CX91x Series Switch Modules V100R001C00 Configuration Guide 09
This document provides the basic concepts, configuration procedures, and configuration examples in different application scenarios of the Ethernet feature supported by the CX111&CX910&CX911&CX913 device.
This document provides the basic concepts, configuration procedures, and configuration examples in different application scenarios of the Ethernet feature supported by the CX111&CX910&CX911&CX913 device.
About This Document
Purpose
The documents describe the configuration of various services supported by the CX91x series switch modules. The description covers configuration examples and function configurations.
Run the display version command in the switching plane CLI and select a reference document based on the Switch Version or Software Version displayed in the command output.
Huawei Support Website Version |
10GE Switching Plane Software Version |
Reference Document |
---|---|---|
V100R001C00 or V100R001C00SPCxxx |
1.1.0.200.3 |
See this document. |
1.1.3.300.5 |
||
1.1.3.301.6 |
||
1.2.1.0.19 |
||
1.2.1.0.21 |
||
2.23 |
||
2.26 |
||
2.29 |
||
V100R001C10 or V100R001C10SPCxxx |
1.2.1.0.39 |
|
Versions in the x.xx format, except 2.23, 2.26, and 2.29. NOTE:
2.05 and later versions are displayed in the x.xx format. |
Intended Audience
This document is intended for:
- Data configuration engineers
- Commissioning engineers
- Network monitoring engineers
- System maintenance engineers
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol |
Description |
---|---|
Indicates an imminently hazardous situation which, if not avoided, will result in death or serious injury. |
|
Indicates a potentially hazardous situation which, if not avoided, could result in death or serious injury. |
|
Indicates a potentially hazardous situation which, if not avoided, may result in minor or moderate injury. |
|
Indicates a potentially hazardous situation which, if not avoided, could result in equipment damage, data loss, performance deterioration, or unanticipated results. NOTICE is used to address practices not related to personal injury. |
|
Calls attention to important information, best practices and tips. NOTE is used to address information not related to personal injury, equipment damage, and environment deterioration. |
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention |
Description |
---|---|
Boldface |
The keywords of a command line are in boldface. |
Italic |
Command arguments are in italics. |
[ ] |
Items (keywords or arguments) in brackets [ ] are optional. |
{ x | y | ... } |
Optional items are grouped in braces and separated by vertical bars. One item is selected. |
[ x | y | ... ] |
Optional items are grouped in brackets and separated by vertical bars. One item is selected or no item is selected. |
{ x | y | ... }* |
Optional items are grouped in braces and separated by vertical bars. A minimum of one item or a maximum of all items can be selected. |
[ x | y | ... ]* |
Optional items are grouped in brackets and separated by vertical bars. You can select one or several items, or select no item. |
&<1-n> |
The parameter before the & sign can be repeated 1 to n times. |
# |
A line starting with the # sign is comments. |
Interface Numbering Conventions
Interface numbers used in this manual are examples. In device configuration, use the existing interface numbers on devices.
Security Conventions
- Password setting
- When configuring a password in plain text, the password is saved in the configuration file in plain text. The plain text has high security risks. The cipher text is recommended. To ensure device security, change the password periodically.
- When you configure a password in cipher text that starts and ends with %@%@ (the password can be decrypted by the device), the password is displayed in the same manner as the configured one in the configuration file. Do not use this setting.
- Encryption algorithm
Currently, the device uses the following encryption algorithms: DES, AES, SHA-1, SHA-2, and MD5. DES and AES are reversible, and SHA-1, SHA-2, and MD5 are irreversible. The encryption algorithm depends on actual networking. If protocols are used for interconnection, the locally stored password must be reversible. It is recommended that the irreversible encryption algorithm be used for the administrator password.
- Personal data
Some personal data may be obtained or used during operation or fault location of your purchased products, services, features, so you have an obligation to make privacy policies and take measures according to the applicable law of the country to protect personal data.
- Remote access
- The Telnet protocol is not secure. Data is not encrypted during transmission over Telnet. Therefore, transmitted data may be restored after IP packets are captured without authorization. It is recommended that files be transmitted over SSH.
- The FTP and TFTP protocol is not secure. Data is not encrypted during transmission over FTP and TFTP. Therefore, transmitted data may be restored after IP packets are captured without authorization. It is recommended that files be transmitted over SFTP.
Change History
Changes between document issues are cumulative. Therefore, the latest document version contains all updates made to previous versions.
Issue |
Date |
Description |
---|---|---|
09 |
2022-06-30 |
Updated the document links. |
08 |
2019-11-30 |
This issue is the eighth official release. |
07 |
2017-09-04 |
This issue is the seventh official release, and includes the following changes: Deleted information about ISSU. |
06 |
2017-03-27 |
This issue is the sixth official release, and includes the following changes: Modified the relationships between switching plane software versions and reference documents in About This Document. |
05 |
2015-02-16 |
This issue is the fifth official release, and includes the following changes: The Example for Configuring Link Aggregation in Manual Load Balancing Mode and Example for Configuring Link Aggregation in Static LACP Mode are modified. |
04 |
2014-11-10 |
This issue is the fourth official release, and includes the following changes: The Adding Member Interfaces to an Eth-Trunk and Adding Member Interfaces to an Eth-Trunk are modified. |
03 |
2014-09-15 |
This issue is the third official release, and includes the following changes: "Tecal" is deleted from the product document. |
02 |
2014-07-30 |
This issue is the second official release, and includes the following changes: The document name is updated. |
01 |
2013-11-18 |
This issue is the first official release. |