H3C SR6600 Fundamentals Configuration Manual
Hide thumbs Also See for SR6600:
Table of Contents

Advertisement

Quick Links

H3C SR6600 Routers
Fundamentals Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Document Version: 20100930-C-1.08
Product Version: SR6600-CMW520-R2420

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SR6600 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for H3C SR6600

  • Page 1 H3C SR6600 Routers Fundamentals Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document Version: 20100930-C-1.08 Product Version: SR6600-CMW520-R2420...
  • Page 2 SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V G, V G, PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co., Ltd. All other trademarks that may be mentioned in this manual are the property of their respective owners.
  • Page 3 The H3C SR6600 documentation set includes 13 configuration guides, which describe the software features for the H3C SR6600 Routers and guide you through the software configuration procedures. These configuration guides also provide configuration examples to help you apply software features to different network scenarios.
  • Page 4 Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features. About the H3C SR6600 Documentation Set The H3C SR6600 documentation set includes: Category...
  • Page 5 Obtaining Documentation You can access the most up-to-date H3C product documentation on the World Wide Web at http://www.h3c.com. Click the links on the top navigation bar to obtain different categories of product documentation: [Technical Support &...
  • Page 6: Table Of Contents

    Table of Contents 1 CLI Configuration ······································································································································1-1 What Is CLI? ···········································································································································1-1 Entering the CLI ······································································································································1-2 Command Conventions···························································································································1-2 Undo Form of a Command ·····················································································································1-3 CLI View Description·······························································································································1-3 Entering System View ·····················································································································1-4 Exiting the Current View ··················································································································1-4 Returning to User View····················································································································1-5 Using the CLI Online Help ······················································································································1-5 Typing Commands ··································································································································1-6 Editing Command Lines ··················································································································1-6 Typing Incomplete Keywords ··········································································································1-6...
  • Page 7 Login Procedure ····························································································································3-27 Console Login Authentication Modes····························································································3-30 Configuring None Authentication for Console Login ·····································································3-31 Configuring Password Authentication for Console Login ······························································3-32 Configuring Scheme Authentication for Console Login·································································3-33 Configuring Common Settings for Console Login (Optional) ························································3-36 Logging In Through Telnet····················································································································3-38 Introduction····································································································································3-38 Telnet Login Authentication Modes ·······························································································3-39 Configuring None Authentication for Telnet Login ········································································3-40 Configuring Password Authentication for Telnet Login ·································································3-41...
  • Page 8 Configuring Source IP-Based Login Control over Telnet Users····················································3-81 Configuring Source and Destination IP-Based Login Control over Telnet Users··························3-82 Configuring Source MAC-Based Login Control over Telnet Users ···············································3-82 Source MAC-Based Login Control Configuration Example···························································3-83 Configuring Source IP-Based Login Control over NMS Users ·····························································3-84 Configuration Preparation ·············································································································3-84 Configuring Source IP-Based Login Control over NMS Users······················································3-84 Source IP-Based Login Control Over NMS Users Configuration Example···································3-85...
  • Page 9 File Operations····································································································································8-111 Displaying File Information ··········································································································8-111 Displaying the Contents of a File·································································································8-111 Renaming a File ··························································································································8-111 Copying a File······························································································································8-111 Moving a File ·······························································································································8-111 Deleting a File······························································································································8-112 Restoring a File from the Recycle Bin ·························································································8-112 Emptying the Recycle Bin ···········································································································8-112 Batch Operations ································································································································8-112 Storage Medium Operations ···············································································································8-113 Managing the Space of a Storage Medium ·················································································8-113 Mounting/Unmounting a Storage Medium···················································································8-114...
  • Page 10 Immediate Upgrade Configuration Example (On the SR6604/6608/6616 router)····························11-133 Scheduled Upgrade Configuration Example (On the SR6602 router)··············································11-135 12 Software Upgrade by Installing Hotfixes ························································································12-137 Hotfix Overview ·································································································································12-137 Basic Concepts in Hotfix············································································································12-137 Patch Status ······························································································································12-138 Hotfix Configuration Task List ···········································································································12-140 Configuration Prerequisites···············································································································12-141 One-Step Patch Installation ··············································································································12-142 Step-by-Step Patch Installation·········································································································12-142 Step-by-Step Patch Installation Task List··················································································12-142...
  • Page 11 Introduction to pluggable transceivers·······················································································13-164 Identifying Pluggable Transceivers ···························································································13-164 Diagnosing Pluggable Transceivers··························································································13-165 Configuring USB Device Port············································································································13-165 Basic Functions of USB Device Port ·························································································13-165 USB Connectors and Cables ····································································································13-165 Connecting the Router and the Host ·························································································13-166 Unmounting the USB Device·····································································································13-168 Enabling USB Device Port ········································································································13-169 Displaying and Maintaining Device Management Configuration ······················································13-169 14 Index ···················································································································································14-172...
  • Page 12: Cli Configuration

    Enter to submit it to your device. Compared with the graphical user interface (GUI) where you can use a mouse to perform configurations, the CLI allows you to input more information in one command line. The CLI of H3C devices is as shown in Figure...
  • Page 13: Entering The Cli

    Figure 1-1 CLI Entering the CLI The H3C devices provide multiple methods for entering the CLI, for example, through the console port, through telnet, and through SSH. For more information, see Logging In to the Device in the Fundamentals Configuration Guide.
  • Page 14: Undo Form Of A Command

    The keywords of H3C command lines are case insensitive. Take the clock datetime time date command as an example to understand the command meaning according to Table 1-1. Figure 1-2 Read command line parameters For example, you can type the following command line at the CLI of your device and press Enter to set the device system time to 10 o’clock 30 minutes 20 seconds, February 23, 2010.
  • Page 15: Entering System View

    To know which commands are supported in a certain view, enter ? in this view. Then the system displays all the commands that can be executed in this view. Figure 1-3 Command line views Entering System View When you log in to the device, you automatically enter user view, where <Device name> is displayed. You can perform limited operations in user view, such as display operations, file operations, and Telnet operations.
  • Page 16: Returning To User View

    To do… Use the command… Remarks Required Return to the parent view from the quit current view Available in any view. Executed in user view, the quit command terminates the current connection between the terminal and the device. In public key code view, use the public-key-code end command to return to the parent view (public key view).
  • Page 17: Typing Commands

    trapping Send trap information to terminal If ? is at the position of an argument, the CLI displays a description about this argument. For example: <sysname> system-view [sysname] interface vlan-interface ? <1-4094> VLAN interface number [sysname] interface vlan-interface 1 ? <cr>...
  • Page 18: Configuring Command Aliases

    For example, in user view, commands starting with an s include startup saved-configuration and system-view. To enter system view, type sy. To set the configuration file for next startup, type st s. You can also press Tab to have an incomplete keyword automatically completed. Configuring Command Aliases The command alias function allows you to replace the first keyword of a command with your preferred keyword.
  • Page 19 To do… Use the command… Remarks Available in any view. See Table Display hotkeys display hotkey for hotkeys reserved by the system. By default, the Ctrl+G, Ctrl+L and Ctrl+O hotkeys are associated with corresponding commands and the Ctrl+T and Ctrl+U hotkeys are not. Ctrl+G corresponds to the display current-configuration command.
  • Page 20: Redisplaying Input But Not Submitted Commands

