it attempts to boot with the backup application file.
zSecure application file. The default name is secure.bin, and the file type is S. When the system fails
to boot with the backup application file, it attempts to boot with the secure application file. If the boot
with the secure application file fails, the system displays a boot failure prompt.
Note that:
6-1
zThe application files for system boot can be type M, B and S, but not type N/A (that is, types other
than M, B, and S).
zYou can modify the name of an application file using commands after the application boots. You
can modify the type of application files of type M, B and N except for type S on the BootWare menu
or using commands after the application boots.
zThe secure application file is the last resort for system boot. You cannot change the type of the
secure application file, or change other types of files to the secure application file. You can only
download it using the BootWare menu.
zThere is only one file of the same type (M, B, or S) in flash memory. For instance, if there is a file of
type M+B on the CF card, there will not be other files of type M or B. If the type of another file is
changed to B, the original type M+B file changes to a file of type M.
Configuration Files
The configuration files store configuration information of the device. These files are displayed when you
view the BootWare information, but without file attributes. The default file attribute is N/A.
By default, the system defines three configuration files for booting:
z Main configuration file
z Backup configuration file
z Default configuration file
The three kinds of configuration files are stored on the CF card with the extension .cfg.
If you have loaded the three configuration files into the CF card, the system will boot with these three
files in order. For more information about configuration files, refer to "
Configuration Files” on page
6-26.
Maintaining Application and
The following gives the types of the configuration files and their priorities at a boot:
zMain configuration file. The file type is M. The system boots using the main configuration file by
default.
zBackup configuration file. The file type is B. When the boot using the main configuration file fails,
the system boots using the backup configuration file.
zDefault configuration file. The file type can be M, B or N. When the boot using the main and backup
configuration files fails, the system boots using the default configuration file. If the boot using the
default configuration file fails, the system boots without loading a configuration file. Devices of
different vendors have different default configuration file names. The main/backup attribute
configuration on the default configuration file is the same as that on common con figuration files. At
present, the name of the default configuration file of a U200 series device is startup.cfg.
Note that:
zThe configuration files for system boot can be type M, B and default configuration file of type N. The
non-default configuration files of type N (that is, neither M nor B) cannot be used for system boot.
zYou can modify the name of a configuration file using commands after the application boots. You
cannot modify the type of the default configuration file, but you can modify the file type of type M, B
and N configuration files using commands after the application boots.
zThere is only one file of the same type (M, or B) on the CF card. For instance, if there i s a file of type
M+B on the CF card, there will not be other files of type M or B. If the type of another file is changed
to B, the original type M+B file changes to a file of type M.
6-2
zThe configuration file name cannot be longer than 64 characters (including drive identifier and a
string terminator). If the drive identifier is “CF:/”, the file name can be at most [ 64 – 1 – 4 ] = 59
characters in length; or, errors will occur in file operation. Typically, the file name is recommended
to be not more than 16 characters.
zThe configuration file as a result of Web-based management is also saved in the CF card.
Currently, the device supports only the M type of configuration file, with a suffix of .xml.
Software Maintenance Methods
You can maintain software of a U200 series device either the Web interface of the command line
interface (CLI).
For the detailed description about software maintenance thro ugh the Web interface, refer to “
the Signature Database and Maintaining Configuration Files” on page
6-34.
Upgrading
In the CLI approach, the following two methods are available for software upgrading:
z Upgrade BootWare and applications using the Xmodem protocol through a serial interface.
z Upgrade applications using TFTP/FTP through Ethernet interface on BootWare menu or through
command lines.
zThe BootWare program is upgraded together with the Comware application. You do not need to
upgrade the BootWare separately. The system automatically upgrades the BootWare program to
the latest version if the current BootWare version is found to be inconsistent with the BootWare
version contained in the host application.
zCheck the current version of the BootWare and the Comware application before upgrading them.
For the association between the Comware application version and the Boot Ware program versi on,
refer to the version configuration information in Release Notes.
6-3
Figure 6-1 BootWare and Comware programs upgrade flow
Start
Comware application
Upgrade Comware ?
Y
Choose the right Comware application file
Choose an upgrade method
Through Ethernet
interface
Xmodem
TFTP
Upgrade
End
N
FTP
BootWare Menu
BootWare Main Menu
When the device is powered on, the system first initializes the memory. After the initialization, the
system, the U200-A for example, runs the extended BootWare, and the following information is
displayed on the console terminal:
The information displayed on the terminal may vary with different BootWare versions.
Compiled Date : May 7 2008
CPU Type : XLS208
CPU L1 Cache : 32KB
CPU Clock Speed : 750MHz
Memory Type : DDR2 SDRAM
Memory Size : 1024MB
Memory Speed : 533MHz
BootWare Size : 1536KB
Flash Size : 32MB
CPLD Version : 1.0
PCB Version : Ver.A
BootWare Validating...
Press Ctrl+B to enter extended boot menu...
Press Ctrl+B to enter the extended BootWare menu; otherwise, the system enters the self extraction
process of applications.
zYou must press Ctrl+B in four seconds when “Press Ctrl+B to enter extended boot menu” appears.
Otherwise, the system will read and decompress the application file instead of entering the
extended BootWare menu.
zAfter the system enters the self extraction process of applications, if you want to enter the extended
BootWare menu, you need to reboot the device.
zThe extended BootWare menu is referred to as BootWare main menu in this manual unless
otherwise specified.
Press Ctrl+B when “Press Ctrl+B to enter extended boot menu...” appears. The system displays:
Please input BootWare password:
Y ou can try up to three times to enter the correct BootW are pa ssword (the initial password is null). If you
fail to provide the correct password with three attempts, you need to reboot the system. After you type
the correct password, the system enters the BootWare main menu:
Note: The current operating device is cfa0
Enter < Storage Device Operation > to select device.
==================<EXTEND-BOOTWARE MENU>=====================
| <1> Boot System |
| <2> Enter Serial SubMenu |
| <3> Enter Ethernet SubMenu |
| <4> File Control |
| <5> Modify BootWare Password |
| <6> Skip Current System Configuration |
6-5
| <7> BootWare Operation Menu |
| <8> Clear Super Password |
| <9> Storage Device Operation |
| <0> Reboot |
=============================================================
Enter your choice(0-9):
The menu is described in the following table.
