01-19 Upgrade-Compatible Commands Reference
01-19 Upgrade-Compatible Commands Reference
Ethernet Switches
Command Reference 19 Upgrade-compatible Commands Reference
19 Upgrade-compatible Commands
Reference
You are not advised to use upgrade-compatible commands to perform operations on the
device. If required, perform operations under the guidance of technical support personnel.
Function
The set authentication password simple command sets the simple format for a
local authentication password.
Format
set authentication password simple password
Parameters
Views
User view
Default Level
3: Management level
telnet-server write
Usage Guidelines
It is replaced by the set authentication password command.
This command is saved in simple text after it is configured, which brings security
risks. Saving the command configuration in ciphertext is recommended.
Format
# Load a PEM digital certificate for the SSL policy.
certificate load pem-cert cert-filename key-pair { dsa | rsa } key-file key-
filename auth-code auth-code
# Load a PFX digital certificate for the SSL policy.
certificate load pfx-cert cert-filename key-pair { dsa | rsa } { mac mac-code |
key-file key-filename } auth-code auth-code
# Load a PEM certificate chain for the SSL policy.
certificate load pem-chain cert-filename key-pair { dsa | rsa } key-file key-
filename auth-code auth-code
Parameters
Parameter Description Value
pem-cert Loads a PEM digital certificate for -
the SSL policy.
A PEM digital certificate has a file
name extension .pem.
A PEM digital certificate transfers
text data between systems.
Views
SSL policy view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
SSL security mechanism includes:
● Data transmission security: Uses the symmetric key algorithm to encrypt data.
● Message integrity: uses the multiplexed analog component (MAC) algorithm
to ensure message integrity.
● Identity authentication mechanism: authenticates users based on the digital
signatures and certificates.
The Certificate Authority (CA) issues PEM, ASN1, and PFX digital certificates that
provide user identity information. Based on digital certificates, users establish trust
relationships with partners who require high security.
A digital certificate data includes the applicant information such as the applicant's
name, applicant's public key, digital signature of the CA that issues the certificate,
and the certificate validity period. A certificate chain can be released when a
certificate is sent so that the receiver can have all certificates in the certificate
chain.
Prerequisites
Before running the certificate load command, you have run the ssl policy
command to create the SSL policy in the system view.
Precautions
● You can load a certificate or certificate chain for only one SSL policy. Before
loading a certificate or certificate chain, you must unload the existing
certificate or certificate chain.
● When you configure an SSL policy to load a certificate or certificate chain,
ensure that the maximum length of the key pair in the certificate or
certificate chain is 2048 bits. If the length of the key pair exceeds 2048 bits,
the certificate file or certificate chain file cannot be uploaded to the device.
Example
# Load a PEM digital certificate for the SSL policy.
<HUAWEI> system-view
[HUAWEI] ssl policy ftp_server
[HUAWEI-ssl-policy-ftp_server] certificate load pem-cert servercert.pem key-pair dsa key-file
serverkey.pem auth-code 123456
Format
set device usb-deployment password password
Parameters
Parameter Description Value
password Specifies the authentication password for USB-based -
deployment.
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
A user with a level lower than the management level cannot query the password
configured using this command. If this user query the configuration file, the
password is displayed as asterisks (******).
Format
set save-configuration backup-to-server server server-ip [ transport-type { ftp |
sftp } ] path path user user-name password password
Parameters
Parameter Description Value
server server-ip Specifies the IP address of the -
server where the system
periodically saves the
configuration file.
transport-type Specifies the mode in which the The value can be ftp or
configuration file is transmitted sftp.
to the server.
user user-name Specifies the name of the user The value is a string of 1 to
who saves the configuration file 64 case-sensitive
on the server. characters without spaces.
password Specifies the password of the user The value is a string of 1 to
password who saves the configuration file 16 or 32 case-sensitive
on the server. characters without spaces.
path path Specifies the relative save path on The value is a string of 1 to
the server. 64 case-sensitive
characters without spaces.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Run this command to periodically save the configuration file to the server.
Precautions
If the mode in which the configuration file is transmitted to the server is not
specified, FTP is used.
If the specified path on the server does not exist, configuration files cannot be
sent to the server. The system then sends an alarm message indicating the
transmission failure to the NMS, and the transmission failure is recorded as a log
message on the device.
The user name and password must be the same as those used in FTP or SFTP
login mode.
Example
# Specify the server to which the system periodically sends the configuration file,
and set the transmission mode to FTP.
<HUAWEI> system-view
[HUAWEI] set save-configuration backup-to-server server 10.1.1.1 transport-type ftp path d:/ftp user
huawei password huawei@1234
Function
Using the set save-configuration command, you can enable automatic saving of
configurations.
Using the undo set save-configuration command, you can disable automatic
saving of configurations.
Format
set save-configuration nochange-time nochange-time
Parameters
Views
System view
Default Level
3: Management level
Usage Guidelines
If nochange-time nochange-time is specified in the command, the system
automatically saves configurations if no configuration changes in the period
specified by nochange-time.
If the interval from the time of the last configuration to the current time is shorter
than the set interval, the system cancels the current automatic saving operation.
Example
# Configure the system to automatically save configurations at 60-minute
intervals if no configuration changes in the period.
<HUAWEI> system-view
[HUAWEI] set save-configuration nochange-time 60
Function
The snmp-agent trap enable configuration command enables the trap function
of the Configuration module.
Format
snmp-agent trap enable configuration
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
snmp-agent trap enable feature-name configuration command.
Format
snmp-agent trap enable ssh
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Format
snmp-agent trap enable system
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
snmp-agent trap enable feature-name system command.
Format
snmp-agent trap enable flash
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
snmp-agent trap enable feature-name vfs { hwflhopernotification |
hwflhsyncfailnotification | hwflhsyncsuccessnotification } command.
By default, the system does not set the password used to change a user from a
lower level to a higher level.
Format
super password [ level user-level ] simple simple-password
Parameters
Parameter Description Value
level user-level Specifies a user level. The value is an integer that ranges
from 1 to 15. By default, the system
sets passwords for users of level 3.
simple simple- Specifies the simple The value is a string of 1 to 16 case-
password password for changing sensitive characters.
a user level.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The device makes it possible to switch a user from a lower level to a higher level.
To prevent illegal intrusion of unauthorized users, when a user switches to a
higher user level, the system authenticates the user identity by requiring the user
to input the password for the higher user level.
● If the cipher cipher-password parameter is not specified, the system starts the
interactive password setting mode. Enter a plain text password of 6 to 16
characters. The requirements for the password are the same as the
requirements for the plain text password configured when the cipher keyword
is specified. The password you enter will not be displayed on the device. You
can press CTRL_C to cancel the password setting.
● The password is in plain or cipher text and displayed on the device when the
cipher cipher-password parameter is specified. When you run the super
command to switch the user level, the password must be entered in plain
text.
● Whether the password is entered in cipher or interactive mode, the password
is saved in cipher text to the configuration file. Therefore, the password
cannot be obtained from the system after it is set. Keep the password secure.
● This command is saved in simple text after it is configured, which brings
security risks. Saving the command configuration in ciphertext is
recommended.
Example
# Set the password used when low-level users switch to level 10 to Example@123.
<HUAWEI> system-view
[HUAWEI] super password level 10 simple Example@123
Function
The trusted-ca load command loads the trusted CA file for the SSL policy for the
FTP client.
Format
# Load the trusted CA file for the SSL policy in PFX format.
Parameters
Parameter Description Value
pfx-ca Load the trusted CA file for the SSL -
policy in PFX format.
Views
SSL policy view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
CAs that are widely trusted in the world are called root CAs. Root CAs can
authorize other lower-level CAs. The identity information about a CA is provided in
the file of a trusted CA. To ensure the communication security and verify the
server validity, you must run the trusted-ca load command to load the trusted CA
file.
Prerequisites
Before running the trusted-ca load command, you have run the ssl policy
command to create the SSL policy in the system view.
Precautions
Example
# Load the trusted CA file for the SSL policy in PFX format.
<HUAWEI> system-view
[HUAWEI] ssl policy ftp_server
[HUAWEI-ssl-policy-ftp_server] trusted-ca load pfx-ca servercert.pfx auth-code cipher 123456
Function
The cpu-usage threshold command sets the upper and lower CPU usage alarm
thresholds.
Format
cpu-usage threshold [ unit unit-id ] { high | low } threshold-value
Parameters
Views
System view
Default Level
3: Management level
Usage Guidelines
When the CPU usage is not within the allowed range, a log is recorded. You can
conveniently know CPU usage through log information.
Function
The display autosave config command displays the configuration about the
autosave function, including the status of the autosave function, time for autosave
check, threshold of the CPU usage, and interval during which configurations are
not changed.
Format
display autosave config
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
After the autosave function is configured, you can run the display autosave
config command to check whether the configured parameters are correct. You can
also run this command to check whether the parameters about the autosave
function are properly configured when autosave cannot function normally. If not,
run the set save-configuration command to adjust the parameters to restore the
normal state of the autosave function.
Example
# Display the configuration about the autosave function.
<HUAWEI> display autosave config
Auto save function status: enable
Auto save checking interval: 60 minutes
The threshold of the CPU usage: 50%
The interval of the configuration not changing: 30 minutes
Auto save checking interval Indicates the time for autosave check.
The threshold of the CPU usage Indicates the threshold of the CPU
usage during the autosave operation.
The interval of the configuration not Indicates the interval during which
changing system configurations are not
changed.
Format
display fault-management { alarm | active-alarm | event } [ sequence-number
sequence-number ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command helps you obtain the contents of all alarm messages or one alarm
message on a device.
Example
# Display the contents of active alarm messages in the system.
<HUAWEI> display fault-management active-alarm
A/B/C/D/E/F/G/H/I/J
A=Sequence, B=RootKindFlag(Independent|RootCause|nonRootCause)
C=Generating time, D=Clearing time
E=ID, F=Name, G=Level, H=State
I=Description information for locating(Para info, Reason info)
J=RootCause alarm sequence(Only for nonRootCause alarm)
1/Independent/2008-10-13 01:49:45+08:00/-/0x41932001/hwLldpEnabled/Warning/Sta
rt/OID: 1.3.6.1.4.1.2011.5.25.134.2.1 Global LLDP is enabled.
2/Independent/2008-10-13 01:50:06+08:00/-/0x41932000/lldpRemTablesChange/Warni
ng/Start/OID: 1.0.8802.1.1.2.0.0.1 Neighbor information is changed. (LldpStatsRe
mTablesInserts=1, LldpStatsRemTablesDeletes=0, LldpStatsRemTablesDrops=0, LldpSt
atsRemTablesAgeouts=0)
5/Independent/2008-10-13 02:22:52+08:00/-/0x40c12014/hwPortPhysicalEthHalfDupl
exAlarm/Minor/Start/OID 1.3.6.1.4.1.2011.5.25.129.2.5.11 The port works in half
duplex mode. (EntityPhysicalIndex=10, BaseTrapSeverity=3, BaseTrapProbableCause=
1024, BaseTrapEventType=8, EntPhysicalName=GigabitEthernet0/0/5, RelativeResourc
e=interface GigabitEthernet0/0/5)
Function
The display fault-management alarm information command displays
registration information about an alarm message.
Format
display fault-management alarm information [ alarm-name ]
Parameters
Parameter Description Value
alarm-name Specifies the name of an The value is a case-sensitive string of
alarm message. 1 to 256 characters without spaces.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Check registration information about the alarm message named linkUp.
<HUAWEI> display fault-management alarm information linkUp
**********************************
AlarmName: linkUp
AlarmType: Resume Alarm
AlarmLevel: Cleared
Suppress Period: NA
CauseAlarmName: linkDown
Match VB Name: ifIndex
**********************************
Item Description
Item Description
Match VB Name Contents of the matching rule set for the alarm messages
Format
dual-active detect mode direct
Parameters
None
Views
GE interface view, XGE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
DAD in direct mode applies to a stack containing two DAD-supporting member
switches.
Prerequisites
The stack containing two member switches is running properly, and DAD in relay
mode is not configured for the stack.
Precautions
Disabling DAD in direct mode on an interface restores the forwarding function on
the interface. If a loop exists on the network, a broadcast storm occurs.
The dual-active detect mode direct command performs the same function as the
mad detect mode direct command.
Example
# Configure DAD in direct mode on GigabitEthernet1/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 1/0/1
[HUAWEI-GigabitEthernet1/0/1] dual-active detect mode direct
Warning: This command will block the port, and no other configuration running on this port is
recommended. Continue?[Y/N]:y
Format
dual-active detect mode relay
Parameters
None
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure DAD in relay mode only when a stack containing two member
switches is configure with an inter-chassis Eth-Trunk and a proxy device supports
the relay function.
Prerequisites
The stack containing two member switches is running properly, and DAD in direct
mode is not configured for the stack.
Precautions
The dual-active detect mode relay command performs the same function as the
mad detect mode relay command.
Example
# Configure DAD in relay mode on Eth-Trunk 10.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 10
[HUAWEI-Eth-Trunk10] dual-active detect mode relay
Function
The dual-active exclude command excludes specified interfaces of a stack from
shutdown.
Format
dual-active exclude interface { interface-type interface-number1 [ to interface-
type interface-number2 ] } &<1-10>
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
Function
The dual-active relay command enables the relay function on a specified
interface of a proxy device.
Format
dual-active relay
Parameters
None
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
In DAD in relay mode, you need to use the dual-active relay command to
configure the relay function on a specified Eth-Trunk interface of a proxy device.
Member interfaces of the Eth-Trunk interface forward DAD packets to each other
so that member switches can exchange DAD packets.
Example
# Enable the relay function on Eth-Trunk 10 of a proxy device.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 10
[HUAWEI-Eth-Trunk10] dual-active relay
Function
The dual-active restore command restores the blocked interfaces of the standby
switch that enters the Recovery state after its stack splits.
Format
dual-active restore
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a stack splits, if the active switch fails, you can restore the blocked interfaces
of the standby switch that enters the Recovery state to make the standby switch
to take over the active role.
Precautions
When the active switch is working properly, do not use this command. Otherwise,
DAD detects a dual-active scenario again and blocks all service interfaces, causing
interface status flapping.
Example
# Restore all the blocked interfaces of the standby switch that enters the Recovery
state after its stack splits.
<HUAWEI> system-view
[HUAWEI] dual-active restore
Function
The fault-management alarm command configures the type or severity of an
alarm message or event.
Format
fault-management alarm alarm-name level alarm-level
Parameters
Parameter Description Value
alarm Specifies the name of an alarm message The value is a case-
alarm-name or event. sensitive string of 1 to
64 characters without
spaces.
Views
System view
Default Level
3: Management level
Usage Guidelines
Alarm messages are classified into root alarm messages and resume-alarm
messages. All the alarms are saved on the device.
Events are classified into critical events and events. Critical events are saved on a
device and can be obtained by the NMS. Events are not saved on a device.
The fault-management alarm command can be used to promote or degrade the
level of an alarm message according to the severity and emergency of the alarm
message.
Example
# Set the alarm severity of the alarm message named hwCfgManEventlog to
major.
<HUAWEI> system-view
[HUAWEI] fault-management alarm hwCfgManEventlog level major
Format
poe af-inrush enable [ slot slot-id ]
undo poe af-inrush enable [ slot slot-id ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, it is replaced by the poe af-inrush enable command in the
interface view.
Function
The reset fault-management command clears all alarm messages.
Format
reset fault-management { active-alarm | event } [ sequence-number sequence-
number ]
Parameters
Views
System view
Default Level
3: Management level
Usage Guidelines
If sequence-number is not specified, the system clears all the alarm messages on
the device.
NOTICE
After this command is run, all alarm messages on a device are cleared and cannot
be restored.
Example
# Clear all active alarm messages.
<HUAWEI> system-view
[HUAWEI] reset fault-management active-alarm
Function
The ntp-service authentication-keyid command sets NTP authentication key.
Format
ntp-service authentication-keyid key-id authentication-mode { md5 | hmac-
sha256 } plain password-plain
Parameters
Views
System view
Default Level
2: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
Function
The error-shutdown auto-recovery cause efm-threshold-event command
enables an interface in error-shutdown state to go Up.
NOTE
An interface enters the error-shutdown state after being shut down due to an error.
Format
error-shutdown auto-recovery cause efm-threshold-event
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Set the auto recovery after an EFM threshold crossing event is associated with
an interface.
<HUAWEI> system-view
[HUAWEI] error-shutdown auto-recovery cause efm-threshold-event
Function
The error-shutdown auto-recovery interval command sets the auto recovery
delay.
NOTE
An interface enters the error-shutdown state after being shut down due to an error.
Format
error-shutdown auto-recovery interval interval-value
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Set the auto recovery delay to 50s.
<HUAWEI> system-view
[HUAWEI] error-shutdown auto-recovery interval 50
Function
Using the port-down holdoff-timer command, you can set the delay in reporting
a port status change event.
Format
port-down holdoff-timer interval
Parameters
Parameter Description Value
Views
GE interface view, XGE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the cable connected to an interface is faulty, the interface status may
change frequently. When this occurs, the system frequently updates the matching
entries. If link backup is configured on the interface, active/standby switchovers
occur frequently. To prevent frequent status change, you can use the port-down
holdoff-timer command to set the delay in reporting a port status change event.
Configuration Impact
If you run the port-down holdoff-timer command multiple times in the same
interface view, only the latest configuration takes effect.
Example
# Set the delay in reporting a port status change event to 1000 milliseconds on
GigabitEthernet0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet0/0/1
[HUAWEI-GigabitEthernet0/0/1] port-down holdoff-timer 1000
Function
The snmp-agent trap enable port command enables the system to generate an
alarm when the inbound or outbound bandwidth usage on all Ethernet sub-
interfaces exceeds the threshold.
Format
snmp-agent trap enable port { input-rate | output-rate }
Parameters
Parameter Description Value
input-rate Enables the system to generate an alarm when the inbound -
bandwidth usage on all Ethernet sub-interfaces exceeds the
threshold.
output-rate Enable the system to generate an alarm when the -
outbound bandwidth usage on all Ethernet sub-interfaces
exceeds the threshold.
Views
System review
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
If the threshold for the inbound or outbound bandwidth usage has been
configured on an Ethernet sub-interface, you can enable the system to generate
an alarm when the threshold is exceeded. This allows you to determine whether
the device is functioning normally.
After the configuration is complete, the system generates an alarm when the
bandwidth usage exceeds or falls below the threshold.
Example
None
Function
Using the mac-address blackhole command, you can add a blackhole MAC
address entry.
Format
mac-address blackhole mac-address [ interface-type interface-number ] vlan
vlan-id1 [ ce-vlan vlan-id2 ]
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, Eth-Trunk interface
view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
Function
Using the mac-address static command, you can add a static MAC address entry.
Format
mac-address static mac-address interface-type interface-number vlan vlan-id1
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, Eth-Trunk interface
view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
Function
The mode command configures the LACP mode of an Eth-Trunk.
Format
mode lacp-static
Parameters
none
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
mode lacp command.
Function
The lacp e-trunk system-id command configures the Link Aggregation Control
Protocol (LACP) system ID of an E-Trunk.
The undo lacp e-trunk system-id command deletes the LACP system ID of an E-
Trunk.
By default, the LACP system ID is the Ethernet MAC address of the device.
Format
lacp e-trunk system-id mac-address
Parameters
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The snmp-agent trap enable eth-trunk command enables the Simple Network
Management Protocol (SNMP) trap function on an Eth-Trunk.
The undo snmp-agent trap enable eth-trunk command disables the SNMP trap
function on an Eth-Trunk.
By default, the SNMP trap function is disabled on an Eth-Trunk.
Format
snmp-agent trap enable eth-trunk
undo snmp-agent trap enable eth-trunk
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
If the SNMP trap function is enabled on an Eth-Trunk, the system sends a trap to
the network management system (NMS) server in case of when the following
exceptions occur:
● The negotiation of the LAG fails.
● The bandwidth of the LAG is lost. For example, if the lower threshold of the
number of active interfaces is set by using the least active-linknumber
command and if the number of active interfaces is smaller than this value,
the Eth-Trunk becomes Down and the system sends the trap.
● Part of the bandwidth of the LAG is lost. When one of active interfaces fails,
the system sends the trap because the number of active interfaces is reduced.
