No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address:Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website:http://www.huawei.com
Email:support@huawei.com
Issue 01 (2011-07-15)Huawei Proprietary and Confidential
This document provides the basic concepts, configuration procedures, and configuration
examples in different application scenarios of the Ethernet feature supported by the S7700
device.
This document describes how to configure the Ethernet feature.
This document is intended for:
lData configuration engineers
lCommissioning engineers
lNetwork monitoring engineers
lSystem maintenance engineers
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol
Description
Indicates a hazard with a high level of risk, which if not
avoided, will result in death or serious injury.
Indicates a hazard with a medium or low level of risk, which
if not avoided, could result in minor or moderate injury.
Indicates a potentially hazardous situation, which if not
avoided, could result in equipment damage, data loss,
performance degradation, or unexpected results.
Indicates a tip that may help you solve a problem or save
time.
Provides additional information to emphasize or supplement
important points of the main text.
Issue 01 (2011-07-15)Huawei Proprietary and Confidential
1.1 Introduction to Ethernet Interfaces.....................................................................................................................2
1.2 Ethernet Interface Features Supported by the S7700.........................................................................................2
1.3 Configuring Basic Attributes of the Ethernet Interface......................................................................................3
1.3.1 Establishing the Configuration Task.........................................................................................................3
1.3.2 (Optional) Configuring a Description for an Interface..............................................................................3
1.3.3 (Optional) Configuring the Cable Type on an Interface............................................................................4
1.3.4 (Optional) Setting the Duplex Mode.........................................................................................................5
1.3.5 (Optional) Setting the Rate of an Interface................................................................................................5
1.3.7 (Optional) Switching Between Optical and Electrical Interfaces..............................................................6
1.3.8 (Optional) Configuring an Interface to Work at Layer 2 or Layer 3.........................................................7
1.3.9 Checking the Configuration.......................................................................................................................7
1.4 Configuring Advanced Attributes of an Ethernet Interface................................................................................8
1.4.1 Establishing the Configuration Task.........................................................................................................8
1.4.2 (Optional) Configuring Loopback on the Ethernet Interface....................................................................9
1.4.3 (Optional) Setting the Minimum Interval for Re-enabling an Interface....................................................9
1.4.4 (Optional) Configuring the Interface Group..............................................................................................9
1.4.5 (Optional) Setting the Maximum Frame Length on the Ethernet Interface.............................................10
1.6.1 Example for Configuring Port Isolation..................................................................................................14
2 Link Aggregation Configuration..............................................................................................17
2.1 Introduction to Link Aggregation.....................................................................................................................18
Issue 01 (2011-07-15)Huawei Proprietary and Confidential
2.2 Link Aggregation Supported by the S7700......................................................................................................18
2.3 Configuring Link Aggregation in Manual Load Balancing Mode...................................................................19
2.3.1 Establishing the Configuration Task.......................................................................................................19
2.3.2 Configuring the Eth-Trunk to Work in Manual Load Balancing Mode..................................................20
2.3.3 Adding Member Interfaces to an Eth-Trunk...........................................................................................21
2.3.4 (Optional) Configuring the Load Balancing Mode.................................................................................22
2.3.5 (Optional) Limiting the Number of Active Interfaces.............................................................................23
2.3.6 (Optional) Configuring a Profile of Enhanced Eth-Trunks in Load Balancing Mode............................24
2.3.7 (Optional) Configuring the Load Balancing Mode for Unknown Unicast Traffic..................................25
2.3.8 Checking the Configuration.....................................................................................................................26
2.4 Configuring Link Aggregation in Static LACP Mode.....................................................................................26
2.4.1 Establishing the Configuration Task.......................................................................................................26
2.4.2 Configuring the Eth-Trunk to Work in Static LACP Mode....................................................................27
2.4.3 Adding Member Interfaces to an Eth-Trunk...........................................................................................27
2.4.4 (Optional) Configuring the Load Balancing Mode.................................................................................29
2.4.5 (Optional) Limiting the Number of Active Interfaces.............................................................................30
2.4.6 (Optional) Setting the LACP Priority of the System...............................................................................31
2.4.7 (Optional) Setting the LACP Priority of an Interface..............................................................................31
2.4.8 (Optional) Enabling LACP Preemption and Setting the Delay for LACP Preemption...........................32
2.4.9 (Optional) Setting the Timeout Interval for Receiving LACP Packets...................................................33
2.4.10 (Optional) Configuring a Profile of Enhanced Eth-Trunks in Load Balancing Mode..........................33
2.4.11 (Optional) Configuring the Load Balancing Mode for Unknown Unicast Traffic................................34
2.4.12 Checking the Configuration...................................................................................................................35
2.5 Configuring an Eth-Trunk Sub-interface..........................................................................................................35
2.5.1 Establishing the Configuration Task.......................................................................................................35