Table 6-1 BootWare main menu
Menu item Description
<1> Boot System Boot the system application from the CF card
<2> Enter Serial
SubMenu
<3> Enter Ethernet
SubMenu
<4> File Control
<5> Modify BootWare
Password
Enter the serial submenu.
Refer to the “
Serial Submenu” section on page 6-6.
Enter the Ethernet submenu.
Refer to the “
Ethernet Submenu” section on page 6-7.
File control submenu.
Refer to the “
File Control Submenu” section on page 6-8.
Modify the BootWare password.
Boot the system with the system configuration ignored.
<6> Skip Current
System Configuration
This is a one-time operation and therefore does not take effect at a reboot.
This option is useful when the password is lost.
<7> BootWare
Operation Menu
BootWare operation submenu.
Refer to the “
BootWare Operation Submenu” section on page 6-8.
Clear the super password.
<8> Clear Super
Password
The super password is used in user level switching.
No super password is set by default.
This setting is valid only for the first reboot of the device. At subsequent
reboots, you will be asked to provide the super password.
<9> Storage Device
Operation
<a> Reboot Reboot the device.
Serial Submenu
Select 2 on the BootWare main menu to enter the serial submenu, where you can upgrade the
application and BootWare with Xmodem.
The system displays:
=====================<Enter Serial SubMenu>==================
|Note:the operating device is flash |
| <1> Download Application Program To SDRAM And Run |
| <2> Update Main Application File |
| <3> Update Backup Application File |
| <4> Update Secure Application File |
Select the storage medium from which the system is to boot.
6-6
| <5> Modify Serial Interface Parameter |
| <0> Exit To Main Menu |
=============================================================
Enter your choice(0-5):
Items on this submenu are described in Table 6-2.
Table 6-2 BootWare serial submenu
Menu item Description
<1> Download Application Program To SDRAM
And Run
<2> Update Main Application File Upg rade the main application file.
<3> Update Backup Application File Upgrade the backup application file.
<4> Update Secure Application File Upgra de the secure application file.
<5> Modify Serial Interface Parameter Modify serial interface parameters.
<0> Exit To Main Menu Return to the BootWare main menu.
Ethernet Submenu
Select 3 on the BootWare main menu to enter the Ethernet submenu, where you can upgrade the
application and BootWare with FTP/TFTP.
The system displays:
==================<Enter Ethernet SubMenu>===================
|Note:the operating device is flash |
| <1> Download Application Program To SDRAM And Run |
| <2> Update Main Application File |
| <3> Update Backup Application File |
| <4> Update Secure Application File |
| <5> Modify Ethernet Parameter |
| <0> Exit To Main Menu |
| < Ensure The Parameter Be Modified Before Downloading! > |
=============================================================
Enter your choice(0-5):
Download the application to the SDRAM through
the serial interface and run the program.
Items in Ethernet submenu are described in the following table:
Table 6-3 Ethernet submenu
Menu item Description
<1> Download Application Program To SDRAM
And Run
Download the application to the SDRAM and run
the program.
<2> Update Main Application File Upg rade the main application file.
<3> Update Backup Application File Upgrade the backup application file.
<4> Update Secure Application File Upgra de the secure application file.
6-7
Menu item Description
<5> Modify Ethernet Parameter Modify Ethernet interface parameters.
<0> Exit To Main Menu Return to the BootWare main menu.
File Control Submenu
Select 4 on the BootWare main menu to enter the file control submenu, where you can view the
application files, modify file names, and delete files.
The system displays:
========================<File CONTROL>=======================
|Note:the operating device is flash |
| <1> Display All File(s) |
| <2> Set Application File type |
| <3> Delete File |
| <0> Exit To Main Menu |
=============================================================
Enter your choice(0-3):
Items on this submenu are described in the following table:
Table 6-4 File control submenu
Menu item Description
<1> Display All File Display all files
<2> Set Application File type Set the application file type
<3> Delete File Delete a file
<0> Exit To Main Menu Return to the BootWare main menu.
BootWare Operation Submenu
Select 7 on the BootWare main menu to enter the BootWare operation submenu:
==================<BootWare Operation Menu>==================
|Note:the operating device is flash |
| <1> Backup Full BootWare |
| <2> Restore Full BootWare |
| <3> Update BootWare By Serial |
| <4> Update BootWare By Ethernet |
| <0> Exit To Main Menu |
=============================================================
Enter your choice(0-4):
Items on this submenu are described in the following table:
6-8
Table 6-5 BootWare operation submenu
Menu item Description
<1> Backup Full BootWare Backup the full BootWare.
<2> Restore Full BootWare Restore the full BootWare.
<3> Update BootWare By Serial Upgrade BootWare through a serial interface
<4> Update BootWare By Ethernet Upgrade BootWare through Ethernet
<0> Exit To Main Menu Return to the BootWare main menu.
Storage Device Operation Submenu
Select 9 on the BootWare main menu to enter the storage device operation submenu:
====================<DEVICE CONTROL>=========================
| <1> Display All Available Nonvolatile Storage Device(s) |
| <2> Set The Operating Device |
| <3> Set The Default Boot Device |
| <0> Exit To Main Menu |
=============================================================
Enter your choice(0-3):
Items on this submenu are described in the following table
Table 6-6 Storage device operation submenu
Menu item Description
<1> Display All Available Nonvolatile Storage
Device(s)
Display all available nonvolatile storage devices
<2> Set The Operating Device Set the current operating device
<3> Set The Default Boot Device Set the default boot device
<0> Exit To Main Menu Return to the BootWare main menu
Upgrading BootWare and Application Through a Serial Interface
Introduction to Xmodem
Use Xmodem when upgrading BootWare or application through a serial interface.
Xmodem is a file transfer protocol that is widely used due to its simplicity and high performance.