Example
# Enable the SNMP trap function on an Eth-Trunk so that the trap can be sent to
the NMS server promptly when the status of the LAG changes.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable eth-trunk
Function
The port mux-vlan enable command enables the MUX VLAN function on an
interface.
The undo port mux-vlan enable command disables the MUX VLAN function on
an interface.
Format
port mux-vlan enable
Parameters
None
Views
GE interface view, XGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
After the upgrade, it is replaced by the port mux-vlan enable vlan command.
Function
The voice-vlan enable command enables the voice VLAN function on an
interface.
Format
voice-vlan enable
Parameters
None
Views
GE interface view, Ethernet interface view, XGE interface view, Eth-Trunk interface
view, port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
Function
The garp leaveall timer command sets the GARP LeaveAll timer.
Format
garp leaveall timer timer-value
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a GARP participant is enabled, the LeaveAll timer is started. When the
LeaveAll timer expires, the GARP participant sends LeaveAll messages to request
other GARP participants to re-register all its attributes. Then the LeaveAll timer
restarts.
Devices on a network may have different settings for the LeaveAll timer. In this
case, all the devices use the smallest LeaveAll timer value on the network. When
the LeaveAll timer of a device expires, the device sends LeaveAll messages to
other devices. After other devices receive the LeaveAll messages, they reset their
LeaveAll timers. Therefore, only the LeaveAll timer with the smallest value takes
effect even if devices have different settings for the LeaveAll timer.
Prerequisites
Before setting GARP timers on an interface, you must enable GVRP globally.
Precautions
The Leave timer length on an interface is restricted by the global LeaveAll timer
length. When configuring the global LeaveAll timer, ensure that all the interfaces
that have a GARP Leave timer configured are working properly.
Example
# Set the LeaveAll timer to 510 centiseconds.
<HUAWEI> system-view
[HUAWEI] garp leaveall timer 510
Function
The snmp-agent trap enable mstp command enables the trap function for the
MSTP module.
Format
snmp-agent trap enable mstp
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
snmp-agent trap enable feature-name mstp command in the system view.
Function
The snmp-agent trap enable feature-name mstp command enables the trap
function for the MSTP module.
By default, the trap function is disabled for the MSTP module.
Format
snmp-agent trap enable feature-name mstp trap-name { nnewroot |
ntopologychange }
undo snmp-agent trap enable feature-name mstp trap-name { nnewroot |
ntopologychange }
Parameters
Parameter Description Value
trap-name Enables the traps of spanning tree protocol events of -
specified types.
nnewroot Enables the device to send trap when the current -
device is elected as the root bridge.
ntopologychange Enables the device to send trap when the topology -
changes.
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
snmp-agent trap enable feature-name mstp trap-name { newroot |
topologychange } command in the system view.
Function
The stp tc-protection command enables the trap function for the Topology
Change (TC) BPDU protection.
The undo stp tc-protection command disables the trap function for the TC BPDU
protection.
By default, the trap function for the TC BPDU protection is disabled.
Format
stp tc-protection
undo stp tc-protection
Parameters
None
Views
System view or MST process region view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The TC attack defense function is enabled by default, you can run the stp tc-
protection interval command to set the time that a device needs to process the
maximum number of TC BPDUs which is configured using the stp tc-protection
threshold command. If there are packets exceeding the maximum number, the
switch processes the packets after the time specified in the stp tc-protection
interval command expires. For example, if the time is set to 10 seconds and the
maximum number is set to 5, when a switch receives TC BPDUs, the switch
processes only the first 5 TC BPDUs within 10 seconds and processes the other TC
BPDUs after the time expires. In this way, the device does not frequently update its
MAC address entries and ARP entries, reducing CPU usage.
To learn about detailed processing information on TC BPDUs, run the stp tc-
protection command to enable the trap function for the TC BPDU protection.
Precautions
The trap function for the TC BPDU protection takes effect only when the snmp-
agent trap enable feature-name mstp and stp tc-protection are both run.
Function
The bpdu-tunnel command configures an interface to forward or discard BPDUs.
Format
bpdu-tunnel { enable | disable }
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, port group view,
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
Function
The bpdu-tunnel enable command enables Layer 2 protocol tunneling on an
interface.
Format
bpdu-tunnel { all | protocol-type &<1-15> } enable
Parameters
Parameter Description Value
Views
Ethernet interface view, XGE interface view, GE interface view, Eth-Trunk interface
view, port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
Function
The bpdu-tunnel group-mac command enables the switch to replace the
multicast destination MAC address of Layer 2 protocol packets with a specified
multicast MAC address.
Format
bpdu-tunnel protocol-type group-mac group-mac
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
Function
Using the bpdu-tunnel stp group-mac command, you can replace the global
well-known MAC address of the STP BPDU packets with a multicast MAC address.
Format
bpdu-tunnel stp group-mac group-mac
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
Function
Using the bpdu-tunnel stp vlan command, you can configure the interface to
accept the BPDU packets whose tag values range from low-vid to high-vid.
Using the undo bpdu-tunnel stp vlan command, you can cancel the
configuration.
Format
bpdu-tunnel stp vlan { low-vid [ to high-vid ] } &<1-10>
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, Eth-Trunk interface
view, port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
After the upgrade, it is replaced by the l2protocol-tunnel stp { vlan low-id [ to
high-id ] } &<1-10> command.
Function
The bpdu-tunnel vlan command enables VLAN-based Layer 2 protocol tunneling
on an interface.
Format
bpdu-tunnel { all | protocol-type &<1-15> } vlan { low-id [ to high-id ] } &<1-10>
Parameters
Parameter Description Value
Views
Ethernet interface view, XGE interface view, GE interface view, Eth-Trunk interface
view, port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
After the upgrade, it is replaced by the l2protocol-tunnel vlan command.
Function
The l2protocol-tunnel user-defined-protocol command defines the
characteristics of a Layer 2 protocol whose packets are transparently transmitted,
including the protocol name, Ethernet encapsulation type, destination MAC
address of packets, multicast MAC address replacing the destination multicast
MAC address of packets, and priority of packets.
By default, there is no user-defined characteristics of a Layer 2 protocol whose
packets are transparently transmitted.
Format
l2protocol-tunnel user-defined-protocol protocol-name protocol-mac protocol-
mac encape-type { ethernetii protocol-type protocol-type | llc dsap dsap-value
ssap ssap-value | snap protocol-type protocol-type } group-mac { group-mac |
default-group-mac } [ priority priority-id ]
Parameters
Parameter Description Value
protocol- Specifies the name of a user-defined The name is a string
name Layer 2 protocol whose packets are of 1 to 31 case-
transparently transmitted. insensitive characters
without spaces.
When quotation
marks are used
around the string,
spaces are allowed in
the string.
protocol-mac Specifies the destination multicast MAC The address is in the
protocol-mac address of the Layer 2 protocol packets format of H-H-H, H
that are transparently transmitted. This indicating a 4-bit
MAC address must be an ordinary MAC hexadecimal number.
address that has not been used on the
devices.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
After the upgrade, it is replaced by the l2protocol-tunnel user-defined-protocol
command.
Function
The expired command sets the lease for IP addresses in a global IP address pool.
By default, the lease of IP addresses is one day.
Format
expired { day day [ hour hour [ minute minute ] ] | unlimited }
Parameters
Parameter Description Value
Views
IP address pool view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The expired-hide command applies to DHCP servers. To meet different client
requirements, DHCP supports dynamic, automatic, and static address assignment.
Different hosts require different IP address leases. For example, if some hosts such
as a DNS server need to use certain IP addresses for a long time, configure
expired as unlimited to set the IP address lease of the specified global address
pool to unlimited. If some hosts such as a portable computer just need to user
temporary IP addresses, set the IP address lease of the specified global address
pool to the required time so that the expired IP addresses can be released and
assigned to other clients.
When a DHCP client starts or half of its IP address lease has passed, the DHCP
client sends a DHCP Request packet to the DHCP server to renew the lease. If the
IP address can still be assigned to the client, the DHCP server informs a renewed
IP address lease to the client. If the IP address can no longer be assigned to this
client, the DHCP server informs the client that the IP address lease cannot be
renewed and it needs to apply for another IP address.
Prerequisites
Run the ip pool command to create a global IP address pool and the dhcp enable
command to globally enable the DHCP server function.
Precautions
Different IP address leases can be specified for different global IP address pools on
a DHCP server. In a global IP address pool, all addresses have the same lease.
Example
# Specify the IP address lease of the global address pool global1 to 1 day 2 hours
and 30 minutes.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] expired day 1 hour 2 minute 30
Function
The dhcp server expired command sets the lease for IP addresses in an interface
IP address pool.
Format
dhcp server expired { day day [ hour hour [ minute minute ] ] | unlimited }
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp server expired command applies to DHCP servers. To meet different
client requirements, DHCP supports dynamic, automatic, and static address
assignment. Different hosts require different IP address leases. For example, if
some hosts such as a DNS server need to use certain IP addresses for a long time,
run the dhcp server expired unlimited command to set the IP address lease of
the specified VLANIF interface address pool to unlimited. If some hosts such as a
portable computer just need to user temporary IP addresses, run the dhcp server
expired command to set the IP address lease of the specified VLANIF interface
address pool to the required time so that the expired IP addresses can be released
and assigned to other clients.
When a DHCP client starts or half of its IP address lease has passed, the DHCP
client sends a DHCP Request packet to the DHCP server to renew the lease. If the
IP address can still be assigned to the client, the DHCP server informs the client of
a renewed IP address lease. If the IP address can no longer be assigned to this
client, the DHCP server informs the client that the IP address lease cannot be
renewed.
Prerequisites
Run the dhcp enable command to globally enable the DHCP function. Run the
dhcp select interface command in the VLANIF interface view to enable the
interface IP address pool.
Precautions
Different IP address leases can be specified for different interface IP address pools
on a DHCP server. In an interface IP address pool, all IP addresses have the same
lease.
Example
# Set the IP address lease of the IP address pool on VLANIF 100 to 2 days 2 hours
and 30 minutes.
<HUAWEI> system-view
[HUAWEI] dhcp enable
Function
The dhcp server forbidden-ip command specifies the range of IP addresses that
cannot be assigned to clients by the DHCP server.
By default, the system does not configure the range of IP addresses that cannot be
assigned to clients by the DHCP server.
Format
dhcp server forbidden-ip start-ip-address [ end-ip-address ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
Example
# Configure that IP addresses in the address pool 10.10.10.10 to 10.10.10.20
cannot be automatically assigned to clients.
<HUAWEI> system-view
[HUAWEI] dhcp server forbidden-ip 10.10.10.10 10.10.10.20
Function
The dhcp server ip-pool command creates a global IP address pool.
The undo dhcp server ip-pool command deletes a global IP address pool.
Format
dhcp server ip-pool pool-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The dhcp server ping command sets the maximum number of ping packets to be
sent and the maximum response time of a ping packet.
Format
dhcp server ping { packets number | timeout milliseconds } *
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
After the upgrade, it is replaced by the dhcp server ping { packet number |
timeout milliseconds } * command.
Example
# Set the maximum number of ping packets to be sent to 5.
<HUAWEI> system-view
[HUAWEI] dhcp server ping packets 5
19.5.1.6 dns-suffix
Function
The dns-suffix command configures the domain name suffix to be assigned by
the DHCP server to a DHCP client.
By default, no domain name suffix is configured for a DHCP client.
Format
dns-suffix domain-name
Parameters
Parameter Description Value
Views
IP address pool view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, it is replaced by the domain-name domain-name command.
Function
Using the ip relay address command, you can configure DHCP server addresses
on a VLANIF interface enabled with DHCP relay.
Using the undo ip relay address command, you can delete the configured DHCP
server addresses.
By default, no DHCP server address is configured on a VLANIF interface enabled
with DHCP relay.
Format
ip relay address ip-address
undo ip relay address { ip-address | all }
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The ip relay address command is applicable to DHCP relay agents. When a DHCP
client needs to send a DHCP request packet to a DHCP server on a different
network segment by using a DHCP relay agent, run the ip relay address
command on the DHCP relay agent to configure a DHCP server address.
Prerequisites
DHCP relay has been enabled on the VLANIF interface by using the dhcp select
relay command.
Precautions
If you run the ip relay address command multiple times, multiple DHCP server
addresses are configured.
Example
# Configure DHCP server addresses 10.2.2.2 on VLANIF100 enabled with DHCP
relay.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp select relay
[HUAWEI-Vlanif100] ip relay address 10.2.2.2
Function
The lease command sets the lease for IP addresses in a global IP address pool.
By default, the lease of IP addresses is one day.
Format
lease day [ hour [ minute ] ]
Parameters
Parameter Description Value
Views
IP address pool view
Default Level
2: Configuration level
Usage Guidelines
After the upgrade, it is replaced by the lease { day day [ hour hour [ minute
minute ] ] | unlimited } command.
Example
# Specify the IP address lease of the global address pool global1 to 1 day.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] lease 1
Function
The static-bind mac-address command binds a MAC address to a global IP
address pool.
Format
static-bind mac-address mac-address
Parameters
Parameter Description Value
Views
IP address pool view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The dhcpv6 relay destination command enables the DHCPv6 relay function on
interfaces and configures the IPv6 address of the DHCPv6 server or next-hop relay
agent.
Format
dhcpv6 relay destination ipv6-address interface interface-type interface-number
Parameters
Parameter Description Value
Views
Interface view
Default Level
2: Configuration level
Usage Guidelines
When a client applies to a DHCPv6 server on a different network segment for an
IPv6 address, you need to deploy a relay agent between the client and the
DHCPv6 server. In this manner, the relay agent transmits DHCPv6 messages
exchanged between the client and the DHCPv6 server.
Function
The mld-snooping group-policy command configures an IPv6 multicast group
policy on an interface.
Format
mld-snooping group-policy acl6-number vlan vlan-id mld-version [ default-
permit ]
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, port group view,
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Example
# Prevent MLDv2 hosts in VLAN 10 on GE0/0/1 from joining IPv6 multicast group
ff1c::3/32.
<HUAWEI> system-view
[HUAWEI] acl ipv6 number 2000
[HUAWEI-acl6-basic-2000] rule deny source ff1c::3/32
[HUAWEI-acl6-basic-2000] quit
[HUAWEI] mld-snooping enable
[HUAWEI] vlan 10
[HUAWEI-vlan10] mld-snooping enable
[HUAWEI-vlan10] quit
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
[HUAWEI-GigabitEthernet0/0/1] port trunk allow-pass vlan 10
[HUAWEI-GigabitEthernet0/0/1] mld-snooping group-policy 2000 vlan 10 2 default-permit
Function
The mld-snooping group-policy command configures an IPv6 multicast group
policy in a VLAN.
Format
mld-snooping group-policy acl6-number mld-version [ default-permit ]
Parameters
Parameter Description Value
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Example
# Prevent MLDv2 hosts in VLAN 4 from joining IPv6 multicast group ff1e::1/32.
<HUAWEI> system-view
[HUAWEI] acl ipv6 number 2001
[HUAWEI-acl6-basic-2001] rule deny source ff1e::1/32
[HUAWEI-acl6-basic-2001] quit
[HUAWEI] mld-snooping enable
[HUAWEI] vlan 4
[HUAWEI-vlan4] mld-snooping enable
[HUAWEI-vlan4] mld-snooping group-policy 2001 2 default-permit
Function
Using the explicit-path command, you can configure an explicit path of a tunnel.
Format
explicit-path path-name { enable | disable }
Parameters
Parameter Description Value
path-name Indicates the name of an explicit path. The value is a string of 1 to
31 characters.
enable Enables the explicit path of a tunnel. -
disable Disables the explicit path of a tunnel. -
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can configure an explicit path only after MPLS TE is enabled.
The addresses of the hops along the explicit path cannot overlap or loops cannot
occur. If a loop occurs, CSPF detects the loop and fails to calculate the path.
When the explicit path is in use, you cannot perform the following operations:
● Run the explicit-path path-name disable command to disable the explicit
path.
● Run the undo explicit-path command to delete the explicit path.
Example
# Create an explicit path named path1.
<HUAWEI> system-view
[HUAWEI] mpls
[HUAWEI-mpls] mpls te
[HUAWEI-mpls] quit
[HUAWEI] explicit-path path1 enable
[HUAWEI-explicit-path-path1]
Function
The mpls rsvp-te authentication handshake command configures the RSVP-TE
handshake mechanism and sets a local password.
The undo mpls rsvp-te authentication handshake command deletes the RSVP-
TE handshake mechanism configuration.
Format
mpls rsvp-te authentication handshake local-secret
Parameters
Parameter Description Value
local-secret Specifies the local The value is a string of 8 to 40 characters
password. without spaces. It has no default value.
Views
Interface view, RSVP-TE neighbor view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
The RSVP authentication function must have been enabled by running the mpls
rsvp-te authentication { { cipher | plain } auth-key | keychain keychain-name }
command in the interface view or the MPLS RSVP-TE neighbor view.
Precautions
local-secret is valid only on the local device and can be different from local-secret
configured on neighbors.
Example
# Configure the RSVP-TE handshake mechanism.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] mpls
[HUAWEI-Vlanif100] mpls te
[HUAWEI-Vlanif100] mpls rsvp-te
[HUAWEI-Vlanif100] mpls rsvp-te authentication cipher beijing123
[HUAWEI-Vlanif100] mpls rsvp-te authentication handshake 12345678
Function
The mpls rsvp-te send-message command configures the formats of objects in a
sent message.
By default, the formats of objects in the sent message are not configured.
Format
mpls rsvp-te send-message suggest-label exclude
Parameters
Views
MPLS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The mpls rsvp-te send-message command controls the formats of objects in the
messages sent by nodes. If required, you can use this command to adjust the
transmission of messages so that downstream nodes can use the carried object
format in processing.
Precautions
Configurations of the four formats of objects in a sent message can take effect
simultaneously.
Example
# Exclude the suggest-label object from a message.
<HUAWEI> system-view
[HUAWEI] mpls
[HUAWEI-mpls] mpls rsvp-te send-message suggest-label exclude
Function
The mpls te max-reservable-bandwidth command sets the maximum reservable
bandwidth of a link.
Format
mpls te max-reservable-bandwidth bw-value [ bc1 bc1-bw-value ]
Parameters
Parameter Description Value
bw-value Specifies the maximum The value is an integer ranging from
reservable link 0 to 40000000, in kbit/s. The default
bandwidth. value is 0.
bc1 bc1-bw- Specifies the maximum The value is an integer ranging from
value reservable bandwidth 0 to 40000000, in kbit/s. The default
for a BC1 link. value is 0.
Views
Interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
Using the mpls te bypass-tunnel bandwidth command, you can configure the
bypass LSP bandwidth.
Format
mpls te bypass-tunnel bandwidth { bandwidth | { bc0 | bc1 } { bandwidth | un-
limited } }
Parameters
Parameter Description Value
bandwidth Specifies the bandwidth that the bypass The value is an integer
tunnel can protect. that ranges from 1 to
32000000, in kbit/s.
bc0 Indicates the BC0 bandwidth (global -
bandwidth) that the bypass tunnel can
protect.
bc1 Indicates the BC1 bandwidth (subaddress -
pool bandwidth) that the bypass tunnel can
protect.
un-limited Indicates that there is no limit on the total -
bandwidth that can be protected.
Views
Tunnel interface view
Default Level
2: Configuration level
Usage Guidelines
The total bandwidth of LSPs protected by the bypass tunnel is not more than the
bandwidth of the primary tunnel. When multiple bypass tunnels exist, the system
selects a single bypass tunnel through the best-fit algorithm.
The total bandwidth of all the LSPs protected by the bypass tunnel is not greater
than the bandwidth of the primary tunnel. When multiple bypass tunnels exist,
the system determines the bypass tunnel through the best-fit algorithm.
Example
# Configure Tunnel1 to protect the LSPs that use the BC0 bandwidth and set no
limit on the bandwidth to be protected.
<HUAWEI> system-view
[HUAWEI] interface tunnel 1
[HUAWEI-Tunnel1] tunnel-protocol mpls te
[HUAWEI-Tunnel1] destination 2.2.2.2
[HUAWEI-Tunnel1] mpls te tunnel-id 100
[HUAWEI-Tunnel1] mpls te bypass-tunnel bandwidth bc0 un-limited
[HUAWEI-Tunnel1] mpls te commit
Function
The mpls te protect-switch manual command sends a manual switchover
request to a specified tunnel.
