01-02 Classic Edition
01-02 Classic Edition
01-02 Classic Edition
2 Classic Edition
NOTE
Prerequisites
● The PuTTY software must be loaded, and you can only switch from the web
platform to the CLI through the Internet Explorer.
When you use the Internet Explorer to switch from the web platform to the
CLI for the first time, a dialog box will be displayed. In the displayed dialog
box, click Download the Telnet client to download the putty.exe file. After
downloading the file, click Configure the path in the displayed dialog box
and select the downloaded putty.exe file. Then click OK in the displayed
dialog box. Click CLI in the lower right corner to switch to the CLI.
● If the Internet Explorer is used, the security level must be set to Low.
Open the Internet Explorer, choose Tools > Internet Options > Security.
Choose Internet and click Custom level. Click Enable under Initialize and
script ActiveX controls not marked as safe, Script ActiveX controls marked
safe for scripting*, Run ActiveX controls and plug-ins, and Active scripting.
Choose Local intranet and Trusted sites, and set the security levels of both
zones to Low. The Internet Explorer 8.0 is used in the preceding example.
NOTE
If the CLI cannot be accessed after the security level of the Internet Explorer is set to
Low, refresh or restart the Internet Explorer and perform the switching again.
● When switching from the web platform to the CLI, note the following:
a. You must log in to the web platform as a user with administrator rights.
b. The device initiates a Telnet connection with a client and it cannot
determine whether the connection is successful.
c. You cannot switch to the CLI if you log in to the web platform using the
URL or based on IP address and port mapping.
Procedure
Step 1 Log in to the web system and click CLI in the lower right corner to display the CLI,
as shown in Figure 2-1.
NOTE
If the Chrome or Firefox browser is used to switch from the web system to the CLI, the
browser attempts to invoke the default Telnet client in the Windows OS and display the
External Protocol Request dialog box after you click CLI in the lower right corner. Click
Launch Application in the External Protocol Request dialog box. The CLI will be
displayed.
Step 2 Enter the configured Telnet user name and password to log in to the router, as
shown in Figure 2-2. You can manage and maintain the router on the CLI.
For details about how to configure the Telnet user name and password, see 2.20.1
User Management.
----End
● The web platform supports multiple browsers. You can log in to the web
platform using Firefox 46 to 66, Google Chrome 46 to 60, Internet Explorer
10.0 or later, or Windows Edge. If an exception occurs when you use Internet
Explorer 10.0 to log in to the web platform, use a later version.
● If Internet Explorer is used and you want to access the CLI by clicking CLI in
the lower right corner or to transfer files, set the security level of the browser
to Low as follows (Internet Explorer 10.0 is used as an example):
a. Open Internet Explorer, and choose Tools > Internet Options > Security.
b. Click Internet and then Custom level, and select Enable for Initialize
and script ActiveX controls not marked as safe, Script ActiveX
controls marked safe for scripting*, Run ActiveX controls and plug-
ins, and Active scripting.
c. Click the Local intranet and Trusted sites zones and set their security
levels to Low.
● If you log in to the web platform using Firefox, choose Tools > Options >
Content and select Enable JavaScript; and choose Tools > Options > Privacy
and select Access cookies from sites and Access third-party cookies.
Otherwise, web pages cannot be displayed. (Firefox 46 is used as an
example.)
● If you log in to the web platform using Google Chrome, choose Settings >
Show advanced settings > Privacy > Content settings, set JavaScript to
Allow all sites to run JavaScript (recommended), and set Cookie to Allow
local data to be set (recommended). Otherwise, web pages cannot be
displayed. (Google Chrome 46 is used as an example.)
● If you log in to the web platform using Windows Edge, choose Settings >
View advanced settings > Cookie > Don't block cookie. Otherwise, web
pages cannot be displayed. (Windows Edge 25 is used as an example.)
● If the device software version changes, for example, the software version is
upgraded or rolled back, clear the browser cache before using the web
platform. Otherwise, web pages may be incorrectly displayed.
– Internet Explorer: Choose Tools > Internet Options > General, click
Delete, select Temporary Internet files and Cookie, and click Delete to
clear the browser cache. (Internet Explorer 10.0 is used as an example.)
– Firefox: Choose Tools > Options > Privacy, click Clear your recent
history, select Cookie and Cache, and click Clear Now to clear the
browser cache. (Firefox 46 is used as an example.)
– Google Chrome: Choose Settings > Show advanced settings > Privacy >
Clear browsing data, select Delete cookies and other site and plug-in
data, and click Clear browsing data to clear the browser cache. (Google
Chrome 46 is used as an example.)
– Windows Edge: Choose Settings > Choose what to clear, select
Browsing history and Cookies and saved website data, and click Clear
to clear the browser cache. (Windows Edge 25 is used as an example.)
● The web platform does not support back, forward, and refresh buttons on the
browser. If you click these buttons, the web platform may return to the login
page.
● After the web platform runs for a long period of time, the browser will occupy
increasing memory with a certain probability. As a result, you cannot log in to
the web page or the web page is displayed abnormally. In this case, restart
the browser, open the web platform, and log in to the system again.
NOTE
Windows Edge translates numbers into telephone numbers and automatically turns the
numbers into clickable links. If you click or select the number, the message "You'll need a
new app to open this tel" will be displayed. Ignore the message.
Context
You can use the device's factory settings to directly log in to the web system to
manage and maintain the device.
Alternatively, you can configure the device's IP address, web system parameters,
and a web system account, and then log in to the web system. For details about
the configuration, see Web System Login Configuration.
As shown in Figure 2-3, you can log in to the device through the web system, and
configure and manage the device on the PC.
Pre-configuration Tasks
Before logging in to the device through the web system, complete the following
tasks:
NOTE
The factory settings of the device include the IP address 192.168.1.1 and subnet mask
255.255.255.0. The access interface is the management interface under which the
silkscreen Management or MGMT is printed. HTTPS services are enabled on the
device.
● Use a network cable to connect the PC to the device.
NOTE
If you cannot log in to the web using the PC that automatically acquires an IP address,
configure a static IP address that is in the same network segment as the IP address of the
device for the PC and then log in to the web.
● The device is running properly.
● Install the browser software on the PC.
Procedure
Step 1 Open the browser on the PC. Windows IE8.0 is used in this example. Enter https://
192.168.1.1 in the address box and press Enter. The web system login page is
displayed, as shown in Figure 2-4.
NOTE
You can use the web mode to configure voice services only when the device works in PBX
mode. You can log in to the voice self-service system using either of the following methods:
● On the web platform, click Enter voice self-service system.
● Run the self-service-http-server command in the voice view to access the self-service
HTTP server configuration view, and then run the self-service http secure-server
enable command to enable the self-service HTTPS server. You can enter https://
192.168.1.1:1443/professional/user/login.html in the address box to access the voice
self-service system. In the configuration view of the self-service HTTPS server, you can
run the self-service http secure-server port command to change the port number of
the self-service HTTPS server. The default port number is 1443.
Check the cause of the login failure based on the prompt message. If the
number of incorrect password attempts reaches the upper limit, the current
account will be locked. By default, a locked account is automatically unlocked
after 5 minutes.
NOTE
After a user logs in, the web system automatically displays the last login time, IP address,
and login mode of the user.
The system asks you to change the password in the following situations, as shown
in Figure 2-6.
V300R019C00 version:
● When you use the default account and password to login to the system for
the first time, you need to change the password.
● After the password expires, you need to change the password.
● At your first login to the system after your password is changed by another
user, you need to change your password.
● If your password is about to expire, the system notifies you the password
expiration time and asks you to change the password.
● When the new user configured by the system administrator logs in to the
device for the first time or uses the initial password or the default password
to log in to the device, the system prompts the user to change the password.
● After the password expires, you need to change the password.
● At your first login to the system after your password is changed by another
user, you need to change your password.
● If your password is about to expire, the system notifies you the password
expiration time and asks you to change the password.
● When you use the default account and password to login to the system for
the first time, you need to change the password.
● After the password expires, you need to change the password.
● At your first login to the system after your password is changed by another
user, you need to change your password.
● If your password is about to expire, the system notifies you the password
expiration time and asks you to change the password.
NOTE
● When you must change the password, after you change the password, click OK. If the
password is changed successfully, a message indicating successful password change is
displayed. Click OK. The login page is displayed. Click Cancel to access the login page
without changing the password, and you cannot enter the web platform.
● When the system asks you to change the password, after you change the password,
click OK. If the password is changed successfully, a message indicating successful
password change is displayed. Click OK. The login page is displayed. Click Cancel to
access the Device Information page.
Step 4 Click Logout in the upper right corner of the page to return to the login page.
Step 5 If you do not perform any operations within a period (10 minutes by default) after
logging in to the web system, the system automatically logs you out. Click OK to
return to the login page.
----End
Symptom
The device cannot be logged in through the web platform.
Procedure
Step 1 Check whether the AR and client can ping each other.
1. Run the ping command on the Windows Command Prompt of the PC to
check whether the PC can ping the AR.
When the system displays the message "Request time out", the target device
is unreachable.
2. Run the display this command in the interface view to check whether the IP
address is configured correctly.
3. If the IP address is incorrect, run the ip address ip-address { mask | mask-
length } command in the interface view to reconfigure the IP address.
4. Open the web platform again and ensure that the input IP address in
https://IP address is the same as that configured on the AR.
Step 2 Check whether the browser configuration is correct.
1. Configure the browser according to 2.4 Precautions for Using the Web
Platform and log in to the web platform again.
2. Log in to the web platform through another browser and check whether the
IE browser limits the login to the web platform.
Step 3 Check whether the HTTPS server configuration is correct.
1. Check whether the HTTPS server is enabled.
Run the display http server command in any view. If the value of HTTPS
server status is Disabled, run the http secure-server enable command in
the system view to enable the HTTPS server.
2. Check the port number of the HTTPS server.
Run the display http server command in any view to check the value of
HTTPS server port.
Ensure that the input port number in the address bar is the same as the value
of HTTPS server port.
Run the http secure-server port command in the system view to configure
the port number of the HTTPS server.
Step 4 Check whether the number of login web users has reached the maximum value.
Run the display http server command in any view to check values of Current
online users and Maximum users allowed.
If the values of Current online users and Maximum users allowed are the same,
log in again after other users go offline.
Step 5 Check whether the interface that allows access to the web platform is configured.
Run the display current-configuration filter http server command in any view
to check whether there is the configuration of http server permit interface.
If the interface that allows access to the web platform Is configured and the
interface that accesses the web platform is not allowed, run the undo http server
permit interface command in the system view to cancel the configuration of the
interface that allows access to the web platform or run the http server permit
interface command in the system view to reconfigure the interface that allows
access to the web platform.
Step 7 Check whether access control is configured for the web client.
1. Run the display current-configuration filter http acl command in any view
to check whether there is the configuration of http acl acl-number.
If there is the configuration of http acl acl-number, record the ACL number.
2. Run the display acl acl-number command in any view to check whether the
IP address of the web client is denied in the ACL.
If the IP address of the web client is denied in the ACL, run the undo rule
rule-id command to delete the ACL rule and use a command to modify the
ACL to allow the IP address of the web client.
Step 8 Check whether the browser is problematic.
----End
2.5.2.2 The Web System Page Is Not Completely Displayed After Successful
Device Login Through the Web System
Symptom
After successful device login through the web system, the web system page is not
completely displayed, or only several options are displayed.
Procedure
Step 1 Check whether the web user level is too low.
If the user level is 1, the user is a common administrator and can only access
Device Information and change the password in User Management. If the user
level is 2, the user is an enterprise administrator and has most operating rights in
the web system. If the user level is 3 to 15, the user is a super administrator and
has all operating rights in the web system.
Run the display this command in the AAA view to check the web user level. If the
value of level is too small in the local-user user-name privilege level level
configuration, some functions cannot be displayed in the web system. Run the
local-user user-name privilege level level command in the AAA view to set the
web user level to 3 or higher so that the web user has all operating rights in the
web system.
Step 2 Check whether the device version is correct.
Run the display version command in any view to check the device version. If the
value of Version is too small in the VRP (R) software, Version Version
configuration, the device does not support some functions in the web system.
Upgrade the device to a proper version.
----End
Run the local-user user-name privilege level level command in the AAA view to
set the web user level.
● If the user level is 1, the user is a common administrator and can only access
Device Information and change the password in User Management.
● If the user level is 2, the user is an enterprise administrator and has most
operating rights in the web system.
● If the user level is 3 to 15, the user is a super administrator and has all
operating rights in the web system.
You are advised to set level to 3 or higher.
If you forget or want to change the web system login password, log in to the
device through the console port, Telnet, or STelnet and set a new password after
login.
NOTE
# Set the password to YsHsjx_202206 for the user admin123 with the privilege
level of 15. The configuration is as follows:
<Huawei> system-view
[Huawei] aaa
[Huawei-aaa] local-user admin123 password irreversible-cipher YsHsjx_202206
[Huawei-aaa] local-user admin123 service-type http
[Huawei-aaa] local-user admin123 privilege level 15
[Huawei-aaa] return
<Huawei> save
NOTE
For service security purposes, you are advised to change the default password of the device.
The system software contains the web page file. After new system software is
loaded to the device, the web page file web.zip is directly decompressed from the
system software and saved to the memory.
2.5.3.7 How Do I Change the Port Number for Web System Login?
Procedure
Run the http secure-server port port-number command in the system view to
reconfigure the port number of the HTTPS server.
More Information
● Changing the port number of the HTTPS service forces all online users to go
offline. Therefore, exercise caution when performing this operation.
● The default port number of the HTTPS server is 443. If you access and control
the device through the web platform, you do not need to specify the port
number. If the default port number is used, attackers may access this port
continuously, consuming bandwidth resources and degrading security
performance of the server. As a result, authorized users cannot access the
device. If the default port number is used by another service, users cannot log
in to the device through the web platform. This command allows you to set
another port number for the HTTPS service to avoid such attacks.
You can change the IP address for web platform login using the command-line
interface (CLI) or web platform.
1. You can configure a management IP address on the CLI using either of the
following methods:
a. Configure a management IP address on the management interface of the AR
router. For example, the management interface is GE0/0/0. Set the management
IP address to 192.168.1.10 and the mask length to 24.
<Huawei> system-view
[Huawei] interface gigabitethernet 0/0/0
[Huawei-GigabitEthernet0/0/0] ip address 192.168.1.10 24
<Huawei> system-view
[Huawei] vlan 1
[Huawei-vlan1] quit
[Huawei] interface vlanif 1
[Huawei-Vlanif1] ip address 192.168.1.10 24
[Huawei-Vlanif1] quit
Log in to the web platform. Choose WAN Access > Ethernet Interface. Find the
corresponding management interface on the Ethernet Interface page. Click
next to the interface to configure an IP address for the interface.
Icon Description
Help You can click Help or press F1 on any page to view help
information about the current page, including the configuration
procedure and parameters.
If the browser automatically blocks pop-up windows, configure the
browser to allow the display of pop-up windows.
In the displayed help window, you can view help information about
any page in the navigation tree on the left side.
About You can click About at any page to view the version of the web
platform.
Context
When logging in to the web platform, you need to perform initial configurations
to implement basic communications.
Procedure
Step 1 Choose Configuration Wizard > Internet Access Wizard.
Configure interfaces connected to the Internet, set parameters for accessing the
Internet, and configure LAN information according to Internet Access Wizard.
After these configurations are complete, hosts on the LAN can access the Internet
using the router.
To view the latest software version, access the technical support center on the
Huawei website.
Some functions of the router are restricted by the license, so you must check
whether information about the current license is the same as information
about the purchased one. If the value of License Status is not activated, see
License Management to apply and activate the license. If license information
is different from information about the purchased information, see Obtaining
Technical Support to contact technical support personnel for help.
NOTE
Only super administrators (levels 3 to 15) can upgrade system software and view license
authorization information.
After completing the initial configuration, click Save in the upper right corner.
Choose System Management > Upgrade and Maintenance > Restart Device.
Click Export Configuration File to back up the configuration file for diagnosing or
rectifying faults in the future. You are advised to back up the configuration file
when the router configuration is changed a lot.
NOTE
----End
● WAN
● Log
2. Click Item.
3. Select status windows you want to view.
The selected windows are displayed in the Device Information page.
NOTE
Device Status
You can view router resource information including the CPU usage, memory
usage, flash memory usage, USB disk usage, temperature, and fan operating
status in the Device Status window, as shown in Figure 2-9.
NOTE
Device Information
You can view router information in the Device Information window, as shown in
Figure 2-13.
● Equipment model: router model.
● Equipment name: router name. To change the router name, click Modify.
When the page shown in Figure 2-10 is displayed, click OK.
To force a user offline, select Disconnect in the Operation column. When the
page shown in Figure 2-12 is displayed, click OK.
Card Information
You can view card information including the slot, card status, power-on status,
registration status, and working status in the Card Information window, as shown
in Figure 2-14.
License Information
You can view license information in the License Information window, as shown in
Figure 2-15.
Service
You can view enabled or disabled services on the router in the Service window,
including FTP, SFTP, Telnet, HTTP, STelnet, HTTPS, SNMP, and CWMP, as shown in
Figure 2-16.
3G/LTE
You can view information about the 3G/LTE wireless card in the 3G/LTE window,
including the interface name, network mode, signal strength, working status,
carrier, transmit rate, receive rate, and IP address. You can check whether the
router can access the Internet using the 3G/LTE wireless card based on the
preceding information, as shown in Figure 2-17.
NOTE
To view information in this window, ensure that the 3G/LTE data card and the corresponding
SIM card have been installed on the router.
You can select an interface from the Interface name drop-down list box to view.
LAN
You can view LAN information about the router in the LAN window, including the
interface name, VLAN ID, connection status, receive rate, transmit rate, IP address/
mask, and interface interzone, as shown in Figure 2-18.
WAN
You can view WAN information about the router in the WAN window, including
the interface name, connection mode, connection status, IP address, transmit rate,
receive rate, NAT status, and interface interzone, as shown in Figure 2-19.
Log
You can view system logs in the Log window, including the log generation time,
log level, and log details, as shown in Figure 2-20.
3. Click Next.
● Figure 2-23 Connect to the WAN using an Ethernet interface (PPP dialup)
Parameter Description
Parameter Description
Parameter Description
Parameter Description
If there is no available LAN interface for the current device, you can select a WAN interface
for LAN configuration.
2. Click Next.
Parameter Description
The Configure WLAN (WiFi) tab page is displayed when the router supports WLAN.
By default, users are added to VLAN1 when a WLAN established through the configuration
wizard on the web platform.
1. Set parameters on the Configure WLAN (WiFi) tab page. The parameters are
as described in Table 2-10. Figure 2-27 shows Configure WLAN (WiFi) page.
2. Click Next.
2. Click Finish.
----End
1. Configure the interface where the IPSec policy is applied and determine the
outbound interface for data flows protected by IPSec.
2. Configure the IP address or domain name for the peer device and click Ping
to test network connectivity.
NOTE
NOTE
You can define multiple data flows that are protected by IPSec.
2. Click Next.
Step 4 Configure encryption and authentication.
Parameter Description
Parameter Description
Parameter Description
Parameter Description
4. Click Next.
Step 5 Confirm settings.
----End
Procedure
Step 1 Configure Zone
1. Choose Configuration Wizard > Deep Security Configuration Wizard to
open the Deep Security Configuration Wizard page.
2. Set Source zone and Destination zone. Table 2-13 describes the parameters.
3. Click Next.
Step 2 Configure IPS
Click Configure IPS, open the Configure IPS page. Select Enable for IPS and click
Next.
----End
2. Configure rate limit on the WAN-side interface, and select or set parameters
according to Table 2-15.
Table 2-15 Description of parameters for rate limit on the WAN-side interface
Item Description
Item Description
3. Click Next.
2. Click Next.
2. Click Finish.
----End
2.10.1 LAN
Context
To identify an interface, you can set the description of the interface. You can query
and configure physical interfaces based on the site requirements.
Procedure
● Configuring a physical interface
a. Choose LAN Access > LAN > Physical Interface, as shown in Figure
2-35.
Parameter Description
NOTE
GE0/0/0 to GE0/0/7 on the AR6120-S, AR6121-S, and AR6121C-S can be changed from
Layer 2 mode to Layer 3 mode.
GE0/0/0, GE0/0/1, GE0/0/4, GE0/0/5, and GE0/0/8 on the AR6140-S can be changed from
Layer 2 mode to Layer 3 mode.
GE0/0/0 to GE0/0/11 on the AR6140H-S can be changed from Layer 2 mode to Layer 3
mode.
GE0/0/0 to GE0/0/3 on the AR611W, AR611W-LTE4CN, AR617VW, AR617VW-LTE4,
AR617VW-LTE4EA, AR651W-X4, and AR651-X8 can be changed from Layer 2 mode to Layer
3 mode.
GE0/0/0 to GE0/0/7 on the AR651C, AR651U-A4, AR651K, AR651, AR651W-8P, AR651W,
AR657W, AR1600 series, AR6120, AR6120-VW, can be changed from Layer 2 mode to Layer
3 mode.
GE0/0/0 to GE0/0/8 on the AR6121K, AR6121E, and AR6121 can be changed from Layer 2
mode to Layer 3 mode.
GE0/0/0 to GE0/0/5, GE0/0/8, and GE0/0/9 on the AR651F-Lite can be changed from Layer
2 mode to Layer 3 mode.
GE0/0/0 to GE0/0/11 on the AR6140-16G4XG can be changed from Layer 2 mode to Layer
3 mode.
GE0/0/0, GE0/0/1, GE0/0/4, GE0/0/5, and GE0/0/8 on the AR6140-9G-2AC,
AR6140E-9G-2AC, and AR6140K-9G-2AC can be changed from Layer 2 mode to Layer 3
mode.
LAN interfaces on the SRU-100H and SRU-200H can be changed from Layer 2 mode to
Layer 3 mode.
WAN interfaces on the SRU-400H, SRU-400HK, SRU-600HK, and SRU-600H can be
changed from Layer 3 mode to Layer 2 mode.
WAN interfaces on the SRU-100HH can be changed from Layer 3 mode to Layer 2 mode.
V300R019C13 and later versions: WAN interfaces on the AR6140-9G-2AC and
AR6140E-9G-2AC can be changed from Layer 3 mode to Layer 2 mode.
V300R019C13 and later versions: After the reserved VLAN ID of the 8FE1GE Ethernet
electrical interface card and 4ES2G-S Ethernet LAN card of the AR6140-16G4XG, AR6140H-
S, AR6200 series, and AR6300 series are using the set reserved-vlan command, the
working modes of all interfaces on the card can be changed from Layer 2 mode to Layer 3
mode.
V300R019C13 and later versions: Interfaces on the 24GE Ethernet LAN cards of the AR6200
series and AR6300 series can be changed from Layer 2 mode to Layer 3 mode.
a. Choose LAN Access > LAN > Physical Interface, as shown in Figure
2-35.
NOTE
----End
Context
Departments in different network segments need to communicate with each
other. The gateway allows communication among different LANs. You can
configure and enable interface-based DHCP on VLAN interfaces to dynamically set
network parameters such as the IP address for departments in an enterprise,
implementing communication among departments.
Procedure
● Creating a VLAN interface
a. Choose LAN Access > LAN > VLAN Interface, as shown in Figure 2-36.
IPv4
Parameter Description
DNS service DNS service for VLAN interfaces. The DNS service
can be configured only when the DHCP service is
enabled. You can select:
● Using system DNS setting: DNS server IP
address allocated by the system, which is the
same as the gateway IP address.
● Specify: DNS IP address specified by the user.
IPv6
Subnet mask Set the subnet prefix length of the IP address of the
VLANIF interface.
Parameter Description
IPv6 DNS IPv6 DNS service for VLAN interfaces. The IPv6 DNS
service service can be configured only when the DHCPv6
service is enabled. You can select:
● Using system DNS setting: DNS server IP
address allocated by the system, which is the
same as the gateway IP address.
● Specify: DNS IP address specified by the user.