    Hotkey Function Moves the cursor down by one line (available before you press Esc+N Enter) Esc+P Moves the cursor up by one line (available before you press Enter) Esc+< Specifies the cursor as the beginning of the clipboard. Esc+> Specifies the cursor as the ending of the clipboard. The hotkeys in the table above are defined by the switch.
  • Page 21: Using Command History

    Table 1-4 Common command line errors Error information Cause % Unrecognized command found at '^' position. The command was not found. % Incomplete command found at '^' position. Incomplete command % Ambiguous command found at '^' position. Ambiguous command Too many parameters Too many parameters % Wrong parameter found at '^' position.
  • Page 22: Configuring The History Buffer Size

    (For more information about the history-command max-size command, see Logging In to the Device in the Fundamentals Command Reference. Configuring the History Buffer Size Follow these steps to configure the history buffer size: To do… Use the command… Remarks Enter system view system-view —...
  • Page 23: Filtering Output Information

    To do… Use the command… Remarks Required By default, a login user uses the settings of the screen-length command. The default settings of the screen-length command are: multiple-screen display is enabled Disable the multi-screen display screen-length disable and up to 24 lines are displayed on function the next screen.
  • Page 24 Character Meaning Remarks Matches the preceding character or For example, “zo*” matches “z” and “zoo”; “(zo)*” character group zero or multiple matches “zo” and “zozo”. times. Matches the preceding character or For example, “zo+” matches “zo” and “zoo”, but not character group one or multiple “z”.
  • Page 25 Character Meaning Remarks Matches character1character2. For example, “v\w” matches “vlan”, with “v” being character2 must be a number, letter, character1\w character1, and “l” being character2. v\w also or underline, and \w equals matches “service”, with “i” being character2. [^A-Za-z0-9_]. For example, “\Wa” matches “-a”, with “-” being Equals \b.
  • Page 26: Configuring User Privilege And Command Levels

    Configuring User Privilege and Command Levels Introduction To avoid unauthorized access, the switch defines user privilege levels and command levels. User privilege levels correspond to command levels. When a user at a privilege level logs in, the user can only use commands at that level, and lower levels. All the commands are categorized into four levels, which are visit, monitor, system, and manage from low to high, and identified respectively by 0 through 3.
  • Page 27 To do… Use the command… Remarks Required By default, the authentication Specify the scheme authentication mode for VTY and AUX users is authentication-mode scheme mode password, and no authentication is needed for console and TTY login users. Return to system view quit —...
  • Page 28 Follow these steps to configure the user privilege level under a user interface (SSH publickey authentication type): To do… Use the command… Remarks Required if the SSH login mode is adopted, and only username is needed during authentication. For more information, see SSH2.0 Configure the authentication type in the Security Configuration After the configuration, the...
  • Page 29: Switching User Privilege Level

    [Sysname-ui-vty0-4] authentication-mode none [Sysname-ui-vty0-4] user privilege level 1 # Authenticate users logged in to the switch through Telnet, verify their password, and specify their user privilege level as 2. <Sysname> system-view [Sysname] user-interface vty 0 4 [Sysname-ui-vty1] authentication-mode password [Sysname-ui-vty0-4] set authentication password cipher 12345678 [Sysname-ui-vty0-4] user privilege level 2 By default, users logged in through telnet use the commands of level 0 after passing the authentication.
  • Page 30 A user is required to input the password (if any) to switch to a higher privilege level for security sake. The authentication falls into one of the following four categories: Authentication Meaning Description mode The switch authenticates a user by using the privilege level switch password input by the user.
  • Page 31 When you configure the password for switching the user privilege level with the super password command, the user privilege level is 3 if no user privilege level is specified. If you specify the simple keyword, the password saved in the configuration file is in plain text, which is easy to be stolen.
  • Page 32: Modifying The Level Of A Command

    User privilege level User interface switch Information input for the Information input after the authentication authentication first authentication mode authentication mode changes mode mode Password for privilege level switch (configured on the AAA Local user privilege level server). The system uses the local scheme switch password username used for logging in as...
  • Page 33: Saving The Current Configuration

    You are recommended to use the default command level or modify the command level under the guidance of professional staff. An improper change of the command level may bring inconvenience to your maintenance and operation, or even potential security problems. Saving the Current Configuration On the device, you can input the save command in any view to save all the submitted and executed commands into the configuration file.
  • Page 34: Login Methods

    Login Methods This chapter includes these sections: Login Methods User Interface Overview Login Methods You can log in to a device in the following ways. Table 2-1 Login methods Login method Default state Logging In By default, you can log in to a device through the console port, the Through the authentication mode is None (no username or password required), Console Port...
  • Page 35: User Interface Overview

    Login method Default state By default, you cannot log in to a device through an network management station (NMS). To do so, log in to the device through the console port, and complete the following configuration: NMS Login Configure the IP address of the interface, and make sure the device and the NMS can reach each other (by default, your device does not have an IP address.).
  • Page 36: Numbering User Interfaces

    interfaces do not associate with specific users. When a user initiates a connection request, the system automatically assigns an idle user interface with the smallest number to the user based on the login method. During the login, the configuration in the user interface view takes effect. The user interface varies depending on the login method and the login time.
  • Page 37: Cli Login

    CLI Login This chapter includes these sections: Overview Logging In Through the Console Port Logging In Through Telnet Logging In Through SSH Logging In Through the AUX Port Logging In Through Modem Displaying and Maintaining CLI Login Overview The CLI enables you to interact with a device by typing text commands. At the CLI, you can instruct your device to perform a given task by typing a text command and then pressing Enter to submit it to your device.
  • Page 38: Configuration Requirements

    Configuration Requirements The following table shows the configuration requirements of console port login. Object Requirements Device No configuration requirement Run the hyper terminal program. Terminal Configure the hyper terminal attributes. The port properties of the hyper terminal must be the same as the default settings of the console port shown in the following table.
  • Page 39 Step2 Launch a terminal emulation program (such as HyperTerminal in Windows XP/Windows 2000). The following takes the HyperTerminal of Windows XP as an example. Select a serial port to be connected to the device, and set terminal parameters as follows: set Bits per second to 9600, Data bits to 8, Parity to None, Stop bits to 1, and Flow control to None, as shown in Figure 3-2 through...
  • Page 40 Figure 3-4 Set the properties of the serial port Step3 Turn on the device. You are prompted to press Enter if the device successfully completes the power-on self test (POST). A prompt such as <H3C> appears after you press Enter, as shown in Figure 3-5.
  • Page 41: Console Login Authentication Modes

    Figure 3-5 Configuration page Step4 Execute commands to configure the device or check the running status of the device. To get help, type ?. Console Login Authentication Modes Three authentication modes are available for console port login: none, password, and scheme. none: Requires no username and password at the next login through the console port.
  • Page 42: Configuring None Authentication For Console Login

    Authentication Configuration Remarks mode nticati Configure the AAA scheme used by the schem domain Configure the username and password on the AAA server Configure the authentication username and password Local authentication Configure the AAA scheme used by the domain as local A newly configured authentication mode does not take effect unless you exit and enter the CLI again.
  • Page 43: Configuring Password Authentication For Console Login

    After the configuration, when you log in to the device through the console port at the next time, you are prompted to press enter. A prompt such as <H3C> appears after you press Enter, as shown in Figure 3-6. Figure 3-6 Configuration page...
  • Page 44: Configuring Scheme Authentication For Console Login