Format
mpls te protect-switch manual [ work-lsp | protect-lsp ]
Parameters
Views
Tunnel interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The snmp-agent trap enable command enables SNMP traps with a related
parameter.
The undo snmp-agent trap enable command disables SNMP traps with a related
parameter.
Format
snmp-agent trap enable { static-lsp | ldp | lsp [ mplsxcup | mplsxcdown ] |
tunnel-ps | te { tunnel-reop | te-frr [ private ] | hot-standby | ordinary |
bandwidth-change } | [ te ] tunnel }
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
By default, the trap function is disabled in the process of the MPLS LSP
establishment.
To check the status of an LSP, run the snmp-agent trap enable lsp { mplsxcup |
mplsxcdown } command when mplsXCUp or mplsXCDown is enabled.
After the undo snmp-agent trap enable command is run, information about
mplsXCUp or mplsXCDown is not displayed, and the status of the trap is
unchanged. When you run the snmp-agent trap enable command again,
information about the restored trap is displayed.
Example
# Enable the private trap of TE FRR.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable te te-frr private
Function
The snmp-agent trap enable feature-name ldp command enables the trap for
the MPLS LDP module.
The undo snmp-agent trap enable feature-name ldp command disables the
trap for the MPLS LDP module.
Format
snmp-agent trap enable feature-name ldp trap-name { session-down |
session-up }
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Run the snmp-agent trap enable feature-name ldp command to enable the LDP
session trap. Currently, all traps of the MPLS LDP module are non-excessive trap.
The frequent LDP session status changes do not trigger a large number of traps.
Example
# Enable the trap of the event that an LDP session is reestablished.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name ldp trap-name session-up
Function
Using the static-cr-lsp ingress bandwidth command, you can configure a static
CR-LSP and specify its bandwidth on the ingress LSR.
Format
static-cr-lsp ingress { tunnel-interface tunnel interface-number | tunnel-name }
destination destination-address { nexthop next-hop-address | outgoing-interface
interface-type interface-number } * out-label out-label bandwidth { bc0 | bc1 }
bandwidth
Parameters
Parameter Description Value
tunnel-interface Specifies the tunnel -
tunnel interface- interface of a static CR-LSP.
number interface-number indicates
the tunnel interface number.
tunnel-name Specifies the name of a CR- The name is a string of 1 to 19
LSP. case-sensitive characters,
spaces and abbreviation not
supported. If you use the
interface Tunnel 2 command
to create a tunnel interface for
a static CR-LSP, the tunnel
name in the static-cr-lsp
ingress command must be
formatted as "Tunnel2",
otherwise, the tunnel cannot
be created. There is no such a
limit for the transit node and
egress node.
destination Specifies the destination IP -
destination- address of a static CR-LSP.
address
nexthop next- Specifies the next-hop IP -
hop-address address of a static CR-LSP.
outgoing- Specifies the type and -
interface number of an outgoing
interface-type interface. This parameter is
interface-number only applicable to a P2P
link.
out-label out- Specifies the value of an out-label is an integer ranging
label outgoing label. from 16 to 1048575.
bc0 Specifies BC0 bandwidth of -
a static CR-LSP.
bc1 Specifies BC1 bandwidth of -
a static CR-LSP.
bandwidth Specifies the bandwidth The value ranges from 0 to
required by a CR-LSP. 4000000000, in kbit/s. The
default value is 0.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Before setting up an MPLS TE tunnel through a static CR-LSP, configure a static
route or an IGP to ensure connectivity between LSRs, and enable basic MPLS and
MPLS TE functions.
Example
# Configure the static CR-LSP named Tunnel1, with the destination IP address
being 10.1.3.1, the next-hop address being 10.1.1.2, the outgoing label being 237,
and the required bandwidth being 20 kbit/s from BC0 on the ingress.
<HUAWEI> system-view
[HUAWEI] static-cr-lsp ingress tunnel-interface Tunnel 1 destination 10.1.3.1 nexthop 10.1.1.2 out-
label 237 bandwidth bc0 20
Format
static-cr-lsp transit lsp-name [ incoming-interface interface-type interface-
number ] in-label in-label { nexthop next-hop-address | outgoing-interface
interface-type interface-number } * out-label out-label bandwidth { bc0 | bc1 }
bandwidth [ description description ]
Parameters
Parameter Description Value
lsp-name Specifies the CR-LSP name. The name is a string of 1
to 19 case-sensitive
characters, spaces not
supported.
incoming-interface Specifies the name of an -
interface-type incoming interface.
interface-number
in-label in-label Specifies the value of an An integer ranging from
incoming label. 16 to 1023
nexthop next-hop- Specifies the next-hop -
address address.
outgoing-interface Specifies the name of an -
interface-type outgoing interface.
interface-number
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Before setting up an MPLS TE tunnel through a static CR-LSP, configure a static
route or an IGP to ensure connectivity between LSRs, and enable basic MPLS and
MPLS TE functions.
Example
# Configure the static CR-LSP named tunnel34, with the incoming interface being
VLANIF10, the incoming label being 123, the outgoing interface being VLANIF20,
the outgoing label as 253, the required BC0 bandwidth being 20 kbit/s on the
transit node.
<HUAWEI> system-view
[HUAWEI] static-cr-lsp transit tunnel34 incoming-interface vlanif 10 in-label 123 outgoing-interface
vlanif 20 out-label 253 bandwidth bc0 20
Format
undo mpls te auto-frr
Parameters
None
Views
Interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
mpls te auto-frr block command.
Function
The display ipv6 prefix-limit statistics command displays the statistics of the
prefix limits of IPv6 VPN instances.
Format
display ipv6 prefix-limit { all-vpn6-instance | vpn6-instance vpn-instance-
name } statistics
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ipv6 prefix-limit statistics command to view the number
of times that a protocol re-adds or deletes routes according to the prefix limit of a
specified IPv6 VPN instance.
Example
# Display the statistics of the prefix limits of all IPv6 VPN instances.
<HUAWEI> display ipv6 prefix-limit all-vpn6-instance statistics
-------------------------------------------------------------------------------
IPv6 VPN instance name: vrf1
DenyAdd TryAddInDelState NotifyDelAll NotifyDelFinish NotifyAddRoute
DIRECT 0 0 0 0 0
STATIC 0 0 0 0 0
OSPFv3 11 3 1 0 5
IS-IS 106 0 1 0 5
RIPng 98 0 1 1 5
BGP 2 0 1 1 5
------------------------------------------------------------------------------
IPv6 VPN instance name: VPN123
Table 19-3 Description of the display ipv6 prefix-limit statistics command output
Item Description
# Display the statistics of the prefix limit of the IPv6 VPN instance named vrf1.
<HUAWEI> display ipv6 prefix-limit vpn6-instance vrf1 statistics
-------------------------------------------------------------------------------
Format
display ipv6 vpn6-instance [ brief | verbose ] [ vpn6-instance-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If a VPN instance is configured, you can check the configuration of the instance by
using the display ipv6 vpn6-instance command. You can also use this command
to view the VPN instances configured on the local device.
When no parameters are specified, the command displays brief information about
all the configured VPN instances.
Example
# View brief information about all the configured IPv6 VPN instances.
<HUAWEI> display ipv6 vpn6-instance
Total VPN-Instances configured :3
Total IPv4 VPN-Instances configured : 2
Total IPv6 VPN-Instances configured : 1
Item Description
Item Description
Item Description
VPN FRR Route Policy VPN FRR route policy used for the
address family. This item is displayed
only after the vpn frr command is run
in the VPN instance IPv4 address
family view.
Item Description
Function
The ipv6 binding vpn6-instance command binds the current interface to an IPv6
VPN instance.
The undo ipv6 binding vpn6-instance command unbinds the current interface
from an IPv6 VPN instance.
By default, an interface is a public network interface and is not bound to any IPv6
VPN instance.
Format
ipv6 binding vpn6-instance vpn6-instance-name
Parameters
Views
Interface view
Default Level
2: Configuration level
Usage Guidelines
After an IPv6 VPN instance is created, the device interfaces belonging to the IPv6
VPN instance need to be bound to the instance; otherwise, the interfaces are
public network interfaces.
Function
The ipv6 vpn6-instance command creates an IPv6 VPN instance and displays the
IPv6 VPN instance view.
The undo ipv6 vpn6-instance command deletes a specified IPv6 VPN instance.
Format
ipv6 vpn6-instance vpn6-instance-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After this command is run, an IPv6 VPN instance is created and the IPv6 VPN
instance view is displayed.
Format
link-alive [ period period ] [ retry-times retry-times ]
undo link-alive
Parameters
Parameter Description Value
period Specifies the interval for The value is an integer that ranges
sending link-alive from 1 to 32767, in seconds. The
packets. default value is 5.
retry-times Specifies the tunnel- The value is an integer that ranges
retry-times unreachable counter from 1 to 255. The default value is
value. 3.
Views
Tunnel interface view
Default Level
2: Configuration level
Usage Guidelines
The link-alive function takes effect on a GRE tunnel immediately after you run the
link-alive command on the tunnel interface. After you run the undo link-alive
command, the link-alive function immediately becomes invalid. The source end of
a GRE tunnel periodically sends link-alive packets. The tunnel-unreachable counter
increases by 1 every time a link-alive packet is sent. If the source end does not
receive any response packet when the tunnel-unreachable counter value reaches
retry-times, the source end considers the remote end unreachable.
Example
# Enable the link-alive function on a GRE tunnel and retain the default parameter
values.
<HUAWEI> system-view
[HUAWEI] interface tunnel 1
[HUAWEI-Tunnel1] tunnel-protocol gre
[HUAWEI-Tunnel1] link-alive
# Enable the link-alive function on a GRE tunnel. Set the interval for sending link-
alive packets to 12 seconds and retain the default tunnel-unreachable counter
value.
<HUAWEI> system-view
[HUAWEI] interface tunnel 1
[HUAWEI-Tunnel1] link-alive period 12
# Enable the link-alive function on a GRE tunnel. Set the interval for sending link-
alive packets to 12 seconds and the tunnel-unreachable counter to 4.
<HUAWEI> system-view
[HUAWEI] interface tunnel 1
[HUAWEI-Tunnel1] link-alive period 12 retry-times 4
Function
The snmp-agent trap enable feature-name l3vpn command enables the trap
function for the L3VPN module.
The undo snmp-agent trap enable feature-name l3vpn command disables the
trap function for the L3VPN module.
Format
snmp-agent trap enable feature-name l3vpn trap-name
l3vpn_mib_trap_mid_exceed
undo snmp-agent trap enable feature-name l3vpn trap-name
l3vpn_mib_trap_mid_exceed
Parameters
Parameter Description Value
trap-name Enables the traps of L3VPN events of -
specified types.
l3vpn_mib_trap_mid_exceed Enables the trap of the event indicating -
that the number of private route prefixes
exceeds the middle threshold.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The Simple Network Management Protocol (SNMP) is a standard network
management protocol widely used on TCP/IP networks. It uses a central computer
(a network management station) that runs network management software to
manage network elements. The management agent on the network element
automatically reports traps to the network management station. After that, the
network administrator immediately takes measures to resolve the problem.
The snmp-agent trap enable feature-name l3vpn command enables the trap
function for L3VPN modules.
Example
# Enable the trap of the event indicating that the number of private route prefixes
exceeds the middle threshold in the system view.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name l3vpn trap-name l3vpn_mib_trap_mid_exceed
The undo snmp-agent trap enable l3vpn command prohibits the device from
sending the L3VPN trap message.
Format
snmp-agent trap enable l3vpn
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
None
Example
# Permit the device to send the L3VPN trap message.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable l3vpn
Function
The sa authentication-hex command sets an authentication in hexadecimal
format or cipher text for Security Associations (SAs).
Format
sa authentication-hex { inbound | outbound } { ah | esp } plain hex-plain-key
Parameters
Parameter Description Value
inbound Specifies SA parameters for -
incoming packets.
Views
SA view
Default Level
3: Management level
Usage Guidelines
This command is upgrade compatible and can be executed during configuration
recovery. Users cannot manually configure this command.
After the upgrade, this command is no longer supported, and it is replaced by the
sa authentication-hex command.
Format
sa encryption-hex { inbound | outbound } { ah | esp } plain hex-plain-key
Parameters
Parameter Description Value
inbound Specifies SA parameters for -
incoming packets.
outbound Specifies SA parameters for -
outgoing packets.
ah Specifies SA parameters for -
Authentication Header (AH).
If the security proposal
applied to an SA uses AH, ah
must be configured in the sa
encryption-hex command.
esp Specifies SA parameters for -
Encapsulating Security
Payload (ESP). If the security
proposal applied to an SA
uses ESP, esp must be
configured in the sa
encryption-hex command.
plain Indicates the plaintext used -
for authentication.
Views
SA view
Default Level
3: Management level
Usage Guidelines
This command is upgrade compatible and can be executed during configuration
recovery. Users cannot manually configure this command.
After the upgrade, this command is no longer supported, and it is replaced by the
sa encryption-hex command.
Function
The sa string-key command configures an authentication key in the string format.
Format
sa string-key { inbound | outbound } { ah | esp } plain string-plain-key
Parameters
Views
SA view
Default Level
3: Management level
Usage Guidelines
This command is upgrade compatible and can be executed during configuration
recovery. Users cannot manually configure this command.
After the upgrade, this command is no longer supported, and it is replaced by the
sa string-key command.
Function
The anti-attack broadcast-flood blacklist disable command disables the
broadcast flood blacklist function.
The undo anti-attack broadcast-flood blacklist disable command enables the
broadcast flood blacklist function.
By default, the broadcast flood blacklist function is disabled.
Format
anti-attack broadcast-flood blacklist disable
undo anti-attack broadcast-flood blacklist disable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the broadcast flood blacklist function is enabled, the device considers traffic
with a rate higher than that specified in anti-attack broadcast-flood sta-rate-
threshold sta-rate-threshold a broadcast flood attack and adds the STA to the
blacklist.
Prerequisites
The broadcast flood detection function has been enabled using the undo anti-
attack broadcast-flood sta-rate-threshold command.
Function
The anti-attack broadcast-flood blacklist enable command enables the
broadcast flood blacklist function.
Format
anti-attack broadcast-flood blacklist enable
undo anti-attack broadcast-flood blacklist enable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The anti-attack broadcast-flood disable command disables the broadcast flood
detection function.
The undo anti-attack broadcast-flood disable command enables the broadcast
flood detection function.
By default, the broadcast flood detection function is enabled.
Format
anti-attack broadcast-flood disable
undo anti-attack broadcast-flood disable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The anti-attack broadcast-flood sta-rate-threshold command sets the broadcast
flood threshold.
Format
anti-attack broadcast-flood sta-rate-threshold sta-rate-threshold
Parameters
Parameter Description Value
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Format
ap-location longitude { e | w } longitude-value latitude { s | n } latitude-value
ap-location latitude { s | n } latitude-value longitude { e | w } longitude-value
Parameters
Parameter Description Value
longitude e Specifies the The value supports two formats: degrees,
longitude- east longitude minutes, and seconds (DMS) and decimal
value value of an AP. degrees (DD).
● The DMS format is XXX-XX-XX. XXX ranges
from 0 to 180, and XX ranges from 0 to 59.
● The DD format is XXX.XXXXXXXXX. XXX ranges
from 0 to 180, and XXXXXXXXX is a decimal
supporting a maximum of 9 digits.
For example, the east longitude value of an AP
can be set to longitude e 120-45-23 in DMS
format and longitude e 120.756333333 in DD
format.
longitude w Specifies the The value supports two formats: DMS and DD.
longitude- west longitude ● The DMS format is XXX-XX-XX. XXX ranges
value value of an AP. from 0 to 180, and XX ranges from 0 to 59.
● The DD format is XXX.XXXXXXXXX. XXX ranges
from 0 to 180, and XXXXXXXXX is a decimal
supporting a maximum of 9 digits.
For example, the west longitude value of an AP
can be set to longitude w 120-45-23 in DMS
format and longitude w 120.756333333 in DD
format.
latitude n Specifies the The value supports two formats: DMS and DD.
latitude- north
value ● The DMS format is XX-XX-XX. The first XX
longitude ranges from 0 to 90, and the other XXs range
value of an AP. from 0 to 59.
● The DD format is XX.XXXXXXXXX. XX ranges
from 0 to 90, and XXXXXXXXX is a decimal
supporting a maximum of 9 digits.
For example, the north longitude value of an AP
can be set to latitude n 78-45-23 in DMS format
and latitude n 78.756333333 in DD format.
Views
AP view
Default Level
2: Configuration level
Usage Guidelines
You can run this command to set the longitude and latitude of an AP for easily
locating it.
Format
calibrate auto-channel-select disable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Two channel selection modes are available:
● Automatic mode (enabling automatic channel selection): An AP automatically
selects a proper channel based on the WLAN radio environment, removing the
need to specify channels manually.
● Fixed mode (disabling automatic channel selection): Channels must be
manually specified.
NOTE
When automatic channel selection is enabled, the manually configured channels do not take
effect to ensure that the radio works in the optimal channel environment.
Function
The calibrate auto-txpower-select disable command disables automatic transmit
power selection.
Format
calibrate auto-txpower-select disable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Two power selection modes are available:
● Automatic mode (enabling automatic transmit power selection): An AP
automatically selects or adjusts the transmit power based on the WLAN radio
environment, removing the need to specify AP power manually.
● Fixed mode (disabling automatic transmit power selection): The transmit
power must be manually specified.
Function
The calibrate error-rate-threshold command sets the retransmission rate
threshold.
Format
calibrate error-rate-threshold error-rate-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
The retransmission rate is the ratio of retransmitted packets to all packets sent by
a radio.
The retransmission rate threshold determines whether the radio environment is
normal. When the retransmission rate of a radio reaches the threshold, the system
considers that the radio environment deteriorates. When this occurs, the system
may start radio calibration or take measures to avoid signal interference.
Format
calibrate noise-threshold threshold
undo calibrate noise-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The noise floor indicates the noise strength in the current environment. A high
noise floor value will make noise drown out valid data, affecting user services.
The noise floor threshold for triggering radio calibration can be used to determine
whether the environment noise is normal. When detecting a noise floor value
higher than the threshold, an AP reports a high noise floor message to the AC.
The AC then performs radio calibration to avoid channels with high noise floor
values to improve user experience.
Function
The calibrate policy command creates a radio calibration policy.
Format
calibrate policy noise
Parameters
Parameter Description Value
noise Indicates the noise floor mode. -
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Noise floor policy: When the noise floor of APs is high due to special external
interference, service experience may deteriorate. With this radio calibration policy,
the device takes actions to avoid interference. When detecting that the noise floor
of the current channel exceeds the threshold for three consecutive times, an AP
notifies the AC of the high noise floor. The AC then allocates another channel to
the AP and does not allocate the current channel to the AP in 30 minutes.
Prerequisites
The noise floor threshold for triggering radio calibration has been specified using
the calibrate noise-floor-threshold threshold command.
Function
The contain-mode command sets the wireless intrusion protection system (WIPS)
mode.
Format
contain-mode all
Parameters
Parameter Description Value
Views
WIDS profile view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Format
dot11r private
undo dot11r private
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Due to the characteristics of Wi-Fi and different behaviors of different terminals
on the WLAN, the actual roaming experience for the terminals varies. The roaming
experience for latency-sensitive services such as audio, video, and gaming cannot
be guaranteed. Roaming optimization policies are different for terminals and APs
and may conflict with each other. Therefore, simply optimization for terminals or
APs cannot solve the problem. AirEngine series APs (except the AirEngine
5760-10) are optimized for Huawei terminals running EMUI 10.0 or later. After the
Huawei's proprietary 802.11r function is enabled, APs can carry the interworking
IE in Beacon and Probe Response frames and perform roaming negotiation with
Huawei terminals based on the specified frame format and interaction action. This
function implements mutual trust and interworking between devices and pipes,
reduces resource overheads during roaming negotiation, and effectively improves
roaming experience.
Precautions
Example
# Enable the Huawei's proprietary 802.11r function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] dot11r private
Function
The frame-format command configures the format for serial frames on an IoT
card interface.
The undo frame-format command restores the configured format for serial
frames to the default value.