Advanced
b. In the VLAN Interface List area, select a VLAN interface, and click .
c. In the Modify VLAN Interface dialog box, modify parameters listed in
Table 2-17. The VLAN interface parameter cannot be modified.
b. In the VLAN Interface List area, select a VLAN interface, and click .
c. In the dialog box that is displayed, click OK.
● Adding interfaces to a VLAN
a. Choose LAN Access > LAN > VLAN Interface, as shown in Figure 2-36.
b. In the VLAN Interface List area, select a VLAN interface, and click .
c. In the Modify VLAN Interface dialog box, select interfaces from the
b. In the VLAN Interface List area, select a VLAN interface, and click .
c. In the Modify VLAN Interface dialog box, select an interface from the
2.10.2 WLAN
This section describes how to configure wireless users to access a local network.
Context
A wireless local area network (WLAN) connects two or more computers or devices
by using the wireless telecommunication technology to provide fast Ethernet
access. It allows terminals, such as computers, to access a network through a
wireless medium rather than a physical cable. This facilitates network construction
and allows users to move around without interrupting communication.
Compared with a wired access network, a WLAN is easier to construct and
requires lower maintenance cost. One or multiple access points (APs) can provide
wireless access for a building or an area.
NOTE
Context
A complete WLAN configuration process includes radio setting and WLAN
configuration. In the radio setting, basic radio parameters are set for a router. In
WLAN configuration, WLAN is configured to provide different access services for
wireless users.
Procedure
● Radio setting
a. Choose LAN Access > WLAN > WLAN Management, as shown in Figure
2-37.
Parameter Description
● WLAN configuration
– Create a WLAN.
i. Choose LAN Access > WLAN > WLAN Management.
ii. Click Create in the WLAN List area.
iii. In the Create WLAN dialog box, set WLAN basic parameters listed in
Table 2-19, as shown in Figure 2-38.
NOTE
Parameter Description
– Modifying a WLAN
i. Choose LAN Access > WLAN > WLAN Management.
If some users are connected to the WLAN to be deleted, you must click Stop
first and then perform steps 1 to 3 to delete the WLAN.
----End
Context
You can establish a WLAN user database on an AP to maintain user information
and manage users.
On a WLAN, you can configure the STA blacklist and whitelist to control STA
access. You also can add unauthorized STAs that have been connected to the
WLAN to the blacklist.
Procedure
● Managing the user list
a. Choose LAN Access > WLAN > WLAN User Management, as shown in
Figure 2-40.
b. In the User List area, view all access STAs. Table 2-21 listed user
parameters.
c. Select a STA and click Terminate to make the STA go offline, or click Add
to Blacklist to forbid the STA to access the WLAN.
NOTE
Parameter Description
Parameter Description
Precautions
1. A blacklist takes effect only after the blacklist function is enabled.
2. A whitelist takes effect only after the whitelist function is enabled.
Context
The device supports the WLAN AP and AC modes and can switch between the two
modes.
NOTE
Procedure
● Switch from the AC mode to the AP mode.
a. Log in to the web platform, and click in the upper right
corner of the page to switch to the AP mode, as shown in Figure 2-42.
NOTE
NOTE
----End
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
NOTE
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
NOTE
GE0/0/0 to GE0/0/7 on the AR6120-S, AR6121-S, and AR6121C-S can be changed from
Layer 2 mode to Layer 3 mode.
GE0/0/0, GE0/0/1, GE0/0/4, GE0/0/5, and GE0/0/8 on the AR6140-S can be changed from
Layer 2 mode to Layer 3 mode.
GE0/0/0 to GE0/0/11 on the AR6140H-S can be changed from Layer 2 mode to Layer 3
mode.
GE0/0/0 to GE0/0/3 on the AR611W, AR611W-LTE4CN, AR617VW, AR617VW-LTE4,
AR617VW-LTE4EA, AR651W-X4, and AR651-X8 can be changed from Layer 2 mode to Layer
3 mode.
GE0/0/0 to GE0/0/7 on the AR651C, AR651U-A4, AR651K, AR651, AR651W-8P, AR651W,
AR657W, AR1600 series, AR6120, AR6120-VW, can be changed from Layer 2 mode to Layer
3 mode.
GE0/0/0 to GE0/0/8 on the AR6121K, AR6121E, and AR6121 can be changed from Layer 2
mode to Layer 3 mode.
GE0/0/0 to GE0/0/5, GE0/0/8, and GE0/0/9 on the AR651F-Lite can be changed from Layer
2 mode to Layer 3 mode.
GE0/0/0 to GE0/0/11 on the AR6140-16G4XG can be changed from Layer 2 mode to Layer
3 mode.
GE0/0/0, GE0/0/1, GE0/0/4, GE0/0/5, and GE0/0/8 on the AR6140-9G-2AC,
AR6140E-9G-2AC, and AR6140K-9G-2AC can be changed from Layer 2 mode to Layer 3
mode.
LAN interfaces on the SRU-100H and SRU-200H can be changed from Layer 2 mode to
Layer 3 mode.
WAN interfaces on the SRU-400H, SRU-400HK, SRU-600HK, and SRU-600H can be
changed from Layer 3 mode to Layer 2 mode.
WAN interfaces on the SRU-100HH can be changed from Layer 3 mode to Layer 2 mode.
V300R019C13 and later versions: WAN interfaces on the AR6140-9G-2AC and
AR6140E-9G-2AC can be changed from Layer 3 mode to Layer 2 mode.
V300R019C13 and later versions: After the reserved VLAN ID of the 8FE1GE Ethernet
electrical interface card and 4ES2G-S Ethernet LAN card of the AR6140-16G4XG, AR6140H-
S, AR6200 series, and AR6300 series are using the set reserved-vlan command, the
working modes of all interfaces on the card can be changed from Layer 2 mode to Layer 3
mode.
V300R019C13 and later versions: Interfaces on the 24GE Ethernet LAN cards of the AR6200
series and AR6300 series can be changed from Layer 2 mode to Layer 3 mode.
– Choose WAN Access > Ethernet Interface. The Ethernet Interface page
is displayed.
– Click corresponding to the Ethernet interface whose mode needs to be
switched in the Operation column of Ethernet Interface List.
– Click OK.
NOTE
Choose LAN access > LAN > Physical Interface. Check the switching result. You can also
switch the interface from Layer 2 mode to Layer 3 mode.
● Disabling an Ethernet interface or sub-interface
a. Choose WAN Access > Ethernet Interface. The Ethernet Interface page
is displayed.
b. Click corresponding to the Ethernet interface or sub-interface to be
disabled in the Operation column of Ethernet Interface List.
c. Click OK.
● Enabling an Ethernet interface or sub-interface
a. Choose WAN Access > Ethernet Interface. The Ethernet Interface page
is displayed.
b. Click corresponding to the Ethernet interface or sub-interface to be
enabled in the Operation column of Ethernet Interface List.
c. Click OK.
● Deleting an Ethernet sub-interface
a. Choose WAN Access > Ethernet Interface. The Ethernet Interface page
is displayed.
b. Select the check box of the interface to be deleted and click Delete in the
Interface Name column.
c. Click OK.
----End
2.11.2.1 ATM
Context
The device supports the ADSL, VDSL, and G.SHDSL interface cards (together called
DSL interface cards). DSL links can be used to connect the device to the Internet.
The VDSL and G.SHDSL interfaces can work in Asynchronous Transfer Mode
(ATM) or Packet Transfer Mode (PTM) mode and switch between these two
modes. An ADSL interface works only in ATM mode.
ATM cells are transmitted over DSL interfaces working in ATM mode. Service
traffic can be transmitted over DSL links only when the interfaces work in the
same mode as the peer device.
Procedure
● Creating an ATM sub-interface
a. Choose WAN Access > DSL Interface to display the DSL Interface page.
Figure 2-55 shows DSL Interface page.
b. Click ATM to display the ATM page.
c. Click Create in ATM Interface List to display the page for creating an
ATM interface.
d. Set the parameters described in Table 2-39.
e. Click OK to complete the configuration.
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Cell maximum burst size (cells) Maximum burst size of ATM cells
that are sent.
NOTE
This parameter is valid only when
Service type is set to vbr-nrt or vbr-
rt.
Parameter Description
Parameter Description
Cell maximum burst size (cells) Maximum burst size of ATM cells
that are sent.
NOTE
This parameter is valid only when
Service type is set to vbr-nrt or vbr-
rt.
Parameter Description
Parameter Description
Parameter Description
Cell maximum burst size (cells) Maximum burst size of ATM cells
that are sent.
NOTE
This parameter is valid only when
Service type is set to vbr-nrt or vbr-
rt.
Parameter Description
Cell maximum burst size (cells) Maximum burst size of ATM cells
that are sent.
NOTE
This parameter is valid only when
Service type is set to vbr-nrt or vbr-
rt.
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Cell maximum burst size (cells) Maximum burst size of ATM cells
that are sent.
NOTE
This parameter is valid only when
Service type is set to vbr-nrt or vbr-
rt.
Before binding interfaces, ensure that these interfaces have been deactivated and that
slave interfaces are not configured with any service. Among the bound interfaces, the first
bound interface is the master interface, and other bound interfaces are slave interfaces.
a. Choose WAN Access > DSL Interface to display the DSL Interface page.
b. Click ATM to display the ATM page.
c. Click Create in ATM Interface Binding List to display the page for
binding ATM interfaces.
d. Set the parameters described in Table 2-45.
Before unbinding interfaces, ensure that these interfaces have been deactivated.
a. Choose WAN Access > DSL Interface to display the DSL Interface page.
b. Click ATM to display the ATM page.
c. Select the check box of the interface to be unbound and click Delete in
the Card/Slot ID column of ATM Interface Binding List.
d. Click OK.
----End
2.11.2.2 PTM
Context
The device supports the ADSL, VDSL, and G.SHDSL interface cards (together called
DSL interface cards). DSL links can be used to connect the device to the Internet.
The VDSL and G.SHDSL interfaces can work in Asynchronous Transfer Mode
(ATM) or Packet Transfer Mode (PTM) mode and switch between these two
modes. An ADSL interface works only in ATM mode.
Ethernet packets are transmitted over DSL interfaces working in PTM mode.
Service traffic can be transmitted over DSL links only when the interfaces work in
the same mode as the peer device.
Procedure
● Creating an Ethernet sub-interface
a. Choose WAN Access > DSL Interface to display the DSL Interface page.
Figure 2-62 shows DSL Interface page.
b. Click PTM to display the PTM page.
c. Click Create in Ethernet Interface List to display the page for creating
an Ethernet interface.
d. Set the parameters described in Table 2-46.
e. Click OK to complete the configuration.
NOTE
The parameters for creating an Ethernet interface are the same as those in 2.11.1
Ethernet Interface. After select an Ethernet interface from the Interface name drop-
down list box, you can set the parameters according to the page (shown in the
following figures) in 2.11.1 Ethernet Interface.
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Before binding interfaces, ensure that these interfaces have been deactivated and that
slave interfaces are not configured with any service. Among the bound interfaces, the first
bound interface is the master interface, and other bound interfaces are slave interfaces.
a. Choose WAN Access > DSL Interface to display the DSL Interface page.
b. Click PTM to display the PTM page.
c. Click Create in Ethernet Interface Binding List to display the page for
binding Ethernet interfaces.
d. Set the parameters described in Table 2-54.
Before unbinding interfaces, ensure that these interfaces have been deactivated.
a. Choose WAN Access > DSL Interface to display the DSL Interface page.
b. Click PTM to display the PTM page.
c. Select the check box of the interface to be unbound and click Delete in
the Card/Slot ID column of Ethernet Interface Binding List.
d. Click OK.
----End
Context
The VDSL and G.SHDSL interfaces can work in ATM or PTM mode and switch
between these two modes. An ADSL interface works only in ATM mode.
The VDSL and G.SHDSL interfaces support the following transfer modes:
● Asynchronous Transfer Mode (ATM): ATM cells are transmitted over VDSL and
G.SHDSL lines.
● Packet Transfer Mode (PTM): Ethernet frames are transmitted over VDSL and
G.SHDSL lines.
The device functions as a CPE and must have the same interface transfer mode as
the peer device. For example, when the G.SHDSL interface of the peer device
works in ATM mode, the G.SHDSL interface of the device must also work in ATM
mode. The device can communicate with the peer device only when the device's
G.SHDSL interface has the same transfer mode as the peer device.
Procedure
● Switching the transfer mode
a. Choose WAN Access > DSL Interface to display the DSL Interface page.
b. Click Mode Switching to display the Mode Switching tab page. Figure
2-71 shows Mode Switching page.
----End
Context
Although wired WAN access technologies such as access through the optical fiber,
xDSL interface, or E1/T1 interface are mature and widely used, wired WAN access
service may meet the bottleneck in the following scenarios:
● In remote branch companies or offshore oil fields, the wired WAN access
service may be unavailable or too expensive.
● The wired WAN access service is restored on the disaster site only after wires
are connected quickly and in a timely manner.
● The wired WAN cannot cover all gas stations and ATMs that are widely
distributed.
● Enterprise staff require mobile office applications.
NOTE
AR651C, AR611W, AR617W and AR651F-Lite do not support 3G and LTE cellular interfaces.
Only V300R019C10 and earlier versions support this interface.
Procedure
Step 1 Choose WAN Access > 3G/LTE Interface to display the 3G/LTE Interface page, as
shown in Figure 2-72.
Step 2 Select the 3G/LTE interface to be configured, as shown in Table 2-55. After you
finish the configuration, click Apply.
Parameter Description
NOTE
To modify an NQA test instance, find it in the Operation column of NQA Instance, click
APN profiles only need to be configured for the 3G/LTE Interfaces in WCDMA and LTE
networks. Skip this step if you use the 3G interface in CDMA2000 networks.
You can create an APN profile and configure an APN in the profile so that you
can access external PDN networks using the configured APN.
a. Click Create in the APN Profile area to create an APN profile, as shown
in Figure 2-74.
NOTE
To modify an APN profile, find it in the Operation column of APN Profile, click , and
set the parameters described in Table 2-57.
3. Set the network connection parameters described in Table 2-58.
Parameter Description
Parameter Description
4. Click Apply.
Step 4 Click Network Setting to configure the network connection mode of the 3G/LTE
Interface, as shown in Table 2-59. After completing the configuration, click Apply.
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Step 5 Click Security Setting to set a PIN code, as shown in Table 2-62.
Parameter Description
Step 6 Click SIM Card Setting to set the SIM cards for the 3G/LTE interface that has dual
SIM cards, as shown in Table 2-63. After you finish the configuration, click Apply.
NOTE
The dual-SIM functions can be configured only on the LTE cellular interface (Cellular 0/0/0)
supported by the AR611W-LTE4CN, AR617VW-LTE4, and AR617VW-LTE4EA.
Parameter Description
----End
2.11.4 SA Interface
Context
Synchronous SA interfaces are used for enterprise branches to communicate with
the headquarters through PPP or HDLC links.
Procedure
● Modifying SA interface configuration
a. Choose WAN Access > SA Interface to display the SA Interface page.
Figure 2-77 shows SA Interface page
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Table 2-67 Description of the SA interface's physical attributes and link layer
attributes (DCE mode)
Parameter Description
Parameter Description
Parameter Description
Table 2-68 Description of the SA interface's physical attributes and link layer
attributes (DTE mode)
Parameter Description
Parameter Description
Parameter Description
● Disabling an SA interface
a. Choose WAN Access > SA Interface to display the SA Interface page.
b. Click corresponding to the SA interface to be configured in the
Operation column of SA Interface List.
c. Click OK.
● Enabling an SA interface
a. Choose WAN Access > SA Interface to display the SA Interface page.
b. Click corresponding to the SA interface to be configured in the
Operation column of SA Interface List.
c. Click OK.
----End
Procedure
● Modifying CE1/CT1 interface configuration
a. Choose WAN access > CE1/CT1 Interface. Click CE1 Interface or CT1
Interface to display the CE1 Interface or CT1 Interface tab page. Figure
2-82 shows CE1 Interface page and CT1 Interface page.
Parameter Description
After the CE1/CT1 interface configuration is complete, the system creates one
or more serial interfaces whose logical features are the same as those of a
synchronous serial interface.
– To modify the serial interface configuration, see Modifying a serial
interface configuration.
– To delete a serial interface, see Deleting a serial interface.
– To disable a serial interface, see Disabling a serial interface.
– To enable a serial interface, see Enabling a serial interface.
● Configuring the physical attributes and link layer attributes of a CE1/CT1
interface
a. Choose WAN access > CE1/CT1 Interface. Click CE1 Interface or CT1
Interface to display the CE1 Interface or CT1 Interface tab page.
b. Click Configure Interface Attribution in the Interface Attribution
column of CE1 Interface List or CT1 Interface List to display the
interface attribute configuration page.
c. Set the parameters.
Table 2-70 Description of the CE1 interface's physical attributes and link layer
attributes
Parameter Description
Parameter Description
Parameter Description
Table 2-71 Description of the CT1 interface's physical attributes and link layer
attributes
Parameter Description
Parameter Description
The 4E1T1-M/8E1T1-M interface card only works in CE1/PRI mode and does not support
working mode switching.
a. Choose WAN access > CE1/CT1 Interface > Switch Mode to display the
Switch Mode tab page.
b. Click corresponding to the CE1 or CT1 interface whose mode needs to
be switched in the Operation column of CE1 Card List or CT1 Card List.
Only the 1E1T1-M/2E1T1-M board supports mode switching.
c. Click OK.
The configuration takes effect after several minutes.
● Modifying serial interface configuration
a. Choose WAN access > CE1/CT1 Interface. Click CE1 Interface or CT1
Interface to display the CE1 Interface or CT1 Interface tab page.
Parameter Description
Parameter Description
Parameter Description
Procedure
● Modifying E1/T1 interface configuration
a. Choose WAN access > E1/T1 Interface and click E1 Interface or T1
Interface to display the E1 Interface or T1 Interface tab page. Figure
2-89 shows CE1 Interface page and CT1 Interface page.
NOTE
The parameters for modifying a T1 interface are the same as those for modifying an E1
interface. You can set the parameters for modifying a T1 interface according to the page
for modifying an E1 interface.
Parameter Description
Parameter Description
Parameter Description
Table 2-78 Description of the E1 interface's physical attributes and link layer
attributes
Parameter Description
Parameter Description
Parameter Description
Table 2-79 Description of the T1 interface's physical attributes and link layer
attributes
Parameter Description
Parameter Description
Parameter Description
Parameter Description
The 4E1T1-F/8E1T1-F interface card only works in E1-F mode and does not support
working mode switching.
a. Choose WAN access > E1/T1 Interface > Mode Switching to display the
Mode Switching tab page.
b. Click corresponding to the E1 or T1 interface whose mode needs to be
switched in the Operation column of E1 Card List or T1 Card List.
c. Click OK.
The configuration takes effect after several minutes.
----End
Context
A PON network consists of only passive optical components. This technology has
the following advantages:
● Prevents electromagnetic interference and lightning damages generated by
active electronic components.
● Reduces failure rate of lines and devices.
● Simplifies power supply configuration and network topology.
● Improves system reliability.
● Saves maintenance costs.
Theoretically, a PON network can transmit signals of any format at any rate.
Procedure
● Creating a PON sub-interface
a. Choose WAN Access > PON Interface to display the PON Interface
page. Figure 2-94 shows PON Interface page.
NOTE
The parameters for creating a PON interface are the same as those for creating an
Ethernet interface. After select a PON interface from the Interface name drop-down list
box, you can set the parameters according to the page (shown in the following figures) for
creating a PON interface.
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Parameter Description
----End
Procedure
● Creating a logical interface
a. Choose WAN Access > Logical Interface.
b. Click Create.
c. Set parameters in the Create Logical Interface dialog box. The
parameters are as described in Table 2-91.
Parameter Description
d. Click OK.
● Modifying logical interface configuration
a. Choose WAN Access > Logical Interface
Procedure
● Create interface backup.
a. Choose WAN Access > Interface Backup, as shown in Figure 2-107.
Parameter Description
Parameter Description
d. Click OK.
● Modify interface backup.
a. Choose WAN Access > Interface Backup, as shown in Figure 2-107.
b. In Interface Backup List, select a backup interface to be modified and
right-click .
c. In the Modify Interface Backup dialog box, modify parameters, as
shown in Table 2-92. The value of Primary interface name cannot be
changed.
d. Click OK.
● Delete interface backup.
a. Choose WAN Access > Interface Backup, as shown in Figure 2-107.
b. In Interface Backup List, select a backup interface to be deleted and
right-click .
c. Click OK in the displayed dialog box.
----End
2.12 WLAN AC
NOTE
● The Classic web platform does not support WLAN AC. To use WLAN AC functions, choose
WLAN AC > WLAN AC. A dialog box is displayed, asking "Classic web does not provide the
WLAN AC function. If the WLAN AC function is required, use EasyOperation web. Switch to
EasyOperation web immediately?" Click Yes to switch to the EasyOperation web platform.
The Classic web platform does not provide a page for configuring the intelligent upgrade
function. This function can be configured on the Intelligent Upgrade page of the
EasyOperation web system. To switch to this page, click Intelligent Upgrade in the upper
right corner and determine whether to save the current configuration as prompted.
2.14 IP Services
2.14.1 DHCP
NOTE
AR300, AR600, AR700, AR1600, and AR6000 series support DHCPv6 functions.
AR6000-S series support DHCPv6 functions.
Context
The Dynamic Host Configuration Protocol (DHCP) dynamically assigns IPv4
addresses to users and manages user configurations in a centralized manner.
The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) assigns IPv6
addresses, prefixes, and other network configuration parameters to hosts.
An interface that is assigned an IPv4 or IPv6 address and enabled with DHCP can
assign IPv4 or IPv6 addresses to its connected terminals. DHCP helps centrally
manage terminals.
A device can be configured as a DHCP server based on an interface address pool
to assign dynamically IPv4 or IPv6 addresses to users. The addresses are on the
network segment to which user interface addresses belong. The interface can be a
Layer 3 physical interface or a logical interface such as a VLANIF interface. For the
interface-related operations, see 2.10.1.1 Physical Interface and 2.10.1.2 VLAN
Interface.
Procedure
● Creating the DHCP service (IPv4)
a. Log in to the web platform and choose IP Service > DHCP > DHCP
Configuration, as shown in Figure 2-108.
b. Set DHCP status to Enabled and click Apply. DHCP is globally enabled.
c. Click Create in the DHCP Service Information List(IPv4) area, and set
DHCP service parameters in the Create DHCP Service dialog box that is
displayed. Table 2-93 describes the parameters.
d. Click OK.
Parameter Description
Parameter Description
Parameter Description
Parameter Description
d. Click OK.
Parameter Description
Parameter Description
----End
Context
You can view the IP address, MAC address, and time when the IP address lease has
used of DHCP clients on the Online User Information tab page.
Procedure
● Viewing information about online users
a. Log in to the web platform and choose IP Service > DHCP > IPv4 Online
User Information, as shown in Figure 2-109.
▪ Select Interface name from the Item drop-down list box and select
the interface name to view.
▪ Select IP Address from the Item drop-down list box and enter the IP
address to view.
c. Click Search. Table 2-95 describes online user parameters.
----End
Context
You can view online user information and conflict addresses assigned by the
DHCPv6 server.
● Online User Information List area: displays the DHCPv6 unique identifiers
(DUID), identity association identifier (IAID), IPv6 address and prefix assigned
by the DHCPv6 server, and remaining lease of the IPv6 address.
● Conflicting Address List area: displays conflict IPv6 addresses that the
DHCPv6 server assigns to the DHCPv6 clients.
Procedure
● Viewing information about online users
a. Log in to the web platform and choose IP Service > DHCP > IPv6 Online
User Information. Online User Information List is displayed, as shown
in Figure 2-110.
b. In the Online User Information List area, set User DUID and click
Search. The search result is displayed. Table 2-96 describes the
parameters.
Parameter Description
----End
2.14.2 NAT
NOTE
Context
Generally, NAT translates only the address in the IP packet header and the port
number in the TCP/UDP header. Packets of some protocols such as DNS and FTP
contain the IP address or port number in the data fields. Such contents cannot be
translated through NAT. Therefore, communication between the internal network
and external networks will fail.