2.5.2 Creating an Eth-Trunk Sub-interface.......................................................................................................36
2.5.3 Setting the IP Address of an Eth-Trunk Sub-interface............................................................................36
2.5.4 Checking the Configuration.....................................................................................................................37
2.6 Configuring an E-Trunk...................................................................................................................................37
2.6.1 Establishing the Configuration Task.......................................................................................................37
2.6.2 Setting the LACP System ID and LACP Priority of an E-Trunk............................................................38
2.6.3 Creating an E-Trunk and Setting Its Priority...........................................................................................39
2.6.4 Configuring Local and Peer IP Addresses of an E-Trunk.......................................................................39
2.6.5 Binding an E-Trunk to a BFD Session....................................................................................................40
2.6.6 Adding an Eth-Trunk to an E-Trunk.......................................................................................................41
2.6.7 (Optional) Configuring the Working Mode of an Eth-Trunk in an E-Trunk..........................................41
2.6.8 (Optional) Setting the Password..............................................................................................................42
2.6.9 (Optional) Setting the Timeout of Hello Packets....................................................................................43
2.6.10 (Optional) Setting the Revertive Switching Delay................................................................................44
2.6.11 Checking the Configuration...................................................................................................................44
2.7 Maintaining Link Aggregation.........................................................................................................................45
2.7.1 Clearing Statistics of LACP Packets.......................................................................................................45
Issue 01 (2011-07-15)Huawei Proprietary and Confidential
3.2 VLAN Features Supported by the S7700.........................................................................................................71
3.3 Dividing a LAN into VLANs...........................................................................................................................75
3.3.1 Establishing the Configuration Task.......................................................................................................75
3.3.2 Dividing a LAN into VLANs Based on Ports.........................................................................................78
3.3.3 Dividing a LAN into VLANs Based on MAC Addresses.......................................................................80
3.3.4 Dividing a LAN into VLANs Based on IP Subnets................................................................................81
3.3.5 Dividing a LAN into VLANs Based on Protocols..................................................................................83
3.3.6 Dividing a LAN into VLANs Based on Policies.....................................................................................85
3.3.7 Checking the Configuration.....................................................................................................................86
3.4 Creating a VLANIF Interface...........................................................................................................................87
3.4.1 Establishing the Configuration Task.......................................................................................................87
3.4.2 Creating a VLANIF Interface..................................................................................................................87
3.4.3 Assigning an IP Address to a VLANIF Interface....................................................................................88
3.4.4 (Optional) Setting a Delay After Which a VLANIF Interface Goes Down............................................88
3.4.5 (Optional) Setting the MTU of a VLANIF Interface...............................................................................89
3.4.6 Checking the Configuration.....................................................................................................................90
3.5.1 Establishing the Configuration Task.......................................................................................................90
3.5.2 Configuring VLANIF Interfaces for Inter-VLAN Communication........................................................92
3.5.3 Configuring Sub-interface for Inter-VLAN Communication..................................................................93
3.5.4 Configuring VLAN Switch for Inter-VLAN Communication................................................................94
3.5.5 Checking the Configuration.....................................................................................................................95
3.6 Configuring VLAN Aggregation to Save IP Addresses...................................................................................96
3.6.1 Establishing the Configuration Task.......................................................................................................96
3.6.2 Creating a Sub-VLAN.............................................................................................................................97
3.6.3 Creating a Super-VLAN..........................................................................................................................98
3.6.4 Assigning an IP Address to the VLANIF Interface of a Super-VLAN...................................................99
3.6.5 (Optional) Enabling Proxy ARP on the VLANIF Interface of a Super-VLAN......................................99
3.6.6 Checking the Configuration...................................................................................................................100
3.7 Configuring a MUX VLAN to Separate Layer 2 Traffic...............................................................................100
3.7.1 Establishing the Configuration Task.....................................................................................................101
3.7.2 Configuring a Principal VLAN for a MUX VLAN..............................................................................102
3.7.3 Configuring a Group VLAN for a Subordinate VLAN.........................................................................103
3.7.4 Configuring a Separate VLAN for a Subordinate VLAN.....................................................................103
Issue 01 (2011-07-15)Huawei Proprietary and Confidential
4.1 Introduction to VLAN Mapping.....................................................................................................................159
4.2 VLAN Mapping Features Supported by the S7700........................................................................................159
Issue 01 (2011-07-15)Huawei Proprietary and Confidential
