HCNA-transmission Practice Guide
HCNA-transmission Practice Guide
With any Huawei Career Certification, you have the privilege on http://learning.huawei.com/en to enjoy:
1、Comprehensive E-Learning Courses
Content:All Huawei Career Certification E-Learning courses
Methods to get the E-learning privilege : submit Huawei Account and email being used for Huawei Account
registration to [email protected] .
2、 Training Material Download
Content: Huawei product training material and Huawei career certification training material
Method:Logon http://learning.huawei.com/en and enter HuaWei Training/Classroom Training ,then you can
download training material in the specific training introduction page.
3、 Priority to participate in Huawei Online Open Class(LVC)
Content:The Huawei career certification training covering all ICT technical domains like R&S, UC&C, Security,
Storage and so on, which are conducted by Huawei professional instructors
Method:The plan and participate method please refer to LVC Open Courses Schedule
4、Learning Tool: eNSP
eNSP (Enterprise Network Simulation Platform) is a graphical network simulation tool which is developed by
Huawei and free of charge. eNSP mainly simulates enterprise routers, switches as close to the real hardware as
it possible, which makes the lab practice available and easy without any real device.
In addition, Huawei has built up Huawei Technical Forum which allows candidates to discuss technical issues with
Huawei experts , share exam experiences with others or be acquainted with Huawei Products(
http://support.huawei.com/ecommunity/)
Content
SDH Network Topologies...............................................……………….....................Page 2
Survivable networks and their protection mechanisms…………………….…………Page 14
The network topology, the geometrical layout of SDH network nodes and transmission
lines, reflects the physical connection of the network. The network topology is important
in the sense that it determines the performance, reliability and cost-effectiveness of an SDH
network.
The chain network is simple and economical at the initial application stage of SDH
equipment. For a chain network, it’s more difficult and more expensive to protect the
traffic, compared with a ring network. The chain network is used in cases where the traffic
is unimportant or where the traffic load is small so that we don’t have to care about the
traffic protection.
In the star network, the hub node selects routes and passes through the traffic signals for
all the other nodes. As a result, the hub node is able to manage the bandwidth resources
thoroughly and flexibly. On the other hand, there is the possibility of a potential bottleneck
of bandwidth resources. Besides, the equipment failure of the hub node may result in the
breakdown of the entire network.
A tree structure can be considered as the combination of chain and star structures. It is
suitable for broadcast service. However, due to the bottleneck problem and the optical
power budget limit, it is not suitable for bidirectional traffic.
The ring network is the most widely used network for SDH transmission networks.
In such a structure, any traffic between two adjacent nodes can be directly add/drop
between them. For traffic between two non-adjacent nodes, we have to configure the
add/drop traffic at the source node and the sink node. And the pass-through traffic in
between those two nodes must be created as well.
The ring network is highly survivable. The most obvious advantage of a ring network is its
high survivability that is essential to modern optical networks with large capacity. Thus, the
ring network enjoys very broad applications in SDH networks.
Mesh networks are such communications networks in which many nodes are
interconnected with each other via direct routes. In such topological structure, if direct
routes are used in the interconnection of all the nodes, this structure is considered as an
ideal mesh topology. In a non-ideal mesh topological structure, the service connection
between nodes that are not connected directly is established through route selection and
transiting via other nodes.
In a mesh network, no bottle neck problem exists. Since more than one route can be
selected between any nodes, when any equipment fails, services can still be transmitted
smoothly through other routes. Thus, the reliability of service transmission is increased.
However, such networks are more complicated, costly and difficult to manage. Mesh
networks are very suitable for those regions with large traffic.
The advantage of sub-network can simplify the big network, make it easy to maintenance.
The concept of sub-network is introduced in Huawei OptiX series equipment and network
management systems in order to facilitate network topology management, security
management, tributary interface expansion, and traffic management.
In practical applications, it simplifies the topology structure of complicated networks and
thus enables hierarchical management.