Xmodem transfers files through a serial interface. It supports two types of data p ackets (128 bytes and
1 KB), two check methods (checksum and CRC), and error packet retransmission mechanism
(generally the maximum number of retransmission attempts is 10).
The Xmodem transmission procedure is completed by the cooperation of a receiving program and a
sending program. The receiving program sends a negotiation character to negotiate a packet check
method. After the negotiation, the sending program starts to transmit data packets. When receiving a
complete packet, the receiving program checks the packet using the agreed method.
6-9
zIf the check succeeds, the receiving program sends an acknowledgement character and the
sending program proceeds to send another packet.
zIf the check fails, the receiving program sends a negative acknowledgement character and the
sending program retransmits the packet.
Modifying Serial Interface Parameters
In actual applications, you need to make the serial interface baud rate higher to save upg rading time o r
make it lower to guarantee transmission reliability. This section introduces how to adjust the serial
interface baud rate.
Enter the BootWare main menu and sele ct 2 to enter the serial interface submenu, and then select 5 on
the submenu to modify the baud rate. The system displays the following:
=====================<Baudrate Avaliable>====================
|Note:'*'indicates the current baudrate |
| Change The HyperTerminal's Baudrate Accordingly |
|--------------------<Baudrate Avaliable>-------------------|
| <1> 9600(Default) * |
| <2> 19200 |
| <3> 38400 |
| <4> 57600 |
| <5> 115200 |
| <0> Exit |
=============================================================
Enter Your Choice(0-5):
Select a proper baud rate. For example, select 5 for a baud rate of 115200 bps and the system displays
the following information:
Baudrate has been changed to 115200 bps.
Please change the terminal's baudrate to 115200 bps, press ENTER when ready.
At this time, the baud rate of the serial interface of the device is modified to 1 15200 bps, while that of the
terminal is still 9600 bps. The device and the terminal cannot communicate with each othe r. Therefore,
you need to make the baud rate on the terminal consistent with that on the device.
Perform the following operations on the terminal:
Figure 6-2 Disconnect the terminal
Select File > Properties, and then click Configure… to change the bits per second to 115200.
6-10
Figure 6-3 Modify the baud rate on the terminal
Select Call > Call to establish a new connection.
Figure 6-4 Re-establish a call connection
Then, press the Enter key, and the system will prompt the current baud rate and return to the previous
menu.
The system displays:
The current baudrate is 115200 bps
After you download files to upgrade applications by changing the baud rate, restore the baud rate in the
HyperTerminal to 9600 bps in time, so as to ensure the normal display on the console screen when the
system boots or reboots.
6-11
Upgrading the Application
The application upgrade through a serial interface is implemented on the serial sub m enu.
Select 2 on the BootWare main menu to enter the serial submenu. For detailed description on this
submenu, refer to the “
The following example shows how to upgrade the main application file main.bin:
To improve the upgrading speed, you can modify the serial port baud rate before upgrading the main
application file (refer to the “
the serial port submenu, and the system prompts:
Please Start To Transfer File, Press <Ctrl+C> To Exit.
Waiting...CC
Select Transfer > Send file… in the terminal window. The following dialog box appears:
Figure 6-5 Send File dialog box
Serial Submenu” section on page 6-6.
Modifying Serial Interface Parameters” section on page 6-10). Select 2 on
Click Browse… to select the application to be downloaded, and select Xmodem from the Protocol
drop-down list. Then click Send and the following dialog box appears:
Figure 6-6 Sending file dialog box
After the file is downloaded, the following information appears on the terminal interface:
Download successfully!
11611272 bytes downloaded!
6-12
Then the system prompts you for the file name:
Input the File Name:
1) If the input file name, main.bin for example, is unique in the storage device, it is adopted and the
system displays:
After naming the application file, return to the BootWare main menu, enter the file control
submenu, and set the new file as the default for system boot. Thus the system will use this
application file at reboot. For how to set the default application file, refer to the “
the Application File Type” section on page
6-27.
Setting
2) If the input file name is the same as the name of a file in the storage device, the system displays:
The file is exist,will you recover it? [Y/N]
zSelect Y to overwrite the existing application file and complete the upgrade process. The system
will use the new application file when it reboots.
zSelect N, the system displays “Cancel to overwrite the file.Failed!” The upgrading attempt fails.
The size of the application is often over 10 MB. Even if the baud rate is 115200 bps, it will take about 30
minutes to upgrade the application through a serial interface. Therefore, you are recommended to
upgrade the application through Ethernet.
Upgrading BootWare
Enter the BootWare main menu, refer to “BootWare Main Menu“ on page 6-4. Select 7 to enter the
BootWare operation submenu, where you can perform all BootWare operations. For detailed
description on this submenu, refer to “
The following example shows how to upgrade the full BootWare:
To upgrade the entire BootWare, you need to upgrade the basic segment first and then the extended
segment.
Select 3 on the BootWare operation submenu. The system prompts:
BootWare Operation Submenu“ on page 6-8.
===========<BOOTWARE OPERATION SERIAL SUB-MENU>==============
| <1> Update Full BootWare |
| <2> Update Extend BootWare |
| <3> Update Basic BootWare |
| <4> Modify Serial Interface Parameter |
| <0> Exit To Main Menu |
=============================================================
Enter your choice(0-4):
First modify the baud rate of the serial interface to a higher speed. To do this, select 4 and set the baud
rate to 1 15200 bps. You also need to keep the baud rate on the terminal con sistent with that of the serial
interface. For details, refer to the “
Modifying Serial Interface Parameters” section on page 6-10.
6-13
After modifying the baud rate of the serial interface and the terminal, return to the BootWare operation
submenu and select 1, the system displays the following:
Please Start To Transfer File, Press <Ctrl+C> To Exit.
Waiting ...CCCCCCCCCCCCCCCCCCCCCCCCC...
Select Transfer > Send file… in the terminal window. The following dialog box appears:
Figure 6-7 Send File dialog box
Click Browse… to select the application file to be downloaded, and select Xmodem from the Protocol
drop-down list. Then click Send and the following dialog box appears:
Figure 6-8 Sending file dialog box
After the file is downloaded successfully, the following information appears on the terminal interface:
Not update the Basic!