To solve this problem, NAT must be able to identify the IP address or port
information in the data field. The application level gateway (ALG) function
enables the NAT device to identify the IP address or port number in the data field,
and translate addresses according to the mapping table. The device provides the
ALG function, so the device can support various special application protocols,
including DNS, FTP, SIP, PPTP and RTSP.
Procedure
● Configuring the ALG
a. Log in to the web platform, and choose IP Service > NAT. Figure 2-111
shows the Global Settings area.
Context
When enterprise users access the Internet using NAT, network address port
translation (NAPT) can be configured to implement concurrent address
translation. NAPT allows multiple internal addresses to be mapped to the same
public address. It is also called many-to-one address translation or address
multiplexing. NAPT translates the IP address and port number of a packet so that
multiple private users can use the same public IP address to access the Internet.
Easy IP uses access control lists (ACLs) to control the private IP addresses that can
be translated. Easy IP applies to the scenario where hosts on small-scale LANs
access the Internet. Generally, small-scale LANs are deployed at small- and
medium-sized cybercafes or small-sized offices where only a few internal hosts are
used and the outbound interface obtains a temporary public IP address through
dial-up. Internal hosts use the temporary public IP address to access the Internet.
Procedure
● Creating an external network access configuration
a. Log in to the web platform, and choose IP Service > NAT. The External
Network Access tab page is displayed, as shown in Figure 2-112.
b. Click Create, and set parameters in the Create External Network Access
dialog box that is displayed. Table 2-98 describes the parameters.
Parameter Description
c. Click OK.
● Modifying an external network access configuration
a. Log in to the web platform, and choose IP Service > NAT. The External
Network Access tab page is displayed.
----End
Context
Some enterprise hosts must use fixed IP addresses to access public networks when
NAT is enabled. Static NAT maps a public IP address to a fixed private IP address.
NOTE
When establishing static binding between private IP addresses and public IP addresses, ensure
that the public IP address is on the same network segment as the IP address of the interface
enabled with static NAT. Packets sent to public network servers can be correctly forwarded to
the interface enabled with static NAT.
Procedure
● Creating a static NAT configuration
a. Log in to the web platform and choose IP Service > NAT > Static NAT,
as shown in Figure 2-113.
b. Click Create in the Static NAT area and set parameters in the Create
Static NAT dialog box that is displayed. Table 2-99 describes the
parameters.
Parameter Description
Parameter Description
c. Click OK.
● Modifying a static NAT entry
a. Log in to the web platform and choose IP Service > NAT > Static NAT.
----End
Context
NAT can hide internal hosts. An enterprise network can use NAT to communicate
with external networks, but external users cannot access internal servers. After the
mappings between "public IP address+port number" and "private IP address+port
number" are defined on a virtual server, external users can access internal servers.
WWW Server
GE0/0/1
192.168.1.2 Internet
Eth0/0/0 1.1.1.1/24
Router External User
1.1.1.1+80(WWW) 192.168.1.2+80(WWW)
Procedure
● Creating an internal server
a. Log in to the web platform and choose IP Service > NAT > Internal
Server, as shown in Figure 2-115.
b. Click Create in the Internal Server area and set parameters in the
Create Internal Server dialog box that is displayed. Table 2-100
describes the parameters.
Parameter Description
a. Log in to the web platform and choose IP Service > NAT > Internal
Server.
----End
2.14.3 DNS
2.14.3.1 DNS
Context
Domain Name System (DNS) is a distributed database used in TCP and IP
applications and completes resolution between IP addresses and domain names.
Users can use the simple and meaningful domain names instead of the
complicated IP addresses to access hosts. The DNS server then resolves the
domain name into a correct IP address.
DNS proxy is used to forward DNS request and reply packets between the DNS
client and DNS server. The DNS client sends DNS request packets to the DNS
proxy. The DNS proxy forwards DNS request packets to the DNS server and sends
reply packets to the DNS client. After DNS proxy is enabled, if the IP address of
the DNS server changes, you only need to change the configuration on the DNS
proxy.
Procedure
● Creating DNS configuration
a. Log in to the web platform and choose IP Service > DNS > DNS, as
shown in Figure 2-116.
b. Set DNS proxy to Enable in the DNS Setting area, and click Apply.
c. Configure an IP address for the DNS server in the DNS Server
Configuration List(IPv4 Address) or DNS Server Configuration
List(IPv6 Address) area based on the IP address type.
▪ To configure an IPv4 address for the DNS server, click Create in the
DNS Server Configuration List(IPv4 Address) area, and enter an
IPv4 address in the Create DNS Server IPv4 Address dialog box that
is displayed.
▪ To configure an IPv6 address for the DNS server, click Create in the
DNS Server Configuration List(IPv6 Address) area, and enter an
IPv6 address in the Create DNS Server IPv6 Address dialog box that
is displayed.
d. Click OK. The default obtaining mode of the DNS server IP address is
Static.
e. Click Create in the Domain Name Suffix List area, and set Domain
name suffix in the Create Domain Name Suffix dialog box that is
displayed.
f. Click OK. The default obtaining mode of the DNS domain name is Static.
Parameter Description
2.14.3.2 DDNS
Context
When the enterprise server's IP address changes, the DNS server needs to
dynamically update the mapping between its domain name and IP address.
Internet users often use domain names to access servers such as HTTP and FTP
servers that provide application layer services. When the server IP address
changes, the server functions as the DDNS client and sends a DDNS request for
updating the mapping between its domain name and IP address to the DDNS
server. Other users can still access the server using the domain name when the
server IP address changes.
After a DDNS client is configured, the router can notify the DDNS server of the
latest public IP address of the server. The DDNS server then updates the mapping
between domain name and IP address on the DNS server so that the DNS server
can resolve the server's domain name into a correct IP address.
NOTE
If the public IP address of the enterprise's server does not frequently change, you do not
need to configure DDNS.
Figure 2-117 shows the DDNS networking. The enterprise's server accesses the
Internet through PPPoE on Dialer1 of the router and provides services using the IP
address of Dialer1. The DDNS client is configured on the router. The DDNS client
notifies the DDNS server when the public IP address of the server changes, and
the DDNS server notifies the DNS server. Therefore, the DNS server maintains the
latest mappings between domain names and IP addresses.
Dialer1
Internet
DDNS Server
Pre-configuration Tasks
● You have obtained an account and domain name on the DDNS service
provider's website.
● On the DNS page, you have configured the IP address of the DNS server on
the public network.
Procedure
● Creating a DDNS client
a. Log in to the web platform and choose IP Service > DNS > DDNS, as
shown in Figure 2-117.
b. Click Create in the DDNS Configuration List area and set DDNS
parameters. Table 2-102 describes the parameters.
c. Click OK.
Parameter Description
b. Select a DDNS policy in the DDNS Configuration List area, and click .
c. In the Modify DDNS dialog box that is displayed, modify parameters
listed in Table 2-102. The parameter DDNS policy name cannot be
modified.
d. Click OK.
● Deleting a DDNS client
a. Log in to the web platform and choose IP Service > DNS > DDNS.
b. Select the check box of a DDNS policy and click Delete.
c. In the dialog box that is displayed, click OK.
----End
2.14.4 Route
Context
A routing table contains the following key data for each IP packet.
Item Description
Item Description
Procedure
Step 1 Choose IP Service > Route > Routing Table.
Step 2 View all the routing tables or specified routes based on the route type or
destination IP address/subnet mask.
----End
Context
Generally, static routes are applicable to the networks with simple structures.
Configuring static routes facilitates route management.
Procedure
Step 1 Create a static route.
1. Choose IP Service > Route > Static Route Configuration.
Item Description
NOTE
○ When both the destination IP address and mask are 0.0.0.0, the
configured route is the default route.
○ If the outbound interface is not a point-to-point interface, the next hop
address must be specified.
– Configure an IPv6 static route.
i. In IPv6 Static Route Configuration Table, click Create. The Create
IPv6 Static Route Service page is displayed.
Item Description
Item Description
NOTE
○ When both the destination IPv6 address and subnet prefix length are ::,
the configured route is the default route.
○ If the outbound interface is not a point-to-point interface, the next hop
address must be specified.
----End
Context
OSPF is a link-state Interior Gateway Protocol (IGP) developed by the Internet
Engineering Task Force (IETF). OSPF describes the network topology through link-
state advertisements (LSAs), generates a shortest path tree (SPT) based on the
network topology, and calculates shortest paths to all destinations on the
network, that is, OSPF routes to all destination network segments are generated.
OSPF is generally used on complex networks, facilitating accurate route selection.
Procedure
● Creating OSPF
a. Create an OSPF process.
i. Choose IP Service > Route > Dynamic Route Configuration >
OSPF.
ii. In the OSPF List area, click Create. The Create OSPF dialog box is
displayed.
Parameter Description
NOTE
When the OSPF List contains many OSPF processes, enter a value in the
Process ID and click Search. Only OSPF processes related to the entered
value are displayed. For example, if you enter 1 in the Process ID, only OSPF
processes with IDs containing 1 (such as processes with IDs 1, 10, or 11) are
displayed.
ii. In the Area Configuration List area, click Create. The Create Area
dialog box is displayed.
Parameter Description
iv. In the Subnet Configuration List area, click Create. The Create
Subnet dialog box is displayed.
Parameter Description
vi. In the Interface Configuration List area, select the interface running
OSPF and click . The Interface Configuration dialog box is
displayed.
Parameter Description
Parameter Description
NOTE
iii. In the Route Import area, click Create. The Create Route Import
dialog box is displayed.
Parameter Description
● Modifying OSPF
– Modify OSPF parameters.
i. In the OSPF List area, select an OSPF process and click . The
Modify OSPF dialog box is displayed.
ii. Modify the parameters and click OK.
– Modify basic parameters of an OSPF process.
i. In the OSPF List area, select an OSPF process and click Advanced.
The Basic tab page is displayed.
ii. In the Area Configuration List area, select an area and click .
The Modify Area dialog box is displayed.
iii. Modify the parameters and click OK.
iv. In the Interface Configuration List area, select an area and click
. The Interface Configuration dialog box is displayed.
v. Modify the parameters and click OK.
– Modify advanced parameters of an OSPF process.
i. In the OSPF List area, select an OSPF process and click Advanced.
The Basic tab page is displayed.
ii. Click the Advanced tab. The Advanced tab page is displayed.
iii. Select an imported external route and click . The Modify Route
Import dialog box is displayed.
iv. Modify the parameters and click OK.
● Deleting OSPF
– Delete an OSPF process.
i. In the OSPF List area, select an OSPF process and click Delete.
ii. In the Information dialog box that is displayed, click OK.
– Delete basic parameter settings of an OSPF process.
i. In the OSPF List area, select an OSPF process and click Advanced.
The Basic tab page is displayed.
ii. In the Subnet Configuration List area, select a network segment
and click Delete.
iii. In the Information dialog box that is displayed, click OK.
iv. In the Area Configuration List area, select an area and click Delete.
v. In the Information dialog box that is displayed, click OK.
– Delete advanced parameter settings of an OSPF process.
i. In the OSPF List area, select an OSPF process and click Advanced.
The Basic tab page is displayed.
ii. Click the Advanced tab. The Advanced tab page is displayed.
iii. In the Route Import area, select an imported external route and
click Delete.
iv. In the Information dialog box that is displayed, click OK.
----End
Context
BGP is a dynamic routing protocol that allows for reachable routes between
autonomous systems (ASs) and selects the optimal routes. BGP is usually used on
large and complex networks.
Procedure
● Enabling BGP
a. Choose IP Service > Route > Dynamic Route Configuration > BGP.
Parameter Description
Parameter Description
● Modifying BGP
– Modify BGP parameters.
NOTICE
In the BGP Setting area, set a new router ID and click Apply.
– Modify BGP peer parameters.
i. In the Peer Configuration List area, select a BGP peer and click .
The Modify Neighbor dialog box is displayed.
ii. Modify the parameters and click OK.
– Modify BGP parameters for importing external routes.
i. In the Route Import Configuration List area, select an imported
external route and click . The Modify Route Import dialog box is
displayed.
ii. Modify the parameters and click OK.
● Deleting BGP
– Disable BGP.
NOTICE
Disabling BGP will delete all BGP configurations. Exercise caution when
disabling BGP.
In the BGP Setting area, set Enable BGP to No and click Apply.
– Delete a BGP peer.
i. In the Peer Configuration List area, select a BGP peer and click
Delete.
ii. In the Information dialog box that is displayed, click OK.
– Delete external routes imported by BGP.
i. In the Route Import Configuration List area, select an imported
external route and click Delete.
ii. In the Information dialog box that is displayed, click OK.
----End
2.14.5 ARP
Context
The Address Resolution Protocol (ARP) maps IP addresses to MAC addresses.
ARP entries include dynamic and static ARP entries according to the mode in
which they are generated.
● Dynamic ARP entries: are automatically generated and maintained through
ARP. Each dynamic ARP entry has a lifetime. Dynamic ARP entries can be
updated or overwritten by static ARP entries.
● Static ARP entries: are configured manually to record mappings between IP
addresses and MAC addresses. Mappings cannot be changed dynamically.
Procedure
● Create a static ARP entry.
a. Log in to the web NMS and choose IP Service > ARP. The ARP page is
displayed, as shown in Figure 2-125.
b. Click Create. In the Create Static ARP Entry dialog box that is displayed,
select or enter each parameter to configure a static ARP entry. For
description of the parameters, see Table 2-113.
Parameter Description
Parameter Description
Parameter Description
----End
2.14.6 ND
Context
The Neighbor Discovery Protocol (NDP) is one important IPv6 basic protocol. NDP
replaces the Address Resolution Protocol (ARP) of IPv4 and the Internet Control
Message Protocol (ICMP) Router Discovery Protocol. NDP uses ICMPv6 packets to
implement address resolution, neighbor tracking, duplicate address detection
(DAD), router discovery, and redirection.
A host must obtain the MAC address of a target host to communicate with the
target host. A device can dynamically generate neighbor entries using ND or be
configured with static neighbor entries.
Procedure
● Creating a static ND entry
a. Log in to the web platform and choose IP Service > ND. The ND page is
displayed, as shown in Figure 2-126.
b. Click Create. In the Create Static ND Entries dialog box that is displayed,
set parameters to configure static ND entries. Table 2-115 describes the
parameters.
Parameter Description
Parameter Description
● Deleting an ND entry
a. Log in to the web platform and choose IP Service > ND. The configured
static ND entries or dynamically generated ND entries are displayed on
the ND page.
b. Select the check box of the required ND entry and click Delete.
c. In the dialog box that is displayed, click OK.
● Updating an ND entry
a. Log in to the web platform and choose IP Service > ND. The configured
static ND entries or dynamically generated ND entries are displayed on
the ND page.
b. Click Refresh. ND entries are updated.
● Querying an ND entry
a. Log in to the web platform and choose IP Service > ND. The configured
static ND entries or dynamically generated ND entries are displayed on
the ND page.
b. Set Search item as follows:
▪ Select Type from the first drop-down list box and Static or Dynamic
from the second drop-down list box, and click Search. ND entries
meeting the search criteria are displayed.
▪ Select IPv6 address from the Search item drop-down list box and
enter an IPv6 address in the text box, enter an IPv6 address, and click
Search. ND entries meeting the search criteria are displayed.
▪ Select MAC address from the Search item drop-down list box and
enter an IPv6 address in the text box, enter a MAC address, and click
Search. ND entries meeting the search criteria are displayed.
Table 2-116 describes the parameters.
Parameter Description
Parameter Description
----End
2.14.7 IP Accounting
Context
This section describes how to view statistics about IP packets.
You can collect statistics about IP packets in the common method or based on the
packet priority. The web management system supports only the common method
to collect statistics about incoming and outgoing IP packets.
The web management system does not allow you to configure rules for collecting
IP traffic statistics.
Procedure
● Querying and ranking IP traffic statistics
a. Choose IP Service > IP Accounting > Traffic Statistics, as shown in
Figure 2-127.
b. Click Refresh.
The current IP traffic statistics are displayed in Traffic Statistics Ranking.
For details about parameters in Traffic Statistics Ranking, see Table
2-117.
Parameter Description
c. Click Total Traffic (Packets) on the top of the list, and rank the traffic
statistics in ascending or descending order.
Context
This section describes how to configure IP traffic statistics collection on Layer 3
interfaces.
NOTE
Procedure
● Querying IP traffic statistics on an interface
a. Choose IP Service > IP Accounting > Configuration.
b. Click Refresh, as shown in Figure 2-128.
Parameter Description
c. Click Disable.
----End
2.15 Security
2.15.1 ACL
Context
After basic ACL rules are configured, routers classify IPv4 or IPv6 packets based on
information such as source IP addresses, and time ranges in the packets.
Procedure
● Creating a basic ACL rule
a. Access the Basic ACL Setting tab page.
Log in to the web platform and choose Security > ACL > Basic ACL
Setting, as shown in Figure 2-129.
b. Click Create in the Basic ACL Setting List area. Enter an ACL rule name
in the Create Basic ACL Setting dialog box, as shown in Figure 2-130. To
create a basic ACL4 rule, click IPv4; to create a basic ACL6 rule, click IPv6.
NOTE
Parameter Description
Log in to the web platform and choose Security > ACL > Basic ACL
Setting.
----End
Context
After advanced ACL rules are configured, routers classify IPv4 or IPv6 packets
based on information such as source IP addresses, destination IP addresses, source
port numbers, destination port numbers, protocols, priorities, and time ranges in
the packets.
Procedure
● Creating an advanced ACL rule
a. Access the Advanced ACL Setting tab page.
Log in to the web platform and choose Security > ACL > Advanced ACL
Setting, as shown in Figure 2-132.
b. Click Create in the Advanced ACL Setting List area. Enter an ACL rule
name in the Create Advanced ACL Setting dialog box, as shown in
Figure 2-133. To create an advanced ACL4 rule, click IPv4; to create an
advanced ACL6 rule, click IPv6.
NOTE
Parameter Description
Parameter Description
Parameter Description
Context
After layer 2 ACL rules are configured, routers classify packets based on link-layer
information such as source MAC addresses, destination MAC addresses, and Layer
2 protocol type in the packets.
Procedure
● Creating a layer 2 ACL rule
a. Access the Layer 2 ACL Setting tab page.
Log in to the web platform and choose Security > ACL > Layer 2 ACL
Setting, as shown in Figure 2-137.
b. Click Create in the Layer 2 ACL Setting List area. Enter an ACL rule
name in the Create Layer 2 ACL Setting dialog box, as shown in Figure
2-138.
NOTE
Parameter Description
Context
To start services or functions periodically or in a specified period of time, you can
set a time range for ACL rules.
Procedure
● Creating a time range
a. Access the Time Range tab page.
Log in to the web platform and choose Security > ACL > Time Range, as
shown in Figure 2-141.
b. Click Create and set parameters in the Create Time Range dialog box, as
shown in Figure 2-142. Table 2-122 describes the parameters.
2.15.2 Firewall
Context
Before configuring a firewall, you need to create related zones. You can deploy
security services according to the security priorities of the zones. The device
considers that data transmission within a zone is reliable; therefore, it does not
enforce any security policy on intra-zone data transmission. The device verifies the
data and enforces the security policies only when data flows from one zone to
another.
You must configure a priority for a zone before making other configurations. The
priority cannot be changed. The priorities of zones cannot be the same. A larger
value indicates a higher priority.
The device automatically creates a zone named Local. The Local zone has the
highest priority and cannot be deleted. In addition, the priority of this zone cannot
be changed, and no interface can be added to this zone. To apply the firewall
function to the control packets that need to be processed by the device, use the
Local zone.
The firewall takes effect only after interfaces are added to the zone.
Procedure
● Creating a zone policy
a. Access the Zone Policy tab page.
Log in to the web platform and choose Security > Firewall > Zone
Policy, as shown in Figure 2-143.
b. Click Create and set parameters in the Create Zone dialog box that is
displayed, as shown in Figure 2-144. Table 2-123 describes the
parameters.
Parameter Description
or to move
interfaces to one area to another.
Context
Any two zones form an interzone. Each interzone has an independent interzone
view. Most firewall configurations are performed in the interzone views. After the
firewall function is configured, the device checks data transmitted between zones.
The configured firewall functions take effect only after you enable firewall in the
interzone.
When data is transmitted between two zones, the ACL-based packet filtering
firewall enforces the packet filtering policies according to ACL rules.
Procedure
● Creating an interzone policy
a. Access the Interzone Policy tab page.
Log in to the web platform and choose Security > Firewall > Interzone
Policy, as shown in Figure 2-145.
b. Click Create and set parameters in the Create Interzone Policy dialog
box that is displayed, as shown in Figure 2-146. Table 2-124 describes
the parameters.
Parameter Description
Log in to the web platform and choose Security > Firewall > Interzone
Policy.
b. Click next to an interzone policy.
c. Click of a direction.
d. In the Modify Interzone Policy dialog box that is displayed, modify
parameters listed in Table 2-124. The parameters are the same as those
in Figure 2-146. The parameters Source zone, Destination zone, and
Direction cannot be modified.
e. Click OK.
● Deleting an interzone policy
a. Access the Interzone Policy tab page.
Log in to the web platform and choose Security > Firewall > Interzone
Policy.
b. Select an interzone policy and click Delete. In the Information dialog
box that is displayed, click OK.
● Search an interzone policy
a. Access the Interzone Policy tab page.
Log in to the web platform and choose Security > Firewall > Interzone
Policy.
b. Select Source zone or Destination zone from the Search item drop-
down list box, enter a keyword, click Search. You can view, modify, or
delete a searched interzone policy.
----End
Context
The attack defense function protects the CPU from attacks and ensures the proper
running of the server even when it is attacked.
To prevent flood attacks, you need to specify the zones or IP addresses to be
protected; otherwise, the attack defense parameters are invalid. You can also
specify the maximum session rate. When the session rate exceeds the limit, the
device considers that an attack occurs and takes measures.
Procedure
● Enabling or disabling the attack defense function
a. Access the Attack Defense tab page.
Log in to the web platform and choose Security > Firewall > Attack
Defense, as shown in Figure 2-147.
b. Enable or disable defense against SYN flood attacks, UDP flood attacks,
or ICMP flood attacks in the Attack Defense area.
c. Click Apply.
b. Click Create in the Attack Defense List area and set parameters in the
Create Attack Defense dialog box that is displayed, as shown in Figure
2-148. Table 2-125 describes the parameters. Only one of the parameters
between IP address and Zone name can be set.
c. Click OK. An attack defense entry is added to the attack defense list.
Parameter Description
TCP proxy status Status of the TCP proxy. The value can be
Auto, Enabled, or Disabled.
NOTE
This parameter is valid only for the SYN flood
attack defense.
2.15.2.4 Blacklist
Context
A blacklist filters packets based on source IP addresses. Compared with the ACL,
the blacklist uses simpler matching fields to implement high-speed packet
filtering. Packets from certain IP addresses can be effectively filtered out.
After an IP address is added to the blacklist, the firewall denies the packets from
this IP address until this entry ages.
Procedure
● Enabling or disabling the blacklist function
a. Access the Blacklist tab page.
Log in to the web platform and choose Security > Firewall > Blacklist,
as shown in Figure 2-149.
Log in to the web platform and choose Security > Firewall > Blacklist.
b. Click Create and set parameters in the Create Blacklist dialog box that is
displayed, as shown in Figure 2-150. Table 2-126 describes the
parameters.
Parameter Description
Log in to the web platform and choose Security > Firewall > Blacklist.
2.15.2.5 Whitelist
Context
The whitelist is applicable to the network where some devices send valid service
packets that look like IP sweeping attacks or port scanning attacks. The whitelist
prevents these devices from being added to the blacklist.
A whitelist filters packets based on source IP addresses. IP addresses in the
whitelist are not added to the static or dynamic blacklist.
Procedure
● Create a whitelist entry
a. Access the Whitelist tab page.
Log in to the web platform and choose Security > Firewall > Whitelist,
as shown in Figure 2-151.
b. Click Create and set parameters in the Create Whitelist dialog box that
is displayed, as shown in Figure 2-152. Table 2-127 describes the
parameters.
Context
A security policy controls traffic forwarding on devices and detects the traffic
content.