Modern society is getting more and more dependent on communications with the
development of science and technologies, and so higher requirements to network security
are being brought forward. Thus the concept of survivable network comes into being. The
following will deal with the concepts of survivable network.
Please pay attention to that the network can only restore services here. It cannot repair the
failure in the network, which cannot do without human intervention.
So there should have protection channels to carry over the services in the working
channels. The first requirement for survivability of network is there should have protection
routes or standby routes.
A survivability also need something else. Nodes in the network must have the intelligence
to check out the failure occurred and inform corresponding units of doing relative
protection operation. And the nodes also should have powerful cross-connect capability to
implement the protection operation.
For the survivable network, the protection object can be the physical or electronic.
Unidirectional traffic and bidirectional traffic are named regarding the traffic flow
directions in the ring. A unidirectional ring means that traffic travel in just one direction,
e.g. clockwise or counter-clockwise. While in a bidirectional ring, traffic signals go in two
directions, one opposite to another.
Protection modes can be divided into two kinds: 1+1 and 1:N. In 1+1 protection mode,
every working system is protected by a dedicated protection system. But in 1:N protection
mode, N systems share one protection system; and when the system is in normal operation,
the protection system can also transmit extra traffic. Thus a higher efficiency can be
obtained than that of 1+1 system.
For multiplex section protection ring, traffic protection is based on multiplex section.
Switching or not is determined by signal qualities of the multiplex section between each
span of nodes.
The network has two channels (two pairs of fibers): working (active) channel and
protection (standby) channel.
When the network is normal (i.e. no failure on working channel), working channel is used
to transport the traffics.
When the working channel is failed, use the protection channel.
Linear Multiplex Section (MS) protection is one of multiplex section protections. Linear
multiplex section protection switching can be a dedicated or shared protection mechanism.
It protects the multiplex section layer, and applies to point-to-point physical networks. One
protection multiplex section can be used to protect the normal traffic from a number (N) of
working multiplex sections. It cannot protect against node failures. It can operate in a
unidirectional or bidirectional manner, and it can carry extra traffic on the protection
multiplex section in bidirectional operation.
Out of 1+1 linear multiplex section protections, some modes require APS protocol during
the switching process, some don’t require. For 1 1 unidirectional switching, the signal
selection is based on the local conditions and requests. Therefore each end operates
independently of the other end, and bytes K1 and K2 are not needed to coordinate switch
action.
When the network has no failure, N working channels can transmit the normal traffic while
the protection channel transmits extra (unimportant) traffic or it transmits no traffic.
Suppose the fiber from NE A to NE B of the working channel 1 is broken. NE B detects
R_LOS alarm and sends a request to NE A to switch the services on the failed channel to
the protection channel.
Upon receiving the request, NE A bridges the service on the failed channel to the
protection channel.
NE B get the information from NE A and switch to select the service from the protection
channel.
NE A switches to select the service from the protection channel. This step completes the
switching of the service on the faulty channel to the protection channel for both directions.
When the working channel 1 repaired, the _RLOS alarm disappears. NE B sets the K1 byte
to “Wait-To-Restore (WTR)” state. If WTR state lasts for a special time (10 minutes by
default), it switches to select the signal from the working channel and sends “No Request”
signal to the NE A using K1 byte.
NE A releases the bridge and replies with the same indication on K1 byte. The selector at
the NE A is also released.
Receiving this K1 byte causes the NE B to release the bridge. This step completes the
protection recovery.
Answer
Linear 1+1 MS
Linear M:N (M=1)
The orderwires can be passed through used the backboard in the dual slots
When we are facing the sub-rack, the left hand side is the West line board, the right hand
side is the East line board
The W was used for the source node
The E was used for the sink node
On each fiber, half the channels are defined as working channels and half are defined as
protection channels. The normal traffic carried on working channels in one fiber are
protected by the protection channels in another fiber traveling in the opposite direction
around the ring. This permits the bidirectional transport of normal traffic. Only one set of
overhead channels is used on each fiber.
For example, a STM-16 system shall assign #1--- #8VC4 as the working channels, #9---#16
as the protection channels. One fiber of #9---#16 are to protect #1---#8 of another fiber.