Updating Extend BootWare? [Y/N]
The system stops upgrading the basic segment and asks whether to upgrade the extended segment.
zIf you select Y, the system continues upgrading the basic segme nt and displays:
6-14
Updating Basic BootWare...............Done!
Updating Extend BootWare? [Y/N]Y
The system succeeds in upgrading the basic segment and asks whether to upgrade the extended
segment:
z If you select N, the system completes the upgrade without upgrading the extende d segment.
z If you select Y, the system proceeds to upgrade the extended segment:
Updating Extend BootWare.................Done!
The entire BootWare is thus upgraded succe ssfully.
The file name, size and path in the above figures are used as examples only. When you upgrade the
application and BootWare, ensure that you are using the correct version and files.
Upgrading the Application Using TFTP
When the application file is large, you can upgrade it using TFTP to save upgrade and maintenance
time.
Trivial File Transfer Protocol (TFTP), a protocol in the TCP/IP protocol suite, is used for trivial file
transfer between client and server . It provides not-so -complex and low-cost file tran sfer services. TFTP
provides unreliable data transfer services over UDP and does not provide any access authori zation and
authentication mechanism. It employs timeout and retransmission to guarantee successful data
delivery.
The U200 series can serve as the TFTP client. Therefore the file server serves as the TFTP server . You
can upload/download the application file on the device to/from the file server.
There are two approaches to upgrading application files using TFTP:
z Using the BootWare menu
z Using command lines.
Upgrading the Application Using TFTP on the BootWare Menu
Step1 Set up a TFTP upgrade environment (taking the U200-S for example)
6-15
Figure 6-9 Set up a TFTP upgrade environment
z The U200-S serves as the TFTP client, and PC serves as the TFTP server.
z Connect Ethernet interface GigabitEthernet 0/0 on the U200-S to the PC using a crossover
Ethernet cable. Ensure the connectivity between the U200-S and the PC. In this example, the IP
address of GigabitEthernet 0/0 on the client is 192.168.80.10 and t hat of the PC is 192.168.80.200.
z Enable TFTP Server on PC and set the path where the application file is stored.
z The U200 series are not available with TFTP Server software. You need to purchase and install
one yourself.
zYou can upgrade the applications of the U200 series through GigabitEthernet 0/0 only.
Step2 Configure Ethernet interface parameters on the BootWare menu.
Enter the BootWare main menu and select 3 to enter the Ethernet submenu, where you can select 5 to
enter the Ethernet Parameter Set menu to set the Ethernet parameters.
==================<ETHERNET PARAMETER SET>===================
| Note: '.' = Clear field. |
| '-' = Go to previous field. |
| Ctrl+D = Quit. |
=============================================================
Protocol (FTP or TFTP):tftp
Load File Name :main.bin
:utm.bin
Target File Name :main.bin
:utm.bin
Server IP Address :192.168.80.200
Local IP Address :192.168.80.10
6-16
Gateway IP Address :
FTP User Name :
FTP User Password :
Table 6-7 Description on the display information of setting Ethernet interface parameters
Display information Description
'.' = Clear field Shortcut key . is used to clear the current input.
'-' = Go to previous field Shortcut key - is used to return to the previous field.
Ctrl+D = Quit Shortcut key Ctrl+D is used to quit the parameter setting page.
Protocol (FTP or TFTP) Choose to upgrade application programs using TFTP/FTP
Name of the download file, which needs to be the same with that of
the actual file to be downloaded.
At the same time, you need to set the download path in TFTP/FTP.
Note that:
Load File Name
zThe first “main.bin” is the file name automatically remembered by
the system at the last update; the second “main.bin” is the so urce
file name set by the user.
zAn application file name including the extension such as .bin,
cannot exceed 50 characters.
Name of the target file after the file is downloaded to the device. The
extension of the target file needs to be the same with that of the
Target File Name
downloaded file.
Note that the first “main.bin” is the file name automatically
remembered by the system at the last update; the second “main.bin ”
is the source file name set by the user.
Server IP Address IP address of the FTP/TFTP server.
Local IP Address IP address of the interface connected with the FTP/TFTP server.
Gateway IP Address IP address of the gateway. You need not configure this IP address.
FTP User Name
FTP User Password
FTP username, which will be used in FTP download. TFTP
download needs no username.
FTP password, which will be used in FTP download. TFTP needs no
password.
To use the default parameter after the colon, press Enter directly.
Step3 After the above configuration, the system will automatically return to the Ethernet submenu, where you
can select 2 to upgrade the main application file.
Step4 After the upgrade is finished, select 0 to return to the BootWare main menu, where you can select 1 to
reboot the system from flash memory.
zIf the input application file name is the same with the name of a file on flash memory, the system
prompts “The file exists, will you recover it? [Y/N]”. If you select Y, the input application file will
overwrite the one on flash memory. The upgraded application file will directly replace the original
one of this type and become the only application file.
zMake sure the available space on the CF card is sufficient. O r, the system prompts “The free space
isn't enough!”
zRefer to the “Overview” section on page 6-1 for detailed description on file types.
Upgrading/Backing Up the Application with TFTP at the Command Line Interface
Step1 Set up a TFTP upgrade environment.
z The U200 series serves as the TFTP client, and PC serves as the TFTP server.
z For the procedure of setting up an upgrade environment, refer to step 1 in the “Upgrading the
Application Using TFTP on the BootWare Menu” section on page
zRun the terminal emulation program on the PC, and then configure the IP addresses of the client
and sever to be on the same network segment. Ensure the connectivity between the U200 series
and the PC. In this example, the IP address of GigabitEthernet 0/0 on the client is 192.168.80.10
and that of the server is 192.168.80.200.
zYou can use the ping command to check whether the connection is successful.
You can upgrade the application of the U200 series through GigabitEthernet 0/0 only.
Step2 View the files saved in the storage medium and its available space.
Use the dir command on the console terminal to view the files contained in the current file system, and
the available space of the storage device.
6-15.