4.3 Configuring VLAN Mapping of Single VLAN Tag......................................................................................159
4.3.1 Establishing the Configuration Task.....................................................................................................159
4.3.2 Replacing a Single Tag..........................................................................................................................160
4.3.3 Checking the Configuration...................................................................................................................161
4.4 Configuring VLAN Mapping of Double VLAN Tags...................................................................................161
4.4.1 Establishing the Configuration Task.....................................................................................................161
4.5.1 Establishing the Configuration Task.....................................................................................................163
4.5.2 Replacing a Single Tag..........................................................................................................................164
5.1 Concept of QinQ.............................................................................................................................................190
5.2 QinQ Features Supported by the S7700.........................................................................................................190
5.3 Configuring QinQ on an Interface..................................................................................................................190
5.3.1 Establishing the Configuration Task.....................................................................................................190
5.3.2 Setting the Link Type of an Interface....................................................................................................191
5.3.3 Specifying the Outer VLAN ID.............................................................................................................192
5.3.4 Checking the Configuration...................................................................................................................192
5.5.3 Setting the Packet Matching Rule.........................................................................................................196
5.5.4 Adding an Outer VLAN Tag.................................................................................................................196
5.5.5 Configuring a Traffic Policy..................................................................................................................197
5.5.6 Applying the Traffic Policy...................................................................................................................197
5.5.7 Checking the Configuration...................................................................................................................198
5.6 Configuring VLAN Stacking Based On the VLAN Priority..........................................................................198
5.6.1 Establishing the Configuration Task.....................................................................................................198
5.6.2 Configuring VLAN Stacking Based on the VLAN Priority on the Incoming Interface.......................199
5.6.3 (Optional) Configuring VLAN Priority Mapping on the Outbound Interface......................................199
5.6.4 Checking the Configuration...................................................................................................................200
5.7 Setting the Protocol Type in the Outer VLAN Tag........................................................................................200
5.7.1 Establishing the Configuration Task.....................................................................................................200
5.7.2 Configuring the Type of an Interface....................................................................................................201
5.7.3 Setting the Protocol Type in the Outer VLAN Tag...............................................................................201
5.7.4 Checking the Configuration...................................................................................................................202
5.8 Adding Double VLAN Tags to Untagged Packets.........................................................................................202
5.8.1 Establishing the Configuration Task.....................................................................................................202
5.8.2 Setting the Interface Type......................................................................................................................203
5.8.3 Adding an Interface to the Outer VLAN...............................................................................................203
5.8.4 Adding Double VLAN Tags to Untagged Packets................................................................................204
5.8.5 Checking the Configuration...................................................................................................................205
5.9 Connecting Sub-interfaces to a VLL Network...............................................................................................205
5.9.1 Establishing the Configuration Task.....................................................................................................205
5.9.2 Configuring a Dot1q Sub-interface.......................................................................................................206
5.9.3 Configuring a QinQ Sub-interface........................................................................................................206
5.9.4 Configuring VLAN Mapping of a Single Tag on a Sub-interface........................................................207
5.9.5 Configuring VLAN Mapping of Double Tags on a Sub-interface........................................................207
5.9.6 Configuring VLAN Stacking on a Sub-interface..................................................................................207
5.9.7 Creating a VLL Connection..................................................................................................................208
5.9.8 Checking the Configuration...................................................................................................................208
5.10 Connecting Sub-interfaces to a VPLS Network...........................................................................................208
5.10.1 Establishing the Configuration Task...................................................................................................209
5.10.2 Configuring a Dot1q Sub-interface.....................................................................................................209
5.10.3 Configuring a QinQ Sub-interface......................................................................................................210
5.10.4 Configuring VLAN Mapping of a Single Tag on a Sub-interface......................................................210
5.10.5 Configuring VLAN Mapping of Double Tags on a Sub-interface......................................................211
5.10.6 Configuring VLAN Stacking on a Sub-interface................................................................................211
6.5.1 Example for Configuring GVRP...........................................................................................................338