For two-fiber bidirectional multiplex section protection rings, as their traffic have uniform
routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the
total capacity is closely related to the traffic distribution mode and quantity of nodes on
the ring.
When a node determines that a switch is required, it sources the appropriate bridge
request in the K-bytes in both directions, i.e. the short path and long path.
The destination node is the node that is adjacent to the source node across the failed span.
When a node that is not the destination nodes receives a higher priority bridge request, it
enters the appropriate pass-through state. In this way, the switching nodes can maintain
direct K-byte communication on the long path. Note that in the case of a bidirectional
failure such as a cable cut, the destination node would have detected the failure itself and
sourced a bridge request in the opposite direction around the ring.
When the destination node receives the bridge request, it performs the bridge and bridges
the channels that were entering the failed span onto the protection channels in the
opposite direction. In addition, for signal fail-ring switches, the node also performs the
switch to protection channels.
APS requests are also initiated based on multiplex section and equipment performance
criteria detected by the NE. All the working and protection channels are monitored
regardless of the failure or degradation conditions (i.e. after a switch has been completed,
all appropriate performance monitoring is continued). The NE initiates the following bridge
requests automatically: Signal Failure (SF), Signal Degrade (SD), Reverse Request (RR), and
Wait to Restore (WTR). The bridge requests are transmitted from NE to NE (not from NMS
to NE).
The APS controller is responsible for generating and terminating the APS information
carried in the K1K2 bytes and implementing the APS algorithm. With the switching state of
each NE, the APS controller status is also changed.
For two-fiber bidirectional multiplex section protection rings, as their traffic have uniform
routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the
total capacity is closely related to the traffic distribution mode and quantity of nodes on
the ring. The network capacity for two-fiber bidirectional multiplex section ring is
½*M*STM-N (M is the number of nodes on the ring, STM-N is the STM level). If we count
the protection channels as well, the maximum traffic load that a two-fiber bidirectional MS
shared protection ring can carry is M*STM-N. Nevertheless, half of the traffic would not be
protected in case of fiber failures.
Four-fiber MS shared protection rings require four fibers for each span of the ring.
Working and protection channels are carried over different fibers: two multiplex sections
transmitting in opposite directions carry the working channels while two multiplex sections,
also transmitting in opposite directions, carry the protection channels. This permits the
bidirectional transport of normal traffic. The multiplex section overhead is dedicated to
either working or protection channels since working and protection channels are not
transported over the same fibers.
In the normal situation, the services will be transmitted on the working fibers
When the fibers between two nodes broken, the switching will happen between these
two nodes
In the other sections, the services will be transmit on the original routes
When all the fibers between two NEs broken, the ring switch happens
All the services will go to the protection fibers
APS requests are also initiated based on multiplex section and equipment performance
criteria detected by the NE. All the working and protection channels are monitored
regardless of the failure or degradation conditions (i.e. after a switch has been completed,
all appropriate performance monitoring is continued). The NE initiates the following bridge
requests automatically: Signal Failure (SF), Signal Degrade (SD), Reverse Request (RR), and
Wait to Restore (WTR). The bridge requests are transmitted from NE to NE (not from NMS
to NE).
For four-fiber bidirectional multiplex section protection rings, as their traffic have uniform
routes and are sent bidirectional, time slots in the ring can be shared by all nodes, so the
total capacity is closely related to the traffic distribution mode and quantity of nodes on
the ring. The network capacity for four-fiber bidirectional multiplex section ring is M*STM-
N (M is the number of nodes on the ring; STM-N is the STM level). If we count the
protection channels as well, the maximum traffic load that a four-fiber bidirectional MS
shared protection ring can carry is 2*M*STM-N. Nevertheless, half of the traffic would not
be protected in case of fiber failures.
K1 bits 1-4 carry bridge request codes. K1 bits 5-8 carry the destination node ID for the
bridge request code indicated in K1 bits 1-4.