<H3C>dir
Directory of flash:/
0 -rw- 11611272 May 13 2008 13:21:20 main.bin
1 -rw- 4722 May 26 2008 12:55:42 config.cfg
2 -rw- 1128 May 27 2008 11:07:24 startup.cfg
3 -rw- 10129712 May 27 2008 10:26:02 update.bin
4 drw- - May 02 2008 18:28:14 logfile
6-18
62472 KB total (41855.5 KB free)
<H3C>
Table 6-8 Description on the display information of the dir command
Display information Description
'.' Directory of flash:/ Name of the current directory.
62472 KB total (41855.5 KB free) Used space of flash memory (available space)
Step3 Upgrade the application.
Using TFTP, you can download an application file from the server to the U200 series device, and
overwrite the original main application file to implement the application program upgrade. The upgraded
application file takes effect when the device reboots.
# Download application file main.bin from the TFTP server to the device.
<H3C> tftp 192.168.80.200 get main.bin main.bin
The file main.bin exists. Overwrite it? [Y/N]:y
Verifying server file...
Deleting the old file, please wait...
File will be transferred in binary mode
Downloading file from remote TFTP server, please wait... \
TFTP: 11611272 bytes received in 65 second(s)
File downloaded successfully.
zWhen you download an application file, if a file having the same name with the downloaded file
exists on the U200 series device, the system prompts whether to overwrite the file on the device.
You need to select Y or N for confirmation.
z For details about the tftp command, see the accompanying documentation.
z You can upgrade a configuration file using the same method as upgrading an application file. A
configuration file can be modified by a text editor. You can modify a configuration file and then
download the modified configuration file to the device, and the modification takes effect after the
device reboots.
Step4 Back up an application file
Using TFTP, you can back up an application file by uploading it to the server.
# Upload file main.bin from the device to the server, and save it as main.bin.
<H3C> tftp 192.168.80.200 put main.bin main.bin
File will be transferred in binary mode
Sending file to remote tftp server. Please wait...\
TFTP: 11611272 bytes sent in 18 second(s).
6-19
File uploaded successfully.
zWhen you backup an application file, if a file having the same name with the file to be backed up
exists on the server, the system overwrites the file on the server directly.
zYou can backup a configuration file using the same method as backing up an application file.
Upgrading the Application with FTP
When the application file is large, you can also upgrade it using FTP to save upg rade and maintenance
time.
File Transfer Protocol (FTP) is an appli cation layer protocol in the TCP/IP suite. It is mainly used for file
transfer between remote hosts. FTP provides reliable and connection-oriented data transfer service
over TCP. Compared with TFTP, the FTP software is much bigger.
There are two approaches to upgrading an application file using FTP:
zUsing the BootWare menu. In this approach, the U200 series device can serve as the FTP client
only.
zUsing command lines. In this approach, the U200 series device can serve a s either the FTP server
or the FTP client.
Upgrading the Application with FTP on the BootWare Menu
Step1 Set up an FTP upgrade environment.
Figure 6-10 Set up an FTP upgrade environment
zThe U200 series device serves as the FTP client, and PC serves as the FTP server.
6-20
zConnect GigabitEthernet 0/0 on the device to the PC using a crossover Ethernet cable. Ensure the
connectivity between the device and the PC. In this example, the IP address of GigabitEthernet 0/0
is 192.168.80.10 and that of the PC is 192.168.80.200.
z Enable FTP Server on PC and set the path where the application file is stored.
z Set the FTP username and password.
z The U200 series devices are not available with FTP server software. You need to purchase and
install one yourself.
zYou can upgrade the application of the U200 series device throug h GigabitEthe rnet 0/0 only.
For the subsequent steps, refer to the corresponding steps in TFTP upgrading.
Upgrading the Application with FTP at the Command Line Interface
U200 series device servers as FTP client; PC serves as FTP server
Step1 Set up the upgrade environment, refer to “Set up an FTP upgrade environment.” on page 6-20.
Step2 Use the dir command on the console terminal to view the files contained in the current file system, and
the available space of the storage device. For details, refer to step 2 in “
Application with TFTP at the Command Line Interface” on page
6-18.
Upgrading/Backing Up the
Step3 Enable FTP server on the PC, configure the path where the application file is stored, and set the FTP
username and password. In this example, the username is guest, and the password is 123456.
Step4 Log in to the FTP server.
<H3C>ftp 192.168.80.200
Trying 192.168.80.200 ...
Press CTRL+K to abort
Connected to 192.168.80.200.
220 3Com 3CDaemon FTP Server Version 2.0
User(192.168.80.200:(none)):guest
331 User name ok, need password
Password:
230 User logged in
[ftp]
After you log into the server, you can upgrade an application file through command lines.
Table 6-9 Description on the information displayed when the FTP client logs into the FTP server
Display information Description
ftp 192.168.80.200 Log into the FTP server, and enter FTP client view.
User(192.168.80.200:(none)) Input the username configured on the FTP server.
331 User name ok, need password Input the password.
230 User logged in You have logged into the FTP server successfully.
6-21
Step5 Upgrade an application file.
Using FTP, you can download an application file from the server to the device, and overwrite the original
main application file to upgrade the application. The upgraded application file takes effect when the
device reboots.
# Download file main.bin from the FTP server to the device and save it as main.bin.
[ftp]get main.bin main.bin
flash:/main.bin has been existing. Overwrite it? [Y/N]:y
227 Entering passive mode (192,168,80,200,5,33)
125 Using existing data connection
226 Closing data connection; File transfer successful.
FTP: 11611272 byte(s) received in 472.515 second(s), 23.00K byte(s)/sec
zWhen you download an application file, if a file having the same name with the downloaded file
exists on the device, the system prompts whether to overwrite the file on the device. You need to
choose Y or N for confirmation.
z For details about the get command, see the accompanying documentation.
z You can upgrade a configuration file using the same method as upgrading an application file. A
configuration file can be modified by a text editor. You can modify a configuration file and then
download the modified configuration file to the device, and the modification takes effect after the
device reboots.
Step6 Back up an application file.