7 MAC Address Table Configuration.......................................................................................342
7.1 MAC Address Table Overview......................................................................................................................344
7.2 MAC Address Features Supported by the S7700...........................................................................................345
7.3 Configuring a Static MAC Address Entry......................................................................................................347
7.4 Configuring a Blackhole MAC Address Entry...............................................................................................348
Issue 01 (2011-07-15)Huawei Proprietary and Confidential
7.5 Setting the Aging Time of Dynamic MAC Address Entries..........................................................................349
7.6 Disabling MAC Address Learning.................................................................................................................350
7.6.1 Establishing the Configuration Task.....................................................................................................350
7.6.2 Disabling MAC Address Learning on an Interface...............................................................................351
7.6.3 Disabling MAC Address Learning in a VLAN.....................................................................................352
7.6.4 Checking the Configuration...................................................................................................................352
7.7 Limiting the Number of Learned MAC Addresses........................................................................................352
7.7.1 Establishing the Configuration Task.....................................................................................................353
7.7.2 Limiting the Number of MAC Addresses Learned on an Interface......................................................354
7.7.3 Limiting the Number of MAC Addresses Learned in a VLAN............................................................355
7.7.4 Limiting the Number of MAC Addresses Learned in a VSI.................................................................356
7.7.5 Limiting the Number of MAC Addresses Learned in a Slot.................................................................357
7.7.6 Checking the Configuration...................................................................................................................357
7.8 Configuring Port Security...............................................................................................................................358
7.8.1 Establishing the Configuration Task.....................................................................................................358
7.8.2 Configuring the Secure Dynamic MAC Function on an Interface........................................................359
7.8.3 Configuring the Sticky MAC Function on an Interface........................................................................360
7.8.4 Checking the Configuration...................................................................................................................361
7.9 Configuring MAC Address Anti-Flapping.....................................................................................................361
7.9.1 Establishing the Configuration Task.....................................................................................................361
7.9.2 Setting the MAC Address Learning Priority of an Interface.................................................................362
7.9.3 Prohibiting MAC Address Flapping Between Interfaces with the Same Priority.................................363
7.9.4 Checking the Configuration...................................................................................................................363
7.10 Configuring MAC Address Flapping Detection...........................................................................................364
7.10.1 Establishing the Configuration Task...................................................................................................364
7.10.2 Configuring MAC Address Flapping Detection..................................................................................365
7.10.3 (Optional) Unblocking a Blocked Interface or MAC Address............................................................365
7.10.4 Checking the Configuration.................................................................................................................366
7.11 Configuring the S7700 to Discard Packets with an All-0 MAC Address....................................................366
7.12 Enabling MAC Address Triggered ARP Entry Update................................................................................367
7.13 Enabling Port Bridge....................................................................................................................................368
8.2.7 Checking the Configuration...................................................................................................................393
8.3 Configuring STP/RSTP Parameters on an Interface......................................................................................394
8.3.1 Establishing the Configuration Task.....................................................................................................396
8.3.2 Setting System Parameters....................................................................................................................397
8.3.3 Setting Port Parameters.........................................................................................................................398
8.3.4 Checking the Configuration...................................................................................................................400
10.2.5 Adding a Layer 2 Interface to a SEP Segment and Configuring a Role for the Interface...................509
10.2.6 Checking the Configuration.................................................................................................................511
10.3 Specifying an Interface to Block..................................................................................................................511
10.3.1 Establishing the Configuration Task...................................................................................................512
10.3.2 Setting an Interface Blocking Mode....................................................................................................512
10.3.3 Configuring the Preemption Mode......................................................................................................514
10.3.4 Checking the Configuration.................................................................................................................516
13.1 Introduction to Loop Detection....................................................................................................................625
This chapter describes the basic knowledge, methods, and examples for configuring the Ethernet
interface.
1.1 Introduction to Ethernet Interfaces
This section describes the Ethernet interfaces.
1.2 Ethernet Interface Features Supported by the S7700
This section describes the Ethernet interface features supported by the S7700.