Prerequisites
To use the deep security function, you must enable it. By default, the deep security
function is disabled.
After the device restarts, the deep security configurations are deleted.
Procedure
● Creating an applied policy
a. Access the Policy Application tab page, as shown in Figure 2-154.
Log in to the tab page Deep Security and choose Policy Application.
b. In the Policy Application List area, click Create and set policy
application parameters. Table 2-128 describes the parameters, as shown
in Figure 2-155.
c. Click OK.
Parameter Description
a. In the Policy Application List area, select a policy and click on the
right.
b. In the Modify Policy Application List dialog box that is displayed,
modify the parameters. The parameters are the same as those in Figure
2-155
c. Click OK.
● Deleting an applied policy
a. In the Policy Application List area, select a policy and click Delete.
b. In the dialog box that is displayed, click OK.
----End
Context
An intrusion prevention system (IPS) prevents and detects intrusions based on the
intrusion defense library. Before configuring intrusion defense policies, load the
intrusion defense library.
After the intrusion defense library is loaded, a large number of unclassified
signatures are generated and characteristics in some signatures do not exist on the
live network. You must use a signature filter to filter out the signatures and
configure a unified action for the signatures. To configure specified actions for
specified signatures, you must set the signatures as exception signatures, bringing
heavy workload.
To resolve this problem, configure intrusion defense policies. You can configure
only one signature filter but multiple exception signatures in an intrusion defense
policy. After the signature filter and exception signatures are configured,
signatures matching the network characteristics are selected. Intrusion defense
policies can prevent intrusions on the device.
The device has multiple default intrusion prevention profiles for different
application scenarios. The default intrusion prevention profiles can be displayed,
cloned, or referenced in security policies, but cannot be modified or deleted.
● strict: It contains all signatures and the action is block. Apply to all protocols
and categories. The intrusion prevention profile applies to the scenarios in
which the device is required to block all matched packets.
● web_server: It contains all signatures and the action is the default actions.
Apply to DNS, HTTP, FTP protocols and all categories. The intrusion
prevention profile applies to the scenarios in which the device is deployed in
front of a web server.
● file_server: It contains all signatures and the action is the default actions.
Apply to DNS, SMB, NETBIOS, NFS, SUNRPC, MSRPC, FILE, TELNET protocols
and all categories. The intrusion prevention profile applies to the scenarios in
which the device is deployed in front of a file server.
● dns_server: It contains all signatures and the action is the default actions.
Apply to DNS protocol and all categories. The intrusion prevention profile
applies to the scenarios in which the device is deployed in front of a DNS
server.
● mail_server: It contains all signatures and the action is the default actions.
Apply to DNS, IMAP4, SMTP, POP3 protocols and all categories. The intrusion
prevention profile applies to the scenarios in which the device is deployed in
front of a mail server.
● inside_firewall: It contains all signatures and the action is the default actions.
Apply to all protocols and categories. The intrusion prevention profile applies
to the scenarios in which the device is deployed behind a firewall.
● dmz: It contains all signatures and the action is the default actions. Apply to
all protocols except NETBIOS, NFS, SMB, TELNET TFTP and categories. The
intrusion prevention profile applies to the scenarios in which the device is
deployed behind a firewall. The intrusion prevention profile applies to the
scenarios in which the device is deployed in front of a DMZ.
● outside_firewall: It contains all signatures and the action is the default
actions. Apply to all protocols and categories except Scanner. The intrusion
prevention profile applies to the scenarios in which the device is deployed in
front of a firewall.
● ids: It contains all signatures and the action is alert. Apply to all protocols and
categories. The intrusion prevention profile applies to the scenarios in which
the device is deployed off-line as an IDS.
● default: It contains all signatures and the action is the default actions. Apply
to all protocols and categories. The intrusion prevention profile applies to the
scenarios in which the device is deployed in-line as an IPS.
Prerequisites
To use the deep security function, you must enable it. By default, the deep security
function is disabled.
1. Open the Service Management page.
Log in to the web system, choose System Management > System
Configuration > Service Management to open the Service Management
page, as shown in Figure 2-156.
Procedure
● Creating an intrusion defense policy
a. Access the Intrusion Defense Policy tab page, as shown in Figure 2-157.
Log in to the tab page Deep Security and choose Intrusion Defense
Policy.
b. Click Create in the Intrusion Defense Policy Configuration List area. Set
parameters in the Create Intrusion Defense Policy dialog box. Table
2-129 describes the parameters, as shown in Figure 2-158.
c. Click Preview Signature Filtering Result. Signatures that are filtered out
by the intrusion defense policy are displayed, as shown in Figure 2-159.
NOTE
You can check mistakenly filtered signature IDs based on the log or in other ways.
After adding these signatures to the list, you can modify the signature actions.
e. Set parameters in List of Other Signatures. Table 2-130 describes the
parameters.
Parameter Description
Operation
You can click next to an exception
signature to delete it.
After an intrusion defense policy is created or modified, you must click Submit to
make the configuration take effect. The activation takes a long period. You are
advised to submit the configuration after modifying the intrusion defense policy.
● Modifying an intrusion defense policy
a. Select an intrusion defense policy in the Intrusion Defense Policy
Configuration List area and click .
NOTE
Context
As Internet applications rapidly develop, the computer network is widely applied,
which facilitates information obtaining, sharing, and spreading. However, this
brings enterprises the following threats:
● Employees access the websites that are irrelevant to their jobs, affecting
working efficiency.
● Employees access illegal or malicious websites that may cause attacks caused
by viruses including Trojan horses, and worms.
URL filtering is used to control URLs that users access. Website resources that are
open to users are limited.
By default, one URL filtering policy is predefined on a device. If the predefined
intrusion defense policy meets scenario requirements, you can reference the
predefined URL filtering policy. The following parameters are used to distinguish
the predefined URL filtering policy and its scenario:
● default
Default policy. This policy contains all signatures and its action is Allow and
HTTP packets are allowed to pass without any processing.
Prerequisites
To use the deep security function, you must enable it. By default, the deep security
function is disabled.
Procedure
● Configuring a URL filtering policy list
– Creating a URL filtering policy
a. Access the URL Filtering Policy tab page, as shown in Figure 2-163.
Log in to the tab pageDeep Security and choose URL Filtering Policy.
b. In the URL Filtering Policy Configuration List area, click Create and set
parameters of the URL filtering policy. Table 2-131 describes the
parameters, as shown in Figure 2-164.
Parameter Description
Parameter Description
c. Click OK.
– Modifying a URL filtering policy
a. Select a URL filtering policy in the URL Filtering Policy Configuration
List area and click .
b. In the Modify URL Filtering Policy dialog box, modify the parameters,
among which Policy name cannot be changed.
c. Click OK.
– Deleting a URL filtering policy
Parameter Description
b. Click OK.
2.15.3.4 Numerical
Context
You can view intrusion defense statistics to check detection and defense records
on the network threats such as Trojan horses and worm viruses. In this way, you
can learn about the historical and current threat events and adjust the security
policy or take defense measures.
You can view URL filtering statistics to know statistics about URLs that users
access or attempt to access and match the URL whitelist and blacklist.
Prerequisites
To use the deep security function, you must enable it. By default, the deep security
function is disabled.
1. Open the Service Management page.
Log in to the web system, choose System Management > System
Configuration > Service Management to open the Service Management
page, as shown in Figure 2-166.
Procedure
● Intrusion defense list
– Viewing the intrusion defense list
a. Access the Numerical tab page, as shown in Figure 2-167.
Log in to the tab pageDeep Security and choose Numerical.
Parameter Description
Parameter Description
ID Signature ID of an intrusion
detected by the intrusion defense
policy.
Parameter Description
Context
An ACL is a set of rules that can only differentiate packets.
After ACLs are configured, you can configure ACL filtering to apply the ACLs so
that packets are filtered.
Procedure
● Creating an ACL filtering rule
a. Access the ACL Filtering tab page.
Log in to the web platform and choose Security > Security Protection >
ACL Filtering, as shown in Figure 2-169.
b. Click Create and set parameters in the Create ACL Filtering dialog box
as shown in Figure 2-170. Table 2-137 describes the parameters.
c. Click OK. An ACL filtering rule is added to the ACL filtering list.
Parameter Description
Context
To defend against ARP address spoofing attacks, configure ARP anti-spoofing. The
mutually exclusive anti-spoofing modes fixed-mac, fixed-all, and send-ack are
applicable to different scenarios:
● fixed-mac mode: When receiving an ARP packet, the device discards the
packet if its MAC address matches no ARP entry. If the MAC address in the
ARP packet matches an ARP entry but the port number or VLAN ID matches
no ARP entry, the device updates the port number or VLAN ID mapping the
MAC address in the ARP table. This mode applies to networks that use static
IP addresses and have redundant links. When services are switched on the
link, port information in the ARP entry can change rapidly.
● fixed-all mode: When the MAC address, port number, and VLAN ID of an ARP
packet match an ARP entry, the device updates other information in the ARP
entry. This mode applies to networks that use static IP addresses and have no
redundant link, and users with the same IP address access the device using
the same port.
● send-ack mode: When receiving an ARP packet with a changed MAC address,
port number, or VLAN ID, the device does not immediately update the
corresponding ARP entry. Instead, the device sends a unicast ARP Request
packet to the user with the IP address mapping the original MAC address in
the ARP entry, and determines whether to change the MAC address, VLAN ID,
or port number in the ARP entry depending on the response from the user.
This mode applies to networks that use dynamic IP addresses and have
redundant links.
The device needs to process a large number of ARP packets, which increases the
CPU load. The device also learns ARP entries from these packets, which causes
ARP entry resources to be occupied by invalid ARP entries. As a result, the device
cannot learn ARP entries from ARP packets of authorized packets and
communication is interrupted. The device updates ARP entries by learning bogus
ARP packets, which leads to failures in communicating with authorized users. To
address the problems, enable strict ARP learning.
After strict ARP learning is enabled, the device learns ARP entries only from ARP
Reply packets in response to the ARP Request packets sent by itself, and does not
learn ARP entries from ARP Request packets from other devices. This method
prevents most attacks from ARP packets.
The device may have no sufficient CPU resources to process other services when
processing a large number of ARP packets. To protect CPU resources of the device,
limit the rate of ARP packets.
Procedure
● Enabling ARP anti-spoofing
a. Log in to the web platform and choose Security > Security Protection >
ARP Attack Defense. The ARP Attack Defense tab page is displayed, as
shown in Figure 2-171.
By default, ARP packet rate limiting is enabled; the default rate limit is 5 pps. When
Rate limit (pps) is set to 0, ARP packet rate limiting is disabled.
● Disabling ARP packet rate limiting
a. Log in to the web platform and choose Security > Security Protection >
ARP Attack Defense. The ARP Attack Defense tab page is displayed.
b. Set ARP packet rate limit to Disabled, and click Apply. In the
Information dialog box that is displayed, click OK.
----End
2.15.5 SSL
Context
A router supports server Secure Sockets Layer (SSL) policies and client SSL policies.
● To use a router as an SSL server, configure a server SSL policy on the router.
During an SSL handshake, the router uses SSL parameters in the server SSL
policy to negotiate session parameters with an SSL client. After the handshake
is complete, the router establishes a session with the client.
● To use a router as an SSL client, configure a client SSL policy on the router.
During an SSL handshake, the router uses SSL parameters in the client SSL
policy to negotiate session parameters with the SSL server. After the
handshake is complete, the router establishes a session with the server.
Procedure
● Creating an SSL policy
– Creating a server SSL policy
i. Access the SSL tab page.
Log in to the web platform and choose Security > SSL, as shown in
Figure 2-172.
ii. Click Create and set parameters in the Create SSL Policy dialog box
that is displayed. Set SSL policy type to Server. Table 2-138
describes other parameters, as shown in Figure 2-173.
iii. Click OK. A server SSL policy is added to the SSL policy list.
Parameter Description
Parameter Description
Parameter Description
Parameter Description
Preferred cipher suite Cipher suite used by the client SSL policy.
----End
2.15.6 PKI
Context
A certificate binds a public key to a set of information that uniquely identifies a
public key interface (PKI) entity. The parameters of an entity indicate the identity
information of the entity. A Certificate Authority (CA) uniquely identifies a
certificate applicant based on identity information provided by an entity.
Procedure
● Creating a PKI entity
a. Access the PKI Entity tab page.
Log in to the web platform and choose Security > PKI > PKI Entity, as
shown in Figure 2-175.
b. Click Create and set parameters in the Create PKI Entity dialog box that
is displayed. Table 2-140 describes the parameters, as shown in Figure
2-176.
c. Click OK.
● Modifying a PKI entity
a. Access the PKI Entity tab page.
Log in to the web platform and choose Security > PKI > PKI Entity.
b. Select a PKI entity in the PKI Entity Information List area, and click .
c. In the Modify PKI Entity dialog box that is displayed, modify the
parameters. The parameter PKI entity name cannot be modified. The
parameters are the same as those in Figure 2-176
d. Click OK.
● Deleting a PKI entity
a. Access the PKI Entity tab page.
Log in to the web platform and choose Security > PKI > PKI Entity.
b. Select the check box of a PKI entity and click Delete.
c. In the dialog box that is displayed, click OK.
NOTE
When a PKI entity is referenced by a PKI domain, delete the PKI entity from the
PKI domain before you delete the PKI entity.
----End
Context
Before an entity applies for a certificate, some enrollment information must be
configured. The collection of the enrollment information is called the PKI domain
of an entity.
Procedure
● Creating a PKI domain
a. Access the PKI Domain tab page.
Log in to the web platform and choose Security > PKI > PKI Domain, as
shown in Figure 2-177.
b. Click Create and set parameters in the Create PKI Domain dialog box
that is displayed. Table 2-141 describes the parameters, as shown in
Figure 2-178.
Parameter Description
CA identifier ID of a CA.
Parameter Description
c. Click OK.
● Modifying a PKI domain
a. Access the PKI Domain tab page.
Log in to the web platform and choose Security > PKI > PKI Domain.
b. Select a PKI domain in the PKI Domain Information List area, and click
.
c. In the Modify PKI Domain dialog box that is displayed, modify the
parameters. The parameter PKI domain name cannot be modified. The
parameters are the same as those in Figure 2-178
d. Click OK.
● Deleting a PKI domain
a. Access the PKI Domain tab page.
Log in to the web platform and choose Security > PKI > PKI Domain.
b. Select the check box of a PKI domain and click Delete.
c. In the dialog box that is displayed, click OK.
----End
2.15.7 AAA
Context
Authentication, Authorization, and Accounting (AAA) provides a management
mechanism for network security.
Procedure
● Authentication scheme
– Creating an authentication scheme
a. Access the AAA Scheme tab page.
Log in to the web platform and choose Security > AAA > AAA Scheme,
as shown in Figure 2-179.
c. Click OK.
– Modifying an authentication scheme
a. Access the AAA Scheme tab page.
Log in to the web platform and choose Security > AAA > AAA Scheme.
b. Select an authentication scheme in the Authentication Scheme area,
and click .
c. In the Modify Authentication Scheme dialog box that is displayed,
modify the parameters. The parameter Authentication scheme name
cannot be modified. The parameters are the same as those in Figure
2-180
d. Click OK.
– Deleting an authentication scheme
a. Access the AAA Scheme tab page.
Log in to the web platform and choose Security > AAA > AAA Scheme.
b. Select the check box of an authentication scheme in the Authentication
Scheme area, and click Delete.
c. In the dialog box that is displayed, click OK.
● Authorization scheme
– Creating an authorization scheme
a. Access the AAA Scheme tab page.
Log in to the web platform and choose Security > AAA > AAA Scheme.
b. Click Create in the Authorization Scheme area, and set parameters in
the Create Authorization Scheme dialog box that is displayed. Table
2-143 describes the parameters, as shown in Figure 2-181.
Parameter Description
c. Click OK.
– Modifying an authorization scheme
a. Access the AAA Scheme tab page.
Log in to the web platform and choose Security > AAA > AAA Scheme.
Log in to the web platform and choose Security > AAA > AAA Scheme.
b. Select the check box of an authorization scheme in the Authorization
Scheme area, and click Delete.
c. In the dialog box that is displayed, click OK.
● Accounting scheme
– Creating an accounting scheme
a. Access the AAA Scheme tab page.
Log in to the web platform and choose Security > AAA > AAA Scheme.
b. Click Create in the Accounting Scheme area, and set parameters in the
Create Accounting Scheme dialog box that is displayed. Table 2-144
describes the parameters, as shown in Figure 2-182.
c. Click OK.
Parameter Description
Log in to the web platform and choose Security > AAA > AAA Scheme.
b. Select an accounting scheme in the Accounting Scheme area, and click
.
c. In the Modify Accounting Scheme dialog box that is displayed, modify
the parameters. The parameter Accounting scheme name cannot be
modified. The parameters are the same as those in Figure 2-182
d. Click OK.
– Deleting an accounting scheme
a. Access the AAA Scheme tab page.
Log in to the web platform and choose Security > AAA > AAA Scheme.
b. Select the check box of an accounting scheme in the Accounting Scheme
area, and click Delete.
c. In the dialog box that is displayed, click OK.
----End
Context
Access users must obtain authorization information before going online.
Authorization information about users can be managed by configuring a service
scheme.
Procedure
● Creating a service scheme
a. Access the Service Scheme tab page.
Log in to the web platform and choose Security > AAA > Service
Scheme, as shown in Figure 2-183.
b. Click Create and set parameters in the Create Service Scheme dialog
box that is displayed. Table 2-145 describes the parameters, as shown in
Figure 2-184.
Parameter Description
Parameter Description
c. Click OK.
● Modifying a service scheme
a. Access the Service Scheme tab page.
Log in to the web platform and choose Security > AAA > Service
Scheme.
Context
RADIUS protects a network from unauthorized access. It is often used on the
networks that require high security and remote user access control.
Procedure
● RADIUS server template
– Creating a RADIUS server template
a. Access the RADIUS Setting tab page.
Log in to the web platform and choose Security > AAA > RADIUS
Setting, as shown in Figure 2-185.
b. Click Create in the RADIUS Server Template area, and set parameters in
the Create RADIUS Server Template dialog box that is displayed, as
shown in Figure 2-186. Table 2-146 describes the parameters.
Parameter Description
Parameter Description
c. Click OK.
– Modifying a RADIUS server template
Log in to the web platform and choose Security > AAA > RADIUS
Setting.
b. Select a RADIUS server template in the RADIUS Server Template area,
and click .
c. In the Modify RADIUS Server Template dialog box that is displayed,
modify the parameters. The parameter Template name cannot be
modified. The parameters are the same as those in Figure 2-186
d. Click OK.
– Deleting a RADIUS server template
a. Access the RADIUS Setting tab page.
Log in to the web platform and choose Security > AAA > RADIUS
Setting.
b. Select the check box of a RADIUS server template in the RADIUS Server
Template area, and click Delete.
c. In the dialog box that is displayed, click OK.
● Authentication/Accounting server
– Creating an authentication or accounting server
a. Access the RADIUS Setting tab page.
Log in to the web platform and choose Security > AAA > RADIUS
Setting.
b. Click Create in the Authentication/Accounting Server area, and set
parameters in the Create Authentication/Accounting Server dialog box
that is displayed, as shown in Figure 2-187. Table 2-147 describes the
parameters.
Parameter Description
Parameter Description
NOTE
You can quickly search for the created authentication or accounting servers based
on the specified criteria.
A maximum of four RADIUS servers can be configured in a RADIUS template. The
device sends authentication or accounting packets to the servers in the
configured mode.
c. Click OK.
– Modifying an authentication or accounting server
a. Access the RADIUS Setting tab page.
Log in to the web platform and choose Security > AAA > RADIUS
Setting.
b. Select an authentication or accounting server in the Authentication/
Accounting Server area, and click .
c. In the Modify Authentication/Accounting Server dialog box that is
displayed, modify the parameters. The parameters Template name and
Server type cannot be modified. The parameters are the same as those
in Figure 2-187
d. Click OK.
– Deleting an authentication or accounting server
a. Access the RADIUS Setting tab page.
Log in to the web platform and choose Security > AAA > RADIUS
Setting.
b. Select the check box of an authentication or accounting server in the
Authentication/Accounting Server area, and click Delete.
c. In the dialog box that is displayed, click OK.
● Authorization server
– Creating an authorization server
a. Access the RADIUS Setting tab page.
Log in to the web platform and choose Security > AAA > RADIUS
Setting.
b. Click Create in the Authorization Server area, and set parameters in the
Create Authorization Server dialog box that is displayed, as shown in
Figure 2-188. Table 2-148 describes the parameters.
c. Click OK.
– Modifying an authorization server
a. Access the RADIUS Setting tab page.
Log in to the web platform and choose Security > AAA > RADIUS
Setting.
b. Select an authorization server in the Authorization Server area, and click
.
c. In the Modify Authorization Server dialog box that is displayed, modify
the parameters. The parameters Authorization server IP address and
VPN instance cannot be modified. The parameters are the same as those
in Figure 2-188
d. Click OK.
– Deleting an authorization server
a. Access the RADIUS Setting tab page.
Log in to the web platform and choose Security > AAA > RADIUS
Setting.
b. Select the check box of an authorization server in the Authorization
Server area, and click Delete.
c. In the dialog box that is displayed, click OK.
----End
Context
HWTACACS prevents unauthorized users from attacking a network and supports
command-line authorization. Compared with RADIUS, HWTACACS is more reliable
in transmission and encryption, and is more suitable for security control.
Procedure
● Global Setting
a. Log in to the web platform and choose Security > AAA > HWTACACS
Setting, as shown in Figure 2-189.
c. Click OK.
– Modifying a HWTACACS server template
a. Access the HWTACACS Setting tab page.
Log in to the web platform and choose Security > AAA > HWTACACS
Setting.
b. Select the HWTACACS server template in the HWTACACS Server
Template area, and click .
c. In the Modify HWTACACS Server Template dialog box that is displayed,
modify the parameters. The parameter Template name cannot be
modified. The parameters are the same as those in Figure 2-190
d. Click OK.
– Deleting a HWTACACS server template
a. Access the HWTACACS Setting tab page.
Log in to the web platform and choose Security > AAA > HWTACACS
Setting.
b. Select the check box of the HWTACACS server template in the
HWTACACS Server Template area, and click Delete.
c. In the dialog box that is displayed, click OK.
● Authentication/Authorization/Accounting server
– Creating an authentication, authorization, or accounting server
a. Access the HWTACACS Setting tab page.
Log in to the web platform and choose Security > AAA > HWTACACS
Setting.
b. Click Create in the Authentication/Authorization/Accounting Server
area, and set parameters in the Create Authentication/Authorization/
Accounting Server dialog box that is displayed, as shown in Figure
2-191. Table 2-150 describes the parameters.
Parameter Description
Log in to the web platform and choose Security > AAA > HWTACACS
Setting.
b. Select an authentication, authorization, or accounting server in the
Authentication/Authorization/Accounting Server area, and click .
c. In the Modify Authentication/Authorization/Accounting Server dialog
box that is displayed, modify the parameters. The parameters Template
name and Server type cannot be modified. The parameters are the same
as those in Figure 2-191
d. Click OK.
– Deleting an authentication, authorization, or accounting server
a. Access the HWTACACS Setting tab page.
Log in to the web platform and choose Security > AAA > HWTACACS
Setting.
b. Select the check box of an authentication, authorization, or accounting
server in the Authentication/Authorization/Accounting Server area,
and click Delete.
Context
The created authentication, authorization, and accounting schemes take effect
only after being applied to a domain.
Procedure
● Creating a domain
a. Access the Domain Setting tab page.
Log in to the web platform and choose Security > AAA > Domain
Setting, as shown in Figure 2-192.
b. Click Create and set parameters in the Create Domain dialog box that is
displayed. Table 2-151 describes the parameters, as shown in Figure
2-193.
Parameter Description
c. Click OK.
● Modify a domain
a. Access the Domain Setting tab page.
Log in to the web platform and choose Security > AAA > Domain
Setting.
NOTE
Some device models may need a license to provide the SAC function, whereas other models
may not. The following lists the details:
This function is not under license control on the AR611W, AR611W-LTE4CN, AR617VW,
AR617VW-LTE4, AR617VW-LTE4EA, and AR651F-Lite.