    After the configuration, when you log in to the device through the console port at the next time, you are prompted to enter a login password. A prompt such as <H3C> appears after you input the password and press Enter, as shown in Figure 3-7.
  • Page 45 To do… Use the command… Remarks Optional default, command authorization is not enabled. By default, the command level depends on the user privilege level. A user is authorized a command level not higher than the user privilege level. With command authorization enabled, Enable command authorization command authorization the command level for a login...
  • Page 46 After the configuration, when you log in to the device through the console port, you are prompted to enter a login username and password. A prompt such as <H3C> appears after you input the password and username and press Enter, as shown in Figure 3-8.
  • Page 47: Configuring Common Settings For Console Login (Optional)

    Figure 3-8 Configuration page Configuring Common Settings for Console Login (Optional) Follow these steps to configure common settings for console port login To do… Use the command… Remarks Enters system view system-view — Optional Enable display of copyright copyright-info enable information Enabled by default.
  • Page 48 To do… Use the command… Remarks Optional By default, the data bits of the console port is 8. Data bits is the number of bits representing one character. The Configure the data databits { 5 | 6 | 7 | 8 } setting depends on the contexts to bits be transmitted.
  • Page 49: Logging In Through Telnet

    To do… Use the command… Remarks Optional The default idle-timeout is 10 minutes. The system automatically terminates the user’s connection if Set the idle-timeout minutes [ seconds ] there is no information interaction idle-timeout timer between the device and the user within the idle-timeout time.
  • Page 50: Telnet Login Authentication Modes

    default. Before you can telnet to the device, you need to log in to the device through the console port and configure the authentication mode, user privilege level, and common settings. This section includes these topics: Telnet Login Authentication Modes Configuring None Authentication for Telnet Login Configuring Password Authentication for Telnet Login Configuring Scheme Authentication for Telnet Login...
  • Page 51: Configuring None Authentication For Telnet Login

    Authentication Configuration Remarks mode Configure the authentication username and Local password authentication Configure the AAA scheme used by the domain as local Configuring None Authentication for Telnet Login Configuration prerequisites You have logged in to the device. By default, you can log in to the device through the console port without authentication and have user privilege level 3 after login.
  • Page 52: Configuring Password Authentication For Telnet Login

    Figure 3-10 Configuration page Configuring Password Authentication for Telnet Login Configuration prerequisites You have logged in to the device. By default, you can log in to the device through the console port without authentication and have user privilege level 3 after login. For how to log in to the device with default configuration, see Configuration Requirements.
  • Page 53: Configuring Scheme Authentication For Telnet Login

    When you log in to the device through telnet again: You are required to enter the login password. A prompt such as <H3C> appears after you enter the correct password and press Enter, as shown in Figure 3-11. If “All user interfaces are used, please try later!” is displayed, it means the current concurrent login users exceed the maximum number.
  • Page 54 To do… Use the command… Remarks Optional By default, command authorization is not enabled. Create a HWTACACS scheme, and specify the IP address of the authorization server and other authorization parameters. Enable command authorization command authorization For more information, see AAA in the Security Configuration Guide.
  • Page 55 When you log in to the device through telnet again: You are required to enter the login username and password. A prompt such as <H3C> appears after you enter the correct username (for example, admin) and password and press Enter, as...
  • Page 56: Configuring Common Settings For Vty User Interfaces (Optional)

    Figure 3-12 Configuration page Configuring Common Settings for VTY User Interfaces (Optional) Follow these steps to configure Common settings for VTY user interfaces: To do… Use the command… Remarks Enters system view system-view — interface interface-type enter interface view { interface-number | Required interface-number.subnumber } Required...
  • Page 57: Configuring The Device To Log In To Another Device As A Telnet Client

    To do… Use the command… Remarks Optional Set the maximum By default, the next screen number of lines on the screen-length screen-length displays 24 lines. next screen A value of 0 disables the function. Optional Set the size of history history-command max-size By default, the buffer saves 10 command buffer...
  • Page 58: Logging In Through Ssh

    Figure 3-13 Log in to another device from the current device If the telnet client port and the telnet server port that connect them are not in the same subnet, make sure that the two devices can reach each other. Configuration procedure Follow the step below to configure the device to log in to a telnet server as a telnet client: To do…...
  • Page 59: Configuring The Ssh Server

    Object Requirements Configure the IP address of the interface, and make sure the SSH server and client can reach each other. SSH server Configure the authentication mode and other settings. Run the SSH client program. SSH client Obtain the IP address of the interface on the server. By default, the device is enabled with the SSH server and client functions.
  • Page 60: Configuring The Ssh Client To Log In To The Ssh Server

    To do… Use the command… Remarks Required Create a local user and enter local local-user user-name user view By default, no local user exists. Required password { cipher | simple } Set the local password By default, no local password is password set.
  • Page 61: Logging In Through The Aux Port

    Configuration procedure Follow these steps to configure the SSH client to log in to the SSH server: To do… Use the command… Remarks Required server is the IPv4 address or host Log in to an IPv4 SSH server ssh2 server name of the server.
  • Page 62: Aux Login Authentication Modes

    AUX Login Authentication Modes By default, password authentication is adopted for AUX port login. Three authentication modes are available for AUX port login: none, password, and scheme. none: Requires no username and password at the next login through the AUX port. This mode is insecure.
  • Page 63: Configuring None Authentication For Aux Login

    (Optional). After the configuration, when you log in to the device through the AUX port at the next time, you are prompted to press enter. A prompt such as <H3C> appears after you press Enter, as shown in Figure 3-17.
  • Page 64: Configuring Password Authentication For Aux Login

    After the configuration, when you log in to the device through the AUX port at the next time, you are prompted to enter a login password. A prompt such as <H3C> appears after you input the password and press Enter, as shown in Figure 3-18.
  • Page 65: Configuring Scheme Authentication For Aux Login

    Configuring Scheme Authentication for AUX Login Configuration prerequisites You have logged in to the device. By default, you can log in to the device through the AUX port with password authentication and have user privilege level 0 after login. For how to log in to the device with default configuration, see Configuration Requirements.
  • Page 66 To do… Use the command… Remarks Optional default, command accounting is disabled. The accounting server does not record commands executed by users. Command accounting allows the HWTACACS server to record all executed commands that are supported by the device, regardless command execution result.
  • Page 67 Guide. After the configuration, when you log in to the device through the AUX port, you are prompted to enter a login password. A prompt such as <H3C> appears after you input the password and press Enter, as shown in Figure 3-19.
  • Page 68: Configuring Common Settings For Aux Login (Optional)

    Configuring Common Settings for AUX Login (Optional) Follow these steps configure common settings login: To do… Use the command… Remarks Enters system view system-view — Optional Enable display of copyright copyright-info enable information Enabled by default. Enter one or more AUX user user-interface aux first-number —...
  • Page 69 To do… Use the command… Remarks flow-control { hardware | none | software } flow-control hardware Configure the flow flow-control-type1 [ software Optional control mode flow-control-type2 ] flow-control software flow-control-type1 [ hardware flow-control-type2 ] Optional By default, the terminal display type is ANSI.
  • Page 70: Configuration Requirements