Format
frame-format { fixed-length | frame-start-stop }
undo frame-format
Parameters
Parameter Description Value
Views
Serial profile view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The frame-length command configures the length for serial frames on an IoT
card interface.
The undo frame-length command restores the configured length for serial frames
to the default value.
Format
frame-length frame-length-value
undo frame-length
Parameters
Parameter Description Value
Views
Serial profile view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Format
frame-start frame-start-value
undo frame-start
Parameters
Parameter Description Value
Views
Serial profile view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Format
frame-stop frame-stop-value
undo frame-stop
Parameters
Parameter Description Value
frame-stop-value Specifies the stop flag byte of a frame. The value ranges
from 0 to ff.
Views
Serial profile view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Format
gap-threshold gap-threshold-value
undo gap-threshold
Parameters
Parameter Description Value
Views
Static load balancing group view
Default Level
2: Configuration level
Usage Guidelines
After the load difference threshold for load balancing based on the number of
users is configured using the gap-threshold command, an AP implements load
balancing based on the difference between the number of users on different
radios. The load balancing algorithm is as follows:
The AC calculates the load percentage of each radio in a load balancing group
using the formula: Load percentage of a radio = (Number of associated users on
the radio/Maximum number of users allowed on the radio) x 100%. The AC
compares load percentages of all radios in the load balancing group and obtains
the smallest load percentage value. When a user requests to associate with an AP
radio, the AC calculates the difference between the radio's load percentage and
the smallest load percentage value and compares the load difference with the
threshold. If the difference is smaller than the threshold, the AC allows the user to
associate with the radio. If not, the AC rejects the association request of the user.
If users continue to send association requests to the AP and the maximum number
of times the AP rejects users' association requests for a static load balancing
group, the AP allows user access.
Format
sta-number gap-threshold gap-threshold-value
undo sta-number gap-threshold
Parameters
Parameter Description Value
Views
Static load balancing group view
Default Level
2: Configuration level
Usage Guidelines
After the load difference threshold for load balancing based on the number of
users is configured using the sta-number gap-threshold command, an AP
implements load balancing based on the difference between the number of users
on different radios.
Function
learn-client-address disable command disables STA address learning.
Format
learn-client-address disable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a STA associates with an AP that has STA address learning enabled and obtains
an IP address, the AP automatically reports the STA IP address to the AC to
maintain the STA' IP address and MAC address binding entry
Prerequisites
● You have disabled the DHCP trusted interface by running undo dhcp trust
port in the VAP profile view.
● Before disabling STA address learning, run the undo learn-client-address
dhcp-strict command to disable strict STA IP address learning through DHCP.
Precautions
Format
parity { none | odd | even | mark | space }
undo parity
Parameters
Parameter Description Value
Views
Serial profile view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Format
serial-profile name profile-name
undo serial-profile { name profile-name | all }
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Format
serial-profile profile-name
undo serial-profile
Parameters
Parameter Description Value
Views
IoT card interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The smart-roam enable command enables smart roaming.
Format
smart-roam enable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a traditional WLAN, when a STA is farther from an AP, the access rate of the
STA becomes lower but the STA still associates with the AP without reinitiating a
connection with the AP or roaming to another AP. This degrades user experience.
To prevent this situation, configure the smart roaming function. When detecting
that the SNR or access rate of a STA is lower than the specified threshold, the AP
sends a Disassociation packet to the STA so that the STA can reconnect or roam to
another AP.
Format
speed speed-value
undo speed
Parameters
Parameter Description Value
speed-value Specifies the baud rate for serial The unit is bit/s and
communication on an IoT card slot. the value can be:
● 9600 bit/s
● 19200 bit/s
● 38400 bit/s
● 57600 bit/s
● 115200 bit/s
Views
Serial profile view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Format
start-threshold start-threshold-value
undo start-threshold
Parameters
Parameter Description Value
Views
Static load balancing group view
Default Level
2: Configuration level
Usage Guidelines
You can use this command to set the start threshold for load balancing based on
the number of users in a static load balancing group. If the load on a radio does
not reach the start threshold, the device does not implement load balancing
control on access STAs.
Format
sta-load-balance dynamic gap-threshold gap-threshold
undo sta-load-balance dynamic gap-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
When a user requests to connect to an AP, the AP will count the total number of
access users on all radios. If the total number of access users does not exceed the
start threshold, the AP does not implement dynamic load balancing. The AP
implements dynamic load balancing only when the total number of access users
on all radios exceeds the start threshold.
Function
The sta-load-balance dynamic sta-number command sets the load difference
threshold for dynamic load balancing based on the number of users.
Format
sta-load-balance dynamic sta-number gap-threshold gap-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
When a user requests to connect to an AP, the AP will count the total number of
access users on all radios. If the total number of access users does not exceed the
start threshold configured, the AP does not implement dynamic load balancing.
The AP implements dynamic load balancing only when the total number of access
users on all radios exceeds the start threshold.
Function
The sta-load-balance dynamic start-threshold command sets the start threshold
for dynamic load balancing based on the number of users.
By default, the start threshold for dynamic load balancing based on the number of
users is 10.
Format
sta-load-balance dynamic start-threshold start-threshold
undo sta-load-balance dynamic start-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
When a user requests to connect to an AP, the AP counts the total number of
access users on all radios. If the number of access users on the requested radio
does not exceed the start threshold, the AP does not implement dynamic load
balancing based on the number of users. The AP implements dynamic load
balancing based on the number of users only after the number of access users
exceeds the start threshold.
Format
stopbits { 1 | 2 }
undo stopbits
Parameters
Parameter Description Value
Views
Serial profile view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The traffic-filter command configures ACL-based IPv4 packet filtering on an AP's
wired interface.
Format
traffic-filter { inbound | outbound } acl { acl-number | name acl-name }
Parameters
Parameter Description Value
Views
AP wired port profile view
Default Level
3: Management level
Usage Guidelines
Usage scenario
The rules for an AP's wired interface to filter IPv4 packets based on ACLs are as
follows:
● If the action in the ACL rule is deny, the device discards IPv4 packets
matching the rule.
● If the action in the ACL rule is permit, the device allows IPv4 packets
matching the rule to pass through.
● If no rule is matched, IPv4 packets are allowed to pass through.
Prerequisites
An ACL rule has been created by running the acl [ number ] acl-number [ match-
order { auto | config } ] or acl name acl-name acl-number [ match-order { auto
| config } ] command.
Precautions
The traffic-filter command can reference an ACL with no rule configured. You can
configure a rule for the ACL after running this command.
You can configure IPv4 packet filtering based on only one ACL in one direction. If a
referenced ACL needs to be replaced, configure a new ACL to overwrite the
original one.
Format
traffic-filter { inbound | outbound } acl { acl-number1 | acl-number2 | name acl-
name }
undo traffic-filter { inbound | outbound }
Parameters
Parameter Description Value
Views
Traffic profile view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After the traffic-filter command is executed in the traffic profile view, the device
filters packets matching a specified ACL rule:
● If the action in the ACL rule is deny, the device discards IPv4 packets
matching the rule.
● If the action in the ACL rule is permit, the device allows IPv4 packets
matching the rule to pass through.
● If no rule is matched, IPv4 packets are allowed to pass through.
Prerequisites
An ACL rule has been created by running the acl [ number ] acl-number [ match-
order { auto | config } ] or acl name acl-name acl-number [ match-order { auto
| config } ] command.
Precautions
The traffic-filter command can reference an ACL with no rule configured. You can
configure a rule for the ACL after running this command.
You can configure IPv4 packet filtering based on only one ACL in one direction. If a
referenced ACL needs to be replaced, configure a new ACL to overwrite the
original one.
Function
The traffic-optimize broadcast-suppression enable command enables rate limit
for broadcast and multicast packets packets on an AP.
By default, rate limit for broadcast and multicast packets packets is disabled on an
AP.
Format
traffic-optimize broadcast-suppression { all | arp | igmp | nd | other } enable
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The traffic-optimize broadcast-suppression disable command disables rate limit
for broadcast and multicast packets on an AP.
The undo traffic-optimize broadcast-suppression disable command enables rate
limit for broadcast and multicast packets on an AP.
By default, rate limit for broadcast and multicast packets is enabled on an AP.
Format
traffic-optimize broadcast-suppression other disable
undo traffic-optimize broadcast-suppression other disable
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The traffic-optimize broadcast-suppression rate-threshold command sets a rate
threshold for broadcast and multicast packets on an AP.
The undo traffic-optimize broadcast-suppression rate-threshold command
restores the default threshold of broadcast and multicast packets on an AP.
The default rate threshold for ARP broadcast packets, ND broadcast packets, IGMP
multicast packets, and other types of broadcast packets is 256 pps.
Format
traffic-optimize broadcast-suppression other rate-threshold threshold-value
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
The undo vht mcs-map command restores the default maximum MCS value
corresponding to a specific number of 802.11ac spatial streams in the 5G radio
profile.
By default, the maximum MCS value of the 802.11 ac radios is 9 in the 5G radio
profile.
Format
vht mcs-map { nss nss-value { max-mcs max-mcs-value } } & <2-3>
Parameters
Parameter Description Value
Views
5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Rates of 802.11ac radios depend on the index value of Modulation and Coding
Scheme (MCS). A larger MCS value indicates a higher transmission rate.
● If nss-value is equal to or larger than the actual number of spatial streams
supported by an AP, the maximum MCS value corresponding to all spatial
streams of the AP is max-mcs-value.
● If nss-value is smaller than the actual number of spatial streams supported by
an AP, only the maximum MCS value of configured spatial streams is max-
mcs-value. The maximum MCS value of the other spatial streams does not
take effect.
For example, if nss-value is 2, and the AP supports 3 spatial streams. Only the
maximum MCS value of spatial stream 1 and spatial stream 2 is max-mcs-
value, and that of spatial stream 3 does not take effect.
Precautions
This configuration applies only to STAs associated with an AP in 802.11ac mode
but does not take effect on STAs associated with the AP in other modes.
Function
The sniffer enable command enables and configures the working mode of an
AP's built-in Bluetooth module.
The undo sniffer enable command disables the configured working mode of an
AP's built-in Bluetooth module.
Format
sniffer enable
Parameters
None
Views
BLE profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After enabling the Bluetooth monitoring function, the built-in Bluetooth module
of an AP will scan and obtain information about surrounding BLE devices, and
reports the obtained information such as MAC addresses, RSSIs, BLE broadcast
frame contents, and battery power.
After you run the undo sniffer enable command to disable the BLE monitoring
function, the AC will trigger an alarm indicating that BLE devices are offline.
Follow-up Procedure
After the Bluetooth monitoring function is enabled, you are advised to run the ble
monitoring-list command to add Bluetooth devices to the monitoring list for easy
management. When a Bluetooth device in the monitoring list is offline or has low
battery power, an alarm is triggered on the AC accordingly. If a Bluetooth device is
not in the monitoring list, no such alarm will be triggered on the AC.
Function
The broadcasting-content command configures the content of a BLE broadcast
frame sent by an AP's built-in Bluetooth module.
The undo broadcasting-content command restores the default content of a BLE
broadcast frame sent by an AP's built-in Bluetooth module.
By default, the UUID, Major, and Minor fields in a BLE broadcast frame sent by an
AP's built-in Bluetooth module are null, and the RSSI calibration value is -65 dBm.
NOTE
Only the AP4050DN-E supports the Bluetooth broadcast function.
Format
broadcasting-content { uuid uuid-value | major major-value | minor minor-value
| reference-rssi reference-rssi-value }*
undo broadcasting-content
Parameters
Parameter Description Value
uuid uuid- Specifies the UUID field in a BLE The value is a string of 1
value broadcast frame. UUID is the to 16 characters. The
universally unique identifier of a BLE default value is null.
device.
major major- Specifies the Major field in a BLE The value is a string of 1
value broadcast frame. This field specifies or 2 characters. The
a major group and is combined with default value is null.
the Minor field to define information
about a BEL device, for example,
location of a BLE device.
minor minor- Specifies the Minor field in a BLE The value is a string of 1
value broadcast frame. This field specifies or 2 characters. The
a minor group and is combined with default value is null.
the Major field to define information
about a BEL device, for example,
location of a BLE device.
reference-rssi Specifies the RSSI calibration value The value is an integer
reference-rssi- of a BLE device. RSSI calibration that ranges from -97 to
value value indicates the RSSI value of a -50, in dBm. The default
BLE device measured at a distance of value is -65 that is
1 m. It is used to estimate the measured when the
distance between the BLE device and transmit power of an APs'
Bluetooth terminals. built-in Bluetooth module
is 0 dBm.
Views
BLE profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After enabling the broadcast function of an AP's built-in Bluetooth module using
the broadcaster enable command, you can run the broadcasting-content
command to configure the content of BLE broadcast frames sent by the module.
Precautions
The RSSI calibration value in a BLE broadcast frame is set based on the actual
measurement result.
After changing the transmit power of a built-in Bluetooth module using the tx-
power (BLE profile view) command, you need to remeasure and reconfigure the
RSSI calibration value. Therefore, you are advised to run the tx-power (BLE
profile view) command to configure the transmit power of a built-in Bluetooth
module before configuring the RSSI calibration value.
Format
radio-5g-profile profile-name
undo radio-5g-profile
Parameters
Parameter Description Value
Views
AP group view, AP view, AP radio view, AP group radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you create a 5G radio profile, bind it to a 5G radio so that the 5G radio
profile can take effect.
Precautions
The configuration in the AP view and AP radio view has a higher priority than that
in the AP group view and AP group radio view.
Format
vap-profile profile-name wlan wlan-id
undo vap-profile profile-name wlan wlan-id
Parameters
Parameter Description Value
Views
AP group view, AP view, AP radio view, AP group radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you create a VAP profile, bind it to a radio so that the VAP profile can take
effect.
Precautions
After a VAP profile is bound to a radio, parameter settings in the VAP profile apply
to the radio using the profile.
Format
learn-client-address enable
undo learn-client-address enable
Parameters
None
Views
AP wired port profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After terminal address learning is enabled on an AP's wired interface, if a wired
terminal connected to the AP wired interface successfully obtains an IP address,
the AP automatically reports the IP address of the terminal to the AC, helping to
maintain the ARP binding entries of wired terminals.
Prerequisites
You have disabled the DHCP trusted interface by running undo dhcp trust port in
the AP wired port profile view.
Follow-up Procedure
Bind the AP wired port profile to an AP group or AP.
Precautions
Function
The radio-2g-profile command binds a 2G radio profile to a 2G radio.
By default, no 2G radio profile is applied in the AP view and AP radio view, but the
2G radio profile default is applied to the AP group view and AP group radio view.
Format
radio-2g-profile profile-name
undo radio-2g-profile
Parameters
Parameter Description Value
Views
AP group view, AP view, AP radio view, AP group radio view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you create a 2G radio profile, bind it to a 2G radio so that the 2G radio
profile can take effect.
Precautions
After a 2G radio profile is applied in the AP group view or AP view, the parameter
settings in the profile take effect on all 2G radios in the AP group or the 2G radio
of the AP.
The configuration in the AP view and AP radio view has a higher priority than that
in the AP group view and AP group radio view.
Format
master controller
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisite
Run the master-controller enable command to enable the Master Controller role.
Format
mu-mimo enable
Parameters
None
Views
SSID profile view, WDS profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Carrier sense multiple access with collision avoidance (CSMA-CA) allows an air
interface channel to be occupied only by one STA, and other STAs cannot
communicate with the AP. After MU-MIMO is enabled, STAs supporting MU-
MIMO can form an MU group to simultaneously receive downlink data from the
same air interface channel, improving channel efficiency and overall downlink
throughput.
Function
The bfd bind peer-ipv6 command creates a BFD6 session to test an IPv6 link.
By default, no BFD6 session is created to test an IPv6 link.
Format
bfd bfd-name bind peer-ipv6 peer-ipv6 [ vpn6-instance vpn6-instance-name ]
[ interface interface-type interface-number ] [ source-ipv6 ipv6-address ]
Parameters
Parameter Description Value
vpn6-instance Specifies the name of the VPN instance that The value is a
vpn6-instance- is bound to a BFD6 session. If no VPN string of 1 to 31
name instance is specified, the peer IP address is characters.
regarded as a public IP address.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
Example
# Create a BFD6 session named test to test the single-hop link.
<HUAWEI> system-view
[HUAWEI] bfd
[HUAWEI-bfd] quit
[HUAWEI] bfd test bind peer-ipv6 2001:db8:1::1 vpn6-instance vpn1 interface gigabitethernet 0/0/1
[HUAWEI-bfd-session-test] discriminator local 1
[HUAWEI-bfd-session-test] discriminator remote 2
[HUAWEI-bfd-session-test] commit
Function
The display bfd statistics session command displays BFD statistics.
Format
display bfd statistics session peer-ipv6 peer-ipv6 [ { vpn-instance | vpn6-
instance } vpn-instance-name ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
Function
The display bfd session command displays information about BFD sessions.
Format
display bfd session peer-ipv6 peer-ipv6 [ { vpn-instance | vpn6-instance } vpn-
instance-name ] [ verbose ]
Parameters
Parameter Description Value
peer-ipv6 peer-ipv6 Displays the configuration of a BFD6 -
session bound to a specified peer
IPv6 address.
{ vpn-instance | vpn6- Displays information about a BFD6 The value must
instance } vpn- session bound to a specified VPN be an existing
instance-name instance. VPN instance
name.
verbose Displays detailed information about -
the BFD6 configuration.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
It is replaced by the display bfd session peer-ipv6 peer-ipv6 [ vpn-instance vpn-
instance-name ] [ verbose ] command.
Function
The display bfd configuration command displays configurations of BFD sessions.
Format
display bfd configuration peer-ipv6 peer-ipv6 [ { vpn-instance | vpn6-instance }
vpn6-instance-name ] [ verbose ]
Parameters
Parameter Description Value
peer-ipv6 peer-ipv6 Displays the configuration of a BFD6 -
session bound to a specified peer
IPv6 address.
{ vpn-instance | vpn6- Displays the configuration of a BFD6 The value must
instance } vpn6- session bound to a specified VPN be an existing
instance-name instance VPN instance
name.
verbose Displays detailed information about -
BFD6 configurations.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
Function
The snmp-agent trap enable bfd command enables the trap function for the BFD
module.
Format
snmp-agent trap enable bfd
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The snmp-agent trap enable dldp command enables the trap function for the
DLDP module.
Format
snmp-agent trap enable dldp
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
snmp-agent trap enable feature-name dldp command.
Function
The dldp authentication-mode md5-compatible command configures MD5-
compatible authentication.
Format
dldp authentication-mode md5-compatible md5-password
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Scenario
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
When the device that uses MD5 authentication is upgraded from V200R001 or
V200R002 to V200R008 or later, to ensure compatibility, upgrade the DLDP
authentication mode to MD5-compatible.
Function
The ma command creates an MA in an MD and displays the MA view. If the MA
already exists, this command displays the MA view.
Format
ma ma-name format { icc-based | string }
Parameters
Parameter Description Value
ma-name Specifies the name of an MA. Names of The value is a string of
MAs in an MD are unique. characters without
spaces, hyphen (-), or
question mark (?). The
total length of the
names of the MA and
MD must be within 44
case-sensitive
characters.
icc-based Specifies an ICC-based MA name carried in -
CCMs to be sent. ITU carrier codes (ICCs)
are assigned to network operators or
service providers and maintained by ITU-T
Telecommunication Standardization Bureau
(TSB) in compliance with ITU-T M.1400
Recommendation.
string Specifies a string-based MA name carried -
in CCMs to be sent.
Views
MD view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
Using the cfm md command, you can create an MD and enter the MD view. If the
MD exists, you can use this command to enter the MD view.
Format
cfm md md-name format { dnsname-and-mdname | mac-address | md-name }
[ level level ]
Parameters
Parameter Description Value
md md-name Specifies the name of an The value is a string of 1 to 43
MD. characters, which are case
sensitive. The characters, such
as ?, -, and space are excluded.
The name of an MD is used to
identify the MD. Different MDs
on a device cannot have the
same name.
NOTE
When double quotation marks are
used around the string, spaces are
allowed in the string.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The delay-measure one-way continual receive command configures a remote
device to receive DMMs to implement proactive one-way frame delay
measurement.