This function is not under license control on the AR6121-S, AR6121C-S, and AR6120-S.
Context
To identify and classify application-based protocols to provide differentiated
services for different applications, you can configure the online behavior
management function.
Online behavior management detects and identifies packets of dynamic protocols
such as Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Real-
Time Transport Protocol (RTP) by checking Layer 4 to Layer 7 information in the
packets. In this manner, online behavior management identifies protocols and
applications on the network so that differentiated services are provided for
different applications.
On the Basic Configuration tab page, you can create applications and configure
online behavior management.
Prerequisites
To use the deep security function, you must enable it. By default, the deep security
function is disabled.
1. Open the Service Management page.
Log in to the web system, choose System Management > System
Configuration > Service Management to open the Service Management
page, as shown in Figure 2-194.
Procedure
Step 1 Configuring Application interface
1. Access the Basic Configuration tab page.
Log in to the web management system, and choose Security > Network
Behavior Management > Basic Configuration, as shown in Figure 2-195.
Interfaces in the Selected Interface area have this function enabled. You can
NOTE
3. Click Apply.
Parameter Description
Item Description
Item Description
Item Description
● Modifying an application
----End
Context
To identify application protocols on the network and implement online behavior
management, manage application protocols on the Advanced Configuration tab
page.
You can manage application protocol sets and their validity periods on the
Advanced Configuration tab page.
Procedure
● Managing an application protocol set
a. Access the Advanced Configuration tab page.
Log in to the web management system, and choose Security > Network
Behavior Management > Advanced Configuration as shown in Figure
2-198.
b. Click Refresh.
The advanced configuration can only be displayed, but cannot be added,
modified, or deleted.
Click the application protocol set name to view detailed information.
● Managing the validity period
– Creating a validity period
i. Access the Advanced Configuration tab page.
Log in to the web management system, and choose Security >
Network Behavior Management > Advanced Configuration as
shown in Figure 2-198.
ii. In the Time Range Management area, click Create. In the Create
Time Range dialog box, as shown in Figure 2-199, set parameters
listed in Table 2-154.
Parameter Description
Start time(Valid Period) Start time of the time range. The format
is YYYY-MM-DD HH:MM:SS, in which SS
is invalid. The value ranges from
1970-01-01 00:00 to 2099-12-31 23:59.
End time(Valid Period) End time of the time range. The format
is YYYY-MM-DD HH:MM:SS, in which SS
is invalid. The value ranges from
1970-01-01 00:00 to 2099-12-31 23:59.
2.16 QoS
Context
After parameters of a traffic policy are set, apply the traffic policy to the interface
to implement differentiated services.
Only one traffic policy can be applied to one direction on an interface, but a traffic
policy can be applied to different directions on different interfaces.
Procedure
● Create traffic policy application.
a. Choose QoS > Traffic Management > Policy Application to open the
Policy Application page. The page shown in Figure 2-200 is displayed.
Item Description
Item Description
----End
Context
A traffic policy is configured by binding traffic classifiers to traffic behaviors. A
traffic classifier defines a group of matching rules to classify packets. A traffic
behavior defines actions to be taken for the packets matching the traffic classifier,
such as traffic statistics, traffic filtering, and re-marking.
Here, the binding between a traffic classifier and a traffic behavior is defined as
classification. By default, the name of the traffic classifier or traffic behavior is the
same as the classification name.
Procedure
● Create a traffic policy.
a. Choose QoS > Traffic Management > Policy Parameter Setting to open
the Policy Parameter Setting page. The page shown in Figure 2-203 is
displayed.
c. On the Create Policy page, set parameters and configure the traffic
classifier and traffic behavior. Table 2-156 describes the parameters. The
page shown in Figure 2-204 is displayed.
Enter the classification name. The traffic classifier and traffic behavior
with the same name as the classification name are created by default.
Item Description
Item Description
Item Description
Item Description
Item Description
d. Click Confirm.
e. Click OK to save the configurations.
● Delete a traffic policy.
a. Choose QoS > Traffic Management > Policy Parameter Setting to open
the Policy Parameter Setting page. The page shown in Figure 2-203 is
displayed.
b. In Policy Configuration List, select a traffic policy and click Delete.
c. Click OK in the displayed dialog box.
If the traffic policy that you want to delete has been applied to an
interface, unbind the traffic policy from the interface on the Policy
Application tab page, and perform step 1 to step 3.
----End
Context
When data is sent from a high-speed link to a low-speed link, the bandwidth on
the interface of the low-speed link is insufficient. As a result, a large number of
packets are discarded. The data traffic rate needs to be limited. To solve the
problem, configure the rate limit in the outbound direction on the interface of the
high-speed link. The interface then discards the packets whose rate exceeds the
rate limit so that traffic is limited in a specified range. You can also configure the
rate limit in the inbound direction on the interface of the low-speed link. When
the rate of received packets is greater than the rate limit, the interface discards
the packets.
You can configure rate limit for all packets on the inbound or outbound interface
or packets on the specified source/destination IP address segment.
Procedure
● Create interface rate limit.
a. Choose QoS > Interface Rate Limit to open the Interface Rate Limit
page. The page shown in Figure 2-208 is displayed.
Item Description
Item Description
2.17 VPN
2.17.1.1 Overview
Concepts
IPSec
IPSec is a protocol suite defined by the Internet Engineering Task Force (IETF) for
securing IP communication by authenticating and encrypting each IP packet of a
communication session. Two communicating parties can encrypt data and
authenticate the data origin at the IP layer to ensure data confidentiality and
integrity and prevent replay of data packets.
IPSec uses two security protocols: Authentication Header (AH) protocol and
Encapsulating Security Payload (ESP). Key exchange and SA establishment in IPSec
AH defines the authentication method and checks data integrity and data origin.
ESP defines the encryption and authentication methods and ensures data
reliability.
● AH: provides data origin authentication, data integrity check, and the anti-
replay service. The sender performs hash calculation on the IP payload and all
header fields of an IP packet except for variable fields to generate a message
digest. The receiver calculates a message digest according to the received IP
packet and compares the two message digests to determine whether the IP
packet has been modified during transmission. AH does not encrypt the IP
payload.
● ESP: encrypts the IP payload in addition to providing all the functions of AH.
ESP can encrypt and authenticate the IP payload but does not authenticate
the IP packet header.
IPSec Peer
Encapsulation Mode
● Transport mode: inserts an IPSec header between the IP header and the
header of the upper-layer protocol (AH or ESP). In this mode, the protocol
type field in the IP header is changed to AH or ESP, and the checksum in the
IP header is recalculated. The transport mode applies to communication
between two hosts or between a host and a security gateway.
● Tunnel mode: encapsulates an IPSec header (AH or ESP) on the original IP
header and adds a new IP header. In this mode, the original IP packet is
transmitted as the payload of the packet and is protected by IPSec. The tunnel
mode applies to communication between two security gateways. Packets
encrypted by one security gateway must be decrypted by the other security
gateway.
IPSec Efficient VPN has high security, reliability, and flexibility and has become the
first choice for enterprises to establish VPNs. When establishing an IPSec tunnel
between a branch and headquarters, an enterprise must configure IPSec and other
network resources on the branch. If the network has hundreds of sites, IPSec
configurations are complex and network maintenance is difficult.
The Efficient VPN solution integrates IPSec and other configurations on the
Efficient VPN server. When basic parameters for establishing an SA are configured
on the remote device, the remote device initiates a negotiation with the server
and establishes an IPSec tunnel. After the IPSec tunnel is established, the server
allocates other IPSec attributes and network resources to the remote device.
Efficient VPN simplifies configurations and maintenance of IPSec and network
resources for the branches.
By default, when the device functions as the server end, the Efficient VPN function
is not under license control. When the device functions as the remote end, the
Efficient VPN function is under license control. To use the Efficient VPN function
on the remote end, apply for and purchase the following license from the Huawei
local office:
NOTE
This function is not under license control on the AR611W, AR611W-LTE4CN, AR617VW,
AR617VW-LTE4, AR617VW-LTE4EA, AR651F-Lite.
This function is not under license control on the AR6121-S, AR6121C-S, and AR6120-S.
● AR650 series: AR650 Value-Added Security Package
● AR1600 series: AR1600 Value-Added Security Package
● AR6100 series: AR6100 Value-Added Security Package
● AR6200 series: AR6200 Value-Added Security Package
● AR6300 series: AR6300 Value-Added Security Package
Context
Authentication and encryption parameters in an IPSec policy must be consistent
on two devices
For details about basic IPSec concepts, see Overview.
Procedure
● Creating an IPSec policy
a. Choose VPN > IPSec VPN > IPSec Policy Management.
b. Click Create and set IPSec connection name and Interface name in the
Create IPSec Policy dialog box that is displayed, and click OK.
Name of an IPSec
policy.
IPSec policy parameter The IPSec policy name
IPSec connection name
setting cannot be changed
after an IPSec policy is
configured.
Parameter Description
Click , select an
interface in the
interface list, and click
OK.
If a tunnel interface is
selected, instead of
Interface name ACLs, a virtual tunnel
interface is used to
establish an IPSec
tunnel to protect data
flows. For details about
the tunnel interface
configuration, see
Logical Interface.
The interface cannot be
changed after an IPSec
policy is configured.
Parameter Description
Networking mode of a
router:
● Branch site: The
router functions as
the enterprise
branch gateway and
establishes IPSec
tunnels between a
branch and the
headquarters or
among different
branches.
A branch site can be
configured as an
Efficient VPN remote
end.
Networking mode ● Headquarters site:
The router functions
as the headquarters
gateway and
establishes IPSec
tunnels with a
branch after
receiving an IPSec
connection request
from the branch.
A headquarters site
can be configured as
an Efficient VPN
server.
The networking mode
cannot be changed
after an IPSec policy is
configured.
Whether to enable
Efficient VPN for a
branch site.
Efficient VPN The Efficient VPN
configuration cannot
be changed after an
IPSec policy is
configured.
Parameter Description
ID of an IPSec policy.
The IPSec connection
name and Connection
ID parameters identify
an IPSec policy.
Multiple IPSec policies
with the same IPSec
connection name
constitute an IPSec
policy group. An IPSec
Connection ID policy group contains a
maximum of 16 IPSec
policies, and an IPSec
policy with the smallest
ID has the highest
priority. After an IPSec
policy group is applied
to an interface, all
IPSec policies in the
group are applied to
the interface to protect
different data flows.
ID of an IKE version,
IKE parameter setting IKE version including IKEv1 or
IKEv2.
Parameter Description
IKEv1 negotiation
mode.
● Main mode: The
main mode
separates the key
exchange
information from
identity
authentication
information. This
provides higher
security.
● Aggressive mode:
The aggressive
mode does not
Negotiation mode provide identity
authentication but
can meet special
network
requirements. This
mode can be used
to establish an IKE
SA more quickly
when the IP address
of the SA initiator is
unknown or keeps
changing, and both
ends need to use the
pre-shared key
authentication to
establish the IKE SA.
IP address or domain
Remote address (IP/
name of the remote
Domain name)
IKE peer.
Parameter Description
Authentication method
used by IKE:
● Pre-shared Key
Authentication mode ● RSA certificate
By default, the IKE uses
pre-shared key
authentication.
Whether to enable
OCSP Online Certificate
Status Protocol (OCSP)
Parameter Description
Authentication
algorithm used by the
IKE:
● MD5: specifies
HMAC-MD5 as the
authentication
algorithm.
● SHA1: specifies
HMAC-SHA-1 as the
authentication
algorithm.
● AES-XCBC-MAC-96:
specifies AES-XCBC-
MAC-96 as the
authentication
algorithm.
NOTE
The AES-XCBC-
MAC-96 algorithm
only supports in
IKEv2.
● SHA2-256: SHA-256
as the
authentication
Authentication
algorithm.
algorithm
● SHA2-384: SHA-384
as the
authentication
algorithm.
● SHA2-512: SHA-512
as the
authentication
algorithm.
● SM3: SM3 as the
authentication
algorithm.
NOTE
The SM3 algorithm
only supports in
IKEv1.
The MD5 algorithm
uses a 128-bit key, and
the SHA-1 algorithm
uses a 160-bit key. The
SHA-256, SHA-384, and
SHA-512 algorithms
use 256-bit, 384-bit,
and 512-bit keys
respectively. A larger
Parameter Description
Parameter Description
Encryption algorithm
used by the IKE:
● 3DES: indicates that
the IKE uses the
168-bit Triple Data
Encryption Standard
(3DES) encryption
algorithm in CBC
mode.
● AES-128: indicates
that the IKE uses the
128-bit Advanced
Encryption Standard
(AES) encryption
algorithm.
● AES-192: indicates
that the IKE uses the
192-bit AES
algorithm
encryption.
● AES-256: indicates
that the IKE uses the
Encryption algorithm 256-bit AES
algorithm
encryption.
● DES: indicates that
the IKE uses the
DES-CBC encryption
algorithm.
● SM1: SM1
encryption
algorithm.
● SM4: SM4
encryption
algorithm.
By default, the IKE uses
the AES-256 encryption
algorithm.
Note that 3DES and
DES encryption
algorithms cannot
ensure security. You are
advised to use another
encryption algorithm.
Parameter Description
Diffie-Hellman group
used in IKE negotiation,
which is key
negotiation:
● Group1: uses the
768-bit Diffie-
Hellman group.
● Group2: uses the
1024-bit Diffie-
Hellman group.
● Group5: uses the
1536-bit Diffie-
Hellman group.
● Group14: uses the
2048-bit Diffie-
Hellman group.
DH group number ● Group19: uses the
256-bit ECP Diffie-
Hellman group.
● Group20: uses the
384-bit ECP Diffie-
Hellman group.
● Group21: uses the
521-bit ECP Diffie-
Hellman group.
Group1 provides the
lowest encryption,
while Group14 provides
the strongest
encryption.
By default, the
Group14 is used in IKE
negotiation.
Parameter Description
Parameter Description
Authentication
algorithm used by AH
in the IPSec:
● MD5
● SHA1
● SHA2-256
● SHA2-384
● SHA2-512
● SM3
NOTE
The SM3 algorithm
only supports in
IKEv1.
By default, AH uses the
SHA2-256
authentication
algorithm.
Note that MD5 and
AH authentication
SHA1 authentication
algorithm
algorithms cannot
ensure security. You are
advised to use another
authentication
algorithm.
NOTE
AR611W, AR611W-
LTE4CN, AR617VW,
AR617VW-LTE4,
AR617VW-LTE4EA,
AR6140-16G4XG, and
AR6140H-S do not
support SHA2-384 and
SHA2-512 authentication
algorithms.
SRU-100H, SRU-100HH,
SRU-200H, SRU-400HK,
SRU-600HK, SRU-400H,
and SRU-600H do not
support SHA2-384 and
SHA2-512 authentication
algorithms.
Parameter Description
Authentication
algorithm used by ESP
in the IPSec:
● Non-authentication
● MD5
● SHA1
● SHA2-256
● SHA2-384
● SHA2-512
● SM3
NOTE
1. The SM3
algorithm only
supports in IKEv1.
2. When configures
the SM3
algorithm, the ESP
ESP authentication encryption
algorithm algorithm must
select SM1, SM4,
or Non-
encryption.
The authentication
algorithm and
encryption algorithm of
ESP cannot be kept
blank simultaneously.
By default, ESP uses
the SHA2-256
authentication
algorithm.
Note that MD5 and
SHA1 authentication
algorithms cannot
ensure security. You are
advised to use another
authentication
algorithm.
Parameter Description
NOTE
AR611W, AR611W-
LTE4CN, AR617VW,
AR617VW-LTE4,
AR617VW-LTE4EA,
AR6140-16G4XG, and
AR6140H-S do not
support SHA2-384 and
SHA2-512 authentication
algorithms.
SRU-100H, SRU-100HH,
SRU-200H, SRU-400HK,
SRU-600HK, SRU-400H,
and SRU-600H do not
support SHA2-384 and
SHA2-512 authentication
algorithms.
Parameter Description
Encryption algorithm
used by ESP in the
IPSec:
● Non-encryption
● DES: indicates that
the IKE uses the
DES-CBC encryption
algorithm.
● 3DES: indicates that
the IKE uses the
168-bit 3DES
encryption
algorithm in CBC
mode.
● AES-128: indicates
that the IKE uses the
128-bit AES
encryption
algorithm.
● AES-192: indicates
that the IKE uses the
192-bit AES
algorithm
ESP encryption encryption.
algorithm
● AES-256: indicates
that the IKE uses the
256-bit AES
algorithm
encryption.
● SM1: SM1
encryption
algorithm.
● SM4: SM4
encryption
algorithm.
NOTE
1. The SM1 and SM4
algorithm only
supports in IKEv1.
2. When configures SM1
or the SM4 algorithm,
the ESP certification
algorithm must select
SHA1, SM3, or Non-
authentication.
By default, ESP uses
the AES-256 encryption
algorithm.
Parameter Description
Encapsulation mode
that IPSec uses to
Encapsulation mode encapsulate IP packets:
● Tunnel mode
● Transport mode
Name of a configured
ACL that IPSec uses to
protect data flows.
When the router
functions as the
headquarters site, you
can configure no ACL
to protect all data
flows on the interface.
ACL parameter setting ACL name For details about the
ACL configuration, see
Advanced ACL Setting.
IPSec supports ACL
rules based on the
source IP address,
destination IP address,
destination port
number, and protocol
number to protect data
flows.
Parameter Description
Parameter Description
Parameter Description
DPD mode:
● on-demand:
indicates the on-
demand DPD mode.
If the local end does
not receive any
packets from the
remote peer within
the specified period,
it sends a DPD
packet to check
whether the remote
DPD type peer is available.
● periodic: indicates
the periodic DPD
mode. If the local
end does not receive
any packets from
the remote peer for
a long time, it sends
DPD packets at
specific intervals to
check whether the
remote peer is
available.
Sequence of the
payload in DPD
packets:
● seq-hash-notify:
indicates that the
payload of DPD
packets is in the
sequence of hash-
notify.
The sequence of the
payload in DPD packets ● seq-notify-hash:
indicates that the
payload of DPD
packets is in the
sequence of notify-
hash.
By default, the payload
in DPD packets is in the
sequence of notify-
hash.
Parameter Description
Interval for
retransmitting DPD
DPD packet packets.
retransmission interval
(seconds) The default interval for
retransmitting DPD
packets is 15 seconds.
Maximum number of
times DPD packets are
retransmitted.
DPD packet
retransmission count The default maximum
number of times DPD
packets are
retransmitted is 3.
Parameter Description
Parameter Description
Algorithm used to
generate the pseudo
random number:
● PRF-HMAC-MD5:
indicates the HMAC-
MD5 algorithm.
● PRF-HMAC-SHA:
indicates the HMAC-
SHA-1 algorithm.
● PRF-AES-XCBC-128:
indicates the AES-
XCBC-128 algorithm.
● PRF-HMAC-
PRF algorithm SHA2-256: indicates
the HMAC-SHA-256
algorithm.
● PRF-HMAC-
SHA2-384: indicates
the HMAC-SHA-384
algorithm.
● PRF-HMAC-
SHA2-512: indicates
the HMAC-SHA-512
algorithm.
By default, the PRF-
HMAC-SHA2-256
algorithm is used.
Parameter Description
Parameter Description
SA lifetime in an IPSec
policy. In IPSec
negotiation, the SA
uses the shorter
lifetime between the
lifetime set on the local
end and that set on the
remote end.
The SA lifetime can be
measured by time or by
traffic:
● Time-based (s):
indicates the period
of time an SA can
exist after being
established.
● Traffic-based (KB):
indicates the
maximum traffic
volume that an SA
IPSec SA aging mode can process.
When the specified
time or traffic volume
is reached, the SA
becomes invalid. When
the SA is about to
expire, IPSec negotiates
a new SA.
By default, when no
IPSec SA lifetime is set
for the IPSec policy, the
global IPSec SA lifetime
is used. The global
IPSec SA lifetime is set
by the parameter IPSec
SA aging
management in IPSec
Global Setting. If
IPSec SA aging
management is not
set, the default value is
used.
Parameter Description
Parameter Description
Priority of an injection
route.
Route priority
By default, the priority
is 60.
Parameter Description
Pre-extraction of
original IP packets is
enabled.
By default, pre-
extraction of original IP
packets is disabled.
In tunnel mode, QoS
parameters such as the
packet header and
protocol type in
original packets are
hidden after IP packets
are encapsulated
through IPSec.
Although IPSec uses
Pre-extraction of the DSCP field in
original IP packets original packets as the
DSCP field in the IP
packet header, some
QoS solutions require
5-tuple information.
The encryption device
can pre-extract 5-tuple
information including
the source address,
destination address,
protocol type, source
port number, and
destination port
number to facilitate
refined QoS
management on IPSec
packets.
b. Select an IPSec to delete in the IPSec Policy Management area and click
Delete.
The selected IPSec policy is not displayed in the IPSec Policy
Management area.
----End
Context
This section describes how to set optional global IPSec parameters.
Procedure
● Setting global IPSec parameters
a. Choose VPN > IPSec VPN > IPSec Global Setting.
Parameter Description
Parameter Description
----End
2.17.2.1 Overview
As enterprises develop and services increase, many branches are set up in different
locations. Some staff often go on business trips, and some may work at home.
They require fast, secure, and reliable network connections with the headquarters.
On traditional dial-up networks, they use phone lines leased by the Internet
Service Provider (ISP) and apply for a dial string or IP addresses from the ISP. This
results in high costs. Besides, leased lines cannot provide services for the off-site
staff especially the staff on business trips. To use the PSTN or ISDN and make it
easy for users at different locations to access the headquarters network, VPDN is
used. VPDN establishes a transparent point-to-point virtual link between remote
users and the headquarters gateway.
Context
An L2TP client is deployed on the remote user side and connects to the L2TP
server in automatic dialup mode.
An L2TP client initiates a virtual dialup request and sends information about itself
to the L2TP server. The L2TP server authenticates L2TP client information and
completes establishing the L2TP connection. Therefore, after a remote user can
use an L2TP client access to connect to the L2TP server, the remote user can
access resources in the headquarters where the L2TP server locates without any
extra configuration.
Procedure
● Creating an L2TP client
a. Choose VPN > L2TP VPN > L2TP Client.
b. In the Global Settings area, set L2TP status to Enable, and click Apply.
c. Click Create in the Client List area.
d. In the Create L2TP Client dialog box, set parameters listed in Table
2-160 based on the site requirements.
e. Click OK.
The created L2TP client is displayed in the Client List area. Table 2-161
describes parameters in the client list.
f. Select the new L2TP client in the Client List area, and click Enable Auto
Dialing.
Parameter Description
Parameter Description
Parameter Description
Context
An L2TP server is deployed in the headquarters and functions as the gateway.
After receiving user information from an L2TP client, the L2TP server authenticates
the user and responds to the L2TP tunnel setup request from the L2TP client. Then
an L2TP connection is set up between the L2TP server and the L2TP client.
Procedure
● Creating an L2TP server
a. Choose VPN > L2TP VPN > L2TP Server.
b. In the Global Settings area, set L2TP status to Enable, and click Apply.
c. Click Create in the Service List area.
d. In the Create L2TP Server dialog box, set parameters listed in Table
2-162 based on the site requirements.
e. Click OK.
The created L2TP server is displayed in the Service List area. Table 2-163
describes parameters in the service list.
Parameter Description
Parameter Description
Parameter Description
Parameter Description
b. In the Service List area, select an L2TP server, and click on the right.
c. In the Modify L2TP Server dialog box, modify parameters listed in Table
2-162.
d. Click OK to save the settings.
● Deleting an L2TP server
a. Choose VPN > L2TP VPN > L2TP Server.
b. In the Service List area, select an L2TP server to delete, and click Restart
to terminate the tunnel connection.
c. Click Delete.
----End
The feature is just for beta test, and is not for commercial use. If the feature is required in the
test, contact Huawei technical support personnel.