As network structures are becoming more and more complicated, the sub-network
connection protection (SNCP) is the only traffic protection mode that can be adapted to
various network topological structures with a fast switching time.
The protection mechanism of SNCP is similar to the PP ring. But for SNCP, the protection
function will be completed in the cross-connect unit not PDH unit.
As shown in the figure , SNCP uses the 1+1 protection mode. Traffics are simultaneously
sent on both the working and protection sub-network connection. When the working sub-
network connection fails, or when its performance deteriorates to a certain level, at the
receiving end of the sub-network connection, the signal from the protection sub-network
connection is selected according to the preference selection rule. Switching usually takes
the unidirectional switching mode, thus it needs no APS protocol.
The protection mechanism of SNCP ring is concurrent sending in the transmitting end and
selective receiving in the receiving end.
Here is a ring chain combination network with 5 nodes. The ring network is SNCP ring.
Suppose that there have E1 services from node A to the end node of the chain. The
services will concurrently sent to both working SNC and protection SNC. After passing
through subnetwork1 and subnetwork2 separately, they both reach node C. there is a
selector in node C, the SNC termination node. Normally, node C will receive the service
from the working SNC, then pass through to the line unit in the chain.
If the signal failure recovers in any way, node C would switch back to receive services from
working SNC after 10 minutes.
10 minutes is the default restoration time. It can be set from 5 to 12 minutes.
ii
Confidential Information of Huawei. No Spreading without Permission
Table of Contents
Course Instruction ........................................................................................................................ 1
About this course .........................................................................................................................1
Course objectives ........................................................................................................................1
Learning Notes.............................................................................................................................1
Relevant Materials .......................................................................................................................1
Chapter 1 EPL Service Configuration using Station by Station Method ......................................2
1.1 Laboratory Network Topology Introduction ............................................................................2
1.2 Service Requirement .............................................................................................................3
1.3 Parameters Description .........................................................................................................3
1.4 Configuration Procedure ........................................................................................................5
1.5 Test Service Configuration ................................................................................................. 19
Chapter 2 EVPL Service Configuration using Station by Station Method (PORT-Shared) .......20
2.1 Laboratory Network Topology Introduction ......................................................................... 20
2.2 Service Requirements ........................................................................................................ 21
2.3 Parameters Description ...................................................................................................... 21
2.4 Configuration Procedure ..................................................................................................... 25
2.5 Test Service Configuration ................................................................................................. 48
Chapter 3 EVPL Service Configuration using Station by Station Method (VCTRUNK Shared)50
3.1 Laboratory Network Topology Introduction ......................................................................... 50
3.2 Service Requirements ........................................................................................................ 51
3.3 Parameters Description ...................................................................................................... 51
3.4 Configuration Procedure ..................................................................................................... 54
3.5 Test Service Configuration ................................................................................................. 67
Chapter 4 EPLAN Service Configuration using Station by Station Method............................... 70
4.1 Laboratory Network Topology Introduction ......................................................................... 70
4.2 Service Requirement .......................................................................................................... 71
4.3 Parameters Description ...................................................................................................... 71
4.4 Configuration Procedure ..................................................................................................... 74
4.5Test Service Configuration .................................................................................................. 94
Chapter 5 EVPLAN Service Configuration using Station by Station Method ............................ 97
5.1 Laboratory Network Topology Introduction ......................................................................... 97
5.2 Service Requirement .......................................................................................................... 98
5.3 Parameters Description ...................................................................................................... 98
5.4 Configuration Procedure ................................................................................................... 103
5.5 Test Service Configuration ............................................................................................... 131
Chapter 6 EPL Configuration by Trail Method .........................................................................134
6.1 Laboratory Network Topology Introduction ....................................................................... 134
6.2 Service Requirement ........................................................................................................ 135
6.3 Parameters Description .................................................................................................... 135
6.4 Configuration Procedure ................................................................................................... 137
iii
6.5 Test Service Configuration ............................................................................................... 144
Chapter 7 EVPL Configuration by Trail Method (VCTRUNK Shared) .....................................145
7.1 Laboratory Network Topology Introduction ....................................................................... 145
7.2 Service Requirements ...................................................................................................... 146
7.3 Parameters Description .................................................................................................... 146
7.4 Configuration Procedure ................................................................................................... 149
7.5 Test Service Configuration ............................................................................................... 158
iv
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
Course Instruction
Course objectives
Upon completion of this course, you will be able to:
To get familiarize with the hardware device through the basic equipment
configuration operation;
To get familiarize with the theory of Ethernet Service through different
Ethernet service configuration;
To get familiarize with U2000 station by station configuration method for
EPL, EVPL, EPLAN and EVPLAN;
To get familiarize with U2000 trail configuration method for EPL and
EVPL.