Using FTP, you can backup an application file by uploading it to the server.
# Upload file main.bin from the device to the server, and save it as main.bin.
[ftp]put main.bin main.bin
227 Entering passive mode (192,168,80,200,5,34)
125 Using existing data connection
226 Closing data connection; File transfer successful.
FTP: 11611272 byte(s) sent in 172.505 second(s), 63.00Kbyte(s)/sec
[ftp]quit
221 Service closing control connection
zWhen you back up an application file, if a file having the same name with the file to be backed up
exists on the server, the system overwrites the file on the server directly.
z For details about the put command, see the accompanying documentation.
z You can backup a configuration file using the same method as backing up an application file.
6-22
Table 6-10 Description on display information for update and backup of an application file on the device
Display information Description
[ftp]get main.bin main.bin Download the file used for upgrade
flash:/main.bin has been existing. Overwrite it?
[Y/N]:y
FTP: 11611272 byte(s) received in 472.515
second(s), 23.00K byte(s)/sec
[ftp]put main.bin main.bin
FTP: 4722 byte(s) sent in 0.074 second(s),
63.00Kbyte(s)/sec
The system prompts whether to overwrite the
existing file.
Download and upgrade of the application file is
finished.
Upload the file from the U200 series device to
the server.
Upload and backup of the application file is
finished.
[ftp]quit Quit FTP client view.
221 Service closing control connection Close the service control connection.
U200 series device servers as FTP server; PC serves as FTP client
Step1 Set up an FTP upgrade environment.
Figure 6-11 Set up an FTP upgrade environment
z Connect GigabitEthernet 0/0 on the device to the PC using a crossover Ethernet cable.
z Configure the IP addresses of the server and client to be on the same network segment and ensure
connectivity between them. In this example, the IP address of GigabitEthernet 0/0 is 192.16 8.80.10,
and that of the PC is 192.168.80.200.
zYou can use the ping command to check whether the connection is successful.
6-23
You can upgrade the application of the U200 series devices through GigabitEthernet 0/0 only.
Table 6-11 Description on the display information of enabling the FTP service
Display information Description
ftp server enable Enable the FTP server function.
local-user guest Create a local user, and enter user view.
service-type ftp Set the service type that can be used locally to FTP.
password simple 123456 Configure the user password.
authorization-attribute level 3 Set the user level to 3.
zThe FTP service is enabled after the authentication and authorization of the FTP server are
configured. The FTP server supports multi-client access. A remote FTP client sends a request to
the FTP server. The FTP server executes an action accordingly and returns the e xecution result to
the client.
zAfter you configure the FTP server authentication and authorization, you need to set the user level
to 3. Otherwise, the system displays that “You have no rights to store files” when you restore the
backed-up file to the device. For configurations of user levels, refer to the accompanying
documentation.
Step3 Enable the FTP client program on the PC.
In the following example, the FTP client program is the built-in Windows XP FTP client:
Enter ftp in the DOS window:
C:\Documents and Settings\Administrator>ftp
ftp>
ftp> open 192.168.80.10
Connected to 192.168.80.10.
220 FTP service ready.
6-24
User (192.168.80.10:(none)): guest
331 Password required for guest
Password:
230 User logged in.
Table 6-12 Description on the display information of enabling FTP server
Display information Description
C:\Documents and Settings\Administrator>ftpEnable the FTP client program on the PC.
ftp> open 192.168.80.10 In FTP client view, log into the IPv4 FTP server.
User (192.168.80.10:(none)) Input the username configured on the FTP server.
331 Password required for guest Input the password.
230 User logged in You have logged into the FTP server successfully.
Step4 Upgrade an application file.
Using FTP, you can upload an application file from the client to the server (the U200 series device), and
overwrite the original main application file to implement the application upgrade. The upgraded
application file takes effect when the device reboots.
# Upload file main_.bin from the PC to the device, and saves it as main.bin.
ftp> binary
200 Type set to I.
ftp> lcd d:\update
Local directory now D:\update.
ftp> put main_.bin main.bin
200 Port command okay.
150 Opening BINARY mode data connection for main.bin.
226 Transfer complete.
zWhen you upgrade an application file, if a file having the same name with the uploaded file exists
on the server, the system overwrites the file on the server directly.
z For details about the put command, refer to the accompanying documentation.
z You can upgrade a configuration file using the same method as upgrading an application file. A
configuration file can be modified by a text editor. You can modify a configuration file and then
download the modified configuration file to the device, and the modification takes effect after the
device reboots.
Step5 Back up an application file.
Using FTP, you can back up an application file by downloading it from the server to the client.
# Download file main.bin from the device to the PC, and save it as main_.bin.
ftp> get main.bin main_.bin
200 Port command okay.
6-25
150 Opening BINARY mode data connection for main.bin.
226 Transfer complete.
zWhen you download an application file, if a file having the same name with the downloaded file
exists on the PC, the system prompts whether to overwrite the file on the PC. You ne ed to ch oose
Y or N for confirmation.
z For details about the get command, refer to the accompanying documentation.
z You can backup a configuration file using the same method as backing up an application file.
Table 6-13 Description on the display information of enabling FTP server
Display information Description
ftp> binary
Change the transmission mode to binary.
The ASCII mode is adopted by default.
ftp> lcd d:\update Change the local directory.
ftp> put main_.bin main.bin Upload the file from the PC to the device.
ftp> get main.bin main_.bin Download the file from the device to the PC.
Maintaining Application and Configuration Files
You can modify and display a file type on the file control submenu.