2.17.3.1 Overview
As the Internet technologies develop, people can access an enterprise's internal
resources whether they are at home, at work, or on the move. Enterprise
employees, customers, and partners desire access to enterprises' intranets
anywhere and anytime. Unauthorized users or insecure access hosts may threaten
security of enterprises' intranets.
SSL VPN is a type of secure access VPN technology. Based on the HTTPS protocol,
SSL VPN uses the data encryption, user identity authentication, and message
integrity check mechanisms of the SSL protocol to help ensure that remote access
to enterprise intranets is safe and secure.
An SSL VPN gateway is located at an intranet edge, and works with the browsers
installed on remote terminals or with clients downloaded using browsers to
protect service data on the Internet. Additionally, the SSL VPN gateway functions
as the proxy to allow users to access internal servers.
Context
As an SSL VPN gateway, a device can function as multiple virtual gateways. The
administrator configures services for each virtual gateway to meet different access
Procedure
● Creating a virtual gateway
a. Choose VPN > SSL VPN > Virtual Gateway Management.
b. (Optional) Set Server port number to the port number used by the SSL
VPN, and click Apply.
By default, port 443 is used by the SSL VPN.
Before configuring the service port number, ensure that all virtual
gateways in the Virtual Gateway List area are in closed state. You can
select the check box next to a virtual gateway that is in enabled state,
and click Close to disable the virtual gateway.
c. In the Virtual Gateway List area, click Create.
d. In the Create Virtual Gateway dialog box, set Virtual gateway name
and click OK.
e. In the Virtual Gateway List area, click configurations corresponding to
the created virtual gateway to access the configuration page, and set
parameters on the Basic Configurations tab page. Set parameters on the
Web Proxy, Port Forwarding, Network Extension, and Page
Customization based on the service requirements.
f. Click Return in the upper right corner of the configuration page. The
system returns to the Virtual Gateway Management page.
Context
Before enabling a virtual gateway, set basic parameters including the maximum
number of online users and internal interface.
Procedure
Step 1 Choose VPN > SSL VPN, and click configurations of a virtual gateway. The Basic
Configurations tab page is displayed.
Parameter Description
Parameter Description
----End
Context
When remote users want to access resources of the intranet server, the virtual
gateway can provide web proxy services to forward data between remote users
and the intranet server. This function ensures that access to the intranet server is
secure.
Procedure
● Creating a web proxy service
a. Choose VPN > SSL VPN, and click configurations of a virtual gateway,
and click the Web Proxy tab.
b. In the Web Proxy List area, click Create. The Create Web Proxy dialog
box is displayed.
c. In the Create Web Proxy dialog box, set parameters listed in Table 2-168
based on the site requirements.
d. Click OK.
The created web proxy service is displayed in the Web Proxy List area.
Table 2-169 describes parameters in the web proxy list.
Parameter Description
Parameter Description
d. In the Web Proxy List area, and click corresponding to a web proxy
service. The Modify Web Proxy dialog box is displayed.
Context
Remote users require TCP-based services on the intranet server, such as remote
access, desktop sharing, and email. The virtual gateway can provide port
forwarding services to ensure that access to the intranet server is secure.
The TCP-based port numbers on the remote terminal and application server must
be the same; otherwise, the port forwarding service will fail.
Procedure
● Creating a port forwarding service
a. Choose VPN > SSL VPN, and click configurations of a virtual gateway,
and click the Port Forwarding tab.
c. In the Create Port Forwarding dialog box, set parameters listed in Table
2-170 based on the site requirements.
d. Click OK.
The created port forwarding service is displayed in the Port Forwarding
List area. Table 2-171 describes parameters in the port forwarding list.
Parameter Description
----End
Context
Remote users need to communicate with the intranet server in a secure mode. The
virtual gateway can provide the network extension service to ensure
communication security between remote users and the intranet server.
Before remote terminals access the intranet server through the network extension
service, the dedicated client must be installed on remote terminals. You can
download the client from the virtual gateway on web pages, and install a virtual
network adapter on the remote terminal. The client sets up a secure sockets layer
(SSL) connection between the remote terminal and the virtual gateway, requests
an IP address for the virtual network adapter, and creates a route with the virtual
network adapter as the outbound interface.
Procedure
● Configuring the network extension service
a. Choose VPN > SSL VPN > Virtual Gateway Management.
b. Click configurations of the virtual gateway. The configuration page is
displayed.
Parameter Description
User address pool (IP address/mask) Address pool used by remote users.
When the network extension service
is enabled for a remote user, an IP
address is dynamically allocated to
the virtual network adapter. The IP
address is set to the gateway
address of the remote virtual
network adapter, and the subnet
mask specifies the available address
range.
Parameter Description
Context
After completing service configurations of the virtual gateway, a remote user
needs to log in to the virtual gateway on web pages to access internal enterprise
resources. An enterprise user can customize web pages of the virtual gateway.
Procedure
● Customizing the login page
a. Choose VPN > SSL VPN > Virtual Gateway Management.
b. Click configurations of the virtual gateway. The configuration page is
displayed.
c. Click the Page Customization tab, and click Login interface.
Parameter Description
d. Click the area under the logo to set the welcome words.
After completing the configuration, click Apply. The message "Operation
succeeded." is displayed. You can view the new welcome words on the
simulated login page.
----End
Procedure
● Creating a VPN instance
a. Choose VPN > VPN Instance.
c. Set parameters in the Create VPN Instance dialog box. Table 2-174
describes the parameters.
d. Click OK.
Parameter Description
Parameter Description
c. Set Description.
d. Click OK.
----End
Prerequisites
NOTE
Reroute
Call Route Call Route
Solution
Prefix
Configuration
Enterprise CRBT
IVR
Advanced
Configuration Mandatory Mandatory
task subtask
End
Context
NOTICE
The configuration in each step of the configuration wizard takes effect in real
time.
Only one user can log in to a web browser at the same time. If you want to log in
as another user, log out the current user first.
Usage Scenario
This configuration wizard applies to configuring the voice service for the first time
or adding an intra-office or outgoing call (which is, adding call prefixes, users,
trunk groups, trunk circuits, and call routes under the default enterprise and dial
plan).
NOTE
For voice service configuration using the configuration wizard, the enterprise and dial plan
to use are the default enterprise (default) and default dial plan (DefaultDialPlan).
Pre-configuration Task
Before using the configuration wizard, choose Voice Management > System
Configuration > Voice IP Management to create a signaling IP address and a
media IP address for the voice service.
Wizard Function
The configuration wizard allows users to quickly complete the intra-office or
outgoing call configuration task.
NOTE
In the actual application, if the wizard-based configuration fails to meet the requirements,
users can access the configuration pages of the corresponding functions from the
navigation bar for optimization.
Configuration Example
An enterprise has two POTS users (user A and user B) and a SIPUE user (user C).
The following data is used as an example:
● Country/Region information: The value of Country/Region is 990.
● Enterprise information: Enterprise name is HUAWEI and the dial plan is 123.
● Voice IP information: Interface description is HUAWEI, AR Series,
GigabitEthernet0/0/0 Interface and IP address is 10.166.70.213.
● SIP server: URI and domain name being abcd.com
● User information: POTS user 7000, SIP user 7100, and BRA user 7200
● Route information: route 1 (reroute of route 2)
● Prefix information: local prefix 7
● Trunk group information: PRA trunk group trunkgroup1
● Trunk circuit information: The PRA trunk name is 12 and the E1 port is port 1;
the SIP-AT0 trunk name is 44, the called number is 28980808, and the register
ID is 7000; the AT0 trunk name is 33 and the called number for the incoming
call is 28980808.
Procedure
Step 1 Configure the country code and region code.
1. Click Start Config to access the country/region configuration page.
2. Click Create.
NOTE
Before your creation, check whether the configuration you require already exists in the
country/region list. The system provides some country/region information by default.
Step 4 On the voice IP management page, click Next to access the SIP server
configuration page.
1. Configure related information.
NOTE
After the SIP server is configured, the system automatically restarts for the data to
take effect. After the system restart, the system automatically displays the User
Management page.
d. Click OK.
Step 6 Configure a call route.
● Configure a call route.
a. On the User Management page, click Next.
b. Click Create.
c. In the Create Call Route dialog box, configure related information.
d. Click OK.
● Configure a reroute scheme.
a. Click the Reroute tab.
b. Click Create.
c. In the dialog box that is displayed, configure related information.
d. Click OK.
Step 7 Configure a prefix.
1. On the Call Route page, click Next.
2. Click Create.
3. In the Create Call Prefix dialog box, configure related information.
4. Click OK.
5. Click Call Route next to the call prefix.
6. In the Configure Call Route dialog box that is displayed, click Create.
7. In the Create Call Route dialog box, set parameters.
8. Click OK. A dialog box is displayed, indicating that the operation succeeds.
Click OK.
Step 8 Configure a trunk group.
1. On the Prefix Configuration page, click Next.
2. Click Create.
3. In the Create Trunk Group dialog box, configure related information.
4. Click OK.
Step 9 Configure trunk circuits.
● Configure a PRA trunk.
a. Click Create.
b. In the Create PRA Trunk dialog box, configure related information.
c. Click OK.
● Configure a SIP-AT0 trunk.
a. Click the SIP-AT0 Trunk tab and click Create.
b. In the Create SIP-AT0 Trunk dialog box, configure related information.
c. Click OK.
● Configure an AT0 trunk.
a. Click the AT0 Trunk tab and click Create.
b. In the Create AT0 Trunk dialog box, configure related information.
c. Click OK.
----End
2.18.3.1 Country/Region
After configuring the country code and region code, you can normalize called
numbers for calls from different regions or countries.
Context
The PBX adds digits to calling numbers to display incoming numbers, meeting user
needs. It regulates called numbers to accurately locate called parties.
NOTE
● Digits are collected at one time. The PBX cannot collect digits one by one.
● The PBX does not support number regulation over an R2 trunk.
● Figure 2-227 shows the calling number regulation process for incoming calls
over a trunk.
Yes
Are one or more country
code prefixes and country
codes matched?
No
No
Yes
Intra-office call
● Figure 2-228 shows the called number regulation process for incoming calls
over a trunk.
Yes
Delete the prefix of the
country code
No
No Is area code prefix the same Is country code the same as
as default value? default value?
Yes Yes
Delete the prefix of the area code Delete the country code
Yes
Yes
Intra-office call Is intra-office user called?
No
Inter-office call
No Does called
number contain
default country prefix
code?
Yes
Yes No
No Yes
Delete area code prefix and Supplement default area
Supplement default area supplement default country code , country code and
code and area code prefix code and country code country code prefix
prefix
Inter-office call
Accessing a Page
Choose Voice Management > System Configuration > Country/Region.
Procedure
● Configure the current country/region code.
a. In Country/Region Configuration, set Select Country/Region.
b. Click Apply.
Figure 2-230 shows the Country/Region Configuration area.
b. Click Search.
Figure 2-231 shows the Country/Region List area.
Parameter Description
Parameter Description
National toll call National toll call prefix of the country or region.
prefix
Context
When multiple enterprises need to share one PBX, you can configure enterprises
on the PBX and virtualize the PBX into multiple PBXs. Configuring enterprises on
the PBX facilitates management on different enterprise users. Each terminal user
is included in an enterprise, and enterprises are independent and make inter-office
calls.
NOTE
You can create DN sets for enterprises and bind DN sets to users and call prefixes
when you configure User Management and Prefix Configuration. After DN sets
are bound to users and call prefixes, define number rules in the DN sets. For
example, if a user must dial 9 for a local call and 90 for a long-distance call, 9 and
90 can be contained in a DN set. You can define multiple DN sets for an enterprise
based on number rules.
NOTE
By default, the PBX provides the DN set defaultdialplan for the enterprise default and new
enterprises.
Figure 2-233 shows the mapping between the PBX, enterprise, and DN set.
PBX
Enterprise name: default
Default PBX DN set: defaultdialplan
Enterprise A
Enterprise A
Virtual PBX DN set: defaultdialplan
(Optional) DN set
Enterprise B Enterprise B
Virtual PBX
… ... DN set: defaultdialplan
Assessing a Page
Choose Voice Management > System Configuration > Enterprise And Dn Set.
Procedure
● Create an enterprise.
a. Click Create.
b. Set parameters in the Create Enterprise dialog box.
Figure 2-234 shows the Create Enterprise dialog box.
----End
Parameter Description
Parameter Description
Enterprise -
name
Enterprise
Service Right Select a check box, and click or to set the service
rights, such as ringback tone (RBT) for users.
Dn Set Name -
NOTE
When you set Description, Dn Set Name and Dn Set Description, enter character strings
with spaces included in double quotation marks (""), for example, "this is an example".
Context
The voice IP address pool stores signaling IP addresses of PBX interfaces and IP
addresses of media streams controlled by signaling protocols. The media and
signaling IP address addresses can be the same.
Media and signaling IP addresses must be available and routes are reachable.
Prerequisites
Ethernet interfaces have been configured for WAN interconnection.
Assessing a Page
Choose Voice Management > System Configuration > Voice IP Address.
Procedure
● Create a voice IP address.
a. Click Create.
b. Set parameters in the Create Voice IP dialog box.
Figure 2-236 shows the Create Voice IP dialog box.
Parameter Description
Parameter Description
Assessing a Page
Choose Voice Management > System Configuration > SIP Server.
Procedure
Step 1 Set parameters in the SIP Server area.
Figure 2-237 shows the SIP Server area.
Step 2 Click OK. A dialog box is displayed, indicating that the operation succeeds. Click
OK.
Step 3 The system resets the SIP server. After a few seconds, a dialog box is displayed,
indicating that the operation succeeds. Click OK.
----End
Parameter Description
Parameter Description
Registration URI Uniform resource identifier of the SIP server for SIP user
registration.
Home domain Name of the home domain to which the SIP server belongs.
name The value of this parameter is used as the user domain
name in the From field carried in the SIP message header.
Parameter Description
Signaling domain Signaling domain name for the SIP server using a dynamic
name signaling IP address.
DDNS client name Dynamic domain name system (DDNS) name for the SIP
server using a dynamic signaling IP address.
This parameter is used to update the mapping between the
signaling domain name and IP address.
Dynamic signaling Interface name of the signaling IP address for the SIP
address name server using a dynamic signaling IP address.
The interface must be configured with dynamic IP address
allocation and added to the dynamic signaling IP address
pool.
SIP server media Specify an IP address in the media address pool as the
IP address media IP address of the SIP server.
Dynamic media Interface name of the media IP address for the SIP server
address name using a dynamic media IP address.
The interface must be configured with dynamic IP address
allocation and added to the dynamic media IP address
pool.
2.18.3.5 CDR
You can configure the call detail record (CDR). The device sends generated CDRs
to the CDR server.
Context
CDRs generated for voice services are directly saved in the built-in CDR pool on
the PBX. CDRs in the CDR pool can be saved on the CDR server in binary format or
be saved on the FTP/SFTP server in binary or text format through the CDR
interface. Figure 2-238 shows the networking.
IP network
PBX
NOTICE
The PBX and CDR server must be deployed on a trusted network. Otherwise, there
will be security risks.
The PBX can be connected to the CDR/FTP/SFTP server using the following two
protocols:
● TCP: Using this protocol, the PBX directly sends CDRs to the CDR server. The
CDR format is UCBILL.
● FTP/SFTP: Using this protocol, the PBX sends CDRs to the FTP/SFTP server,
providing CDR information for the third-party billing system and billing center.
The CDR formats are CDR (used in the CC08 environment), SOFTX (used in
the SOFTX3000 environment), and MINI (used when only CDRs need to be
checked and charging is ignored).
NOTE
UCBILL, CDR, and SOFTX CDRs are in binary format. MINI CDRs are in text format.
Accessing a Page
Choose Voice Management > System Configuration > CDR.
Procedure
● Provide CDRs through FTP/SFTP.
a. Set parameters on the CDR page.
----End
Parameter Description
Parameter Description
Server protocol ● When CDR format is CDR, SOFTX, or MINI, the server
type protocol type is FTP/SFTP.
● When CDR format is UCBILL, the server protocol type is
Internal.
Parameter Description
CDR format -
Discard CDRs -
upon full CDR
pool
Call Restriction You can click to configure call restrictions for called
For Callee numbers when the CDR pool is full.
Numbers Upon
Full CDR Pool
Display MINI When the value of CDR format is MINI, you can click to
CDR configure displayed elements of CDRs in MINI format.
Context
A SIP user connects calls on the SIP server through SIP. SIP user devices can be IP
phones, eSpace software terminals, and POTS phones connected to the eSpace
IAD. The PBX as the SIP server receives registration and session requests of SIP
users.
As shown in Figure 2-241, the PBX connects to SIP users.
PBX
IAD
IP eSpace soft
phone terminal
POTS POTS
phone phone
You can configure a single SIP user or multiple SIP users in batches. Select a
configuration mode based on the number plan. If the batch configuration mode is
used, the PBX configures multiple SIP users based on the start terminal ID, step,
and user number, improving configuration efficiency. After you configure a SIP
user, you can configure the call rights and service rights for the user. The call
rights and service rights of different users may differ according to actual
requirements.
After a user is configured, you can log in to the PBX web system using the user
name and password. The default username and password are available in AR
Router Default Usernames and Passwords (Enterprise Network or Carrier). If you
have not obtained the access permission of the document, see Help on the
website to find out how to obtain it. If you forget the password after changing it,
the administrator can restore the default password.
Assessing a Page
Choose Voice Management > User Management > SIPUE User.
Procedure
● Create a SIP user.
a. Click Create.
b. Set parameters in the Create SIP User dialog box.
Figure 2-242 shows the Create SIP User dialog box.
----End
Parameter Description
Parameter Description
Start user name User names cannot be duplicate with each other. It is
recommended that you use the phone number to be
assigned to a user as the user name.
Start terminal ID Terminal identifier, that is, the registration account of a SIP
user.
The terminal IDs cannot be duplicate with each other. The
terminal ID of a SIP user must be the same as that
configured on the SIP trunk. It is recommended that you
use the phone number to be assigned to a user as the
terminal ID.
Start long number Long code of the first user. Long codes are assigned by the
carrier network such as the PSTN. Inter-office users can dial
the long code directly to call a user.
Parameter Description
User level You need to set this parameter when the trunk group is
bound to a call route using the routing policy with User
level specified.
A user can be the default user, common user, advanced
user, or super user.
Call-out right Call out rights of a user. The value can be Internal, Local,
National toll call, or International toll call.
Call-in right Call in rights of a user. The value can be Internal, Local,
National toll call, or International toll call.
Service Right
Select a check box, and click or to set the service
rights for users.
Activating After the call waiting or call barring service right is added,
Services you must activate the service.
Context
A POTS user refers to a user of an analog phone or fax machine. POTS users
connect to PBX's voice boards equipped with FXS ports using common phone
cables.
As shown in Figure 2-243, the PBX connects to POTS users.
POTS POTS
Fax machine
phone phone
You can configure a single POTS user or multiple POTS users in batches. Select a
configuration mode based on the number plan. If the batch configuration mode is
used, the PBX configures multiple POTS users based on the start terminal ID, step,
and user number, improving configuration efficiency. After you configure a POTS
user, you can configure the call rights and service rights for the user. The call
rights and service rights of different users may differ according to actual
requirements.
After a user is configured, you can log in to the PBX web system using the user
name and password. The default username and password are available in AR
Router Default Usernames and Passwords (Enterprise Network or Carrier). If you
have not obtained the access permission of the document, see Help on the
website to find out how to obtain it. If you forget the password after changing it,
the administrator can restore the default password.
Assessing a Page
Choose Voice Management > User Management > POTS User.
Procedure
● Create a POTS user.
a. Click Create.
b. Set parameters in the Create POTS User dialog box.
Figure 2-244 shows the Create POTS User dialog box.
----End
Parameter Description
Parameter Description
Start user name User names cannot be duplicate with each other. It is
recommended that you use the phone number to be
assigned to a user as the user name.
Start terminal ID Number of the physical interface to which the first user is
bound. The interface number is in the format of slot ID/
subcard ID/interface sequence number.
Step (user name Difference between two neighboring user names or user
and user number) numbers.
For example, if Start user name or Start Number is set to
8100, Step is set to 2, and Batch Addition Quantity is set
to 3, the names or numbers of the three users are 8100,
8102, and 8104 respectively.
Start long number Long code of the first user. Long codes are assigned by the
carrier network such as the PSTN. Inter-office users can dial
the long code directly to call a user.
User level You need to set this parameter when the trunk group is
bound to a call route using the routing policy with User
level specified.
A user can be the default user, common user, advanced
user, or super user.
Call-out right Call out rights of a user. The value can be Internal, Local,
National toll call, or International toll call.
Call-in right Call in rights of a user. The value can be Internal, Local,
National toll call, or International toll call.
Parameter Description
Service Right
Select a check box, and click or to set the service
rights for users.
Activating After the call waiting or call barring service right is added,
Services you must activate the service.
Context
A BRA user connects to the 2BST card of the PBX through an ISDN telephone line,
and the 2BST card must work in NT mode.
You can configure a single BRA user or multiple BRA users in batches. Select a
configuration mode based on the number plan. If the batch configuration mode is
used, the PBX configures multiple BRA users based on the start terminal ID, step,
and user number, improving configuration efficiency. After you configure a BRA
user, you can configure the call rights and service rights for the user. The call
rights and service rights of different users may differ according to actual
requirements.
After a user is configured, you can log in to the PBX web system using the user
name and password. The default username and password are available in AR
Router Default Usernames and Passwords (Enterprise Network or Carrier). If you
have not obtained the access permission of the document, see Help on the
website to find out how to obtain it. If you forget the password after changing it,
the administrator can restore the default password.
Prerequisites
● The 2BST card has been configured to work in NT mode using the set
workmode slot slot-id bri bri-voice { nt-mode } command in the system
view.
● The remote power supply of the interface has been configured. For details,
see the Configuring an ISDN User of CLI-based Configuration.
Assessing a Page
Choose Voice Management > User Management > BRA User.
Procedure
● Create a BRA user.
a. Click Create.
b. Set parameters in the Create BRA User dialog box.
----End
Parameter Description
Parameter Description
Start user name User names cannot be duplicate with each other. It is
recommended that you use the phone number to be
assigned to a user as the user name.
Start terminal ID Number of the physical interface to which the first user is
bound. The interface number is in the format of slot ID/
subcard ID/interface sequence number.
Step (user name Difference between two neighboring user names or user
and user number) numbers.
For example, if Start user name or Start Number is set to
8100, Step is set to 2, and Batch Addition Quantity is set
to 3, the names or numbers of the three users are 8100,
8102, and 8104 respectively.
Start long number Long code of the first user. Long codes are assigned by the
carrier network such as the PSTN. Inter-office users can dial
the long code directly to call a user.
User level You need to set this parameter when the trunk group is
bound to a call route using the routing policy with User
level specified.
A user can be the default user, common user, advanced
user, or super user.
Call-out right Call out rights of a user. The value can be Internal, Local,
National toll call, or International toll call.
Call-in right Call in rights of a user. The value can be Internal, Local,
National toll call, or International toll call.
Parameter Description
Service Right
Select a check box, and click or to set the service
rights for users.
Activating After the call waiting or call barring service right is added,
Services you must activate the service.
Context
The PBX can select routes according to routing policies defined by subscribers. The
PBX intelligently selects trunk links for voice transmission to minimize costs and
implement load balancing. The routing policies are classified into the following
types:
● Time-based: The PBX selects different routes for outgoing calls based on the
time period. For example, outgoing calls are made through the R2 trunk from
08:00:00 to 18:00:00, and are made through the SIP trunk at other times.
● Charge-rate-based: The PBX selects different routes for outgoing calls based
on the charge rate. For example, charge rates for outgoing calls made
through the R2 trunk and SIP trunk are 1 and 2 respectively.
● Load sharing: The PBX performs route polling according to trunk group
numbers in ascending order till it finds a route that has an idle circuit.
● Percentage load sharing: The PBX selects routes for outgoing calls based on
the call percentage. For example, 30% outgoing calls are made through the
R2 trunk and the other 70% through the SIP trunk.
● Subscriber level: The PBX selects routes for outgoing calls based on the
subscriber right level. For example, calls from subscribers with default rights
are made through the R2 trunk, and calls from subscribers with common
rights are made through the SIP trunk.