Learning Notes
According to lab equipment availability, this lab experiment will be carried out
in group rotation. You should be well prepared before the lab experiment in
order to save time. There will be 5 sets of OptiX OSN 3500 and 1 set U2000
NMS computer. For the ID of each NE, please refer to the actual NE ID
allocation.
Before doing any service configuration for this practice guide, you should be
familiar with the basic operation of U2000 and PDH service configuration.
Relevant Materials
OptiX OSN 3500 product documentation
1
OHCNATS11 Ethernet Configuration Practice Guide
NE A #5
NE B #5
NE C #5
NE D #5
NE E #5
2
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
Parameter NE A NE C
Port Type PE PE
3
OHCNATS11 Ethernet Configuration Practice Guide
Parameter NE A NE C
Port Type PE PE
Board N2EFS4
4
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
5
OHCNATS11 Ethernet Configuration Practice Guide
6 The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 1 need to be enabled manually
by double-click on the “Enabled/Disabled” tab for Port 1 and select
“Enabled” as shown below.
After selecting, click the “Apply” button at the right bottom of the panel.
6
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
7
OHCNATS11 Ethernet Configuration Practice Guide
8
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
7 Finally the Ethernet Line service has been successfully created and
the Ethernet service will be displayed in the Ethernet Line panel.
9
OHCNATS11 Ethernet Configuration Practice Guide
3 There should not have any service created yet at the SDH Service
Configuration panel. Click on the “Create” button to create a new SDH
service.
10
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
4 At the Create SDH service panel, select the correct information from
the options. (In this case, VC4-4 is selected for N2EFS4 board because
only VC4-4 can support for VC-12 level virtual concatenation). After
obtaining display as shown below, (The “Source Slot” and the “Sink Slot”
position have to be the same as the actual board slot number), click
“OK”.
5 At this moment, the system will show a newly created SDH service on
the panel, the necessary configuration at NE A station is done, you can
now close the NE explorer of NE A.
11
OHCNATS11 Ethernet Configuration Practice Guide
Configuration at NE B
At station NE B, there is no add/drop of Ethernet service, therefore
station NE B only need to create a pass-through SDH service.
Configuration service steps is the same as previous, therefore only final
result of the configured service is shown at diagram below.
Configuration at NE C
Step 1 Configure Ethernet Port Parameters:
1 Login to U2000 Main Topology.
12
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
6 The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 1 need to be enabled manually
by double-click on the “Enabled/Disabled” tab for Port 1 and select
“Enabled” as shown below.
After selecting, click the “Apply” button at the right bottom of the panel.
remember to click on the “Apply” button at the bottom right of the panel
to activate the changes.
14
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
and the below diagram will be shown. Click on the “>>” button to bound
the timeslot needed to VCTRUNK1. At this time, we click 3 times on the
“>>” button, as we have assigned 3 timeslots at the beginning of the
configuration which is VC4-4:VC12:1~3; total of 3 VC12s. Make sure the
correct timeslot is bounded then click on the “OK” button at the bottom
right of the panel and return to the Create Ethernet Line configuration
panel .
15
OHCNATS11 Ethernet Configuration Practice Guide
7 Finally the Ethernet Line service has been successfully created and
the Ethernet service will be displayed in the Ethernet Line panel .