By default, the remote device enabled with proactive one-way frame delay
measurement in the maintenance association (MA) is not configured to receive
DMMs.
Format
delay-measure one-way continual receive
Parameters
None
Views
MA view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
Using the delay-measure one-way receive command, you can configure the DM
frame receiving function on the remote end of the local device enabled with one-
way frame delay measurement.
By default, the DM frame receiving function is not configured for the remote end
in an MA.
Format
delay-measure one-way receive
Parameters
None
Views
MA view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
Using the delay-measure two-way receive command, you can enable DM frame
reception on the remote MEP to implement the two-way frame delay
measurement.
Format
delay-measure two-way receive
Parameters
None
Views
MA view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
delay-measure two-way receive mep mep-id [ 8021p { 8021p-value } &<1-3> ]
[ peer-ip peer-ip [ vc-id vc-id ] ] command.
Function
Using the efm threshold-event trigger error-shutdown command, you can
enable the error-triggered shutdown function on an interface. After this function is
enabled, the interface is shut down when the number of EFM errored frames or
errored codes reaches the threshold.
Format
efm threshold-event trigger error-shutdown
Parameters
None
Views
Interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The efm trigger if-net command associates EFM with an interface.
Format
efm trigger if-net
Parameters
None
Views
Interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
It is replaced by the efm trigger if-down command.
Function
The oam-bind ingress interface egress cfm md ma command configures an
interface to report faults to Ethernet CFM.
Format
oam-bind ingress interface interface-type interface-number egress cfm md md-
name ma ma-name
Parameters
Views
OAM management view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The oam-bind ingress interface egress efm interface command enables an
interface to report faults to EFM OAM.
Format
oam-bind ingress interface interface-type1 interface-number1 egress efm
interface interface-type2 interface-number2
Parameters
Parameter Description Value
interface-type1 Specifies the type and number of the interface -
interface- enabled with EFM.
number1
● interface-type1 specifies the interface type.
● interface-number1 specifies the interface number.
interface-type2 Specifies the type and number of the interface bound -
interface- to an EFM OAM session.
number2
● interface-type2 specifies the interface type.
● interface-number2 specifies the interface number.
Views
OAM management view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The snmp-agent trap enable efm command enables the trap function for the
EFM module.
Format
snmp-agent trap enable efm
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After an upgrade, this command is no longer supported, and it is replaced by the
snmp-agent trap enable feature-name efm command.
Function
The snmp-agent trap enable eoam-1ag command enables the trap function for
the Eoam-1ag module.
By default, the trap function is disabled for the Eoam-1ag module.
Format
snmp-agent trap enable eoam-1ag
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After an upgrade, this command is no longer supported, and it is replaced by the
snmp-agent trap enable feature-name eoam-1ag command.
Function
The snmp-agent trap enable test-packet command enables an Ethernet OAM
module to send traps to the NMS.
Format
snmp-agent trap enable test-packet
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The adminuser-priority command configures a user as an administrator to log in
to the device and sets the administrator level during login.
Format
adminuser-priority level
Parameters
Parameter Description Value
level Specifies the level of The value is an integer ranging from 0 to 15.
an administrator. After logging in to the device, a user can run
only the commands of the same level or
lower levels.
Views
Service scheme view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Its function is the same as that of the admin-user privilege level level command.
Function
The hwtacacs-server shared-key command configures the shared key of an
HWTACACS server.
The undo hwtacacs-server shared-key command deletes the shared key of an
HWTACACS server.
By default, no shared key of an HWTACACS server is configured.
Format
hwtacacs-server shared-key simple key-string
undo hwtacacs-server shared-key
Parameters
Parameter Description Value
Views
HWTACACS server template view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Its function is the same as that of the hwtacacs-server shared-key [ cipher ] key-
string command.
Function
The local-user command creates a local user and sets parameters of the local
user.
By default, a local user exists in the system. The privilege of the user is 15, and
service type is http. The default username and password are available in S Series
Switches Default Usernames and Passwords (Enterprise Network or Carrier). If
you have not obtained the access permission of the document, see Help on the
website to find out how to obtain it.
Format
local-user user-name password { key-string [ old-password password ] | simple
simple-string } [ access-limit max-number | idle-timeout minutes [ seconds ] |
state { block | active } ] *
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Its function is the same as that of the local-user user-name { password { cipher |
irreversible-cipher } password [ old-passwordold-password ] | access-limit max-
number | ftp-directory directory | idle-timeout minutes [ seconds ] | privilege
level level | state { block | active } } * command.
Function
The local-user level command sets the level of a local user.
Format
local-user user-name level level
Parameters
Parameter Description Value
Views
AAA view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Its function is the same as that of the local-user user-name privilege level level
command.
Function
The radius-server accounting command configures the RADIUS accounting
server.
Format
radius-server accounting ipv4-address port [ vpn-instance vpn-instance-name |
source { loopback interface-number | ip-address ipv4-address } | weight weight-
value ] * secondary
Parameters
Parameter Description Value
source ip-address ipv4- Specifies the source IPv4 The value is a valid
address address of a RADIUS unicast address in dotted
accounting server. decimal notation.
source ip-address ipv6- Specifies the source IPv6 The value is a 32-digit
address address of a RADIUS hexadecimal number, in
accounting server. the format
X:X:X:X:X:X:X:X.
Views
RADIUS server template view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Its function is the same as that of the radius-server accounting ipv4-address port
[ vpn-instance vpn-instance-name | source { loopback interface-number | ip-
address ipv4-address } | weight weight-value ] * or radius-server accounting
ipv6-address port [ source { loopback interface-number | ip-address ipv6-
address } | weight weight-value ] * command.
Function
The radius-server authentication command configures a RADIUS authentication
server.
The undo radius-server authentication command deletes the configured RADIUS
authentication server.
By default, no RADIUS authentication server is specified.
Format
radius-server authentication ipv4-address port [ vpn-instance vpn-instance-
name | source { loopback interface-number | ip-address ipv4-address } | weight
weight-value ] * secondary
radius-server authentication ipv6-address port [ source { loopback interface-
number | ip-address ipv6-address } | weight weight-value ] * secondary
undo radius-server authentication secondary
undo radius-server authentication ipv4-address port source { loopback | ip-
address ipv4-address } secondary
undo radius-server authentication ipv6-address port source { loopback | ip-
address ipv6-address } secondary
Parameters
Parameter Description Value
source ip-address ipv4- Specifies the source IPv4 The value is a valid
address address in RADIUS unicast address in dotted
packets sent from the decimal notation.
device to a RADIUS
authentication server.
If this parameter is not
specified, the IPv4
address of the outbound
interface is used as the
source IPv4 address in
RADIUS packets sent
from the device to a
RADIUS authentication
server.
source ip-address ipv6- Specifies the source IPv6 The value is a 32-digit
address address in RADIUS hexadecimal number, in
packets sent from the the format
device to a RADIUS X:X:X:X:X:X:X:X.
authentication server.
If this parameter is not
specified, the IPv6
address of the outbound
interface is used as the
source IPv6 address in
RADIUS packets sent
from the device to a
RADIUS authentication
server.
Views
RADIUS server template view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Its function is the same as that of the radius-server authentication ipv4-address
port [ vpn-instance vpn-instance-name | source { loopback interface-number |
ip-address ipv4-address } | weight weight-value ] * or radius-server
authentication ipv6-address port [ source { loopback interface-number | ip-
address ipv6-address } | weight weight-value ] * command.
Function
The radius-server authorization command configures the RADIUS authorization
server.
The undo radius-server authorization command deletes the configured RADIUS
authorization server.
By default, no RADIUS authorization server is configured.
Format
radius-server authorization ip-address [ vpn-instance vpn-instance-name ]
{ server-group group-name | shared-key { key-string | simple simple-string } } *
[ ack-reserved-interval interval ]
undo radius-server authorization ip-address [ vpn-instance vpn-instance-name ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Its function is the same as that of the radius-server authorization command.
Function
The radius-server shared-key command configures the shared key of a RADIUS
server.
By default, the password is in cipher text. The default username and password are
available in S Series Switches Default Usernames and Passwords (Enterprise
Network or Carrier). If you have not obtained the access permission of the
document, see Help on the website to find out how to obtain it.
Format
radius-server shared-key { key-string | simple simple-string }
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Its function is the same as that of the radius-server shared-key cipher key-string
command.
Function
Using the radius-server testuser command, you can create a user account for
automatic detection in the RADIUS server template.
Using the undo radius-server testuser command, you can delete a user account
for automatic detection.
By default, a user account for automatic detection in the RADIUS server template
is not created.
Format
radius-server testuser username username password password
undo radius-server testuser
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Its function is the same as that of the radius-server testuser username username
password cipher password command.
Function
Using the radius-server test-user command, you can create a user account for
automatic detection in the RADIUS server template.
Using the undo radius-server test-user command, you can delete a user account
for automatic detection.
By default, a user account for automatic detection in the RADIUS server template
is not created.
Format
radius-server test-user username password
undo radius-server test-user
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Its function is the same as that of the radius-server testuser username username
password cipher password command.
Function
The radius-server test-user detect interval command sets the interval for
automatic user status detection.
Format
radius-server test-user detect interval interval-time
Parameters
Parameter Description Value
Views
RADIUS server template view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The radius-server user-name domain-included force command configures the
device encapsulate the domain name in the user name in RADIUS packets to be
sent to a RADIUS server.
Format
radius-server user-name domain-included force
Parameters
None
Views
RADIUS server template view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The remote-aaa-user authen-fail command enables the remote AAA
authentication account locking function, and sets the authentication retry interval,
maximum number of consecutive authentication failures, and account locking
period.
Format
remote-aaa-user authen-fail retry-interval retry-interval retry-time retry-time
block-time block-time
Parameters
Parameter Description Value
Views
AAA view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Its function is the same as that of the access-user remote authen-fail command
and administrator remote authen-fail command.
Function
The authentication arp handshake command enables the handshake with pre-
connection users and authorized users.
The undo authentication arp handshake command disables the handshake with
pre-connection users and authorized users.
By default, the handshake with pre-connection users and authorized users is
enabled.
Format
authentication arp handshake
undo authentication arp handshake
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication handshake command.
Function
The authentication handshake command enables the handshake with pre-
connection users and authorized users.
The undo authentication handshake command disables the handshake with pre-
connection users and authorized users.
Format
authentication handshake
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication handshake command in the authentication profile view.
Function
The authentication event action authorize command configures the device to
assign network access policies to users before the users are authenticated.
By default, no network access right is granted to users before the users are
authenticated.
Format
authentication event pre-authen action authorize service-scheme service-
scheme
undo authentication event pre-authen action authorize
authentication event { authen-fail | authen-server-down } action authorize
service-scheme service-scheme [ response-fail ]
undo authentication event { authen-fail | authen-server-down } action
authorize
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication event pre-authen action authorize service-scheme scheme-
name and authentication event { authen-fail | authen-server-down } action
authorize service-scheme service-scheme [ response-fail ] commands in the
authentication profile view.
Function
The authentication event authen-server-up action re-authen command enables
the device to re-authenticate users when the authentication server changes from
Down to Up.
By default, the device does not re-authenticate users when the authentication
server changes from Down to Up.
Format
authentication event authen-server-up action re-authen
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication event authen-server-up action re-authen command in the
authentication profile view.
Function
The authentication event client-no-response action authorize command
configures the device to assign network access policies to users before the users
are authenticated.
The undo authentication event client-no-response action authorize command
deletes the configured network access policies.
By default, no network access right is granted to users before the users are
authenticated.
Format
authentication event client-no-response action authorize service-scheme
service-scheme
undo authentication event client-no-response action authorize
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication event client-no-response action authorize service-scheme
service-scheme command in the 802.1X access profile view.
Function
The authentication event portal-server-down action authorize command
configures network access policies for users when the Portal server is Down.
By default, no network access policy is configured for users when the Portal server
is Down.
Format
authentication event portal-server-down action authorize service-scheme
service-scheme
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication event portal-server-down action authorize service-scheme
service-scheme command in the Portal access profile view.
Function
The authentication event portal-server-up action re-authen command enables
the device to re-authenticate users when the Portal server changes from Down to
Up.
By default, the device does not re-authenticate users when the Portal server
changes from Down to Up.
Format
authentication event portal-server-up action re-authen
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication event portal-server-up action re-authen command in the Portal
access profile view.
Function
The authentication timer arp handshake-period command sets the handshake
interval of the device with pre-connection users and authorized users.
The undo authentication timer arp command restores the default setting.
The default handshake interval of the device with pre-connection users and
authorized users is 300 seconds.
Format
authentication timer arp handshake-period handshake-period
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication timer handshake-period handshake-period command.
Function
The authentication timer handshake-period command sets the handshake
interval of the device with pre-connection users and authorized users.
The undo authentication timer handshake-period command restores the
default setting.
The default handshake interval of the device with pre-connection users and
authorized users is 300 seconds.
Format
authentication timer handshake-period handshake-period
undo authentication timer handshake-period
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication timer handshake-period handshake-period command in the
authentication profile view.
Function
The authentication timer authen-fail-user-aging command configures the aging
time for entries of the users who fail to be authenticated.
By default, the aging time for entries of the users who fail to be authenticated is
23 hours.
Format
authentication timer authen-fail-user-aging aging-time
Parameters
Parameter Description Value
aging-time Specifies the aging time. The value is an integer that
ranges from 0 or 60 to 4294860,
If the user still fails to be in seconds.
authenticated when the user
aging time expires, the user entry The value 0 indicates that the
is deleted. entry does not age.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication timer authen-fail-aging aging-time command in the
authentication profile view.
Function
The authentication timer pre-authen-user-aging command configures the aging
time for pre-connection user entries.
The undo authentication timer pre-authen-user-aging command restores the
default aging time for pre-connection user entries.
By default, the aging time for pre-connection user entries is 23 hours.
Format
authentication timer pre-authen-user-aging aging-time
undo authentication timer pre-authen-user-aging
Parameters
Parameter Description Value
aging-time Specifies the aging time. The value is an integer that
ranges from 0 or 60 to 4294860,
If the user still fails to be in seconds.
authenticated when the user
aging time expires, the user entry The value 0 indicates that the
is deleted. entry does not age.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication timer pre-authen-aging aging-time command in the
authentication profile view.
Function
The authentication timer re-authen command configures the interval for re-
authenticating pre-connection users or users who fail to be authenticated.
The undo authentication timer re-authen command restores the default setting.
By default, pre-connection users and users who fail to be authenticated are re-
authenticated at an interval of 60 seconds.
Format
authentication timer re-authen { pre-authen re-authen-time | authen-fail re-
authen-time }
undo authentication timer re-authen { pre-authen | authen-fail }
Parameters
Parameter Description Value
pre-authen re- Specifies the interval for The value is an integer that ranges
authen-time re-authenticating pre- from 0 or 30 to 7200, in seconds.
connection users.
The value 0 indicates that the re-
authentication function is disabled
for pre-connection users.
authen-fail re- Specifies the interval for The value is an integer that ranges
authen-time re-authenticating users from 30 to 7200, in seconds.
who fail to be
authenticated.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication timer re-authen { pre-authen re-authen-time | authen-fail re-
authen-time } command in the authentication profile view.
Function
The authentication device-type voice authorize command enables voice
terminals to go online without authentication.
Format
authentication device-type voice authorize [ service-scheme scheme-name ]
undo authentication device-type voice authorize [ service-scheme ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication device-type voice authorize service-scheme scheme-name
command in the authentication profile view.
Function
The authentication free-rule command configures the NAC authentication-free
rule for users.
The undo authentication free-rule command restores the default configuration.
By default, no NAC authentication-free rule is configured.
Format
authentication free-rule rule-id { destination { any | ip { ip-address mask
{ mask-length | ip-mask } [ tcp destination-port port | udp destination-port
port ] | any } } | source { any | { interface interface-type interface-number | ip
{ ip-address mask { mask-length | ip-mask } | any } | vlan vlan-id } * } } *
undo authentication free-rule { rule-id | all }
Parameters
Parameter Description Value
rule-id Specifies the ID of the NAC The value is an
authentication-free rule. integer of which the
range depends on
product models
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
free-rule rule-id { destination { any | ip { ip-address mask { mask-length | ip-
mask } [ tcp destination-port port | udp destination-port port ] | any } } |
source { any | { ip { ip-address mask { mask-length | ip-mask } | any } | vlan vlan-
id } * } } * command in the authentication-free rule profile view.
Function
The authentication mode command configures the user access mode.
The undo authentication mode command restores the default user access mode.
Format
authentication mode { single-terminal | single-voice-with-data | multi-share |
multi-authen [ max-user max-user-number ] }
undo authentication mode [ multi-authen max-user ]
Parameters
Parameter Description Value
single- Specifies the interface to allow only one user to -
terminal go online.
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication mode { single-terminal | single-voice-with-data | multi-share |
multi-authen [ max-user max-user-number ] } command in the authentication
profile view.
Function
The authentication command enables NAC authentication.
The undo authentication command disables NAC authentication.
By default, NAC authentication is disabled.
Format
Layer 2 interface view:
Parameters
Parameter Description Value
Views
VLANIF interface view, Ethernet interface view, GE interface view, XGE interface
view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
dot1x-access-profile access-profile-name, mac-access-profile access-profile-
name, and portal-access-profile access-profile-name commands in the
authentication profile view.
Function
The authentication single-access command enables the device to allow users to
access in only one authentication mode.
Format
authentication single-access
Parameters
None
Views
System view, VLANIF interface view, Ethernet interface view, GE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication single-access command in the authentication profile view.
Function
The authentication trigger-condition dhcp dhcp-option command enables the
device to send DHCP option information to the authentication server when
triggering MAC address authentication through DHCP packets.
The undo authentication trigger-condition dhcp dhcp-option command
restores the default configuration.
By default, the device does not send DHCP option information to the
authentication server when triggering MAC address authentication through DHCP
packets.
Format
authentication trigger-condition dhcp dhcp-option option-code
undo authentication trigger-condition dhcp dhcp-option option-code
Parameters
Parameter Description Value
option-code Specifies the option that the device sends The value is fixed as 82.
to the authentication server.
Views
System view, Ethernet interface view, GE interface view, XGE interface view, 40GE
interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication trigger-condition dhcp dhcp-option option-code command in
the mac access profile view.
Function
The authentication trigger-condition command configures the packet types that
can trigger 802.1X authentication.
The undo authentication trigger-condition command restores the default
configuration.
By default, DHCP/ARP packets can trigger 802.1X authentication.
Format
authentication trigger-condition { dhcp | arp } *
Parameters
Parameter Description Value
dhcp Triggers 802.1X authentication through DHCP packets. -
Views
System view, VLANIF interface view, Ethernet interface view, GE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication trigger-condition { dhcp | arp } * command in the 802.1X access
profile view.
Function
The authentication trigger-condition command configures the packet types that
can trigger MAC address authentication.
Format
authentication trigger-condition { dhcp | arp | dhcpv6 | nd } *
Parameters
Parameter Description Value
dhcp Triggers MAC address authentication through DHCP packets. -
Views
System view, VLANIF interface view, Ethernet interface view, GE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication trigger-condition { dhcp | arp | dhcpv6 | nd } * command in the
mac access profile view.
Function
The domain command configures the default domain or force domain for users.
The undo domain command deletes the configured default domain or force
domain.
Format
Layer 2 interface view:
Parameters
Parameter Description Value
Views
System view, VLANIF interface view, Ethernet interface view, GE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
access-domain domain-name [ dot1x | mac-authen | portal ]* [ force ]
command in the authentication profile view.
Function
The dot1x authentication-method command sets the authentication mode for
802.1X users.
Format
dot1x authentication-method { chap | pap | eap }
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, XGE interface view, 40GE
interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
dot1x authentication-method { chap | pap | eap } command in the 802.1X
access profile view.
Function
The dot1x eap-notify-packet command enables the device to send an EAP packet
code number to users.
The undo dot1x eap-notify-packet command disables the device from sending
an EAP packet code number to users.
By default, the device is disabled from sending an EAP packet code number to
users.
Format
dot1x eap-notify-packet eap-code code-number data-type type-number
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
dot1x eap-notify-packet eap-code code-number data-type type-number
command in the 802.1X access profile view.