● Load balancing: The PBX performs route polling according to trunk group
numbers in ascending order till it finds an office direction that has the largest
number of idle circuits.
● Calling number: The PBX selects routes based on the calling number. For
example, internal numbers of two intra-office subscribers are 6000 and 8000
respectively. You can configure the SIP1 trunk for outgoing calls made by the
subscriber whose call prefix is 6 and the SIP2 trunk for the subscriber whose
call prefix is 8.
Accessing a Page
Choose Voice Management > Call Route > Call Route.
Procedure
● Create a call route.
a. Click Create.
b. Set parameters in the Create Call Route dialog box.
Figure 2-246 shows the Create Call Route dialog box.
Parameter Description
Parameter Description
Routing policy Select a routing policy in the drop-down list box. When no
routing policy is used, select none.
Accessing a Page
Choose Voice Management > Call Route > Reroute Solution.
Procedure
● Create a reroute solution.
a. Click Create.
b. Set parameters in the Create Reroute Solution dialog box.
Figure 2-247 shows the Create Reroute Solution dialog box.
Parameter Description
Parameter Description
Reroute solution -
name
Call Route In the drop-down list box, select the name of the call route
that needs to be configured with a call reroute.
Call reroute In the drop-down list box, select the name of the call
reroute. It indicates that if Call Route cannot be selected,
Call reroute is used.
Context
A call prefix is a string of consecutive digits starting from the first digit of a called
number. It can be the first digit or several digits starting from the first digit of a
called number. That is, a call prefix is a subset of a called number. For example,
you can define either of the following intra-office call prefixes for the called
number 1234:
● First digit: 1
● First two digits: 12
● First three digits: 123
● Called number: 1234
A group of call prefixes configured on the PBX constitutes a DN set. If the
preceding call prefixes all exist in the DN set, the PBX analyzes the called number
according to the longest match principle. For example, a user calls 1234. If call
prefixes 1, 12, and 1234 are configured in a DN set, the PBX matches the called
number with the call prefix 1234 according to the longest match principle.
Call prefixes are classified into the following types:
● Intra-office call prefix: is applicable to scenarios where intra-office and inter-
office users call intra-office users. For example, the intra-office number range
is 7000 to 7099. You can configure the intra-office call prefix 7. You need to
dial only the intra-office user number such as 7001 when calling an intra-
office user.
● Inter-office call prefix: is used by intra-office users to make outgoing calls, for
example, intra-office users make local calls, national toll calls, and
international toll calls. Assuming that the inter-office call prefix is 9, intra-
office user 7000 can dial 912345678 when calling inter-office user 12345678.
The PBX parses and changes the number (for example, delete 9) to make
outgoing calls.
Dial
912345678
12345678 7000
NOTE
A call prefix can be flexibly configured depending on the user number plan.
You can configure a call prefix for basic services, new services, supplementary
services, and the Interactive Voice Response (IVR) service. The call prefix for the
IVR service is called the service access code. For example, you can set a call prefix
*192* for the self-number query service.
In the prefix query result, #*** and **** are prefixes reserved by the system and are
used for the conference service, #99* is used for turning on the MWI, and *99* is
used for turning off the MWI.
Prerequisites
Call Route has been configured.
Assessing a Page
Choose Voice Management > Prefix Configuration.
Procedure
● Create a call prefix.
a. Click Create.
b. Set parameters in the Create Call Prefix dialog box.
Figure 2-249 shows the Create Call Prefix dialog box.
----End
Parameter Description
Parameter Description
Call prefix name Name of a call prefix name. It is recommended that the call
prefix name be the same as the call prefix.
NOTE
If spaces are used, include the string with spaces in double quotation
marks (""), such as, "this is an example".
Service attribute Service attribute of the call prefix. Configure this parameter
only when the call type is not IVR. The listed service
attributes vary according to the call type.
Service IVR service for the call prefix. Configure this parameter only
when the call type is IVR. The listed service names are
defined in the IVR scripts configured in the system or
uploaded to the PBX.
VU loop count Number of times the IVR voice file for the call prefix can be
played. Configure this parameter only when the call type is
IVR.
Call-out right Configure this parameter only when the call type is IVR. The
call-out right can be Internal, Local, National toll call, or
International toll call.
Min. phone Minimum length of a number that can be parsed (with the
number length call prefix included).
Parameter Description
Max. phone Maximum length of a number that can be parsed (with the
number length call prefix included).
Display long Whether the long calling number (for example, 28980001) is
calling number displayed when the user (for example, 8001) makes an
outgoing call using the call prefix.
You are advised to select Yes when a long calling number is
configured.
For details on how to configure a long calling number, see
2.18.4 User Management.
Context
A PRA trunk group uses Digital Subscriber Signaling No.1 (DSS1) or Q Signaling
(QSIG) as the control signaling and can work at the user or network side.
A trunk group must be bound to a specific call route. You can configure the
routing plan for the trunk group based on the routing policy of the call route. If a
time-based routing policy is used, select the time segment index when you select
a specific call route.
In a PBX, you can use a PRA trunk group to implement upstream connection to
the PSTN or downstream connection to the existing PBX devices in an enterprise,
PRA trunk
group
PRA trunk
group Traditional
PBX
PBX
Prerequisites
● Call Route has been configured.
● Routing Time Range Index has been configured if you bind a trunk group to
a call route using time-based routing policy.
● The VE1 interface has been configured. For details, see the Configuring a PRA
Trunk Group of CLI-based Configuration.
Assessing a Page
Choose Voice Management > Trunk Group.
Procedure
● Create a trunk group.
a. Click Create.
b. Select PRA trunk and set parameters in the Create Trunk Group dialog
box.
Figure 2-252 shows the Create Trunk Group dialog box.
----End
Parameter Description
Parameter Description
Signaling mode Signaling type used by the trunk group. The value can be
DSS1 or QSIG. Ensure that the signaling mode is the same as
that used by the remote device.
Access mode Access mode, which can be network side or user side. One of
the two devices connected through the PRA trunk group
must be used as the user-side device, and the other must be
used as the network-side device.
Parameter Description
Toll Call Area Area code of an incoming toll call through the trunk group.
Code If the incoming call does not contain an area code, the
system automatically adds the country or area code, so that
users can view the country or area code through the CLIP
function.
Circuit selection Circuit selection mode used by the trunk group. The value
mode can be Loop, Increase, Decrease, or Master (controlled by
the user).
Outgoing call Outgoing call rights of the trunk group. The value can be
right Local, Internal, National toll call, or International toll call.
Time segment You need to set this parameter when the trunk group is
index bound to a call route using time-based routing policy.
This parameter is optional and is defined in 2.18.11.2 Time
Segment Index.
Percentage You need to set this parameter when the trunk group is
bound to a call route using the routing policy with Load
percentage specified. The unit is %.
Charging rate You need to set this parameter when the trunk group is
bound to a call route using the routing policy with Based on
charging rate specified.
User level You need to set this parameter when the trunk group is
bound to a call route using the routing policy with User level
specified.
NOTE
When you set Trunk Group Name and Trunk Group Description, enter character strings
with spaces included in double quotation marks (""), such as, "this is an example".
Context
There are three SIP trunk groups based on the registration mode, as shown in
Table 2-175.
SIP IP The PBX at one end of a SIP IP trunk group does not need to register
trunk with the device at the other end. Unlike a circuit trunk group that
group defines a physical channel, a SIP IP trunk group defines a logical
channel and solves authentication and addressing problems between
local and remote offices.
When you configure a SIP IP trunk group for the PBX, the remote
end must be the device supporting SIP IP trunks.
SIP AT0 After an enterprise applies for SIP users from the carrier, configure a
trunk SIP AT0 trunk group to implement voice communication between
group PBX users and inter-office users. A SIP AT0 trunk group, similar to an
AT0 trunk group based on POTS users, works over the IP network
and uses SIP.
The SIP users are separately registered on the carrier network such
as IMS networks. Then trunks of the SIP AT0 trunk group are
formed. The carrier network connects to common SIP users, and
does not learn about the private network. An enterprise user
occupies one trunk of the SIP AT0 trunk group to make outgoing
calls. Incoming calls are made through the enterprise switchboard or
an enterprise user.
SIP PRA After an enterprise applies for SIP users from the carrier, configure a
trunk SIP PRA trunk group to implement voice communication between
group PBX users and inter-office users.
Unlike a SIP AT0 trunk group, a SIP PRA trunk group uses trunk
group registration. That is, the SIP PRA trunk group sends a
registration message to complete number registration of a group of
SIP users. Then trunks of the SIP PRA trunk group are formed. The
carrier network connects to common SIP users, and does not learn
about the private network. An enterprise user occupies one trunk of
the SIP PRA trunk group to make outgoing calls. Incoming calls are
made through the enterprise switchboard or an enterprise user.
Table 2-176 describes the transport protocols that can be used by a SIP trunk
group.
Transpor Description
t
Protocol
A trunk group must be bound to a specific call route. You can configure the
routing plan for the trunk group based on the routing policy of the call route. If a
time-based routing policy is used, select the time segment index when you select
a specific call route.
The PBX connects to the carrier network and an IP PBX through SIP trunk groups,
as shown in Figure 2-254.
IMS
Network
SIP AT0/PRA
Trunk Group
SIP IP Trunk
Group another
PBX IP PBX
Prerequisites
● Voice IP Address has been configured.
● Call Route has been configured.
● Routing Time Range Index has been configured if you bind a trunk group to
a call route using time-based routing policy.
Assessing a Page
Choose Voice Management > Trunk Group.
Procedure
● Create a trunk group.
a. Click Create.
b. Select SIP trunk and set parameters in the Create Trunk Group dialog
box.
Figure 2-255 shows the data configuration dialog box (for example, for
configuring a SIP IP trunk group).
Parameter Description
Parameter Description
Home domain Name of the domain to which the SIP trunk group belongs,
name such as abcd.com.
Registrar URI URI address of a registration server. The value must be the
same as that of Home domain name.
Local signaling Number of a local signaling port. When the same signaling
port number IP address is used, ensure that the two port numbers (for
example, the local port and the SIP server) do not conflict
with each other.
Peer port -
number
Parameter Description
Client mode Working mode of the trunk group for reliable connections.
● client: The trunk group functions as a client which
initiates unidirectional connection requests to other
devices.
● server: The trunk group functions as a server which
accepts connection requests from other devices.
● client_server: The trunk group functions as a client and a
server which can set up bidirectional connections.
The PBX must negotiate with the remote device to obtain the
client mode configuration of the remote device.
Toll Call Area Area code of an incoming toll call through the trunk group.
Code If the incoming call does not contain an area code, the
system automatically adds the country or area code, so that
users can view the country or area code through the CLIP
function.
Circuit selection Circuit selection mode used by the trunk group. The value
mode can be Loop, Increase, Decrease, or Master (controlled by
the user).
Time segment You need to set this parameter when the trunk group is
index bound to a call route using time-based routing policy.
This parameter is optional and is defined in 2.18.11.2 Time
Segment Index.
Percentage You need to set this parameter when the trunk group is
bound to a call route using the routing policy with Load
percentage specified. The unit is %.
Parameter Description
Charging rate You need to set this parameter when the trunk group is
bound to a call route using the routing policy with Based on
charging rate specified.
User level You need to set this parameter when the trunk group is
bound to a call route using the routing policy with User level
specified.
NOTE
When you set Trunk Group Name and Trunk Group Description, enter character strings
with spaces included in double quotation marks (""), such as, "this is an example".
Context
Enterprises request PSTN telephone numbers of a certain number, and use
common telephone lines as AT0 trunk lines so that enterprise users can share the
trunk lines. Outgoing calls occupy one trunk line, and the PSTN telephone number
is displayed. After calls are ended, the trunk line is released. Incoming calls reach
the PBX through the AT0 trunk, and then the PBX forwards the incoming calls to a
PBX user or access number of the enterprise switchboard. The trunk line use
efficiency is high, and enterprises do not need to request independent PSTN
telephone numbers for all enterprise employees.
The PBX connects to the PSTN through an AT0 trunk group, as shown in Figure
2-257.
AT0 trunk
group
PBX
Prerequisites
● Call Route has been configured.
● Routing Time Range Index has been configured if you bind a trunk group to
a call route using time-based routing policy.
Assessing a Page
Choose Voice Management > Trunk Group.
Procedure
● Create a trunk group.
a. Click Create.
b. Select AT0 trunk and set parameters in the Create Trunk Group dialog
box.
Parameter Description
Parameter Description
Toll Call Area Area code of an incoming toll call through the trunk group.
Code If the incoming call does not contain an area code, the system
automatically adds the country or area code, so that users can
view the country or area code through the CLIP function.
Circuit Circuit selection mode used by the trunk group. The value can
selection mode be Loop, Increase, Decrease, or Master (controlled by the
user).
Time segment You need to set this parameter when the trunk group is bound
index to a call route using time-based routing policy.
This parameter is optional and is defined in 2.18.11.2 Time
Segment Index.
Percentage You need to set this parameter when the trunk group is bound
to a call route using the routing policy with Load percentage
specified. The unit is %.
Charging rate You need to set this parameter when the trunk group is bound
to a call route using the routing policy with Based on
charging rate specified.
User level You need to set this parameter when the trunk group is bound
to a call route using the routing policy with User level
specified.
NOTE
When you set Trunk Group Name and Trunk Group Description, enter character strings
with spaces included in double quotation marks (""), such as, "this is an example".
Context
A PRA trunk can use the E1 interface not the T1 interface to connect the PBX to
the remote device. An E1 interface on a PRA trunk provides 32 channels which are
also called timeslots. Channels 0 and 16 are signaling channels, and all the other
channels are voice channels. If Board full configuration is set to Yes when you
configure a PRA trunk, all the 30 voice channels of the trunk are used. If Board
full configuration is set to No, only the specified voice channel of the trunk is
used. After a PRA trunk is configured, you can block, restore, and release voice
channels of the trunk.
The PBX can add several trunks of the same type to a trunk group, which are
invoked by call routes. Even if there is only one trunk, a trunk group needs to be
configured to facilitate trunk management.
Prerequisites
2.18.7.1 PRA Trunk Group has been configured.
Assessing a Page
Choose Voice Management > Trunk Circuit > PRA Trunk.
Procedure
● Create a trunk.
a. Click Create.
b. Set parameters in the Create PRA Trunk dialog box.
Figure 2-260 shows the Create PRA Trunk dialog box.
----End
Parameter Description
Parameter Description
Trunk Group Name of the trunk group to which the PRA trunk belongs.
Name
Board full If you want to use all the 30 voice channels (channels 1 to
configuration 15, and 17 to 31) on the E1 interface, select Yes.
If you want to use specified voice channels on the E1
interface only, select No.
Parameter Description
Start channel Start voice channel on the E1 interface that is added to the
PRA trunk. This parameter is available when Board full
configuration is set No.
Context
After an enterprise applies for SIP users from the carrier network such as the IMS
network, the SIP users are separately registered on the carrier network. Then
trunks of the SIP AT0 trunk group are formed.
The PBX can add several trunks of the same type to a trunk group, which are
invoked by call routes. Even if there is only one trunk, a trunk group needs to be
configured to facilitate trunk management.
Prerequisites
● SIP AT0 Trunk Group has been configured.
● The format of the user name for user authentication has been configured. For
details, see the Configuring a SIP AT0 Trunk Group of CLI-based
Configuration.
Assessing a Page
Choose Voice Management > Trunk Circuit > SIP-AT0 Trunk.
Procedure
● Create a trunk.
a. Click Create.
b. Set parameters in the Create SIP-AT0 Trunk dialog box.
Figure 2-261 shows the Create SIP-AT0 Trunk dialog box.
----End
Parameter Description
Parameter Description
Trunk group Name of the trunk group to which the SIP-AT0 trunk
name belongs.
Parameter Description
Register ID Trunk identifier, that is the user name used for registration.
NOTE
If spaces are used, include the string with spaces in double quotation
marks (""), such as, "this is an example".
Context
AT0 trunks must have voice cards such as 4FXS1FXO and 4FXO installed to provide
FXO interfaces.
The PBX can add several trunks of the same type to a trunk group, which are
invoked by call routes. Even if there is only one trunk, a trunk group needs to be
configured to facilitate trunk management.
Prerequisites
2.18.7.3 AT0 Trunk Group has been configured.
Assessing a Page
Choose Voice Management > Trunk Circuit > AT0 Trunk.
Procedure
● Create a trunk.
a. Click Create.
b. Set parameters in the Create AT0 Trunk dialog box.
Figure 2-262 shows the Create AT0 Trunk dialog box.
----End
Parameter Description
Parameter Description
Trunk Group Name Name of the trunk group to which the AT0 trunk belongs.
Parameter Description
Insert call prefix Call prefix inserted to outgoing calls routed through the
trunk.
Incoming signal Signal transmission type for the CLIP service. Set the signal
transmission type transmission type based on the requirements of the
remote end.
Dial delay after Dial delay after a call prefix is inserted by the AT0 trunk.
call prefix is
added(ms)
Prerequisites
● The CRBT service has been enabled. For details, see 2.18.3.2 Enterprise and
DN Set.
Procedure
● Create a CRBT file.
a. Click Create.
b. In the Create CRBT file dialog box, set parameters.
Figure 2-263 shows the parameter settings.
----End
Parameter Description
Parameter Description
Parameter Description
Prerequisites
● The CRBT service has been enabled. For details, see 2.18.3.2 Enterprise and
DN Set.
● Voice File Upload has been configured.
Procedure
● Create a CRBT.
a. Click Create.
b. In the Create CRBT dialog box, set parameters.
Figure 2-264 shows the parameter settings.
Parameter Description
Parameter Description
Calling number Specifies the calling number to which the CRBT is played.
By default, the CRBT is played to all calling numbers.
Validity period Specifies the validity period of the CRBT. If the default value
is used, the CRBT is always valid.
Repeated mode Specifies the repetition mode of the CRBT within the validity
period, including not repeat, manual, monthly, weekly, and
daily.
2.18.10 IVR
IVR refers to the interactive voice response (IVR) service. When there is an
incoming call dialing the access code of an IVR service after the service is
configured, the user is prompted to directly dial the extension number or listen to
the next prompt tone.
Context
Before configuring the IVR service, complete the following operations:
● Voice File Upload
● Voice Resource
● IVR Time Segment Index
After IVR Configuration or the Script Resource configuration is completed,
perform the task of Prefix Configuration. When configuring IVR prefixes, select
the corresponding service name. Then users can hear the tone after dialing an
IVR prefix.
NOTE
When configuring IVR prefixes, associate service name with the voice file configured in IVR
Configuration or Script Resource to ensure that the value of service name is the same as
that configured in IVR Configuration or Script Resource.
Context
A voice file must be in the WAV format and cannot be larger than 480 KB.
Prerequisites
● The voice file has been recorded. For details, see CLI-based Configuration >
Configuration Guide - Voice > PBX Configuration > Advanced
Configuration > Recording and Switching a Phone System Announcement.
● 2.18.12 Voice File Upload has been configured.
Accessing a Page
Choose Voice Management > IVR > Voice Resource.
Procedure
● Create a voice file.
a. Click Create.
b. Set parameters in the Create Voice Configuration dialog box.
Figure 2-265 shows the Create Voice Configuration dialog box.
NOTICE
It takes one minute to release an IVR prompt tone. Therefore, after a voice file
is deleted, you need to wait at least one minute to reconfigure the voice file.
----End
Parameter Description
Parameter Description
Context
To use the IVR switchboard in a specified time segment, you can associate the IVR
time segment index. IVR time segment can be configured using the day, date,
time, and holiday.
Accessing a Page
Choose Voice Management > IVR > IVR Times Segment Index.
Procedure
● Create an IVR time segment index.
a. Click Create.
b. Set parameters in the Create IVR Time Segment Index dialog box.
Figure 2-266 shows the Create IVR Time Segment Index dialog box.
Parameter Description
Parameter Description
Number -
Parameter Description
Context
The IVR service provides IVR menu and prompt tone customization functions.
When an external line calls the switchboard number, the device uses IVR to
provide services to the external line, such as transferring the call or playing the
prompt tone.
Prerequisites
2.18.10.1 Voice Resource has been configured.
Accessing a Page
Choose Voice Management > IVR > IVR Configuration.
Procedure
● Create an IVR script.
a. Click Create.
b. Set parameters in the Create IVR Script dialog box.
Figure 2-267 shows the Create IVR Script dialog box.
c. In the Set IVR Calling Process area, click Create Self-Defined Voice to
configure the IVR calling process.
Figure 2-268 shows the Set IVR Calling Process area.
NOTE
● You can configure a maximum of three time segments for an IVR calling
process.
● You can click + before an IVR calling process to add a process of the same
level, or click - to delete a process of the same level.
● When multiple time segments configured for IVR calling processes overlap,
the system preferentially enters the process with the time segment configured
as holiday. If the Holiday parameters for the time segments are the same, the
system preferentially enters the process with the time segment that has a
smaller value of Name. For example, if the value of Name for one time
segment is 0 and that for another time segment is 1, the system preferentially
enters the process with the name of Name being 0.
d. Click OK. A dialog box is displayed, indicating that the operation
succeeds. Click OK.
● Modify an IVR script.
Parameter Description
Parameter Description
Accessing a Page
Choose Voice Management > IVR > Script Resource.
Procedure
● Upload a script file.
a. In the Script Upload area, click Browse... to select the script file to be
uploaded.
b. Click Upload. A dialog box is displayed, indicating that the operation
succeeds. Click OK.
Figure 2-269 shows the Script Upload area.
----End
Context
Calling Number Discrimination Plan
You can configure calling number discrimination plans to change calling or called
numbers to new numbers for outgoing calls.
● If the calling number needs to be displayed as a specified number, change the
calling number to a new number.
● If the called number needs to be changed, change the called number to a
new number.
The pre-routing number change plan changes a calling or called number before
route selection.
You can configure pre-routing number change plans to provide various dialing
modes and change the calling number displayed on the called party's phone. For
example, a POTS subscriber (using the number 28761000) connected to a PBX
makes a local call (the called number is 28961000) by dialing 928961000. The
configured call prefix for outgoing calls is 2896. Therefore, a pre-routing number
change plan needs to be configured to remove 9 from the called number. You can
use pre-routing number change plans to delete the call prefix for the device to
correctly locate the called party. After number analysis, the calling or called
number is changed before route selection. Second-time number analysis is
performed and the two-stage dial tone is played after number change.
The post-routing number change plan changes a calling or called number after
route selection.
You can configure post-routing number change plans to provide various dialing
modes and change the calling number displayed on the called party's phone. A
post-routing number change plan can change a called number to a long number
to ensure that it complies with the required number format. For example, a POTS
subscriber (using the number 7000) connected to a PBX makes a national toll call
by dialing 057128980000. A post-routing number change plan adds 12523 to the
called number 057128980000. 12345 is the call prefix defined by the carrier for
the enterprise. When the carrier's device detects the call prefix 12345, it connects
the outgoing call through the matching trunk. This reduces the call fees of the
enterprise. You can use post-routing number change plans to delete the call prefix
for the device to correctly locate the called party.
Accessing a Page
Choose Voice Management > Advanced Configuration > Number Change.
Procedure
● Create a calling number discrimination plan.
a. In the Calling Number Discrimination List area, click Create.
b. Set parameters in the Create Calling Number Discrimination dialog
box.
Parameter Description
Parameter Description
Call source Name of the call source that the calling number
discrimination plan is applied to. Select an enterprise from
the drop-down list box.
Change type Change type of the calling number. You can change, delete,
or insert digits into the calling number, or do not change the
calling number.
New calling ● When digits in the calling number are changed, the digit
number change range is determined by the number change start
point and number change length. You can replace digits
in the range with a new number.
● When digits are inserted into the calling number, the
insertion start point is determined by the number change
start point. You can insert a new number in the insertion
start point of the original number.
Change type Change type of the called number. You can change, delete,
or insert digits into the calling number, or do not change the
called number.
Parameter Description
New called ● When digits in the called number are changed, the digit
number change range is determined by the number change start
point and number change length. You can replace digits
in the range with a new number.