16
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
3 There should not have any service created yet at the SDH Service
Configuration panel. Click on the “Create” button to create a new SDH
service.
17
OHCNATS11 Ethernet Configuration Practice Guide
4 At the Create SDH service panel, select the correct information from
the options. (In this case, VC4-4 is selected for N2EFS4 board because
only VC4-4 can support for VC-12 level virtual concatenation). After
obtaining display as shown below, (The “Source Slot” and the “Sink Slot”
position have to be the same as the actual board slot number), click
“OK”.
5 At this moment, the system will show a newly created SDH service on
the panel, all the necessary configuration at NE C station is done, you
can now close the NE explorer of NE C.
18
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
19
OHCNATS11 Ethernet Configuration Practice Guide
NE A #5
NE B #5
NE C #5
NE D #5
NE E #5
20
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
21
OHCNATS11 Ethernet Configuration Practice Guide
Parameters NE A NE B
Default VLAN ID
Port Type PE PE
Parameters NE A NE B
Port Type PE PE
Board N2EFS4
22
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
Board N2EFS4
Parameters NE A NE D
Default VLAN ID
Port Type PE PE
23
OHCNATS11 Ethernet Configuration Practice Guide
Parameters NE A NE D
Port Type PE PE
Board N2EFS4
Board N2EFS4
24
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
25
OHCNATS11 Ethernet Configuration Practice Guide
6 The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 2 needs to be enabled
manually by double-click on the “Enabled/Disabled” tab for Port 2 and
select “Enabled” as shown below.
After selecting, click the “Apply” button at the right bottom of the panel.
26
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
27
OHCNATS11 Ethernet Configuration Practice Guide
28
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
7 Finally the Ethernet Line service has been successfully created and
the Ethernet service will be displayed in the Ethernet Line panel.
29
OHCNATS11 Ethernet Configuration Practice Guide
30
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
11 The Ethernet Line service has been successfully created and you
will see 3 EPL Ethernet service in the Ethernet Line panel.
31
OHCNATS11 Ethernet Configuration Practice Guide
32
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
4 At the Create SDH service panel, select the correct information from
the options for NE A. (In this case, VC4-4 is selected for N2EFS4 board
because only VC4-4 can support for VC-12 level virtual concatenation).
After obtaining display as shown below, (The “Source Slot” and the
“Sink Slot” position have to be the same as the actual board slot
number), click “OK”.
5 Then, configure SDH service for Ne D as shown below and click “OK”.
33
OHCNATS11 Ethernet Configuration Practice Guide
Configuration at NE B
Step 1 Configure Ethernet Port Parameters:
1 Login to U2000 Main Topology.
34
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
6 The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 1 need to be enabled manually
by double-click on the “Enabled/Disabled” tab for Port 1 and select
“Enabled” as shown below.
After selecting, click the “Apply” button at the right bottom of the panel.
35
OHCNATS11 Ethernet Configuration Practice Guide
36
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
37
OHCNATS11 Ethernet Configuration Practice Guide
38
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
39
OHCNATS11 Ethernet Configuration Practice Guide
4 At the Create SDH service panel, select the correct information from
the options for NE B. (In this case, VC4-4 is selected for N2EFS4 board
because only VC4-4 can support for VC-12 level virtual concatenation).
After obtaining display as shown below, (The “Source Slot” and the
“Sink Slot” position have to be the same as the actual board slot
number), click “OK”.
5 The SDH service has been successfully created and the SDH service
is shown as below in the panel.
40
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
Configuration at NE D
Step 1 Configure Ethernet Port Parameters:
1 Login to U2000 Main Topology.
41
OHCNATS11 Ethernet Configuration Practice Guide
6 The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 1 need to be enabled manually
by double-click on the “Enabled/Disabled” tab for Port 1 and select
“Enabled” as shown below.
After selecting, click the “Apply” button at the right bottom of the panel.
7 Next, click on the “TAG Attributes” tab. At the Entry Detection column,
change the Entry Detection of Port 1 to “Disabled”.