Function
The dot1x reauthenticate command enables periodic 802.1X re-authentication on
an interface.
Format
dot1x reauthenticate
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
dot1x reauthenticate command in the 802.1X access profile view.
Function
The dot1x retry command sets the maximum number of times an authentication
request is sent to an 802.1X user.
The undo dot1x retry command restores the default setting.
By default, the device sends an authentication request to an 802.1X user twice.
Format
dot1x retry max-retry-value
undo dot1x retry
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
dot1x retry max-retry-value command in the 802.1X access profile view.
Function
The dot1x timer reauthenticate-period command sets the re-authentication
interval for 802.1X authentication users.
The undo dot1x timer reauthenticate-period command restores the default re-
authentication interval.
By default, the re-authentication interval is 3600 seconds.
Format
dot1x timer reauthenticate-period reauthenticate-period-value
undo dot1x timer reauthenticate-period
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, XGE interface view, 40GE
interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
dot1x timer reauthenticate-period reauthenticate-period-value command in
the802.1X access profile view.
Function
The dot1x timer command sets values of timers used in 802.1X authentication.
The undo dot1x timer command restores the default settings of timers used in
802.1X authentication.
By default, the values of timers used in 802.1X authentication are not set.
Format
dot1x timer client-timeout client-timeout-value
undo dot1x timer client-timeout
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
dot1x timer command in the 802.1X access profile view.
Function
The dot1x trigger dhcp-binding command enables the device to automatically
generate the DHCP snooping binding table after static IP users pass 802.1X
authentication or when the users are at the pre-connection phase.
The undo dot1x trigger dhcp-binding command restores the default setting.
By default, the device does not automatically generate the DHCP snooping
binding table after static IP users pass 802.1X authentication or when the users
are at the pre-authentication phase.
Format
dot1x trigger dhcp-binding
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
dot1x trigger dhcp-binding command in the dot1x access profile view.
Function
The dot1x unicast-trigger command enables 802.1X authentication triggered by
unicast packets.
Format
dot1x unicast-trigger
undo dot1x unicast-trigger
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
dot1x unicast-trigger command in the 802.1X access profile view.
Function
The mac-authen offline dhcp-release command enables the device to clear user
entries when receiving DHCP Release packets from MAC address authentication
users.
The undo mac-authen offline dhcp-release command restores the default
configuration.
By default, the device does not clear user entries when receiving DHCP Release
packets from MAC address authentication users.
Format
In the system view:
mac-authen offline dhcp-release interface { interface-type interface-number1
[ to interface-number2 ] } &<1-10>
undo mac-authen offline dhcp-release interface { interface-type interface-
number1 [ to interface-number2 ] } &<1-10>
In the interface view:
mac-authen offline dhcp-release
undo mac-authen offline dhcp-release
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, XGE interface view, 40GE
interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
mac-authen offline dhcp-release command in the mac access profile view.
Function
The mac-authen permit mac-address command specifies the MAC address range
allowed for MAC address authentication.
The undo mac-authen permit mac-address command deletes the MAC address
range allowed for MAC address authentication.
Format
mac-authen permit mac-address mac-address mask { mask | mask-length }
undo mac-authen permit mac-address mac-address mask { mask | mask-
length }
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
mac-authen permit mac-address mac-address mask { mask | mask-length }
command in the mac access profile view.
Function
The mac-authen reauthenticate dhcp-renew command enables the device to re-
authenticate the users when receiving DHCP lease renewal packets from MAC
address authentication users.
The undo mac-authen reauthenticate dhcp-renew command restores the
default setting.
By default, the device does not re-authenticate the users when receiving DHCP
lease renewal packets from MAC address authentication users.
Format
mac-authen reauthenticate dhcp-renew
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
mac-authen reauthenticate dhcp-renew command in the mac access profile
view.
Function
The mac-authen reauthenticate command enables periodic MAC address re-
authentication on a specified interface.
Format
mac-authen reauthenticate
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
mac-authen reauthenticate command in the mac access profile view.
Function
The mac-authen timer reauthenticate-period command sets the re-
authentication interval for MAC address authentication users.
The undo mac-authen timer reauthenticate-period command restores the
default re-authentication interval.
By default, the re-authentication interval is 1800 seconds.
Format
mac-authen timer reauthenticate-period reauthenticate-period-value
undo mac-authen timer reauthenticate-period
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, XGE interface view, 40GE
interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
mac-authen timer reauthenticate-period reauthenticate-period-value command
in the mac access profile view.
Function
The mac-authen username command configures the user name format for MAC
address authentication.
The undo mac-authen username restores the default user name format.
By default, the MAC address without hyphens (-) is used as the user name and
password for MAC address authentication.
Format
mac-authen username { fixed username [ password cipher password ] |
macaddress [ format { with-hyphen | without-hyphen } [ password cipher
password ] ] | dhcp-option option-code { circuit-id | remote-id } password
cipher password }
undo mac-authen username [ fixed username [ password cipher password ] |
macaddress [ format { with-hyphen | without-hyphen } [ password cipher
password ] ] | dhcp-option option-code [ password cipher password ] ]
Parameters
Parameter Description Value
Views
System view, VLANIF interface view, Ethernet interface view, GE interface view,
XGE interface view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
mac-authen username command in the mac access profile view.
Function
The portal auth-network command configures a source subnet for Portal
authentication.
The undo portal auth-network command restores the default source subnet for
Portal authentication.
By default, the source subnet for Portal authentication is 0.0.0.0/0, indicating that
users in all subnets must pass Portal authentication.
Format
portal auth-network network-address { mask-length | mask-address }
Parameters
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
portal auth-network network-address { mask-length | mask-address } command
in the Portal access profile view.
Function
The portal https-redirect enable command enables HTTPS redirection of Portal
authentication.
The undo portal https-redirect enable command disables HTTPS redirection of
Portal authentication.
By default, HTTPS redirection is enabled for wireless Portal authentication users
and disabled for wired Portal authentication users.
Format
portal https-redirect enable
undo portal https-redirect enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
authentication https-redirect enable command.
Function
The portal local-server anonymous command enables anonymous login for users
in built-in Portal authentication.
The undo portal local-server anonymous command disables anonymous login
for users in built-in Portal authentication.
Format
portal local-server anonymous
Parameters
None
Views
VLANIF interface view, Ethernet interface view, GE interface view, XGE interface
view, 40GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
portal local-server anonymous command in the Portal access profile view.
Function
The portal local-server ad-image load command loads an advertisement image
file to the built-in Portal server login page.
By default, no advertisement image file is loaded to the built-in Portal server login
page.
Format
portal local-server ad-image load ad-image-file
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
There is a blank area on the login page of the default page package used by the
built-in Portal server. Users can customize this area by loading an advertisement
image file. When the login page needs to be customized based on special
requirements, the administrator can upload the user-defined advertisement image
file to the device and run the portal local-server ad-image load command. After
the advertisement image file is loaded, the user-defined advertisement images are
displayed on the built-in Portal server login page for authentication.
Prerequisites
The user-defined advertisement image file has been uploaded to the device.
Example
# Load the advertisement image file ad.png to the built-in Portal server login
page.
<HUAWEI> system-view
[HUAWEI] portal local-server ad-image load flash:/ad.png
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Function
The portal local-server anonymous command enables the anonymous login
function for users authenticated through the built-in Portal server.
Format
portal local-server anonymous [ redirect-url url ]
Parameters
Parameter Description Value
Views
Portal access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In places such as airports, hotels, cafes, and public recreation places, the
anonymous login function allows users to access the network without entering the
user name and password, facilitating network service provisioning.
After the anonymous login function is enabled, users are redirected to the login
page the first time they access a web page. To connect to the network, users only
need to accept terms in the license agreement and click Login.
If the redirect-url url parameter is specified, the web page corresponding to the
specified URL will be automatically displayed when anonymous login users access
web pages for the first time. This function can be used for advertisement push and
users are unaware of the anonymous login process, improving user experience.
Precautions
Example
# In the Portal access template p1, configure the anonymous login function for
users authenticated through the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal-access-profile name p1
[HUAWEI-portal-access-profile-p1] portal local-server anonymous
Function
The portal local-server authentication-method command configures the
authentication mode for Portal users on the built-in Portal server.
By default, the built-in Portal server uses CHAP to authenticate Portal users.
Format
portal local-server authentication-method { chap | pap }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Password Authentication Protocol (PAP) is a two-way handshake authentication
protocol. It transmits passwords in plain text format in RADIUS packets.
Challenge Handshake Authentication Protocol (CHAP) is a three-way handshake
authentication protocol. It transmits only user names using RADIUS packets, but
does not transmit passwords. CHAP is more secure and reliable than PAP. If high
security is required, CHAP is recommended.
Prerequisites
The built-in Portal server function has been enabled globally using the portal
local-server command.
Example
# Configure the built-in Portal server to use PAP to authenticate Portal users.
<HUAWEI> system-view
[HUAWEI] portal local-server authentication-method pap
Function
The portal local-server background-color command configures the background
color of the built-in Portal server login page.
Format
portal local-server background-color background-color-value
undo portal local-server background-color
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Users can customize the login page of the default page package used by the built-
in Portal server. The administrator can configure the background color of the login
page.
Example
# Configure the user-defined background color of the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server background-color #AABBCC
Function
The portal local-server background-image load command loads a background
image file to the built-in Portal server login page.
The undo portal local-server background-image load command deletes the
background image file loaded to the built-in Portal server login page.
By default, the device has two background images default-image0 and default-
image1. The built-in Portal server uses default-image0 as the background image
by default.
Format
portal local-server background-image load { background-image-file | default-
image1 }
undo portal local-server background-image load
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Users can customize the login page of the default page package used by the built-
in Portal server. Users can customize background images or select the default
ones. When the background image of the login page needs to be customized
based on special requirements, the administrator can upload the user-defined
background image file to the device and run the portal local-server background-
image load command. After the image is loaded, the user-defined background
image file is displayed on the built-in Portal server login page for authentication.
Prerequisites
The user-defined background image has been uploaded to the device.
Example
# Load the background image file bg.png to the built-in Portal server login page.
<HUAWEI> system-view
[HUAWEI] portal local-server background-image load flash:/bg.png
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Function
The portal local-server enable command enables the built-in Portal server
function in a Portal access profile.
The undo portal local-server enable command restores the default setting.
By default, the built-in Portal server function is disabled in a Portal access profile.
Format
portal local-server enable
undo portal local-server enable
Parameters
None
Views
Portal access profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In Portal authentication, the device needs to provide the IP address of the Portal
server. The device supports external and built-in Portal servers. When the built-in
Portal server is required to authenticate users, enable the built-in Portal server
function globally and then run the portal local-server enable command in the
Portal access profile. Then the built-in Portal server can be used to authenticate
the users who use the Portal access profile.
Prerequisites
The built-in Portal server function has been enabled globally using the portal
local-server command.
Example
# In the Portal access profile p1, enable the built-in Portal server function.
<HUAWEI> system-view
[HUAWEI] interface loopback 1
[HUAWEI-LoopBack1] ip address 10.1.1.1 24
[HUAWEI-LoopBack1] quit
[HUAWEI] portal local-server ip 10.1.1.1
[HUAWEI] ssl policy s1
[HUAWEI-ssl-policy-s1] quit
[HUAWEI] portal local-server https ssl-policy s1
[HUAWEI] portal-access-profile name p1
[HUAWEI-portal-access-profile-p1] portal local-server enable
Function
The portal local-server enable command enables built-in Portal authentication
on an interface.
The undo portal local-server enable command disables built-in Portal
authentication on an interface.
By default, built-in Portal authentication is disabled on an interface.
Format
In the system view:
portal local-server enable interface { interface-type interface-number1 [ to
interface-number2 ] } &<1-10>
undo portal local-server enable interface { interface-type interface-number1
[ to interface-number2 ] } &<1-10>
In the interface view:
portal local-server enable
undo portal local-server enable
Parameters
Parameter Description Value
Views
System view, VLANIF interface view, Ethernet interface view, GE interface view,
MultiGE interface view, XGE interface view, 25GE interface view, 40GE interface
view, 100GE interface view, Eth-Trunk interface view, Port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Compared with the external Portal server, the built-in Portal server is easy to use,
cost-effective, and easy to maintain. After built-in Portal authentication is enabled,
the external Portal server is not required. After the built-in Portal server function is
enabled using the portal local-server command, built-in Portal authentication
must be enabled on the interface using the portal local-server enable command
to authenticate users on the interface.
Prerequisites
Portal authentication has been enabled globally using the portal local-server
command.
Precautions
The portal local-server enable command cannot be used together with the
following commands on the same interface.
Command Function
Example
# Enable built-in Portal authentication on VLANIF 10.
<HUAWEI> system-view
[HUAWEI] interface loopback 1
[HUAWEI-LoopBack1] ip address 10.1.1.1 24
[HUAWEI-LoopBack1] quit
[HUAWEI] portal local-server ip 10.1.1.1
[HUAWEI] ssl policy s1
[HUAWEI-ssl-policy-s1] pki-realm default
[HUAWEI-ssl-policy-s1] quit
[HUAWEI] http secure-server ssl-policy s1
[HUAWEI] portal local-server https ssl-policy s1 port 1025
[HUAWEI] vlan batch 10
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] portal local-server enable
Function
The portal local-server ip command configures an IP address for the built-in
Portal server.
Format
portal local-server ip ip-address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When the device is used as a built-in Portal server, you can run the portal local-
server ip command to configure an IP address for the built-in Portal server. Users
are then redirected to the Portal server if they enter URLs that are not located in
the free IP subnet.
NOTE
● The IP address assigned to the built-in Portal server must have a reachable route to the
user.
● It is recommended that a loopback interface address be assigned to the built-in Portal
server because the loopback interface is stable. Additionally, packets destined for
loopback interfaces are not sent to other interfaces on the network; therefore, system
performance is not deteriorated even if many users request to go online.
● After users go online through the built-in Portal server, if the interface address or
interface (non-physical interface) matching the built-in Portal server's IP address is
deleted, online users cannot go offline and offline users cannot go online. Therefore,
exercise caution when you delete the interface address or interface.
Example
# Assign the IP address 10.1.1.1 to the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] interface loopback 1
[HUAWEI-LoopBack1] ip address 10.1.1.1 24
[HUAWEI-LoopBack1] quit
[HUAWEI] portal local-server ip 10.1.1.1
Function
The portal local-server keep-alive command configures the heartbeat detection
interval and mode of the built-in Portal server.
By default, the heartbeat detection function of the built-in Portal server is not
configured.
Format
portal local-server keep-alive interval interval-value [ auto ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a user closes the browser or an exception occurs, the device can detect the
user's online state to determine whether to make the user go offline. The
administrator can configure the heartbeat detection function of the built-in Portal
server. If the device does not receive a heartbeat packet from the client within a
specified period, the user is specified to go offline. The heartbeat detection mode
of the built-in Portal server can be either of the following modes:
● Forcible detection mode: This mode is valid for all users. If the device does not
receive a heartbeat packet from a user within a specified period, the device
specifies the user to go offline.
● Automatic detection mode: The device checks whether the client browser
supports the heartbeat program. If yes, the forcible detection mode is used for
the user; if no, the device does not detect the user. You are advised to
configure this mode to prevent users from going offline because the browser
does not support the heartbeat program.
NOTE
Currently, the heartbeat program is supported by Internet Explorer 8, FireFox 3.5.2, Chrome
28.0.1500.72, and Opera 12.00 on Windows 7. A Java program must be installed and
configured on the operating system.
Browsers using Java1.7 and later versions do not support the heartbeat program.
Precautions
When the forcible detection mode is configured, the device specifies users to go
offline to prevent from failing to receive heartbeat packets for a long time during
Example
# Configure the automatic detection function of the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server keep-alive interval 60 auto
Function
The portal local-server load command loads a page file package to the built-in
Portal server.
The undo portal local-server load command restores the default configuration.
By default, the built-in Portal server loads the default page file package
portalpage.zip.
Format
portal local-server load string
undo portal local-server load
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Customized page file packages can be loaded to the built-in Portal server.
Prerequisites
The page file (.zip) has been uploaded from the PC to the device storage media.
Precautions
The default page file package can be modified but cannot be deleted. If it is
deleted, the built-in Portal server fails to load the pages after startup.
This function is used by technical support personnel to develop limited page
customization based on customer requirements and does not apply to
customization by customers themselves.
Example
# Load the page file portalpage_01.zip on the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server load portalpage_01.zip
Warning: Portal local server has been enabled, and this operation will affect online user, continue?[Y/N]:y
Function
The portal local-server logo load command loads a logo file to the built-in Portal
server login page.
The undo portal local-server logo load command deletes the logo file loaded to
the built-in Portal server login page.
By default, no logo file is loaded to the built-in Portal server login page.
Format
portal local-server logo load logo-file
undo portal local-server logo load
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
There is a blank area on the login page of the default page package used by the
built-in Portal server. Users can customize this area by loading a logo file. When
the login page needs to be customized based on special requirements, the
administrator can upload the user-defined logo file to the device and run the
portal local-server logo load command. After the logo file is loaded, the user-
defined logo is displayed on the built-in Portal server login page for
authentication.
Prerequisites
Example
# Load the logo file logo.png to the built-in Portal server login page.
<HUAWEI> system-view
[HUAWEI] portal local-server logo load flash:/logo.png
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Function
The portal local-server command enables the built-in Portal server function.
The undo portal local-server command disables the built-in Portal server
function.
Format
portal local-server https ssl-policy policy-name [ port port-num ]
Parameters
Parameter Description Value
port port-num Specifies the TCP port The value can be 443 or
number used. any integer in the range
If you do not specify a of 1025 to 55535. By
port number, the default default, the port number
port number is used. is 443.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Compared with an external Portal server, a built-in Portal server is easy to use,
cost-effective, and easy to maintain. After a built-in Portal server is configured,
Portal authentication can be implemented for users without an external Portal
server. When using the portal local-server command to enable the built-in Portal
server function, configure the built-in Portal server to exchange authentication
messages with users using the HTTPS protocol. HTTPS is a secure extension of
HTTP and uses the SSL protocol to guarantee secure communication. To enable
the built-in Portal server to exchange authentication messages using HTTPS, you
need to configure an SSL policy and load a digital certificate to the server.
Prerequisites
● The IP address of the built-in Portal server has been configured using the
portal local-server ip command.
● An SSL policy has been configured using the ssl policy policy-name command
in the system view, and a certificate has been loaded using the certificate
load command in the SSL policy view.
● You have obtained a digital certificate for the SSL policy from an authorized
certificate authority.
Precautions
When there are Portal authentication users online, you cannot disable the built-in
Portal server function or change the SSL policy for the built-in Portal server.
Example
# Enable the built-in Portal server function and configure the server to use the SSL
policy s1.
<HUAWEI> system-view
[HUAWEI] interface loopback 1
[HUAWEI-LoopBack1] ip address 10.1.1.1 24
[HUAWEI-LoopBack1] quit
[HUAWEI] portal local-server ip 10.1.1.1
[HUAWEI] ssl policy s1
[HUAWEI-ssl-policy-s1] quit
[HUAWEI] portal local-server https ssl-policy s1
Function
The portal local-server page-text load command loads the use instruction page
file of the built-in Portal server.
The undo portal local-server page-text load command deletes the loaded use
instruction page file of the built-in Portal server.
By default, no use instruction page file of the built-in Portal server is loaded.
Format
portal local-server page-text load string
undo portal local-server page-text load
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If you need to customize the use instruction page, you can upload the customized
use instruction page file to the device, and run this command to load the file.
After the file is loaded, the hyperlink Instruction for Use is generated on the login
page of the built-in Portal server, and users can click the hyperlink to access the
use instruction page.
Prerequisite
Precautions
When the to-be-loaded page is customized, the page length and width are fixed.
After adjusting the page, the administrator must upload and load the modified
page again.
Currently, only Chinese or English page files can be loaded on the device.
Example
# Load the use instruction page file page.html to the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server page-text load flash:/page.html
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Function
The portal local-server policy-text load command loads a disclaimer page file to
the built-in Portal server.
The undo portal local-server policy-text load command deletes the loaded
disclaimer page file.
Format
portal local-server policy-text load string
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To customize a disclaimer page, upload the disclaimer page file to the device and
run this command to load the file. After the file is loaded, the hyperlink
Disclaimer will be displayed on the login page. You can click the link to visit the
disclaimer page.