Select 4 on the BootWare main menu to enter the file control submenu. The system displays:
========================<File CONTROL>=======================
|Note:the operating device is flash |
| <1> Display All File(s) |
| <2> Set Application File type |
| <3> Delete File |
| <0> Exit To Main Menu |
=============================================================
Enter your choice(0-3):
Displaying All Files
Displaying all files on the BootWare menu
Select 1 on the file control submenu, and the system displays:
Display all file(s) in flash:
'M' = MAIN 'B' = BACKUP 'S' = SECURE 'N/A' = NOT ASSIGNED
=========================================================================
|NO. Size(B) Time Type Name |
|1 10129712 Apr/11/2008 05:39:50 M flash:/main.bin |
|2 1227 May/11/2008 16:25:52 N/A flash:/startup.cfg |
0 drw- - Jun 11 2008 19:09:42 logfile
1 -rw- 11611272 Jun 13 2008 13:21:20 main.bin
2 -rw- 1128 Jun 27 2008 11:07:24 startup.cfg
3 -rw- 558 Jun 11 2008 20:20:38 config.cfg
4 -rw- 558 Jun 11 2008 20:23:10 config_bac.cfg
506336 KB total (506272 KB free)
Table 6-14 Description on the display information of the dir command
Display information Description
Directory of flash:/ Name of the current directory.
506336 KB total (506272 KB free) Used space of the storage medium (available space)
For details about the dir command, refer to the accompanying documentation.
Setting the Application File Type
Setting application file type on the BootWare menu
You can modify the type of application files on the BootWare menu or using commands after the
application files boot; you cannot modify the type of an application file of type S. For more information
about the attributes of each type of application file, refer to the “
Select 2 on the file control submenu, and the system displays:
'M' = MAIN 'B' = BACKUP 'S' = SECURE 'N/A' = NOT ASSIGNED
======================================================================
1NO. Size(B) Time Type Name 1
11 10129712 Jun/11/2008 05:39:50 B flash:/main.bin 1
12 10129712 Jun/11/2008 05:39:50 M flash:/main_bak.bin 1
10 Exit 1
======================================================================
Enter file no:
Application File” section on page 6-1.
Enter the file number, select 1, and the system displays:
| <3> +Backup |
| <4> -Backup |
| <0> Exit |
Enter your choice(0-4):
You can set the file type to M (main) or B (backup) or cancel the setting by selecting 1 to 4.
In this example, you can select 1 to modify the file type of main.bin from B to M+B.
Set the file attribute success!
Then the file type of main_bak.bin automatically changes from M to N/A.
Setting application file type through the CLI
Take the files main.bin and main_bak.bin for example:
# Change the type of main.bin from B to M+B.
<H3C> boot-loader file main.bin main
This command will set the boot file. Continue? [Y/N]:
The specified file will be used as the main boot file at the next reboot on slot 0!
By now, the type of main.bin has been changed to M+B, and the file has become the main application
file for the next startup. In addition, the type of main_bak.bin automatically changes from M to N/A.
You can display all the files in the file control submenu to verify the type of these two files.
Select 2 on the file control submenu and the system displays:
'M' = MAIN 'B' = BACKUP 'S' = SECURE 'N/A' = NOT ASSIGNED
=====================================================================
|NO. Size(B) Time Type Name |
|1 11673608 Jun/15/2008 05:39:50 M+B flash:/main.bin |
12 11673608 Jun/15/2008 05:39:50 N/A flash:/main_bak.bin |
|0 Exit |
=====================================================================
Enter file No:
For details about the boot-loader command, refer to the accompanying documentation.
Deleting a File
Deleting a file on the BootWare menu
Step1 Select 3 on the file control submenu, and the system displays:
Deleting the file in flash:
'M' = MAIN 'B' = BACKUP 'S' = SECURE 'N/A' = NOT ASSIGNED
=========================================================================
|NO. Size(B) Time Type Name |
|1 10129712 Apr/11/2008 05:39:50 B flash:/main.bin |
|2 1227 May/11/2008 16:25:52 N/A flash:/startup.cfg |
Step2 Enter the file number, select 4, and the system prompts:
The file you selected is flash:/~/startup_bac.cfg,Delete it? [Y/N]
Step3 Select Y, and the system displays the following information:
Deleting.........
Done!
Deleting a file using the command line
Y ou can delete a file using the delete [ /unreserved ] file-url command in user view. file-url specifies the
file to be deleted, and /unreserved indicates to delete the file permanently.
For details about the delete and undelete commands, refer to the accompanying documentation.
Specifying a Configuration File for Next Startup
You can specify a configuration file for next startup in two approaches:
zUse the save command in any view to save the current configurations to the specified config uration
file in interactive mode and rename the configuration file. The system automatically sets this new
configuration file as the one used at next startup.
zUse the startup saved-configurationcfgfile command in user view. Note that the startup
configuration file must be saved in the root directory of flash memory.
# Specify a configuration file for next startup.
<H3C> startup saved-configuration testcfg.cfg
Please wait .......
...Done!
6-29
Use the display startup command to verify the configuration.
<H3C> display startup
Current startup saved-configuration file: flash:/startup.cfg
Next startup saved-configuration file: flash:/testcfg.cfg
For details about the save and startup saved-configurationcfgfile commands, refer to the
accompanying documentation.
Dealing With Password Loss
When the BootWare password, user password or super password is lost, resort to the following
methods:
BootWare Password Loss and Modification
If you lose your BootWare password of the U200 seri es device, contact your sales agent.
You can modify the BootWare password in the BootWare main menu.
Select option 5. The system displays:
please input old password:
Enter your old password at this prompt.
please input old password: ******
In case you enter a wrong password, the system displays “Wrong password, Please input password
again:” If you fail to provide the correct password after three consecutive attempts, the system will halt,
prompting “Wrong password, system halt.”
After you enter the old password correctly, the system prompts you to enter the same new password
twice.
Please input new password: ******
Please input new password again: ******
You succeed in modifying the password if the system displays:
Password Set Successfully.
User Password Loss
If you lose your password, you cannot enter the system. In this case, you can boot the system by
ignoring the system configuration. Perform the following operations:
6-30
Step1 Enter the BootWare main menu, and select 6 to boot the system by ignoring the system configuration.
The system prompts:
Flag Set Successfully.
The system prompts that the setting succeeds.
Step2 When the BootWare main menu appears again, select 0 to reboot the system.
System is rebooting now.
System start booting...
Booting Normal Extend BootWare....
Step3 Set a new password in system view after system reboot.
