CX91x Series Switch Modules V100R001C00 Configuration Guide 09

This document provides the basic concepts, configuration procedures, and configuration examples in different application scenarios of the Ethernet feature supported by the CX111&CX910&CX911&CX913 device.

This document provides the basic concepts, configuration procedures, and configuration examples in different application scenarios of the Ethernet feature supported by the CX111&CX910&CX911&CX913 device.

About This Document

About This Document

Purpose

The documents describe the configuration of various services supported by the CX91x series switch modules. The description covers configuration examples and function configurations.

The product features and commands for the 10GE switching plane of the CX91x series switch modules vary according to the software version. For details, see the documents listed in the following table.

Run the display version command in the switching plane CLI and select a reference document based on the Switch Version or Software Version displayed in the command output.

Huawei Support Website Version

10GE Switching Plane Software Version

Reference Document

V100R001C00 or V100R001C00SPCxxx

1.1.0.200.3

See this document.

1.1.3.300.5

1.1.3.301.6

1.2.1.0.19

1.2.1.0.21

2.23

2.26

2.29

V100R001C10 or V100R001C10SPCxxx

1.2.1.0.39

See the CX11x, CX31x, CX710 (Earlier Than V6.03), and CX91x Series Switch Modules V100R001C10 Configuration Guide.

Versions in the x.xx format, except 2.23, 2.26, and 2.29.

NOTE:

2.05 and later versions are displayed in the x.xx format.

Intended Audience

This document is intended for:

  • Data configuration engineers
  • Commissioning engineers
  • Network monitoring engineers
  • System maintenance engineers

Symbol Conventions

The symbols that may be found in this document are defined as follows.

Symbol

Description

Indicates an imminently hazardous situation which, if not avoided, will result in death or serious injury.

Indicates a potentially hazardous situation which, if not avoided, could result in death or serious injury.

Indicates a potentially hazardous situation which, if not avoided, may result in minor or moderate injury.

Indicates a potentially hazardous situation which, if not avoided, could result in equipment damage, data loss, performance deterioration, or unanticipated results.

NOTICE is used to address practices not related to personal injury.

Calls attention to important information, best practices and tips.

NOTE is used to address information not related to personal injury, equipment damage, and environment deterioration.

Command Conventions

The command conventions that may be found in this document are defined as follows.

Convention

Description

Boldface

The keywords of a command line are in boldface.

Italic

Command arguments are in italics.

[ ]

Items (keywords or arguments) in brackets [ ] are optional.

{ x | y | ... }

Optional items are grouped in braces and separated by vertical bars. One item is selected.

[ x | y | ... ]

Optional items are grouped in brackets and separated by vertical bars. One item is selected or no item is selected.

{ x | y | ... }*

Optional items are grouped in braces and separated by vertical bars. A minimum of one item or a maximum of all items can be selected.

[ x | y | ... ]*

Optional items are grouped in brackets and separated by vertical bars. You can select one or several items, or select no item.

&<1-n>

The parameter before the & sign can be repeated 1 to n times.

#

A line starting with the # sign is comments.

Interface Numbering Conventions

Interface numbers used in this manual are examples. In device configuration, use the existing interface numbers on devices.

Security Conventions

  • Password setting
    • When configuring a password in plain text, the password is saved in the configuration file in plain text. The plain text has high security risks. The cipher text is recommended. To ensure device security, change the password periodically.
    • When you configure a password in cipher text that starts and ends with %@%@ (the password can be decrypted by the device), the password is displayed in the same manner as the configured one in the configuration file. Do not use this setting.
  • Encryption algorithm

    Currently, the device uses the following encryption algorithms: DES, AES, SHA-1, SHA-2, and MD5. DES and AES are reversible, and SHA-1, SHA-2, and MD5 are irreversible. The encryption algorithm depends on actual networking. If protocols are used for interconnection, the locally stored password must be reversible. It is recommended that the irreversible encryption algorithm be used for the administrator password.

  • Personal data

    Some personal data may be obtained or used during operation or fault location of your purchased products, services, features, so you have an obligation to make privacy policies and take measures according to the applicable law of the country to protect personal data.

  • Remote access
    • The Telnet protocol is not secure. Data is not encrypted during transmission over Telnet. Therefore, transmitted data may be restored after IP packets are captured without authorization. It is recommended that files be transmitted over SSH.
    • The FTP and TFTP protocol is not secure. Data is not encrypted during transmission over FTP and TFTP. Therefore, transmitted data may be restored after IP packets are captured without authorization. It is recommended that files be transmitted over SFTP.

Change History

Changes between document issues are cumulative. Therefore, the latest document version contains all updates made to previous versions.

Issue

Date

Description

09

2022-06-30

Updated the document links.

08

2019-11-30

This issue is the eighth official release.

07

2017-09-04

This issue is the seventh official release, and includes the following changes:

Deleted information about ISSU.

06

2017-03-27

This issue is the sixth official release, and includes the following changes:

Modified the relationships between switching plane software versions and reference documents in About This Document.

05

2015-02-16

This issue is the fifth official release, and includes the following changes:

The Example for Configuring Link Aggregation in Manual Load Balancing Mode and Example for Configuring Link Aggregation in Static LACP Mode are modified.

04

2014-11-10

This issue is the fourth official release, and includes the following changes:

The Adding Member Interfaces to an Eth-Trunk and Adding Member Interfaces to an Eth-Trunk are modified.

03

2014-09-15

This issue is the third official release, and includes the following changes:

"Tecal" is deleted from the product document.

02

2014-07-30

This issue is the second official release, and includes the following changes:

The document name is updated.

01

2013-11-18

This issue is the first official release.

Translation
Favorite
Download
Update Date:2022-07-08
Document ID:EDOC1000018101
Views:365587
Downloads:1505
Average rating:5.0Points

Digital Signature File

digtal sigature tool