    Configuration Requirements The following table shows the configuration requirements of AUX login. Object Requirements Configure the authentication mode. For more information, see Configuring None Authentication for AUX Login, Configuring Device Password Authentication for AUX Login, and Configuring Scheme Authentication for AUX Login.
  • Page 71 Because the serial port of a PC does not support hot-swap, do not plug or unplug the console cable to or from the PC when your device is powered on. To connect the PC to the device, first plug the DB-9 connector of the console cable into the PC, and then plug the RJ-45 connector of the console cable into your device.
  • Page 72 Figure 3-23 Set the properties of the serial port Step3 Turn on the device. You are prompted to enter the login password if the device successfully completes the power-on self test (POST). A prompt such as <H3C> appears after you press Enter, as shown in Figure 3-24.
  • Page 73: Logging In Through Modems

    Figure 3-24 Configuration page Step4 Execute commands to configure the device or check the running status of the device. To get help, type ?. Logging In Through Modems Introduction The administrator can use two modems to remotely maintain a device through its AUX port over the Public Switched Telephone Network (PSTN) when the IP network connection is broken.
  • Page 74 Object Requirement The telephone number of the remote modem connected to the AUX port of the remote device is obtained. The AUX port is correctly connected to the modem. Configurations have been configured on the modem. Device side The modem is connected to a telephone cable that works normally. Authentication configuration has been completed on the remote device.
  • Page 75 The configuration commands and the output for different modems may be different. For more information, see the user guide of your modem. Step3 Launch a terminal emulation utility (such as HyperTerminal in Windows XP/Windows 2000), create a new connection (the telephone number is the number of the modem connected to the device). On the Windows 2003 Server operating system, you need to add the HyperTerminal program first, and then log in to and manage the device as described in this document.
  • Page 76 Figure 3-27 Enter the phone number Figure 3-28 Dial the number Step4 Character string CONNECT9600 is displayed on the terminal. Then a prompt such as <H3C> appears when you press Enter. 3-65...
  • Page 77: Modem Login Authentication Modes

    Figure 3-29 Configuration page Step4 Execute commands to configure the device or check the running status of the device. To get help, type ?. To terminate the connection between the PC and device, execute the ATH command on the terminal to terminate the connection between the PC and modem. If you cannot execute the command on the terminal, input AT+ + + and then press Enter.
  • Page 78: Configuring None Authentication For Modem Login

    The following table lists modem login configurations for different authentication modes: Authentication Configuration Remarks mode For more information, Configuring None None Configure not to authenticate users Authentication for Modem Login. Configure to authenticate users by using the local password For more information, Configuring Password Password...
  • Page 79: Configuring Password Authentication For Modem Login

    VTY User Interfaces (Optional). After the configuration, when you log in to the device through modems, you are prompted to press Enter. A prompt such as <H3C> appears after you press Enter, as shown in Figure 3-30. Figure 3-30 Configuration page...
  • Page 80: Configuring Scheme Authentication For Modem Login

    VTY User Interfaces (Optional). After the configuration, when you log in to the device through modems, you are prompted to enter a login password. A prompt such as <H3C> appears after you input the password and press Enter, as shown in Figure 3-31.
  • Page 81 To do… Use the command… Remarks Required Whether local, RADIUS, or HWTACACS authentication is Specify the scheme adopted depends on the configured authentication-mode scheme authentication mode AAA scheme. By default, the modem login authentication mode of the device is password. Optional default, command...
  • Page 82 To do… Use the command… Remarks ation If you specify the local AAA scheme, authentication default Apply the mode perform the configuration { hwtacacs-scheme specified AAA concerning local user as well. If you hwtacacs-scheme-name [ local ] | local | scheme to the specify an existing scheme by none | radius-scheme...
  • Page 83: Configuring Common Settings For Modem Login (Optional)

    After the configuration, when you log in to the device through modems, you are prompted to enter a login username and password. A prompt such as <H3C> appears after you input the password and username and press Enter, as shown in Figure 3-32.
  • Page 84 To do… Use the command… Remarks Optional By default, the data bits of the AUX port is 8. Data bits is the number of bits representing one character. The Configure the data databits { 5 | 6 | 7 | 8 } setting depends on the contexts to bits be transmitted.
  • Page 85: Displaying And Maintaining Cli Login

    To do… Use the command… Remarks Optional The default idle-timeout is 10 minutes. The system automatically terminates the user’s connection if Set the idle-timeout minutes [ seconds ] there is no information interaction idle-timeout timer between the device and the user within the idle-timeout time.
  • Page 86 To do… Use the command… Remarks Available in user view Multiple users can log in to the system to simultaneously configure the device. In some circumstances, when the administrator wants to make configurations without interruption from the users that free user-interface { num1 | { aux Release a specified user interface have logged in through other user | vty } num2 }...
  • Page 87: Nms Login

    NMS Login This chapter includes these sections: NMS Login Overview Configuring NMS Login NMS Login Example NMS Login Overview A Network Management Station (NMS) runs the SNMP client software. It offers a user-friendly interface to facilitate network management. An agent is a program that resides in the device. It receives and handles requests from the NMS.
  • Page 88 To do… Use the command… Remarks Optional Disabled by default. Enable SNMP agent snmp-agent You can enable SNMP agent with this command or any command that begins with snmp-agent. snmp-agent group v3 group-name [ authentication | Required Configure an SNMP group privacy ] [ read-view read-view ] By default, no SNMP group is and specify its access right...
  • Page 89: Nms Login Example

    The device supports three SNMP versions: SNMPv1, SNMPv2C and SNMPv3. For more information about SNMP, see SNMP in the Network Management and Monitoring Configuration Guide. NMS Login Example In this example, iMC is used as the NMS for illustration. Configuration on the device # Assign 1.1.1.1/24 for the IP address of device.
  • Page 90 Figure 4-2 iMC login page Type the username and password, and then click Login. The iMC homepage appears, as shown in Figure 4-3. Figure 4-3 iMC homepage Log in to the iMC and configure SNMP settings for the iMC to find the device. After the device is found, you can manage and maintain the device through the iMC.
  • Page 91 Click Help in the upper right corner of each configuration page to get corresponding help information. 3-80...
  • Page 92: User Login Control

    User Login Control This chapter includes these sections: User Login Control Overview Configuring Login Control over Telnet Users Configuring Source IP-Based Login Control over NMS Users User Login Control Overview The device provides the following login control methods. Login Through Login control methods ACL used Configuring Source IP-Based Login Control over...
  • Page 93: Configuring Source And Destination Ip-Based Login Control Over Telnet Users

    To do… Use the command… Remarks rule [ rule-id ] { permit | deny } [ source { sour-addr Configure rules for this ACL Required sour-wildcard | any } | time-range time-name | fragment | logging ]* — Exit the basic ACL view quit user-interface [ type ] —...
  • Page 94: Source Mac-Based Login Control Configuration Example

    To do… Use the command… Remarks — Enter system view system-view Required Create an advanced ACL and acl number acl-number enter its view, or enter the view of By default, no advanced ACL [ match-order { config | auto } ] an existing advanced ACL exists.
  • Page 95: Configuring Source Ip-Based Login Control Over Nms Users

    [Sysname-acl-basic-2000] quit # Reference ACL 2000 in user interface view to allow telnet users from Host A and Host B to access the Device. [Sysname] user-interface vty 0 4 [Sysname-ui-vty0-4] acl 2000 inbound Configuring Source IP-Based Login Control over NMS Users You can log in to the NMS to remotely manage the devices.
  • Page 96: Source Ip-Based Login Control Over Nms Users Configuration Example