42
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
43
OHCNATS11 Ethernet Configuration Practice Guide
44
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
45
OHCNATS11 Ethernet Configuration Practice Guide
4 At the Create SDH service panel, select the correct information from
the options for NE D. (In this case, VC4-4 is selected for N2EFS4 board
because only VC4-4 can support for VC-12 level virtual concatenation).
After obtaining display as shown below, (The “Source Slot” and the
“Sink Slot” position have to be the same as the actual board slot
number), click “OK”.
46
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
5 The SDH service has been successfully created and the SDH service
is shown as below in the panel.
47
OHCNATS11 Ethernet Configuration Practice Guide
48
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
49
OHCNATS11 Ethernet Configuration Practice Guide
NE A #5
NE B #5
NE C #5
NE D #5
NE E #5
50
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
Parameters NE A NE B
Port Type PE PE
51
OHCNATS11 Ethernet Configuration Practice Guide
Parameters NE A NE B
Default VLAN ID
Port Type PE PE
Board N2EFS4
52
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
Parameters NE A NE B
Port Type PE PE
Parameters NE A NE B
Default VLAN ID
Port Type PE PE
Board N2EFS4
53
OHCNATS11 Ethernet Configuration Practice Guide
54
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
6 The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 1 and Port 2 needs to be
enabled manually by double-click on the “Enabled/Disabled” tab for Port
1 and 2 and select “Enabled” as shown below.
After selecting, click the “Apply” button at the right bottom of the panel.
7 Click on the “TAG Attributes” tab, change the TAG to “Access” for Port
1 and Port 2 follow by changing the “Default VLAN ID” to 100 for Port 1
and “VLAN ID” to 200 for Port 2. Click “Apply” button to activate
changes.
55
OHCNATS11 Ethernet Configuration Practice Guide
56
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
57
OHCNATS11 Ethernet Configuration Practice Guide
7 Now, configure EVPL service for company G. Click “New” button and
select “PORT2” as Source Port , “VCTRUNK1” as Sink Port and type in
200 for the Source VLAN and Sink VLAN as shown below.
8 Finally the Ethernet Line service has been successfully created and
the Ethernet service for both company H and G will be displayed in the
Ethernet Line panel.
58
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
59
OHCNATS11 Ethernet Configuration Practice Guide
4 At the Create SDH service panel, select the correct information from
the options for NE A as shown below. (In this case, VC4-4 is selected for
N2EFS4 board because only VC4-4 can support for VC-12 level virtual
concatenation). Click “OK” . (The “Source Slot” and the “Sink Slot”
position have to be the same as the actual board slot number).
60
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
Configuration at NE B
Step 1 Configure Ethernet Port Parameters:
1 Login to U2000 Main Topology.
61
OHCNATS11 Ethernet Configuration Practice Guide
6 The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 1 and Port 2 need to be
enabled manually by double-click on the “Enabled/Disabled” tab for Port
1 and Port 2 and select “Enabled” as shown below.
After selecting, click the “Apply” button at the right bottom of the panel.
62
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
7 Click on the “TAG Attributes” tab, change the TAG to “Access” for Port 1
and Port 2 follow by changing the “Default VLAN ID” to 100 for Port 1 and
“VLAN ID” to 200 for Port 2. Click “Apply” button to activate changes.
2 To create a new Ethernet Line service for company H, click “New” and
select PORT 1 as Source Port and VCTRUNK1 as Sink Port. Type “100”
as the Source and Sink VLAN ID.
63
OHCNATS11 Ethernet Configuration Practice Guide
64
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
6 Now create a new Ethernet Line service for company G. Click “New”
again at the Create Ethernet Line service panel. (As both company H
and G are sharing the same VCTRUNK1, therefore there is no need to
bound path for company G again).
7 Finally the Ethernet Line service has been successfully created and
the Ethernet service will be displayed in the Ethernet Line panel .
65
OHCNATS11 Ethernet Configuration Practice Guide
66
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
4 At the Create SDH service panel, select the correct information from
the options as according to the diagram below. (In this case, VC4-4 is
selected for N2EFS4 board because only VC4-4 can support for VC-12
level virtual concatenation). Click “OK” when done.