● When digits are inserted into the called number, the
insertion start point is determined by the number change
start point. You can insert a new number in the insertion
start point of the original number.
Call prefix name Call prefix bound to the pre-routing number change plan.
Reanalyze -
changed number
Play two-stage -
dial tone
New enterprise Indicates the new enterprise name after pre-routing number
name change.
Call prefix name Call prefix bound to the post-routing number change plan.
Trunk group Trunk group bound to the post-routing number change plan.
name
Accessing a Page
Choose Voice Management > Advanced Configuration > Time Segment Index.
Procedure
● Create a time segment index.
a. Click Create.
b. Set parameters in the Create Time Segment Index dialog box.
Figure 2-273 shows the Create Time Segment Index dialog box.
----End
Parameter Description
Parameter Description
Validity period Specifies the validity period of the Time Segment. If the
default value is used, the Time Segment is always valid.
Repeat Mode Select the repeat mode of the time segment from the drop-
down list box.
Accessing a Page
Choose Voice Management > Advanced Configuration > Number Mapping.
Procedure
● Create a number mapping.
a. Click Create.
b. Set parameters in the Create Number Mapping dialog box.
Figure 2-274 shows the Create Number Mapping dialog box.
----End
Parameter Description
Parameter Description
Enterprise name Name of the enterprise that the number mapping is applied
to. Select an enterprise from the drop-down list box.
Parameter Description
Accessing a Page
Choose Voice Management > Voice File Upload.
Procedure
Step 1 Click Browse... to select the voice file directory (for example, D:\VOICE).
Figure 2-275 shows the Uploading a voice file.
Step 2 Click Upload. A dialog box is displayed, indicating that the operation succeeds.
Click OK.
----End
NOTE
If the storage device of the system software is a USB flash drive, do not remove the USB
flash drive or power off the device during the upgrade. Otherwise, the USB flash drive may
be damaged. You are advised to copy the system software to the default storage device and
configure the system to start from the default storage device.
Context
After the system is upgraded or when the device configuration is changed, restart
the device to make the new configuration take effect. You are advised to save the
current configuration and back up the current configuration file before restarting
the system. Ensure that the system software of the standby MPU is the same as
that of the active MPU before restarting the device with active and standby MPUs.
Procedure
Step 1 Click Save to save the current configuration.
Step 2 Choose System Management > Upgrade and Maintenance > Restart Device, as
shown in Figure 2-276 and Figure 2-277.
Figure 2-277 Restart page of the device with active and standby MPUs
Step 3 Click Save As Configuration File to back up the configuration file to the storage
device of the router.
Step 4 Click Export Configuration File to back up the configuration file to the local PC.
Step 5 Set System software to specify the system software to use during the next
startup.
Step 6 Set Configuration file to specify the configuration file to use during the next
startup.
Step 7 Click Restart Device. The device prompts whether to check system software. The
device with active and standby MPUs checks whether the two MPUs have the
same system software. If not, the standby MPU spends 1 to 3 minutes copying the
system software from the active MPU. The message "Is the configuration saved?"
is displayed.
● To save the current configuration and restart the device, click Yes.
● To restart the device without saving the current configuration, click No.
● To cancel the configuration, click Cancel.
----End
Context
The device software includes BootROM software and system software. After the
device is powered on, it runs the BootROM software to initialize the hardware and
display hardware parameters, and then runs the system software. The system
software provides drivers and adaptation functions for hardware, and offers
service features. The BootROM software and system software are prerequisites for
device startup and operation, providing support, management, and services for the
device.
NOTE
The BootROM software is included in the system software package (.cc file) of the device.
The BootROM software is automatically upgraded in system software upgrade.
Procedure
Step 1 Choose System Management > Upgrade and Maintenance > System Software,
as shown in Figure 2-278.
----End
Context
A configuration file is a collection of command lines. The current configurations
are saved in configuration files, and continue to take effect after the device
restarts. You can view configurations in configuration files or upload the files to
other devices to implement batch configuration.
Procedure
Step 1 Choose System Management > Upgrade and Maintenance > Configuration
File, as shown in Figure 2-279.
Context
A patch is a kind of software compatible with the system software. It is used to
remove the urgent bugs of the system software. Patches can also fix errors or
improve adaptation of the system software. For example, patches can fix defects
of the system and optimize some functions to meet service requirements.
The patches are released in patch files. A patch file may contain one or more
patches with different functions. When patch files are loaded from the storage
device to the patch area in the memory, a unique sequence number is assigned to
each patch file to identify, manage, and operate the patches.
Procedure
Step 1 Choose System Management > Upgrade and Maintenance > Patch File, as
shown in Figure 2-280.
----End
Context
The device is delivered with basic configurations so that it can start and work
properly when no configuration file exists or the configuration file is lost or
damaged.
Procedure
Step 1 Choose System Management > Upgrade and Maintenance > Restore Factory
Settings, as shown in Figure 2-281.
----End
Context
Security signature libraries include the intrusion defense library. You can upgrade
the library to improve device capabilities of identifying intrusions.
An IPS prevents and detects intrusions based on the intrusion defense library in
which IPS signatures are predefined. IPS signatures describe characteristics of
attacks on the network. A device compares the packet content against IPS
signatures to detect and defend against attacks. If a data flow matches the
characteristics in an IPS signature, the device processes the data flow based on the
action matching the IPS signature.
The libraries are upgraded in the security center in real time. After purchasing the
library license, you can obtain the latest libraries to upgrade the security signature
libraries.
You can upgrade the libraries locally or directly in the security center.
Procedure
Step 1 Access the Security Signature Library page.
Log in to the web platform and choose System Management > Upgrade and
Maintenance > Security Signature Library, as shown in Figure1 Security
Signature Library page.
Step 2 In the Server Setting area, click Configuration. In the Server Setting dialog box
that is displayed, as shown in Figure 2-283, set parameters described in Table
2-177.
Parameter Description
Parameter Description
----End
Context
The file system manages files on the storage devices.
Procedure
Step 1 Choose System Management > System Configuration > File Management, as
shown in Figure 2-284.
Step 2 In the Storage Medium area, check the remaining space, available space, and
total space of the storage device.
NOTE
The device supports the flash memory, hard disk, and USB flash drive. Different models
support different storage devices. For the storage device type and specifications supported
by the device, see "Technical Specifications" in the Hardware Description.
----End
Context
In the TCP/IP protocol suite, the Telnet protocol applies to the application layer.
The Telnet protocol provides remote login and virtual terminal functions through
networks. Telnet is implemented based on the client/server model. Telnet clients
send requests to the Telnet server that provides the Telnet service.
NOTE
The Telnet protocol poses a security risk, and therefore the STelnet protocol is
recommended.
The File Transfer Protocol (FTP) applies to scenarios that do not require high file
transfer security. FTP is widely used for version upgrades.
NOTE
The FTP protocol will bring risk to device security. The SFTP mode is recommended.
Secure Shell Telnet (STelnet) ensures secure Telnet services. STelnet secures client
access on a traditional insecure network by authenticating the client and
encrypting data bidirectionally.
The Secure File Transfer Protocol (SFTP) secures file transfer on a traditional
insecure network by authenticating the client and encrypting data bidirectionally.
After value-added security service is enabled. The device uses security policies to
provide deep security defense based on the application layer. It protects users
against attacks from various network threats.
If you do not perform any operation before the web service times out, the system
forcibly logs you out and prompts you to log in to the web platform again when
you perform an operation. The default web service timeout period, 10 minutes, is
recommended.
Procedure
● Perform service management.
a. Choose System Management > System Configuration > Service
Management to access the Service Management page, as shown in
Figure 2-285.
Context
To ensure communication between the router and other devices, set the accurate
system time. The router support automatic system time synchronization with the
NTP server or manual system time setting. The first method is recommended.
Procedure
● Automatic synchronization
a. Choose System Management > System Configuration > System Time,
as shown in Figure 2-287.
The web platform supports two NTP servers and synchronizes the system time with
the NTP server whose primary clock level is higher. For example, NTP1 has a higher
primary clock level than NTP2, so the router synchronizes time with NTP1.
If the primary clock level of the web platform is higher than the NTP servers, the web
platform does not synchronize the system time with the NTP server.
● Manual setting
a. Choose System Management > System Configuration > System Time.
b. In the Date And Time Setting area, click Manual Setting, as shown in
Figure 2-288.
c. In the Date And Time Setting area, set the date and time.
d. Click the Select time zone drop-down list box, and select the time zone.
e. Click Apply.
f. In the Information dialog box that is displayed, click OK.
----End
Context
Logs are displayed in a log list. You can view logs of a specified type and delete
logs.
Procedure
● Viewing logs
a. Choose System Management > Log Management > View Logs, as
shown in Figure 2-289.
b. Select Module or Level from the Search item drop-down list box, and
select the log module or level from the subsequent drop-down list box.
To check logs of a specified module, you can enter the module name
in this drop-down list box. Fuzzy search is supported. For example,
you can enter net to check logs of all modules whose name contains
net and NET.
Level Description
c. Click Search.
Logs of the specified level are displayed in the log list. Table 2-181
describes parameters in the log list.
Parameter Description
● Clearing logs
a. Choose System Management > Log Management > View Logs.
b. Click Clear.
c. In the Information dialog box, click OK.
----End
Context
You can save logs in either of the following ways:
● Configure the log buffer. A router reserves a certain size of flash memory to
save a small number of logs.
● Configure a log host to save logs.
NOTE
The web platform supports 8 log hosts. When the number of configured log hosts exceeds
that limited by the web platform, a dialog box is displayed indicating the number of log
hosts reaches the maximum.
If the device does not support depth security or depth security is not enabled, some security
logs cannot be displayed.
Procedure
● Configuring log parameters
a. Choose System Management > Log Management > Configure Logs, as
shown in Figure 2-291.
----End
Context
This section describes how to save logs in the user log buffer and diagnosis log
buffer as log files.
● Logs in the user log buffer are saved as the file log.log.
● Logs in the diagnosis log buffer are saved as the file log.dblg.
When the size of a log file exceeds the threshold, the log file is automatically
compressed as a .zip file.
Procedure
● Querying log information
a. Choose System Management > Log Management > Log File, as shown
in Figure 2-292.
b. Click Refresh.
Information about log files is displayed in Log File. For details about
parameters in Log File, see Table 2-182.
b. Find the required log file from the log file list, and click mapping the
log file. The File Download dialog box is displayed.
c. Click Save As.
d. Select the directory for storing the log file and click Save.
● Deleting a log file
a. Choose System Management > Log Management > Log File.
b. Select a log file in the log file list.
c. Click Delete.
d. In the dialog box that is displayed, click OK. The log file is deleted.
----End
2.19.4.1 Introduction
A license is used to authorize users to use a specified feature, version, or capacity
or use services in a certain period. A license contains a license file and a license
authorization certificate.
After purchasing or renew a license, you can obtain a license authorization
certificate. To use resources controlled by the license, you have to apply for a
license file. Only one license file is generated on a device even if you have
purchased multiple licenses. Each license file is bound to an Equipment Serial
Number (ESN). A license file belongs to only one device.
Obtain the following information before applying for a license file:
● Obtain the Contract number from the license authorization certificate.
● Obtain the License Authorization Code (LAC) from the license authorization
certificate.
● Obtain the ESN on the Device Information page. Log in to the web platform,
click Device Information, and select Device Information from the Item
drop-down list box at the upper right corner. You can view the ESN in the
Device Information area.
Agents and common users can use Huawei flexnet operations (ESDP) to obtain
license files.
NOTE
Context
You need to activate licenses in either of the following situations:
● Purchasing a license to obtain permissions on related functions after you
purchase a new device.
● Applying for a new license file, and upgrade and activate the license file when
the license file is activated on the device and a new feature is required.
Procedure
Step 1 Choose System Management > License Management.
Step 2 Click Browse in the License Activation area and select the license file to upload.
NOTE
If you need to adjust a license file between devices (for example, move a license file from
device A to device B) without changing the license authorization certificate or an upgraded
license file is incompatible with the original one, click Revoke in the License Information
area to obtain a license revocation code. Use the license revocation code to obtain a new
license file, and activate the license file.
You can view the license status, resources controlled by the license, and
authorization information in the License Information area. Table 2-183 describes
license parameters.
Parameter Description
----End
2.19.5 SNMP
Context
The Simple Network Management Protocol (SNMP) is a network management
standard widely used on TCP/IP networks. SNMP uses a central computer (a
network management station) that runs network management software to
manage network elements.
The web system supports SNMPv1, SNMPv2, and SNMPv3. The router and
network management station must use the same SNMP version.
Context
After the SNMP agent starts, you can perform the SNMP global configuration to
confirm the SNMP version and device maintenance information.
Procedure
Step 1 Choose System Management > SNMP, as shown in Figure 2-294.
By default, the web platform supports SNMPv3. You can select one or multiple
versions. The router and network management station must use the same SNMP
version.
NOTE
SNMPv1 and SNMPv2c are insecure. It is recommended that you use SNMPv3, which has
the encryption function.
Step 4 Enter the position of the router in the Device position text box.
When Device position is not set, click Apply. The factory setting is displayed.
When Device maintenance information is not set, click Apply. The factory
setting is displayed.
----End
Context
In different SNMP versions, community/group management configurations are
different. After the global configuration is applied, you must configure the
community/group management. Table 2-185 describes mappings between SNMP
versions and community/group management.
NOTE
The web platform supports a maximum of 20 communities and 20 groups. The number of
users in all groups cannot exceed 20. A dialog box is displayed when the number of
communities, groups, or users exceeds the limit on the web platform.
Procedure
● Community management
Creating a community
c. In the dialog box that is displayed, set parameters listed in Table 2-186.
d. Click OK.
Modifying a community
Deleting a community
Creating a group
c. In the dialog box that is displayed, set parameters listed in Table 2-187.
d. Click OK.
Creating a user
a. Choose System Management > SNMP > Community/Group
Management.
b. In the Group/User area, click Add User corresponding to the group to
which you want to add users, as shown in Figure 2-299.
The security level of a user cannot lower than that of the group to which
the user belongs.
c. In the dialog box that is displayed, set parameters listed in Table 2-188.
The parameter Group Name cannot be modified.
d. Click OK.
The created user is displayed in the Group/User area. To create more
users, repeat the preceding steps. To view users in a group, click next
to Group Name.
Modifying a group
a. Choose System Management > SNMP > Community/Group
Management.
Deleting a group
a. Choose System Management > SNMP > Community/Group
Management.
b. In the Group/User area, select the check box next to the group you want
to delete, or select the check box next to Group Name to select all
groups.
c. Click Delete.
d. In the Information dialog box that is displayed, click OK.
The deleted group is not displayed in the Group/User area, and users in
this group are deleted at the same time.
----End
Context
A MIB view is an abstract set of all managed objects. The NMS manages the
device by reading and writing the managed objects in the MIB. A MIB view defines
management information included and excluded in this MIB view, which is
implemented in the following ways:
● When the NMS cannot manage a small number of MIB objects on the
managed device or the NMS needs to be disabled from managing some MIB
objects in the existing MIB view, exclude these MIB objects.
● When the NMS cannot manage most MIB objects on the managed device or
the NMS needs to be enabled to manage some new MIB objects in the
existing MIB view, add these MIB objects.
NOTE
The web platform supports a maximum of 20 rules in all MIB views among which 4 rules
are configured in the default MIB view. You can add only 16 rules. When the total number
of rules exceeds 20, the system prompts you with a message.
Procedure
● Creating a MIB view
a. Choose System Management > SNMP > MIB View, as shown in Figure
2-300.
b. Click Create in the MIB View List area, as shown in Figure 2-301.
c. Perform the following operations in the Create MIB View dialog box.
Creating a rule
Deleting a rule
New MIB views are displayed on the MIB View tab page. You can click
to view information about a MIB view. To create multiple MIB views,
repeat the preceding steps.
● Modifying a MIB view
a. Choose System Management > SNMP.
Creating a rule
Deleting a rule
The MIB View tab page is displayed. You can click to view the
configuration change.
● Deleting a MIB view
a. Choose System Management > SNMP > MIB View.
b. Select the check box of a MIB view in the MIB view list or select the check
box next to View Name to select all MIB views.
c. Click Delete.
d. In the Information dialog box that is displayed, click OK.
----End
Context
A managed device sends a trap to the NMS so that the administrator can discover
exceptions of the device. The NMS receives a trap from a managed device without
confirmation.
NOTE
The web platform supports 20 trap destination hosts. When the number of configured trap
destination hosts exceeds that limited by the web platform, a dialog box is displayed
indicating that the number of trap destination hosts reaches the maximum.
Procedure
● Trap setting
a. Choose System Management > SNMP > Trap Setting, as shown in
Figure 2-302.
e. Click Apply.
The Trap Setting tab page is displayed, and information in the Source
interface that sends trap messages text box changes to the specified
interface.
● Trap target host
c. In the Create Trap Destination Host dialog box that is displayed, set
parameters listed in Table 2-189.
d. Click OK.
The created trap destination host is displayed in the Trap Target Host
area. To create more trap destination hosts, repeat the preceding steps.
The Trap Target Host area is displayed and the information about the
trap destination host changes in the list.
The deleted trap destination host is not displayed in the Trap Target
Host area.
----End
2.19.6 CWMP
Context
When a router functions as a customer premises equipment (CPE), you can enable
CPE WAN Management Protocol (CWMP) on the auto-configuration server (ACS)
to remotely manage the CPE. A connection can be initiated by a CPE or an ACS.
● Connection initiated by a CPE
After the CPE sends an Inform message containing a uniform resource locator
(URL) address to the ACS, the ACS authenticates the CPE by using the user
name and password. After being authenticated, the CPE can set up a
connection with the ACS.
● Connection initiated by an ACS
After the ACS sends a Hypertext Transfer Protocol (HTTP) packet containing
the IP address of the CPE, the CPE authenticates the ACS by using the user
name and password. After being authenticated, the ACS can set up a
connection with the CPE. This connection initiation mode can be used only
when the ACS has communicated with the CPE at least once through a
session that the CPE initiates.
The ACS's URL is in the HTTP or Hypertext Transfer Protocol Secure (HTTPS)
format. The HTTPS format can ensure the communication security and data
integrity between the ACS and CPE.
Procedure
● Configuring CWMP
a. Choose System Management > CWMP.
b. Set CWMP to Enable.
c. Configure the ACS.
When the ACS's URL is in the HTTP format:
i. Enter a URL of the HTTP format in the URL text box, as shown in
Figure 2-304.
ii. Enter the user name and password in the User name and Password
test boxes.
ii. Enter the user name and password in the User name and Password
test boxes.
iii. Set Authentication mode.
iv. When Authentication mode is set to SSL, select an SSL policy from
the SSL drop-down list box.
v. When Authentication mode is set to Certificate authentication,
select Upload The Certificate from the Primary root certificate
drop-down list box. Click Browse in the displayed Upload The
Certificate dialog box, select the certificate to upload, and click
Upload.
To use a certificate that has been uploaded to the device, select the
certificate from the Primary root certificate drop-down list box.
vi. (Optional) When Authentication mode is set to Certificate
authentication, select Upload The Certificate from the Secondary
root certificate drop-down list box. Click Browse in the displayed
Upload The Certificate dialog box, select the certificate to upload,
and click Upload.
To use a certificate that has been uploaded to the device, select the
certificate from the Secondary root certificate drop-down list box.
d. (Optional) Configure the CPE.
i. Enter the user name and password in the User name and Password
test boxes.
ii. Set Send inform packets to Enable.
A CPE can set up a connection with the ACS in Inform remote
procedure call (PRC) mode. By default, the CPE does not send Inform
packets periodically.
Configuration Parameters
Parameter Description
2.19.7 Diagnostic
2.19.7.1 Ping
Context
A ping test checks whether a destination host is reachable to determine network
connectivity to the host.
When a ping operation is complete, the result is displayed in the Result text box.
Procedure
Step 1 Choose System Management > Diagnostic Tools > Ping, as shown in Figure
2-307.
Step 2 In the IP/host name text box, enter the destination IP address or host name.
Step 3 Click Start.
----End
Context
A trace route test tracks the forwarding path from a source device to a destination
device. When a network failure occurs, you can use the tracert tool to locate the
fault. You can specify a destination IP address or host name.
After the tracert operation is complete, the result is displayed in the Result text
box.
Procedure
Step 1 Choose System Management > Diagnostic Tools > Trace Route, as shown in
Figure 2-308.
Step 2 In the IP/host name text box, enter the destination IP address or host name.
Step 3 Click Start.
----End
Context
You can use HTTP Get to check whether the host with the specified URL provides
the HTTP service.
When an HTTP Get operation is complete, the result is displayed in the Result text
box.
Procedure
Step 1 Choose System Management > Diagnostic Tools > Http Get, as shown in Figure
2-309.
----End
Context
The DNS query allows you to obtain the IP address mapped to a specified domain
name.
After the DNS query operation is complete, the result is displayed in the Result
text box.
Procedure
Step 1 Choose System Management > Diagnostic Tools > DNS Query, as shown in
Figure 2-310.
Step 2 In the Domain name text box, enter the domain name.
Step 3 Click Start.
----End
Context
The one-key log collection function exports a large amount of diagnosis
information running on the device to the web_diaginfo.txt file. The information
includes startup configuration, current configuration, interface information, time,
and system version.
Procedure
Step 1 Choose System Management > Diagnostic > One-Key Log Collection.
Step 2 Click One-Key Collection. In the Information dialog box that is displayed, click
OK.
Step 3 Click Export to export the current web_diaginfo.txt file.
The web_diaginfo.txt file can be exported only when the collection is completed.
----End
Procedure
● Electronic Label
a. Choose System Management > Electronic Label, as shown in Figure
2-312.
----End
Context
The open programmability system (OPS) is an open platform that provides
Application Programming Interfaces (APIs) to achieve programmability, allowing
third-party applications to run on the platform.
Procedure
Step 1 Choose System Management > OPS Configuration to access the OPS
Configuration page, as shown in Figure 2-313.
Step 3 In Script File List, manage the OPS scripts on the device.
● Select an OPS script file and click Delete to delete it.
● Click Refresh to update the file list.
----End
Context
You can use the web page to specify the IP address, port number, and VPN
instance of the controller so that the AR can interwork with the controller.
Procedure
● Configure the controller.
a. Choose System Management > Controller Configuration, as shown in
Figure 2-314.
b. Enter the IP address, port number, and VPN instance of the controller in
IP address, Port number, and VPN instance.
c. Click Apply.
----End
Context
An administrator can create, modify, and delete local users on the User
Management tab page.
NOTE
Only a super administrator can add and delete local user accounts as well as view administrator
details.
Procedure
● Creating a local user
a. Choose User Management > User Management, as shown in Figure
2-315.
c. Set parameters in the Create User dialog box. Table 2-191 describes the
parameters.
Parameter Description
Parameter Description
d. Click OK.
A user is added to the user list.
e. To create multiple users, repeat this procedure.
● Modifying a local user
a. Choose User Management > User Management.
▪ When a user changes the personal password, the user sets Old
password, New password, Confirm password and Access type.
After the super administrator changes the password of another user, the user is
required to change the password in first login.
Only the users logging in through Telnet or HTTP can be forcibly logged out.
disconnect the user?, and Yes is selected for the super administrator,
the super administrator is still online on the current page, but is
logged out of other pages.
e. Click OK.
● Deleting a local user
a. Choose User Management > User Management.
b. Select the check boxes of users in the user list or select the check box
next to User Name to select all users.
c. Click Delete.
Users are deleted from the user list.
NOTE
The administrator cannot delete the online user that has logged in to the web
platform.
● Refreshing the user list
Click Refresh.
● Click Details to view details about the administrator. Table 2-192 describes
the parameters.
Parameter Description
Whether the password has been Whether the password used by the
expired administrator has expired.
The value is Yes or No.
----End
Context
A super administrator can change the password policy to manage the password
change period of users.
Procedure
Step 1 Choose User Management > Password Policy, as shown in Figure 2-317.
----End
Context
The super administrator can customize web pages that can be viewed by the
enterprise administrator.
Procedure
Step 1 Choose User Management > Customized Web, as shown in Figure 2-318.
----End