    To do… Use the command… Remarks snmp-agent usm-user { v1 | v2c } user-name group-name [ acl acl-number ] snmp-agent usm-user v3 user-name group-name Associate the user with the ACL [ [ cipher ] authentication-mode { md5 | sha } auth-password [ privacy-mode { 3des | aes128 | des56 } priv-password ] ] [ acl acl-number ]...
  • Page 97: Ftp Configuration

    FTP Configuration This chapter includes these sections: FTP Overview Configuring the FTP Client Configuring the FTP Server Displaying and Maintaining FTP FTP Overview Introduction to FTP The File Transfer Protocol (FTP) is an application layer protocol for sharing files between server and client over a TCP/IP network.
  • Page 98: Configuring The Ftp Client

    Table 6-1 Configuration when the device serves as the FTP client Device Configuration Remarks If the remote FTP server supports anonymous FTP, the device can log in to it directly; if not, Use the ftp command to establish the Device (FTP client) the device must obtain the FTP username and connection to the remote FTP server password first to log in to the remote FTP...
  • Page 99: Establishing An Ftp Connection

    Only users with the manage level can use the ftp command to log in to an FTP server, enter FTP client view, and execute directory and file related commands. However, whether the commands can be executed successfully depends on the authorizations of the FTP server. Establishing an FTP Connection To access an FTP server, an FTP client must establish a connection with the FTP server.
  • Page 100: Operating The Directories On An Ftp Server

    To do… Use the command… Remarks client view. Support for vpn-instance Log in to the remote FTP server vpn-instance-name in the ftp indirectly in FTP client view open server-address [ service-port ] command depends on the device model. If no primary IP address is configured on the specified source interface, no FTP connection can be established.
  • Page 101: Operating The Files On An Ftp Server

    To do… Use the command… Remarks Remove the specified working directory on the rmdir directory Optional remote FTP server Operating the Files on an FTP Server After the device serving as the FTP client has established a connection with an FTP server (For how to establish an FTP connection, see Establishing an FTP Connection.), you can upload a file to or...
  • Page 102: Using Another Username To Log In To An Ftp Server

    Using Another Username to Log In to an FTP Server After the device serving as the FTP client has established a connection with the FTP server (For how to establish an FTP connection, see Establishing an FTP Connection.), you can use another username to log in to the FTP server.
  • Page 103: Ftp Client Configuration Example (On The Sr6602 Router)

    To do… Use the command… Remarks Optional Terminate the connection to the FTP quit Available in FTP client view, server and return to user view equal to the bye command. FTP Client Configuration Example (On the SR6602 router) Network requirements As shown in Figure 6-2, use Device as an FTP client and PC as the FTP server.
  • Page 104: Ftp Client Configuration Example (On The Sr6604/6608/6616 Router)

    [ftp] get newest.bin # Upload the configuration file config.cfg of Device to the server for backup. [ftp] ascii [ftp] put config.cfg back-config.cfg 227 Entering Passive Mode (10,1,1,1,4,2). 125 ASCII mode data connection already open, transfer starting for /config.cfg. 226 Transfer complete. FTP: 3494 byte(s) sent in 5.646 second(s), 618.00 byte(s)/sec.
  • Page 105 If the available memory space of the device is not enough, use the fixdisk command to clear the memory or use the delete /unreserved file-url command to delete the files not in use and then perform the following operations. # Log in to the server through FTP. <Sysname>...
  • Page 106: Configuring The Ftp Server

    The boot file used for the next startup must be saved under the root directory of the storage medium (For a device that has been partitioned, the boot file must be saved on the first partition). You can copy or move a file to the root directory of the storage medium. For the details of the boot-loader command, see Software Upgrade in the Fundamentals Command Reference.
  • Page 107: Configuring Authentication And Authorization On The Ftp Server

    Configuring Authentication and Authorization on the FTP Server To allow an FTP user to access certain directories on the FTP server, you need to create an account for the user, authorizing access to the directories and associating the username and password with the account.
  • Page 108: Ftp Server Configuration Example (On The Sr6602 Router)

    FTP Server Configuration Example (On the SR6602 router) Network requirements As shown in Figure 6-4, use Device as an FTP server, and the PC as the FTP client. Their IP addresses are 1.2.1.1/16 and 1.1.1.1/16 respectively. Device and PC are reachable to each other. PC keeps the updated boot file of the device.
  • Page 109: Ftp Server Configuration Example (On The Sr6604/6608/6616 Router)

    331 Password required for ftp. Password: 230 User logged in. # Download the configuration file config.cfg of the device to the PC for backup. ftp> get config.cfg back-config.cfg # Upload the configuration file newest.bin to Device. ftp> put newest.bin ftp> bye You can take the same steps to upgrade configuration file with FTP.
  • Page 110 Figure 6-5 Upgrading using the FTP server Configuration procedure Configure Device (FTP Server) # Create an FTP user account ftp, set its password to pwd and the user privilege level to level 3 (the manage level).Allow user ftp to access the root directory of the cfa0 on the AMB, and specify ftp to use FTP.
  • Page 111: Displaying And Maintaining Ftp

    # Upload the configuration file newest.bin to the root directory of the storage medium on the AMB. ftp> put newest.bin ftp> bye You can take the same steps to upgrade configuration file with FTP. When upgrading the configuration file with FTP, put the new file under the root directory of the storage medium (For a device that has been partitioned, the configuration file must be saved on the first partition.).
  • Page 112 6-101...
  • Page 113: Tftp Configuration

    TFTP Configuration This chapter includes these sections: TFTP Overview Configuring the TFTP Client TFTP Client Configuration Example (On the SR6602 router) TFTP Client Configuration Example (On the SR6604/6608/6616 router) TFTP Overview Introduction to TFTP The Trivial File Transfer Protocol (TFTP) provides functions similar to those provided by FTP, but it is less complex than FTP in interactive access interface and authentication.
  • Page 114: Configuring The Tftp Client

    Before using TFTP, the administrator needs to configure IP addresses for the TFTP client and server, and make sure that there is a reachable route between the TFTP client and server. When the device serves as the TFTP client, you need to perform the following configuration: Table 7-1 Configuration when the device serves as the TFTP client Device Configuration...
  • Page 115: Displaying And Maintaining The Tftp Client

    If the source address is specified with the tftp client source or tftp command, this source address is adopted. If you use the tftp client source command and the tftp command to specify a source address respectively, the source address configured with the tftp command is used to communicate with a TFTP server.
  • Page 116: Tftp Client Configuration Example (On The Sr6602 Router)

    TFTP Client Configuration Example (On the SR6602 router) Network requirements As shown in Figure 7-2, use a PC as the TFTP server and Device as the TFTP client. Their IP addresses are 1.2.1.1/16 and 1.1.1.1/16 respectively. Device and PC are reachable to each other. Device downloads a boot file from PC for upgrading and uploads a configuration file named config.cfg to PC for backup.
  • Page 117: Tftp Client Configuration Example (On The Sr6604/6608/6616 Router)