Prerequisite
The disclaimer page file to be loaded has been uploaded to the device.
Precautions
Currently, only Chinese and English disclaimer page files can be loaded on the
device.
Example
# Load the disclaimer page file policy.html to the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server policy-text load policy.html
Info: The loading process may take a few seconds.Please wait for a moment.
Info: Load web file successfully.
Function
The portal local-server timer session-timeout command configures the session
timeout interval for built-in Portal authentication users.
The undo portal local-server timer session-timeout command restores the
default session timeout interval for built-in Portal authentication users.
By default, the session timeout interval is 8 hours for built-in Portal authentication
users.
Format
portal local-server timer session-timeout interval
undo portal local-server timer session-timeout
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Scenario
When built-in Portal authentication is used for users and the device functions as a
built-in Portal server, you can configure the session timeout interval for the users.
The users are disconnected after the specified session timeout interval. To connect
to the network again, the users need to be re-authenticated.
Precautions
The session timeout interval for built-in Portal authentication users is calculated
based on the device time. For example, if the session timeout interval is 6 hours
and the device time is 2014-09-01 02:00:00 when a user was connected, the user
should be disconnected at 2014-09-01 08:00:00. Therefore, ensure that the device
time and time zone are correct after the session timeout interval is configured for
users. If the device time is incorrect, users may fail to be connected or
disconnected properly. You can run the display clock command to check the
device time and the time zone.
Example
# Set the session timeout interval to 10 hours for built-in Portal authentication
users.
<HUAWEI> system-view
[HUAWEI] portal local-server timer session-timeout 10
Function
The portal local-server syslog-limit enable command enables the log
suppression function for users authenticated through the built-in Portal server.
The undo portal local-server syslog-limit enable command disables the log
suppression function for users authenticated through the built-in Portal server.
By default, the log suppression function is enabled for users authenticated through
the built-in Portal server.
Format
portal local-server syslog-limit enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The device generates logs when users authenticated through the built-in Portal
server fail to go online or offline. If a user fails to go online or offline, the user
attempts to go online or offline repeatedly, and the device generates a large
number of logs within a short time. This results in a high failure rate in the
statistics and degrades the system performance. You can run the portal local-
server syslog-limit enable command to enable the log suppression function for
users authenticated through the built-in Portal server. The device then only
generates one log if a user fails to go online or offline within a suppression period
(configured using the portal local-server syslog-limit period command).
Example
# Enable the log suppression function for users authenticated through the built-in
Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server syslog-limit enable
Function
The portal local-server syslog-limit period command configures the log
suppression period for users authenticated through the built-in Portal server.
The undo portal local-server syslog-limit period command restores the default
log suppression period.
By default, the log suppression period is 300 seconds for users authenticated
through the built-in Portal server.
Format
portal local-server syslog-limit period value
undo portal local-server syslog-limit period
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The device generates logs when users authenticated through the built-in Portal
server fail to go online or offline. If a user fails to go online or offline, the user
attempts to go online or offline repeatedly, and the device generates a large
number of logs within a short time. This results in a high failure rate in the
statistics and degrades the system performance. You can enable the log
suppression function (configured using the portal local-server syslog-limit
enable command) for users authenticated through the built-in Portal server. The
device then only generates one log if a user fails to go online or offline within a
suppression period.
Example
# Set the log suppression period to 1000 seconds for users authenticated through
the built-in Portal server.
<HUAWEI> system-view
[HUAWEI] portal local-server syslog-limit period 1000
Function
The portal timer offline-detect command sets the Portal user offline detection
interval.
The undo portal timer offline-detect command restores the default Portal user
offline detection interval.
By default, the Portal user offline detection interval is 300 seconds.
Format
portal timer offline-detect time-length
undo portal timer offline-detect
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
portal timer offline-detect time-length command in the Portal access profile
view.
19.11.2.57 url-parameter
Function
The url-parameter command sets parameters in a URL.
The undo url-parameter command deletes parameters in a URL.
By default, a URL does not carry parameters.
Format
url-parameter { ac-ip ac-ip-value | ac-mac ac-mac }*
undo url-parameter
NOTE
The command is only supported by the S5731-H, S5731S-H, S6730S-H, S5732-H, and
S6730-H.
Parameters
Parameter Description Value
ac-ip ac-ip- Specifies the IP address of the ac carried The value is a string
value in the URL and sets the parameter name of 1 to 16 case-
displayed in the URL. sensitive characters
In the wireless access scenario, the value without spaces. If
of ac-ip carried in the URL is the the string is
CAPWAP gateway address. enclosed in double
quotation marks ("
"), the string can
contain spaces.
ac-mac ac- Specifies the MAC address of the ac The value is a string
mac-value carried in the URL and sets the of 1 to 16 case-
parameter name displayed in the URL. sensitive characters
without spaces. If
the string is
enclosed in double
quotation marks ("
"), the string can
contain spaces.
Views
URL template view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade. After the upgrade, this
command is no longer supported, and it is replaced by the following command in
the URL template view:
url-parameter { device-ip device-ip-value | device-mac device-mac }*
Function
The url command configures the redirect URL or pushed URL.
The undo url command cancels the redirect URL or pushed URL.
By default, no redirect URL or pushed URL is configured.
Format
url [ ssid ssid ] [ push-only | redirect-only ] url-string
Parameters
Parameter Description Value
ssid ssid Specifies the SSID that users associate The SSID must
with. already exist.
Views
URL template view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Example
# Set the redirect URL to http://10.1.1.1.
<HUAWEI> system-view
[HUAWEI] url-template name huawei
[HUAWEI-url-template-huawei] url http://10.1.1.1
Function
The ucl-group command creates a UCL group.
Format
ucl-group name group-name [ extend ]
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Example
# Create a UCL group named abc.
<HUAWEI> system-view
[HUAWEI] ucl-group name abc
Function
The voice-vlan command configures a voice VLAN in a service scheme.
The undo voice-vlan command deletes the voice VLAN configured in the service
scheme.
Format
voice-vlan vlan-id
undo voice-vlan
Parameters
Parameter Description Value
Views
Service scheme view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Example
# Configure voice VLAN 100 in the service scheme huawei.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] service-scheme huawei
[HUAWEI-aaa-service-huawei] voice-vlan 100
Function
The web-auth-server command binds a Portal server template to an interface.
The undo web-auth-server command unbinds a Portal server template from an
interface.
By default, no Portal server template is bound to an interface.
Format
● Layer 2 interface view
web-auth-server server-name [ bak-server-name ] direct
undo web-auth-server [ server-name [ bak-server-name ] direct ]
● VLANIF interface view
web-auth-server server-name [ bak-server-name ] { direct | layer3 }
undo web-auth-server [ server-name [ bak-server-name ] { direct | layer3 } ]
● Routed main interface view
Parameters
server-name Specifies the name of the Portal server The value must
template. be an existing
Portal server
template name.
bak-server- Specifies the name of the secondary Portal The value must
name server template. be an existing
Portal server
NOTE
template name.
The name of the secondary Portal server template
cannot be configured to the command-line
keywords direct and layer3.
Views
VLANIF interface view, Ethernet interface view, GE interface view, XGE interface
view, 40GE interface view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
web-auth-server server-name [ bak-server-name ] { direct | layer3 } command in
the Portal access profile view.
Function
The acl ipv6 command creates an ACL6 and enters the ACL6 view.
Format
acl ipv6 [ number ] acl6-number [ name acl6-name ] [ match-order { auto |
config } ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An ACL6 is a set of rules composed of permit or deny clauses. ACL6s are mainly
used in QoS. ACL6s can limit data flows to improve network performance. For
example, ACL6s are configured on an enterprise network to limit video data flows,
which lowers the network load and improves network performance.
Follow-up Procedure
Run the rule command to configure ACL6 rules and apply the ACL6 to services
which packets need to be filtered.
Example
# Create an ACL6 named test and numbered 3100.
<HUAWEI> system-view
[HUAWEI] acl ipv6 number 3100 name test
[HUAWEI-acl6-adv-test]
Function
The acl command creates an ACL and enters the ACL view.
Format
acl [ number ] acl-number [ name acl-name ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
An ACL consists of a list of rules. Each rule contains a permit or deny clause.
Before creating an ACL rule, you must create an ACL.
Example
# Create an ACL named test and numbered 3100.
<HUAWEI> system-view
[HUAWEI] acl number 3100 name test
[HUAWEI-acl-adv-test]
Function
The rule command adds or modifies advanced ACL6 rules.
Format
rule [ rule-id ] { deny | permit } ipv6-ah [ destination { destination-ipv6-address
prefix-length | destination-ipv6-address/prefix-length | destination-ipv6-address
postfix postfix-length | any } | dscp dscp | fragment | logging | precedence
precedence | source { source-ipv6-address prefix-length | source-ipv6-address/
prefix-length | source-ipv6-address postfix postfix-length | any } | time-range
time-name | tos tos | vpn-instance vpn-instance-name ] *
Parameters
Parameter Description Value
logging Indicates whether to Log contents include the ACL rule ID,
record logs for packets pass or discard of packets, type of
that meet ACL rules. the protocol over IP, source or
destination address, source or
destination port number, and
number of packets.
tos tos Filters packets by Type of The value is a name or a digit that
Service (ToS). ranges from 0 to 15.
Views
Advanced ACL6 view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Advanced ACL6s classify data packets based on the source IP address, destination
IP address, source port number, destination port number, and protocol type.
Prerequisites
Precautions
If the specified rule ID already exists and the new rule conflicts with the original
rule, the new rule replaces the original rule.
To modify an existing rule, delete the old rule, and then create a new rule.
Otherwise, the configuration result may be incorrect.
When you use the undo rule command to delete an ACL6 rule, the rule ID must
exist. If the rule ID is unknown, you can use the display acl ipv6 command to
view the rule ID.
The undo rule command deletes an ACL6 rule even if the ACL6 rule is referenced.
Exercise caution when you run the undo rule command.
Example
# Create an advanced ACL6 with ID 3000 and configure a rule that allows only
IPv6 ESP packets with the source IPv6 address xxxx:xxxx::xxxx and mask 64 to pass.
<HUAWEI> system-view
[HUAWEI] acl ipv6 number 3000
[HUAWEI-acl6-adv-3000] rule 0 permit ipv6-esp source xxxx:xxxx::xxxx/64
Function
The blacklist command configures an ACL-based blacklist.
Format
blacklist blacklist-id acl acl-number soft-drop
Parameters
Parameter Description Value
acl acl-number Indicates the ACL ID. The ACL The value is an integer that
referenced by a blacklist on the ranges from 2000 to 4999.
device can be a basic ACL, an
advanced ACL, or a Layer 2 ACL.
soft-drop Indicates that the blacklist is -
implemented through software.
Views
System view, Attack defense policy view
Default Level
2: Configuration level
Usage Guidelines
A maximum of 8 blacklists can be configured in an attack defense policy on the
device. You can set the attributes of a blacklist by defining ACL rules.
The packets sent from users in the blacklist are discarded after reaching the
device.
Example
# Reference ACL 2001 in the blacklist.
<HUAWEI> system-view
[HUAWEI] cpu-defend policy test
[HUAWEI-cpu-defend-policy-test] blacklist acl 2001 soft-drop
Function
The car cpu-port command configures the CIR of all the packets to be sent to the
CPU.
By default, the CIR value of all the packets to be sent to the CPU is 1024 kbit/s on
the device.
Format
car cpu-port cir cir-rate
Parameters
Parameter Description Value
cir cir-rate Sets the CIR of all the The value is an integer
packets to be sent to the that ranges from 64 to
CPU. 2048, in kbit/s.
Views
Attack defense policy view
Default Level
2: Configuration level
Usage Guidelines
The car cpu-port command limits the total rate of all protocol packets sent to the
CPU. The car packet-type command limits the rate of packets of a specified
protocol. However, the total CIR of packets of specified protocols cannot exceed
the CIR of all the packets sent to the CPU.
When the CIR is exceeded, excess packets including unicast, multicast, and
broadcast packets are not sent to the CPU. In addition, the unicast packets are
discarded directly.
Example
# Set the CIR of all the packets to be sent to the CPU to 512 kbit/s on the device.
<HUAWEI> system-view
[HUAWEI] cpu-defend policy test
[HUAWEI-cpu-defend-policy-test] car cpu-port cir 512
Function
The deny command sets the discard action taken for packets sent to the CPU.
The undo deny command restores the default action taken for packets sent to the
CPU.
By default, the device limits the rate of protocol packets and user-defined flows
based on the CAR configuration.
Format
deny packet-type bpdu
Parameters
Parameter Description Value
Views
Attack defense policy view
Default Level
2: Configuration level
Usage Guidelines
If you run the deny and car commands for the same type of packets sent to the
CPU, the command that runs later takes effect. The undo deny command restores
the default action taken for packets sent to the CPU. After you run this command,
the system limits the rate of packets sent to the CPU based on the configured CIR
and CBS values.
Example
# Set the discard action taken for bpdu packets sent to the CPU attack in defense
policy test.
<HUAWEI> system-view
[HUAWEI] cpu-defend policy test
[HUAWEI-cpu-defend-policy-test] deny packet-type bpdu
Function
The application-apperceive default drop command enables the device to discard
the received packets when no matching application layer association policy exists.
By default, the device is enabled to deliver the received packets to the upper layer
though no matching application layer association policy exists.
Format
application-apperceive default drop
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the application-apperceive default drop command is run, if a protocol is
not enabled in the system view nor in the interface view, the device discards all
the packets of this protocol type.
Example
# Enable the device to discard the received packets when no matching application
layer association policy exists.
<HUAWEI> system-view
[HUAWEI] application-apperceive default drop
Function
The broadcast-suppression command sets the maximum traffic rate of broadcast
packets that can pass through an interface.
The undo broadcast-suppression command restores the default traffic rate of
broadcast packets that can pass through an interface.
Format
broadcast-suppression { broadcast-pct | packets packets-per-second }
undo broadcast-suppression
Parameters
Parameter Description Value
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
When the traffic rate of broadcast packets exceeds the maximum value, the
system discards excess broadcast packets to control the traffic rate and ensure
normal operation of network services.
Example
# Set the maximum percentage of broadcast traffic to 20% of interface bandwidth
on Eth-Trunk1.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] broadcast-suppression 20
Function
The multicast-suppression command sets the maximum traffic rate of unknown
multicast packets that can pass through an interface.
Format
multicast-suppression { multicast-pct | packets packets-per-second }
undo multicast-suppression
Parameters
Parameter Description Value
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
When the traffic rate of unknown multicast packets exceeds the maximum value,
the system discards excess unknown multicast packets to control the traffic rate
and ensure normal operation of network services.
Example
# Set the maximum percentage of unknown multicast traffic to 20% of interface
bandwidth on Eth-Trunk1.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] multicast-suppression 20
Function
The unicast-suppression command sets the maximum traffic rate of unknown
unicast packets that can pass through an interface.
The undo unicast-suppression command restores the default traffic rate of
unknown unicast packets that can pass through an interface.
Format
unicast-suppression { unicast-pct | packets packets-per-second }
undo unicast-suppression
Parameters
Parameter Description Value
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
When the traffic rate of unknown unicast packets exceeds the maximum value,
the system discards excess unknown unicast packets to control the traffic rate and
ensure normal operation of network services.
Example
# Set the maximum percentage of unknown unicast traffic to 20% of interface
bandwidth on Eth-Trunk1.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk1
[HUAWEI-Eth-Trunk1] unicast-suppression 20
Function
The storm-control action sets the storm control action to shutdown.
The undo storm-control action command cancels the configuration.
By default, no storm control action is configured.
Format
storm-control action shutdown
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
Example
# Configure the storm control action is shutdown on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] storm-control action shutdown
Function
The arp anti-attack rate-limit command sets the maximum rate and rate limit
duration of ARP packets globally, in a VLAN, or on an interface, enables the
function of discarding all ARP packets received from the interface when the rate of
ARP packets exceeds the limit on an interface.
The undo arp anti-attack rate-limit command restores the default maximum
rate and rate limit duration of ARP packets globally, in a VLAN, or on an interface,
and allows the device to send ARP packets to the CPU again.
By default, a maximum of 100 ARP packets are allowed to pass in 1 second, and
the function of discarding all ARP packets received from the interface when the
rate of ARP packets exceeds the limit is disabled.
Format
System view, VLAN view
arp anti-attack rate-limit packet-number [ interval-value ]
Interface view
Parameters
Parameter Description Value
block timer Specifies the duration for The value is an integer that
timer blocking ARP packets. ranges from 5 to 864000, in
seconds.
Views
System view, VLAN view, GE interface view, XGE interface view, port group view,
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After rate limit on ARP packets is enabled, run the arp anti-attack rate-limit
command to set the maximum rate and rate limit duration of ARP packets
globally, in a VLAN, or on an interface. In the rate limit duration, if the number of
received ARP packets exceeds the limit, the device discards the excess ARP packets.
If the parameter block timer timer is specified, the device discards all ARP packets
received in the duration specified by timer.
Prerequisites
Rate limit on ARP packets has been enabled globally, in a VLAN, or on an interface
using the arp anti-attack rate-limit enable command.
Precautions
If the maximum rate and rate limit duration are configured in the system view,
VLAN view, and interface view, the device uses the configurations in the interface
view, VLAN view, and system view in order.
If the maximum rate and rate limit duration are set globally or on an interface at
the same time, the configurations on an interface and globally take effect in
descending order of priority.
NOTE
The arp anti-attack rate-limit command takes effect only on ARP packets sent to the CPU
for processing in none-block mode, and does not affect ARP packet forwarding by the chip.
In block mode, only when the number of ARP packets sent to the CPU exceeds the limit,
the device discards subsequent ARP packets on the interface.
Example
# Configure GE0/0/1 to allow 200 ARP packet to pass through in 10 seconds, and
configure GE0/0/1 to discard all ARP packets in 60 seconds when the number of
ARP packets exceeds the limit.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] arp anti-attack rate-limit enable
[HUAWEI-GigabitEthernet0/0/1] arp anti-attack rate-limit 200 10 block timer 60
Function
The arp filter source command enables ARP gateway protection for the specified
IP address.
The undo arp filter source command disables ARP gateway protection for the
specified IP address.
Format
arp filter source ip-address
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, it is replaced by the arp trust source command.
Function
The dhcp option82 format command configures the format of the Option 82
field in DHCP messages.
Format
dhcp option82 [ circuit-id | remote-id ] format userdefined text
Parameters
Parameter Description Value
circuit-id Specifies the format of the circuit-id -
(CID).
remote-id Specifies the format of the remote- -
id (RID).
userdefined text Indicates the user-defined format of text is the user-defined
the Option 82 field. character string of the
Option 82 field.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can use the dhcp option82 format command to configure the format of the
Option 82 field in DHCP messages.
Example
# Configure the user-defined string for the CID in the Option 82 field and use the
hexadecimal format to encapsulate the CID type (0, indicating the hexadecimal
format), length (excluding the length of the CID type and the length keyword
itself), outer VLAN ID, slot ID (5 bits), subslot ID (3 bits), and port number (8
bits).
<HUAWEI> system-view
[HUAWEI] dhcp option82 circuit-id format userdefined 0 %length %svlan %5slot %3subslot %8port
Function
The dhcp snooping alarm enable command enables the alarm function for DHCP
snooping.
The undo dhcp snooping alarm enable command disables the alarm function for
DHCP snooping.
Format
dhcp snooping alarm { user-bind | mac-address | untrust-reply } { enable |
[ enable ] threshold threshold }
Parameters
Views
Ethernet interface view, GE interface view, XGE interface view, Eth-Trunk interface
view, Port-group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
It is replaced by the dhcp snooping alarm { dhcp-request | dhcp-chaddr | dhcp-
reply } enable [ threshold threshold ] command.
Example
# On GE0/0/1, enable DHCP snooping, and enable the alarm function for DHCP
snooping.
<HUAWEI> system-view
[HUAWEI] dhcp snooping enable
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] dhcp snooping enable
[HUAWEI-GigabitEthernet0/0/1] dhcp snooping alarm user-bind enable
Function
The dhcp snooping bind-table autosave command configures a device to
automatically back up DHCP snooping binding entries in a specified file.