1.3 Configuring Basic Attributes of the Ethernet Interface
This section describes how to configure the description, cable type, duplex mode, rate, and autonegotiation an Ethernet interface, and switch between the optical and electrical interfaces and
between Layer 2 and Layer 3 interfaces.
1.4 Configuring Advanced Attributes of an Ethernet Interface
This section describes how to configure the loopback on the Ethernet Interface, minimum
interval for re-enabling an interface, port group, maximum frame size, flow control, flow control
auto-negotiation, cable test, sub-interface IP address, and port isolation.
1.5 Maintaining Ethernet Interfaces
This section describes how to maintain Ethernet interfaces.
1.6 Configuration Examples
This section provides several configuration examples of Ethernet interfaces.
Issue 01 (2011-07-15)Huawei Proprietary and Confidential
The Ethernet is flexible, simple, and easy to implement; therefore, it becomes an important local
area network (LAN) networking technology.
Table 1-1 shows the attributes of Ethernet electrical interfaces and Ethernet optical interfaces.
Table 1-1 Attributes of Ethernet interfaces
Interface
Type
Ethernet
electrical
interface
Ethernet
optical
interface
If the local interface works in auto-negotiation mode, the peer interface must also work in autonegotiation mode; otherwise, packet loss may occur.
Rate (Mbit/s)Auto-negotiationNon-negotiation
Full
Duplex
10YesYesYesYes
100YesYesYesYes
1000YesNoYesNo
100NoNoYesNo
1000YesNoYesNo
10000NoNoYesNo
Half
Duplex
Full
Duplex
Half
Duplex
1.2 Ethernet Interface Features Supported by the S7700
This section describes the Ethernet interface features supported by the S7700.
Port Group
The port group function enables you to configure multiple interfaces at the same time. You can
run commands in the port group view to configure all the interfaces in the group.
Auto-Negotiation
The auto-negotiation function allows interfaces on both ends of a link to select the same operating
parameters by exchanging capability information. Each interface sends its capability information
to the remote end and checks capabilities of the remote end. After both interfaces receive the
capability information from each other, they adopt the highest capability they support to
communicate with each other.
The interfaces negotiate the duplex mode, speed, and flow control parameters. After a successful
negotiation, the interfaces use the same duplex mode, speed, and flow control parameters.
Issue 01 (2011-07-15)Huawei Proprietary and Confidential
The port isolation function isolates Layer 2 and Layer 3 communication between ports in the
same VLAN. This function restricts packet transmission between ports flexibly, providing a
secure and flexible network solution.
1.3 Configuring Basic Attributes of the Ethernet Interface
This section describes how to configure the description, cable type, duplex mode, rate, and autonegotiation an Ethernet interface, and switch between the optical and electrical interfaces and
between Layer 2 and Layer 3 interfaces.
1.3.1 Establishing the Configuration Task
Applicable Environment
The configuration task is applicable to the following situations:
lYou can configure the description of interfaces to facilitate the identification, maintenance,
and configuration of the interfaces.
lBy default, an FE electrical interface automatically identifies the network cable type. If the
interface cannot identify the cable type properly, set the cable type for the interface
manually.
lBy default, an FE electrical interface negotiates the duplex mode and rate with the
equipment that is directly connected to the interface. If the connected equipment does not
have the auto-negotiation capability, set the duplex mode and rate for the FE interface
manually so that the interface can work with the connected equipment.
Pre-configuration Tasks
None
Data Preparation
To configure the basic functions of Ethernet interfaces, you need the following data.
No.
1Number of an Ethernet interface
2(Optional) Description of an interface
Data
3(Optional) Cable type of an ethernet electrical interface
4(Optional) Duplex mode of an ethernet electrical interface
5(Optional) Rate of an ethernet interface
1.3.2 (Optional) Configuring a Description for an Interface
Issue 01 (2011-07-15)Huawei Proprietary and Confidential
By default, the description of an interface is "HUAWEI, Quidway Series, X interface". X
specifies the interface type and number.
----End
1.3.3 (Optional) Configuring the Cable Type on an Interface
Context
Perform the following steps on the S7700.
Procedure
Step 1 Run:
system-view
The system view is displayed.
Step 2 Run:
interface interface-typeinterface-number
The Ethernet electrical interface view is displayed.