    The boot file used for the next startup must be saved under the root directory of the storage medium (For a device that has been partitioned, the boot file must be saved on the first partition). You can copy or move a file to the root directory of the storage medium. For the details of the boot-loader command, see Software Upgrade in the Fundamentals Command Reference.
  • Page 118 <Sysname> tftp 1.2.1.1 get newest.bin slot1#cfa0:/newest.bin # Upload a configuration file config.cfg to the TFTP server. <Sysname> tftp 1.2.1.1 put config.cfg configback.cfg # Specify newest.bin as the main boot file to be used at the next startup. Specify newest.bin as the main boot file to be used at the next startup for the AMB. <Sysname>...
  • Page 119: File Management

    File Management This chapter includes these sections: Managing Files Directory Operations File Operations Batch Operations Storage Medium Operations Setting Prompt Modes Example for File Operations Managing Files Files such as host software and configuration files that are necessary for the operation of the device are saved in the storage media of the device.
  • Page 120: Directory Operations

    Format Description Length Example Specifies a file in the current 1 to 91 a.cfg indicates a file named a.cfg file-name working directory. characters in the current working directory Specifies a file in the specified folder in the current working test/a.cfg indicates a file named directory.
  • Page 121: Displaying Directory Information

    Displaying Directory Information To do… Use the command… Remarks Required Display directory or file information dir [ /all ] [ file-url ] Available in user view Displaying the Current Working Directory To do… Use the command… Remarks Required Display the current working directory Available in user view Changing the Current Working Directory...
  • Page 122: File Operations

    File Operations You can display the specified directory or file information; display file contents; rename, copy, move, remove, restore, and delete files. You can create a file by copying, downloading or using the save command. Displaying File Information To do… Use the command…...
  • Page 123: Deleting A File

    Deleting a File To do… Use the command… Remarks Required Move a file to the recycle bin or delete [ /unreserved ] file-url delete it permanently Available in user view The files in the recycle bin still occupy storage space. To delete a file in the recycle bin, execute the reset recycle-bin command in the directory to which the file originally belongs.
  • Page 124: Storage Medium Operations

    Download the batch file to the device. If the suffix of the file is not .bat, use the rename command to change the suffix to .bat. Execute the batch file. Follow these steps below to execute a batch file: To do… Use the command…...
  • Page 125: Mounting/Unmounting A Storage Medium

    Mounting/Unmounting a Storage Medium For a hot swappable storage medium, such as a CF card, you can use the mount and umount command to mount or unmount it. By default, a storage medium is automatically mounted when connected to the device. However, when a storage medium is connected to a lower version system, the system cannot recognize the storage medium.
  • Page 126: Example For File Operations

    Example for File Operations # Display the files and the subdirectories in the current directory. <Sysname> dir Directory of cfa0:/ -rw- 10944608 Jan 11 2030 23:47:54 sr6602.bin drw- Apr 26 2000 12:00:02 logfile -rw- 95805 Jun 30 2007 10:00:28 startup.cfg -rw- 22745844 Jun 28 2007 20:19:50...
  • Page 127: Configuration File Management

    Configuration File Management The device provides the configuration file management function. You can manage configuration files at a user-friendly command line interface (CLI). This chapter includes these sections: Configuration File Overview Saving the Current Running Configuration Setting Configuration Rollback Specifying a Startup Configuration File to Be Used at the Next System Startup Backing Up the Startup Configuration File Deleting a Startup Configuration File to Be Used at the Next Startup Restoring a Startup Configuration File...
  • Page 128: Format And Content Of A Configuration File

    You can use the display current-configuration command to view the current validated configuration of the device. Format and Content of a Configuration File A configuration file is saved as a text file. It is saved following these rules: A configuration file contains commands, and only non-default configuration settings are saved. Commands in a configuration file are listed in sections by views, usually in the order of system view, interface view, routing protocol view, and user interface view.
  • Page 129: Saving The Current Running Configuration

    Saving the Current Running Configuration Introduction To make configuration changes take effect at the next startup of the device, you can save the running configuration to the startup configuration file to be used at the next startup before the device reboots. Complete these tasks to save the current configuration: Task Remarks...
  • Page 130 Safe mode. This is the mode when you use the save command with the safely keyword. The mode saves the file more slowly but can retain the configuration file in the device even if the device reboots or the power fails during the process. The fast saving mode is suitable for environments where power supply is stable.
  • Page 131: Setting Configuration Rollback

    The configuration file must be with extension .cfg. Whether the save [ safely ] [ backup | main ] command or the save filename all command+Enter takes effect on both the AMB and SMB or on the AMB only depends on whether the configuration file auto-save function is enabled.
  • Page 132: Configuration Task List

    Applies the commands from the replacement configuration file that are not present in the current running configuration. Applies the commands from the replacement configuration file that have different configurations in the current running configuration. The current running configuration is only saved to the AMB, and only the configuration on the AMB can be rolled back.
  • Page 133: Enabling Automatic Saving Of The Running Configuration

    To do… Use the command… Remarks Required By default, the path and filename archive configuration location Configure the path and filename for saving configuration files are directory filename-prefix prefix for saving configuration files not configured, and the system filename-prefix does not save the configuration file at a specified interval.
  • Page 134: Manually Saving The Current Running Configuration

    To do… Use the command… Remarks Enable the automatic saving of the Optional archive configuration interval current running configuration, and minutes Disabled by default set the interval The path and filename prefix for saving configuration files must be specified before you configure the automatic saving period.
  • Page 135: Specifying A Startup Configuration File To Be Used At The Next System Startup

    Do not unplug and plug a card during configuration rollback (that is, the system is executing the configuration replace file command). In addition, configuration rollback may fail if one of the following situations is present (if a command cannot be rolled back, the system skips it and processes the next one): The complete undo form of a command is not supported, namely, you cannot get the actual undo form of the command by simply putting the keyword undo in front of the command, so the complete...
  • Page 136: Backing Up The Startup Configuration File

    A configuration file must use .cfg as its extension name and the startup configuration file must be saved in the root directory of the storage medium. Backing Up the Startup Configuration File The backup function allows you to copy the startup configuration file to be used at the next startup from the device to the TFTP server.
  • Page 137: Restoring A Startup Configuration File

    To do… Use the command… Remarks Delete a startup configuration file Required reset saved-configuration to be used at the next startup from [ backup | main ] Available in user view the storage medium This command permanently deletes startup configuration files to be used at the next startup from the device.
  • Page 138: Displaying And Maintaining A Configuration File

    Displaying and Maintaining a Configuration File To do… Use the command… Remarks Display the information about display archive configuration Available in any view configuration rollback Display the current running display saved-configuration Available in any view configuration file saved on the [ by-linenum ] storage medium of the device Display the configuration files used...
  • Page 139: Software Upgrade Overview

    Software Upgrade Overview This chapter includes these sections: Device Software Overview Software Upgrade Methods Device Software Overview Device software comprises the Boot ROM program and the system boot file. After powered on, the device runs the Boot ROM program, initializes the hardware, and displays the hardware information.
  • Page 140 The upgrading at the CLI falls into two categories: Upgrade method Upgrade object Description You need to reboot the whole system to upgrade the Software Upgrade Boot ROM software of a device. This causes running service Through a System program and interruption during the upgrade process, and is not Reboot system boot file...
  • Page 141: Software Upgrade Through A System Reboot