Format
dhcp snooping bind-table autosave file-name [ write-delay delay-time ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can use the dhcp snooping bind-table command to back up DHCP snooping
binding entries in a specified file.
Example
# Configure a device to automatically back up DHCP snooping binding entries in
the file backup.tbl in the flash memory.
<HUAWEI> system-view
[HUAWEI] dhcp snooping enable
[HUAWEI] dhcp snooping bind-table autosave flash:/backup.tbl
Function
The dhcp snooping check enable enables the device to check DHCP messages.
The undo dhcp snooping check enable disables the device from checking DHCP
messages.
Format
In the system view:
In the VLAN view, Ethernet interface view, GE interface view, XGE interface view,
Eth-Trunk interface view, Port-group view:
Parameters
Parameter Description Value
vlan { vlan-id1 [ to Enables the device to check the HCP The value is
vlan-id2 ] } messages from a specified VLAN to the an integer
&<1-10> processing unit. that ranges
● vlan-id1 specifies the first VLAN ID. from 1 to
4094.
● to vlan-id2 specifies the last VLAN ID.
vlan-id2 must be larger than vlan-id1.
Views
VLAN view, System view, Ethernet interface view, GE interface view, XGE interface
view, Eth-Trunk interface view, Port-group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
After the command is used, you can check DHCP messages against the DHCP
snooping binding table or Compare the MAC address in DHCP ACK or DHCP
Request messages with the CHADDR value.
Example
# Enable the function of checking DHCP messages against the binding table in
VLAN 100.
<HUAWEI> system-view
[HUAWEI] vlan 100
[HUAWEI-vlan100] dhcp snooping check user-bind enable
Function
The dhcp snooping check dhcp-rate alarm enable command enables the device
to generate an alarm when the number of discarded DHCP messages reaches the
threshold.
By default, the device is disabled from generating an alarm when the number of
discarded DHCP messages reaches the threshold.
Format
dhcp snooping check dhcp-rate alarm { enable | [ enable ] threshold
threshold }
Parameters
Parameter Description Value
threshold Specifies the alarm threshold for checking the The value is an
threshold rate of sending DHCP messages to the integer that
processing unit. An alarm is generated after ranges from 1 to
the rate for sending DHCP messages is 1000.
checked and the number of discarded DHCP
messages reaches the alarm threshold.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
After the alarm function is enabled, the device sends a trap message when the
number of discarded DHCP messages reaches the alarm threshold.
Example
# In the system view, enable the device to generate an alarm when the number of
discarded DHCP messages reaches the threshold.
<HUAWEI> system-view
[HUAWEI] dhcp snooping check dhcp-rate alarm enable
Function
Using the dhcp snooping check dhcp-rate enable alarm dhcp-rate enable
command, you can:
● Enable the function of checking the rate of sending DHCP messages to the
DHCP protocol stack.
● Set the rate limit of sending DHCP messages to the DHCP protocol stack.
● Enable the DHCP message discard alarm.
● Set the alarm threshold for discarded DHCP messages.
By default, the function of checking the rate of sending DHCP messages to the
DHCP stack is disabled; the rate limit of sending DHCP messages to the DHCP
stack is 100 pps; the DHCP message discard alarm is disabled; the alarm threshold
for discarded DHCP messages is 100.
Format
dhcp snooping check dhcp-rate { enable | [ enable ] [ rate ] rate } alarm dhcp-
rate { enable | [ enable ] threshold threshold-value }
Parameters
Parameter Description Value
[ rate ] rate Specifies the rate limit of The value ranges from 1
sending DHCP messages to 100, in pps. The
to the DHCP protocol default value is 100.
stack.
Views
Ethernet interface view, GE interface view, XGE interface view, Eth-Trunk interface
view, Port-group view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
After the command is used, the DHCP message discard alarm is enabled. If the
number of discarded messages reaches the alarm threshold, an alarm is
generated.
Example
# On GE 0/0/1, enable the function of checking the rate of sending DHCP
messages, set the rate limit of sending DHCP messages to the DHCP protocol
stack to 50 pps, enable the DHCP message discard alarm, and set the alarm
threshold for discarded DHCP messages to 50.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] dhcp snooping check dhcp-rate enable 50 alarm dhcp-rate enable
threshold 50
Function
Using the dhcp snooping check dhcp-rate enable alarm enable command, you
can:
● Enable the function of checking the rate of sending DHCP messages to the
processing unit.
● Set the rate limit of sending DHCP messages to the processing unit.
● Enable the device to generate an alarm when the number of discarded DHCP
messages reaches the threshold.
● Set the alarm threshold for the number of discarded DHCP messages.
By default, the device does not check the rate of sending DHCP messages to the
processing unit; the maximum rate of sending DHCP messages to the processing
unit is 100 pps; the device does not generate an alarm when the number of
discarded DHCP messages reaches the threshold; the alarm threshold for the
number of discarded DHCP messages is 100.
Format
dhcp snooping check dhcp-rate enable [ [ rate ] rate ] alarm [ dhcp-rate ]
{ enable | [ enable ] threshold threshold }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
After the command is used, the DHCP message discard alarm is enabled. If the
number of discarded messages reaches the alarm threshold, an alarm is
generated.
Example
# Enable the function of checking the rate of sending DHCP messages to the
processing unit, set the rate limit of sending DHCP messages to the processing
unit to 50 pps, enable the DHCP message discard alarm, and set the alarm
threshold for discarded DHCP messages to 50.
<HUAWEI> system-view
[HUAWEI] dhcp snooping check dhcp-rate enable 50 alarm dhcp-rate enable threshold 50
Function
The dhcp snooping check { dhcp-request | dhcp-chaddr | dhcp-giaddr | user-
bind | mac-address } enable alarm enable command enables the DHCP packet
check and alarm function.
Format
dhcp snooping check { dhcp-request | dhcp-chaddr | dhcp-giaddr | user-bind |
mac-address } enable alarm { dhcp-request | dhcp-chaddr | dhcp-reply | user-
bind | mac-address | untrust-reply } { enable | [ enable ] threshold threshold }
Parameters
threshold threshold Specifies the alarm threshold. The device The value is
generates alarm information when the an integer
number of discarded DHCP packets reaches that ranges
the threshold. from 1 to
1000.
Views
Interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
This function equals to the combination of the dhcp snooping check dhcp-giaddr
enable, dhcp snooping check dhcp-chaddr enable, dhcp snooping check dhcp-
request enable, and dhcp snooping alarm { user-bind | mac-address | untrust-
reply } threshold threshold commands.
Example
# Enable the user-bind check function on GE0/0/1. Set the alarm threshold to
1000 for the discarded packet in the user-bind check.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp snooping enable
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] dhcp snooping enable
[HUAWEI-GigabitEthernet0/0/1] dhcp snooping check user-bind enable alarm user-bind enable
threshold 100
Function
The dhcp snooping check enable alarm enable command enables the DHCP
packet check and alarm function.
By default, the DHCP packet check and alarm function is disabled.
Format
dhcp snooping check { dhcp-request | dhcp-chaddr | dhcp-giaddr } enable
alarm { user-bind | mac-address | untrust-reply } { enable | [ enable ]
threshold threshold }
Parameters
Parameter Description Value
dhcp-request Matches DHCP packets with entries in the -
binding table.
threshold Specifies the alarm threshold. When the number The value is
threshold of discarded DHCP packets reaches the an integer
threshold, an alarm is generated. that ranges
from 1 to
1000.
Views
Interface view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade. This function equals to the
combination of the dhcp snooping check dhcp-giaddr enable, dhcp snooping
check dhcp-chaddr enable, dhcp snooping check dhcp-request enable, and
dhcp snooping alarm { dhcp-request | dhcp-chaddr | dhcp-reply } threshold
threshold commands.
Function
The dhcp snooping global max-user-number command sets the maximum
number of global DHCP users.
Format
dhcp snooping global max-user-number max-user-number
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The dhcp snooping global max-user-number command takes effect only when
DHCP snooping is enabled globally and is valid for only DHCP users. When the
number of global DHCP users reaches the threshold set by this command, no
more users can access.
You can use the dhcp snooping global max-user-number command to set the
maximum number of global users.
Example
# Set the maximum number of global DHCP users to 100.
<HUAWEI> system-view
[HUAWEI] dhcp snooping enable
[HUAWEI] dhcp snooping global max-user-number 100
Function
The dhcp snooping information circuit-id command configures the Option 82
circuit-id format.
Format
System view:
Interface view:
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, XGE interface view, Eth-
Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
You can use the dhcp snooping information circuit-id command to configure the
Option 82 circuit-id format.
Example
# Configure the Option 82 circuit-id format.
<HUAWEI> system-view
[HUAWEI] dhcp snooping information circuit-id string teststring
Function
The dhcp snooping information format command configures the Option 82 field
format.
Format
dhcp snooping information format { hex | ascii }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can use the dhcp snooping information format command to configure the
Option 82 field format.
Example
# Set the Option 82 format to ASCII.
<HUAWEI> system-view
[HUAWEI] dhcp snooping information format ascii
Function
The dhcp snooping information remote-id command configures the Option 82
remote-id format.
Format
System view:
dhcp snooping information remote-id { sysname | string string }
Interface view:
dhcp snooping information [ vlan vlan-id ] remote-id string string
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, XGE interface view, Eth-
Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
You can use the dhcp snooping information remote-id command to configure
the Option 82 remote-id format.
Example
# Configure the Option 82 remote-id format.
<HUAWEI> system-view
[HUAWEI] dhcp snooping information remote-id string teststring
Function
The dhcp snooping max-user-number global command sets the maximum
number of global DHCP users.
By default, the maximum number of global DHCP users is 1024.
Format
dhcp snooping max-user-number max-user-number global
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
The command takes effect only when DHCP snooping is enabled globally and is
valid for only DHCP users. When the number of global DHCP users reaches the
threshold set by this command, no more users can access. You can use the
command to set the maximum number of global users.
Example
# Set the maximum number of global DHCP users to 100.
<HUAWEI> system-view
[HUAWEI] dhcp snooping enable
[HUAWEI] dhcp snooping max-user-number 100 global
Function
The dhcp snooping sticky-mac command enables the device to generate static
MAC address entries based on dynamic DHCP snooping binding entries.
The undo dhcp snooping sticky-mac command disables the device from
generating static MAC address entries based on dynamic DHCP snooping binding
entries.
By default, the device is disabled to generate static MAC address entries based on
dynamic DHCP snooping binding entries.
Format
dhcp snooping sticky-mac
undo dhcp snooping sticky-mac
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, port group view,
Eth-trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Dynamic MAC address entries are learned and generated by the device, and static
MAC address entries are configured by command lines. A MAC address entry
consists of the MAC address, VLAN ID, and port number of a DHCP client. The
device implements Layer 2 forwarding based on MAC address entries.
After the dhcp snooping sticky-mac command is executed on an interface, the
device generates static MAC address entries (snooping type) of DHCP users on the
interface based on the corresponding dynamic binding entries, clears all the
dynamic MAC address entries on the interface, disables the interface to learn
dynamic MAC address entries, and enables the device to match the source MAC
address based on MAC address entries. Then only the message with the source
MAC address matching the static MAC address entry can pass through the
interface; otherwise, messages are discarded. Therefore, the administrator needs to
manually configure static MAC address entries (the static type) for non-DHCP
users on the interface so that messages sent from non-DHCP users can pass
through; otherwise, DHCP messages are discarded. This prevents attacks from
non-DHCP users.
NOTE
● If a DHCP snooping binding entry is updated, the corresponding static MAC address
entry is automatically updated.
● If you run the dhcp snooping sticky-mac command on the interface, DHCPv6 users
cannot go online. Run the nd snooping enable command in the system view and
interface view to enable ND snooping and the savi enable command in the system view
to enable SAVI.
Prerequisites
DHCP snooping has been enabled on the device using the dhcp snooping enable
command.
Precautions
The dhcp snooping sticky-mac command cannot be used with the following
commands on an interface.
Command Description
Example
# Enable the device to generate static MAC address entries based on DHCP
snooping binding entries on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp snooping enable
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] dhcp snooping sticky-mac
Function
The dhcp snooping trusted interface no-user-binding command configures a
trusted interface.
Format
dhcp snooping trusted interface interface-type interface-number no-user-
binding
Parameters
Parameter Description Value
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
You can use the dhcp snooping trusted interface no-user-binding command to
configure a trusted interface in the VLAN view.
Example
# Configure a trusted interface GE0/0/1 in VLAN 100.
<HUAWEI> system-view
[HUAWEI] vlan 100
[HUAWEI-vlan100] dhcp snooping trusted interface gigabitethernet 0/0/1 no-user-binding
Function
The dhcp snooping trusted no-user-binding command configures an interface as
the trusted interface.
The undo dhcp snooping trusted no-user-binding command restores the default
state of an interface.
Format
dhcp snooping trusted no-user-binding
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, Eth-Trunk interface
view
Default Level
2: Configuration level
Usage Guidelines
When DHCP snooping is enabled on an interface, the interface is an untrusted
interface by default. After you use the dhcp snooping trusted no-user-binding
command in the interface view, the interface becomes a trusted interface.
Example
# Configure a trusted interface GE0/0/1.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp snooping enable
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] dhcp snooping trusted no-user-binding
Function
The receive-time command makes a key act as a receive-key for the specified
interval of time.
Format
receive-time utc start-time start-date { duration { duration-value | infinite } |
{ to end-time end-date } }
Parameters
Parameter Description Value
utc Specifies that the given time is -
in Coordinated Universal Time
(UTC) format.
start-time Specifies the start receive In HH:MM format. The value
time. ranges from 00:00 to 23:59.
start-date Specifies the start date. In YYYY-MM-DD format. The
value ranges from 1970-01-01
to 2050-12-31.
duration Specifies the duration of the The value ranges from 1 to
duration-value receive time in minutes. 26280000.
infinite Specifies that the key will be -
acting as a active receive key
forever from the configured
start-time.
to Acts as a separator. -
end-time Specifies the end receive time. In HH:MM format. The value
ranges from 00:00 to 23:59.
The end-time should be
greater than the start-time.
end-date Specifies the end date. In YYYY-MM-DD format. The
value ranges from 1970-01-01
to 2050-12-31.
Views
key-id view
Default Level
2: Configuration Level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
It is replaced by the receive-time start-time start-date { duration { duration-value
| infinite } | { to end-time end-date } } command.
Function
The send-time command makes a key act as a send key for the specified interval
of time.
Format
send-time utc start-time start-date { duration { duration-value | infinite } | { to
end-time end-date } }
Parameters
Parameter Description Value
utc Specifies that the given time is -
in Coordinated Universal Time
(UTC) format.
start-time Specifies the start send time. In HH:MM format. The value
ranges from 00:00 to 23:59.
start-date Specify the start date. In YYYY-MM-DD format. The
value ranges from 1970-01-01
to 2050-12-31.
duration Specifies the duration of the The value ranges from 1 to
duration-value send time in minutes. 26280000.
infinite Specifies that the key will be -
acting as a send key forever
from the configured start-time.
to Acts as a separator. -
end-time Specifies the end send time. In HH:MM format. The value
ranges from 00:00 to 23:59.
The end-time should be
greater than the start-time.
end-date Specifies the end date. In YYYY-MM-DD format. The
value ranges from 1970-01-01
to 2050-12-31.
daily Specifies the daily send timing -
for the given key.
Views
Key-ID view
Default Level
2: Configuration Level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Format
count
Parameters
None
Views
Traffic behavior view
Default Level
2: Configuration level
Usage Guidelines
When there are many traffic classification rules on the switch, you can run the
count command to count the specific traffic. The counting start time is the time
when the policy is applied.
Currently, the switch counts packets rather than bytes.
Example
# Configure the traffic policy p1 so that the switch counts packets that flow
through GigabitEthernet 0/0/1. After a period of time, the switch displays the
traffic statistics.
<HUAWEI> system-view
[HUAWEI] traffic classifier c1
[HUAWEI-classifier-c1] if-match any
[HUAWEI-classifier-c1] quit
[HUAWEI] traffic behavior b1
[HUAWEI-behavior-b1] count
[HUAWEI-behavior-b1] quit
[HUAWEI] traffic policy p1
[HUAWEI-trafficpolicy-p1] classifier c1 behavior b1
[HUAWEI-trafficpolicy-p1] quit
Direction: Inbound
Policy: p1
Classifier: c1
Rule(s) : if-match any
Behavior: b1
Count
Matched : 10 (Packets)
Function
The snmp-agent group command creates an SNMP group by mapping SNMP
users to SNMP views.
The undo snmp-agent group command deletes a specified SNMP user group.
By default, no SNMP group is configured.
Format
snmp-agent group v3 group-name [ authentication | privacy ] [ read-view
read-view | write-view write-view | notify-view notify-view ] * [ acl acl-number ]
undo snmp-agent group v3 group-name [ authentication | privacy ]
Parameters
Parameter Description Value
v3 Indicates that the SNMP -
group uses the security
mode in SNMPv3.
group-name Specifies the name of an It is a string of 1 to 32 case-
SNMP group. sensitive characters without
spaces.
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The snmp-agent trap enable command enables a specified trap for a specified
feature.
The undo snmp-agent trap enable command disables a specified trap for a
specified feature.
The default configuration of the snmp-agent trap enable command can be
checked using the display snmp-agent trap all command.
Format
snmp-agent trap enable feature-name
undo snmp-agent trap enable feature-name
Parameters
Parameter Description Value
feature-name Specifies the name of the feature that generates traps. -
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
Using the snmp-agent trap enable standard command, you can enable the trap
function of standard SNMP.
Using the undo snmp-agent trap enable standard command, you can disable
the trap function of standard SNMP.
By default, no trap messages are sent to a device.
Format
snmp-agent trap enable standard [ authentication | coldstart | warmstart |
linkup | linkdown ] *
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
The snmp-agent usm-user command adds a user to an SNMP user group.
The undo snmp-agent usm-user command deletes a user from an SNMP user
group.
NOTE
Format
snmp-agent usm-user v3 user-name group-name simple [ authentication-mode
{ md5 | sha } password [ privacy-mode { des56 | aes128 | aes192 | aes256 |
3des } encrypt-password ] ] [ acl acl-number ]
snmp-agent usm-user v3 user-name group-name [ cipher ] [ authentication-
mode { md5 | sha } password [ privacy-mode { des56 | aes128 | aes192 | aes256
| 3des } encrypt-password ] ] [ acl acl-number ]
undo snmp-agent usm-user v3 user-name group-name [ engineid engineid |
local ]
Parameters
Parameter Description Value
v3 Indicates that the security mode -
in SNMPv3 is adopted.
user-name Specifies the name of a user. It is a string of 1 to 32
case-sensitive characters
without spaces.
group-name Specifies the name of the group It is a string of 1 to 32
to which a user belongs. case-sensitive characters
without spaces.
simple Indicates the simple -
authentication.
cipher Specifies that the password is in -
ciphertext, which is the default
password type. If this parameter
is specified, you can enter only a
password in ciphertext. This type
of password can be viewed using
the configuration file.
acl acl-number Specifies the ACL number of the The value is an integer
access view. that ranges from 2000 to
2999.
engineid engineid Specifies the ID of the engine The value is a string of
associated with a user. 10 to 64 case-insensitive
characters without
spaces.
local Indicates the local entity user. -
Views
System view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
Function
Using the send-trap overthreshold command, you can configure conditions for
sending trap messages.
Using the undo send-trap overthreshold command, you can delete the previous
configuration.
By default, the device is disabled from sending traps.
Format
send-trap overthreshold
undo send-trap overthreshold
Parameters
None
Views
NQA view
Default Level
2: Configuration level
Usage Guidelines
This command is available to aid upgrade compatibility. It can only be run during
the configuration restoration phase of the upgrade.
After the upgrade, this command is no longer supported, and it is replaced by the
send-trap rtd command.
Function
The port-mirroring command configures a mirroring behavior on an interface.
Format
port-mirroring to observe-port index
Parameters
Parameter Description Value
Views
Traffic behavior view
Default Level
3: Management level
Usage Guidelines
This command is available to aid upgrade compatibility. It can be run when it is
entered in full.
Example
# Mirror traffic to observing interface with index 1.
<HUAWEI> system-view
[HUAWEI] traffic behavior b1
[HUAWEI-traffic-behavior-b1] port-mirroring to observe-port 1