The above information indicates that the password authentication is adopted on the console interface
and the password is set to 123456 and stored in plain text.
zAfter reboot, the system runs with the initial default configuration, but the original configuration file
is still stored in the storage medium. To restore the original configuration, you can use the display saved-configuration command to display the configuration, and then copy and execute the
configuration.
zIf the password is stored in plain text, you can use the display current-configuration command to
view the password in the current configuration. If the password 123456 is set with the set
authentication password cipher command, the password is stored in cipher text.
Step4 Save the new password.
[H3C] save
z Execute the save command after modifying the user password to save the new password.
z You are recommended to save the modification to the configuration file used by default.
Super Password Loss
The super password enables you to switch between four super levels. In the case of super password
loss, you cannot perform higher level operations.
You can clear the super password by selecting 8 on the BootWare main menu.
6-31
==================<EXTEND-BOOTWARE MENU>=====================
| <1> Boot System |
| <2> Enter Serial SubMenu |
| <3> Enter Ethernet SubMenu |
| <4> File Control |
| <5> Modify BootWare Password |
| <6> Skip Current System Configuration |
| <7> BootWare Operation Menu |
| <8> Clear Super Password |
| <9> Storage Device Operation |
| <0> Reboot |
=============================================================
Enter your choice(0-9):8
The system displays the following information indicating that you have successfully cleared the super
password.
Clear Application Password Success!
z Select option 8, quit the menu, reboot the device, and then you can enter system view directly.
z This setting (password clearing) is valid only for the first reboot of the device. The super password
will be restored after a second reboot.
Backing Up and Restoring BootWare
Select 7 on the BootWare main menu to enter the BootWare operation submenu. Refer to “BootWare
Operation Submenu” on page
Backing Up the Full BootWare
Backing up the full BootWare using BootWare menu options
To backup a full BootWare, you need to backup the basic segment and then the extended segment.
Select 1 on the BootWare operation submenu, and the system prompts:
Will you backup the Basic BootWare? [Y/N]
6-8 for details.
Select Y:
Begin to backup the Basic BootWare....................
Done!
At this moment, backup for the basic segment is finished.
The system continues to prompt:
Will you backup the Extend BootWare? [Y/N]
Select Y:
Begin to backup the Extend BootWare....................
6-32
Done!
At this moment, backup for the extended segment is finished.
Both the basic and extended BootWare are backed up to flash memory.
Backing up the full BootWare using the CLI
<H3C>bootrom backup
Now backuping bootrom, please wait...
Backup bootrom! Please wait...
Read normal basic bootrom completed!
Backup normal basic bootrom completed!
Read normal extend bootrom completed!
Backup normal extend bootrom completed!
Backup bootrom completed!
Restoring the Full BootWare
Storing the full BootWare using BootWare menu options
Select 2 on the BootWare operation submenu to overwrite the BootWare in the system with the
BootWare stored in flash memory. To restore a full BootWare, you need to restore the basic segment
and then the extended segment.
Will you restore the Basic BootWare? [Y/N]
Select Y:
Begin to restore Normal Basic BootWare....................
Done!
At this moment, restoration of the basic segment is finished.
The system continues to prompt:
Will you restore the Extend BootWare? [Y/N]
Select Y:
Begin to restore Normal Extend BootWare....................
Done!
At this moment, restoration of the extended segment is finished.
Storing the full BootWare using the CLI
<H3C>bootrom restore
This command will restore bootrom file, Continue? [Y/N]:y
Upgrading/Managing Configuration through the Web Interface
Introduction
The U200 series devices are available with a web interface for you to upgrade and maint ain the devices
with ease. At this Web interface, you can:
z Upgrade software
z Upgrade the signature database
z Maintain configuration files
About software upgrade
At the web interface, you can upgrade software, specify the main/backup software, and remove
software files.
Software upgrade is performed with TFTP (see
Figure 6-12). Therefore, to download a software
upgrade file from a TFTP server, you must set the IP addresses of your U200 series device (the TFTP
client) and the TFTP server correctly and ensure that they are reachable to each other.
Figure 6-12 Network diagram for TFTP configuration
On the TFTP client and the TFTP server, make configuration as shown in
Table 6-15.
Table 6-15 Configuration for TFTP file transfer
Role Configuration
TFTP server (a PC)
Enable TFTP server on the PC and configure the TFTP working
directory
TFTP client (the U200 series
device)
Assign an IP address to the interface connected to the TFTP client
and ensure that the route between the TFTP client and the TFTP
server is reachable.
6-34
About signature database upgrade
The signature database records the traffic patterns of known attacks exploiting various protocols. To
keep the effectiveness of your U200 series device as a security dev ice, you must upgrade the signature
database timely to include latest updates.
You can manually or automatically upgrade the signature database:
zAutomatic upgrade allows the system to download the latest signature database automatically at
regular intervals.
zManual upgrade allows you to upgrade the signature database as needed. You can configure the
protocol for downloading the signature database, address of the server, and name of the signature
database. Moreover, you can download a compatible signature database of any version.
zSignature database version is specific to device software version. To ensure a successful upgrade,
make sure that the new signature database is compatible with the current software before
upgrading the signature database.
zTo ensure a successfully upgrade, you must check that the current license is legitimate and valid in
addition.
About configuration file maintenance
At the Web interface, you can perform the following operations to maintain configuration files:
z Backing up the current configuration file as an encrypted and compressed file.
z Saving compressed configuration files to the local device.
z Uploading a compressed configuration file from the local device to the U200 series device.
z Importing a compressed configuration file to the U200 series device and rebooting the device to
bring the configuration file into effect.
If multiple devices in your network share similar configurations, you can export the configuration file of a
device to the local device, and then import it to the other devices instead of configuring them one by
one.
zTo use the configuration file exported from another device on the current device, you must make
sure that the current device is using the same software version, product version, and license file
used by the source device at the time when the configuration file was exported. Otherwise, loading
configuration file will fail.
zYou cannot activate configuration while a compressed configuration file is being imported or
exported.
zAt the Web interface, you cannot maintain the configuration of high availability, login settings,
management port, interfaces, and system thresholds.
6-35
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.