    Software Upgrade Through a System Reboot This chapter includes these sections: Upgrading the Boot ROM Program Through a System Reboot Upgrading the Boot File Through a System Reboot Upgrading the Boot File for the SMB Displaying and Maintaining the System Boot File Upgrade Configuration Example (On the SR6604/6608/6616 router) Scheduled Upgrade Configuration Example (On the SR6602 router) Upgrading the Boot ROM Program Through a System Reboot...
  • Page 142: Upgrading The Boot File Through A System Reboot

    You must save the Boot ROM file in the root directory of the device. You can copy or move a file to change the path of it to the root directory. (On the SR6602 router) To execute the bootrom command successfully, save the Boot ROM file in the root directory of the storage media on the active main board (AMB) (On the SR6604/6608/6616 router) Upgrading the Boot File Through a System Reboot...
  • Page 143: Upgrading The Boot File For The Smb

    You must save the file to be used at the next device boot in the root directory of the device. You can copy or move a file to change the path of it to the root directory. To execute the boot-loader command successfully, save the file to be used at the next device boot in the root directory of the storage media on the AMB (On the SR6604/6608/6616 router) The names of the files for the next boot of the AMB and the SMB may be different, but...
  • Page 144: Displaying And Maintaining The System Boot File

    Displaying and Maintaining the System Boot File To do… Use the command… Remarks Available in any view Display information about the display boot-loader Only available on the boot file SR6602 router Available in any view Display information about the display boot-loader [ slot Only available on the boot file slot-number ]...
  • Page 145 [FTP-Server] ftp server enable # Set the FTP username to aaa and password to hello. [FTP-Server] local-user aaa [FTP-Server-luser-aaa] password cipher hello # Configure the user to have access to the aaa directory. [FTP-Server-luser-aaa] service-type ftp [FTP-Server-luser-aaa] authorization-attribute work-directory flash:/aaa Configuration on the device If the size of the CF card on the device is not large enough, delete the original application programs from the CF card before downloading.
  • Page 146: Scheduled Upgrade Configuration Example (On The Sr6602 Router)

    <Device> reboot To check if the upgrade is successful after the device reboots, use the display version command. Scheduled Upgrade Configuration Example (On the SR6602 router) Network requirement As shown in Figure 11-2, the current software version is soft-version1 for the device. Upgrade the software version of the device to soft-version2 and configuration file to new-config at a time when few services are processed (for example, at 3 am) through remote operations.
  • Page 147 Use text editor on the FTP server to edit batch file auto-update.txt. The following is the content of the batch file: return startup saved-configuration new-config.cfg boot-loader file soft-version2.bin main reboot 2) Configuration on the device # Log in to the FTP server (The prompt may vary with servers.) <Device>...
  • Page 148: Software Upgrade By Installing Hotfixes

    Software Upgrade by Installing Hotfixes This chapter includes these sections: Hotfix Overview Hotfix Configuration Task List One-Step Patch Installation Step-by-Step Patch Installation Step-by-Step Patch Uninstallation Displaying and Maintaining Hotfix Hotfix Configuration Examples Hotfix Overview Hotfix is a fast, cost-effective method to repair software defects of a device. Compared with another method, software version upgrade, hotfix can upgrade the software without interrupting the running services of the device.
  • Page 149: Patch Status

    Patch Status Each patch has its status, which can be switched only by commands. The relationship between patch state changes and command actions is shown in Figure 12-1. The patch can be in the state of IDLE, DEACTIVE, ACTIVE, and RUNNING. Load, run temporarily, confirm running, stop running, delete, install, and uninstall represent operations, corresponding to commands of patch load, patch active, patch run, patch deactive, patch delete, patch install, and undo patch install.
  • Page 150 Figure 12-2 Patches are not loaded to the memory patch area Currently, the memory patch area supports up to 200 patches. DEACTIVE state Patches in the DEACTIVE state have been loaded to the memory patch area but have not run in the system yet.
  • Page 151: Hotfix Configuration Task List

    Figure 12-4 Patches are activated RUNNING state After you confirm the running of the ACTIVE patches, the state of the patches become RUNNING and are in the RUNNING state after system reboot. For the five patches in Figure 12-4, if you confirm running the first three patches, their states change from ACTIVE to RUNNING.
  • Page 152: Configuration Prerequisites

    Configuration Prerequisites Patches are released per device model or card type. Before patching the system, you need to save the appropriate patch files to the storage media of the device using FTP or TFTP. When saving the patch files, note that: The patch files match the device model and software version.
  • Page 153: One-Step Patch Installation

    One-Step Patch Installation To install patches in one step, use the patch install command. After you execute the command, the system displays the message "Do you want to continue running patches after reboot? [Y/N]:". Entering y or Y: All the specified patches are installed, and turn to the RUNNING state from IDLE. This equals execution of the commands patch location, patch load, patch active, and patch run.
  • Page 154: Loading A Patch File

    To do… Use the command… Remarks Enter system view system-view — Optional Configure the patch file location patch location patch-location cfa0: by default The directory specified by the patch-location argument must exist on both the AMB and SMB. If the SMB does not have such directory, the system cannot locate the patch files on the SMB.
  • Page 155: Activating Patches

    Activating Patches After you activate a patch, the patch takes effect and is in the test-run stage. After the device is reset or rebooted, the patch becomes invalid. If you find that an ACTIVE patch is of some problem, reboot the device to deactivate the patch, so as to avoid a series of running faults resulting from patch error.
  • Page 156: Step-By-Step Patch Uninstallation

    Step-by-Step Patch Uninstallation Step-by-Step Patch Uninstallation Task List Task Remarks Stopping Running Patches Required Deleting Patches Required Stopping Running Patches When you stop running a patch, the patch state becomes DEACTIVE, and the system runs in the way before it is installed with the patch. Follow these steps to stop running patches: (On the SR6602 router) To do…...
  • Page 157: Displaying And Maintaining Hotfix

    Displaying and Maintaining Hotfix To do… Use the command… Remarks Display the patch information display patch information Available in any view Hotfix Configuration Examples Hotfix Configuration Example (On the SR6602 router) Network requirements As shown in Figure 12-6, the software running on the device is of some problem, and thus hotfixing is needed.
  • Page 158: Hotfix Configuration Example (On The Sr6604/6608/6616 Router)

    [Device] patch install cfa0:/ Patches will be installed. Continue? [Y/N]:y Do you want to continue running patches after reboot? [Y/N]:y Installing patches..Installation completed, and patches will continue to run after reboot. Hotfix Configuration Example (On the SR6604/6608/6616 router) Network requirements As shown in Figure 12-7, the software running on the device is of some problem and thus hotfixing...
  • Page 159 Patches will be installed. Continue? [Y/N]:y Do you want to continue running patches after reboot? [Y/N]:y Installing patches..Installation completed, and patches will continue to run after reboot. 12-148...
  • Page 160: Device Management

    Device Management This chapter includes these sections: Device Management Overview Displaying Device Configuration Configuring the Device Name Configuring the System Clock Enabling the Display of Copyright Information Configuring Banners Configuring the Number of Concurrent Users Configuring the Exception Handling Method Rebooting the Device Configuring the Scheduled Automatic Execution Function Hot-Swapping a Card...
  • Page 161: Configuring The Device Name

    Factory defaults: When devices are shipped, they are provided some basic configurations, which are called factory defaults. These default configurations ensure that a device can start up and run normally when it has no configuration file or the configuration file is damaged. Current configuration: The currently running configuration on the device.
  • Page 162: Configuring The System Clock