Step 3 Run:
mdi { across | auto | normal }
The cable type is configured for the Ethernet electrical interface.
By default, an Ethernet electrical interface automatically identifies the cable type.
An electrical interface can use a crossover cable or a straight through cable. If across is specified,
the interface can use a crossover cable; if normal is specified, the interface can use a straight
through cable; if auto is specified, the interface can use both types of network cables.
----End
Issue 01 (2011-07-15)Huawei Proprietary and Confidential
The interface is changed to an optical interface or an electrical interface.
By default, a combo port selects the working mode automatically.
A G24C LPU has 8 electrical interface and 24 optical interfaces, among which the first 8 optical
interfaces are duplexed with electrical interfaces. You can use the combo-port command to use
these interfaces as electrical interfaces or optical interfaces.
----End
1.3.8 (Optional) Configuring an Interface to Work at Layer 2 or Layer
3
Procedure
Step 1 Run:
system-view
The system view is displayed.
Step 2 Run:
interface interface-typeinterface-number
The interface view is displayed.
Step 3 Run:
portswitch
The interface is configured to work at Layer 2.
Step 4 Run:
undo portswitch
The interface is configured to work at Layer 3.
By default, an Ethernet interface works at Layer 2.
When an Ethernet interface switches from Layer 3 to Layer 2, the Layer 3 functions and flag
are disabled. The MAC address of the system is used.
----End
1.3.9 Checking the Configuration
Issue 01 (2011-07-15)Huawei Proprietary and Confidential
Step 1 Run the display interface [ interface-type [ interface-number [.subnumber ] ] ] command to
display the description, duplex mode, and rate of an Ethernet interface.
----End
1.4 Configuring Advanced Attributes of an Ethernet
Interface
This section describes how to configure the loopback on the Ethernet Interface, minimum
interval for re-enabling an interface, port group, maximum frame size, flow control, flow control
auto-negotiation, cable test, sub-interface IP address, and port isolation.
1.4.1 Establishing the Configuration Task
Applicable Environment
The configuration task is applicable to the following situations:
lThe S7700 provides the interface group function, which enables you to configure multiple
interfaces at the same time.
lIf the traffic volume received on an interface of the S7700 may exceed the processing
capability of the interface and the directly connected interface supports traffic control,
enable the traffic control function on the interface. When the rate of received traffic reaches
the threshold, the interface sends a Pause frame (in full duplex mode) or sends a back
pressure signal (in half duplex mode) to notify the peer interface. If the peer interface
supports traffic control, it decreases the rate of at which it sends traffic so that the local
interface can properly process received traffic.
lPorts enabled with port isolation cannot communicate with each other so that ports on the
same VLAN can be isolated. Port isolation provides secure and flexible networking
schemes for customers.
Pre-configuration Tasks
None.
Data Preparation
To configure the advanced functions of Ethernet interfaces, you need the following data.
No.
1Interface number
2(Optional) Maximum frame length allowed on the interface
Issue 01 (2011-07-15)Huawei Proprietary and Confidential
Do as follows on the S7700 where you need to enable port isolation.
Procedure
Step 1 Run:
system-view
The system view is displayed.
Step 2 Run:
port-isolate mode { l2 | all }
The port isolation mode is set.
By default, ports are isolated on Layer 2 but can communicate on Layer 3.
Step 3 Run:
interface interface-typeinterface-number
The Ethernet interface view is displayed.
Step 4 (Optional) Run:
am isolate interface-typeinterface-number [ to interface-number ]
The Ethernet interface is isolated from another interface unidirectionally.
NOTE
After interface A is isolated from interface B unidirectionally, packets sent by interface A cannot reach
interface B, whereas packets sent from interface B can reach interface A.
Step 5 Run:
port-isolate enable [ group group-id ]
Port isolation is enabled.
NOTE
Ports in a port isolation group are isolated from each other, and ports in different port isolation groups can
communicate with each other. If group-id is not specified, a port is added to port isolation group 1.
----End
1.4.9 (Optional) Performing a Cable Test on an Interface
Context
A cable test detects faults on the cable connected to an interface. If the cable is working properly,
the total length of the cable is displayed. If the cable cannot work properly, the distance between
the interface and the fault point is displayed.
Procedure
Step 1 Run:
system-view
Issue 01 (2011-07-15)Huawei Proprietary and Confidential