    Configuring the System Clock Configuring the System Clock The system clock, displayed by system time stamp, is determined by the configured relative time, time zone, and daylight saving time. To view the system clock, use the display clock command. Follow these steps to configure the system clock: To do…...
  • Page 163 Configuration System clock configured Example Configure: clock timezone zone-time add 1 The original system clock ± zone-offset System clock configured:: 02:00:00 zone-time Sat 01/01/2005 Configure: clock datetime 2:00 2007/2/2 and clock timezone zone-time add 1 1 and 2 date-time ± zone-offset System clock configured:: 03:00:00 zone-time Fri 02/02/2007 Configure: clock timezone zone-time...
  • Page 164: Enabling The Display Of Copyright Information

    The display format of copyright information is shown below: ************************************************************************** * Copyright (c) 2004-2009 Hangzhou H3C Tech. Co., Ltd. All rights reserved.* * Without the owner's prior written consent, * no decompiling or reverse-engineering shall be allowed.
  • Page 165: Configuring Banners

    To do… Use the command… Remarks Enter system view system-view — Optional Enable the display of copyright copyright-info enable information Enabled by default. Configuring Banners Introduction to Banners Banners are prompt information displayed by the system when users are connected to the device, perform login authentication, and start interactive configuration.
  • Page 166: Banner Configuration Example

    Optional displayed before login Banner Configuration Example # Configure the banner to be displayed when a user enters user view as Welcome to H3C!. Single-line input mode: <System> system-view [System] header shell %Welcome to H3C!% Multiple-line input mode (method I): <System>...
  • Page 167: Configuring The Exception Handling Method

    To do… Use the command… Remarks Enter system view system-view — Optional Configure the number of Two users are allowed to perform configure-user count number concurrent users the operation concurrently in system view. When multiple users enter system view concurrently to configure certain attribute, only the last configuration applies.
  • Page 168: Rebooting The Device

    With this command configured, both the AMB and the SMB adopt the same method to handle exceptions. The system adopts the reboot method to handle exceptions happened on an interface card or the auxiliary CPU system. In other words, the system reboots the failed card. (On the SR6604/6608/6616 router) The exception handling method is effective to the failed card only, and does not influence the functions of other card s.
  • Page 169 Follow the step below to reboot a device immediately: To do… Use the command… Remarks Required The slot keyword specifies a card. Reboot a card, a subcard, or the reboot [ slot slot-number If it is not provided, the whole whole system immediately [ subslot subslot-number ] ] device is specified.
  • Page 170: Configuring The Scheduled Automatic Execution Function

    Device reboot may result in interruption of ongoing services. Use these commands with caution. Before rebooting the device, use the save command to save the current configurations. For more information about the save command, see Configuration File Management in the Fundamentals Command Reference.
  • Page 171: Hot-Swapping A Card

    To do… Use the command… Remarks time timeID at time1 date command command Bind the execution time with the time timeID { one-off | repeating } Required commands in the task, that is, at time1 [ month-date month-day | configure the time to execute the week-day week-daylist ] Use any of the commands.
  • Page 172: Power Supply Management

    You can use the command to unmount a hot swappable card only. To remove other cards, you need to power off the device first. Execution of the command will make the card unavailable, thus interrupting services. Use the command with caution. Use the command to unmount a hot swappable card before you remove the card with the power on.
  • Page 173 to implement E1, CE1 or ISDN PRI access); some cards can be configured with different working modes. At present, the following switching modes are supported (support for the switching mode depends on the interface card): CPOS 155 Mbps (E1/T1): Supports the E1/T1 switch of the entire interface card. When this interface card works in E1 mode, all the interfaces on the interface card can receive, send and process E1 data flows, and provide CE1 access, thus implementing the ISDN PRI function;...
  • Page 174: Clearing The 16-Bit Interface Indexes Not Used In The Current System

    For some devices, you need to restart the device or hot swap the interface card (if the interface card supports hot swapping) after working mode switch to make the newly configured working mode take effect. Clearing the 16-bit Interface Indexes Not Used in the Current System In practical networks, the network management software requires the device to provide a uniform, stable 16-bit interface index.
  • Page 175: Identifying And Diagnosing Pluggable Transceivers

    [ interface-type interface-number ] } To identify an anti-spoofing pluggable transceiver customized by H3C, use the Vendor Name field in the prompt information of the display transceiver command. If the field is H3C, it is considered an H3C-customized pluggable transceiver.
  • Page 176: Diagnosing Pluggable Transceivers

    USB 2.0 specifications. The SR6600 can be connected with a host through a standard detachable cable. The host registers the internal CF card of the SR6600 as an USB mass storage medium on its Windows operating system. After the host recognizes the router as an USB mass storage medium, you can access the internal CF card quickly and perform file operations on it.
  • Page 177: Connecting The Router And The Host

    Use an A-type receptacle with an A-type plug. An A-type receptacle is usually on a host or a hub and functions as the output of the host system or hub system; an A-type plug usually connects to its corresponding A-type receptacle on a host or a hub. Use a B-type receptacle with a B-type plug.
  • Page 178 Figure 13-4 The Windows operating system has loaded the USB mass storage medium Note that: The router does not provide the USB mass storage medium driver at the host end. Therefore, you need to install a Windows operating system that supports the USB mass storage medium driver on the host (Windows XP is recommended).
  • Page 179: Unmounting The Usb Device

    Unmounting the USB Device To ensure the safety of the USB device and data, after using the USB device in the Window operating system, you need to unmount the USB device by using the Safely Remove Hardware feature provided by Windows: At the right corner of the taskbar on the Windows desktop, double-click the Safely Remove Hardware icon, select USB Mass Storage Device from the pop-up window, and then click Stop.
  • Page 180: Enabling Usb Device Port

    Enabling USB Device Port Follow these steps to enable USB device port: To do… Use the command… Remarks Enter system view system-view — On the SR6602 router usb device-port enable type storage Required Enable USB On the Disabled by usb device-port enable type storage device port SR6604/6608/6616 default...
  • Page 181 To do… Use the command… Remarks Display the operating state of fans display fan [ fan-id ] Available in any view in a device Display the usage of the memory of display memory Available in any view a device Display the power state of a device display power [ power-id ] Available in any view Display state of the redundant...
  • Page 182 To do… Use the command… Remarks Display the temperature display environment Available in any view information of devices Available in any view Display the operating state of fans display fan [ fan-id | verbose ] on the SR6604/6608/6616 in the device router Display the usage of the memory of display memory [ slot slot-number...
  • Page 183: Index

    Index Controlling CLI Display 1-11 Backing Up the Startup Configuration File Deleting a Startup Configuration File to Be 9-125 Used at the Next Startup 9-125 Batch Operations 8-112 Device Management Overview 13-149 Device Software Overview 10-128 Directory Operations 8-109 Checking Command Line Errors Displaying and Maintaining a Configuration Clearing the 16-bit Interface Indexes Not File...
  • Page 184 Hot-Swapping a Card 13-160 Scheduled Upgrade Configuration Example (On the SR6602 router) 11-135 Setting Configuration Rollback 9-120 Identifying and Diagnosing Pluggable Setting Prompt Modes 8-114 Transceivers 13-164 Software Upgrade Methods 10-128 Immediate Upgrade Configuration Example Specifying a Startup Configuration File to Be (On the SR6604/6608/6616 router) 11-133 Used at the Next System Startup...

Table of Contents