67
OHCNATS11 Ethernet Configuration Practice Guide
In order for us to test for the Ethernet service configuration for company H,
two PCs are needed. Each PC is connected to port 1 of NE A and NE B. In
the command prompt, use the “ping” command to test whether the services
are configured successfully.
PCs with IP addresses of 188.20.7.100 and 188.20.7.101 were used for the
“ping” test in this case. The results below show the EPL service is working
normally.
68
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
69
OHCNATS11 Ethernet Configuration Practice Guide
NE A #5
NE B #5
NE C #5
NE D #5
NE E #5
70
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
71
OHCNATS11 Ethernet Configuration Practice Guide
Port Type PE PE PE
Port Type PE PE PE PE
Board N2EFS4
VB Name VB1
72
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
VCTRUNK1 Hub
VCTRUNK2 Hub
Board N2EFS4
Direction Bidirectional
Source C-VLAN
(e.g. 1,3-6)
Board N2EFS4
Direction Bidirectional
Source C-VLAN
(e.g. 1,3-6)
73
OHCNATS11 Ethernet Configuration Practice Guide
74
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
6 The diagram below shows the 4 external port of the Ethernet board,
all the ports are disabled by default. Port 1 need to be enabled manually
by double-click on the “Enabled/Disabled” tab for Port 1 and select
“Enabled” as shown below.
After selecting, click the “Apply” button at the right bottom of the panel.
75
OHCNATS11 Ethernet Configuration Practice Guide
2 At the Ethernet LAN service panel, click “New”, (When the bridge
adopts the SVL learning mode, all the VLANs share the same MAC
address table. That is, the bridge learns and forwards the packets
according to the MAC address of the user packets only. The information
in the VLAN tags of the user packets, however, is not considered in the
learning and forwarding process.) Take note that the VB name must be
set, the VB name “AB_LAN” was set as shown below. Select the correct
parameters and click “Configure Mount”.
76
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
4 After mounting the VB, return to Create Ethernet LAN service and
click “Configuration” button to bound path into VCTRUNK1 and
VCTRUNK2. You can select between VCTRUNK1 and VCTRUNK2 at
the Configuration Ports section.
77
OHCNATS11 Ethernet Configuration Practice Guide
78
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
79
OHCNATS11 Ethernet Configuration Practice Guide
4 Next, create a SDH service to NE D.. Fill in the correct options and
click “OK” to confirm.
80
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
Configuration at NE B
Step 1 Configure Ethernet Port Parameters:
1 Login to U2000 Main Topology.
81
OHCNATS11 Ethernet Configuration Practice Guide
7 Next, at the “TAG Attributes” tab, change the Entry Detection for Port
1 to “Disabled”.
8 Finally, click on “Internal Port” and change the Entry Detection for
VCTRUNK1 to “Disabled”.
82
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
83
OHCNATS11 Ethernet Configuration Practice Guide
84
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
85
OHCNATS11 Ethernet Configuration Practice Guide
86
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
5 The SDH service has been successfully created and the SDH service
is shown as below in the panel.
Configuration at NE D
Step 1 Configure Ethernet Port Parameters:
1 Login to U2000 Main Topology.
87
OHCNATS11 Ethernet Configuration Practice Guide
88
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
7 Next, at the “TAG Attributes” tab, change the Port 1 Entry Detection to
“Disabled”.
89
OHCNATS11 Ethernet Configuration Practice Guide
90
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
91
OHCNATS11 Ethernet Configuration Practice Guide
4 At the Create SDH service panel, select the correct parameters from
the options for NE D. (In this case, VC4-4 is selected for N2EFS4 board
because only VC4-4 can support for VC-12 level virtual concatenation).
After obtaining display as shown below, (The “source board” and the
“sink board” position have to be the same as the actual board slot
number), click “OK”.
92
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
6、 The SDH service has been successfully created and the SDH
service is shown as below in the panel.
93
OHCNATS11 Ethernet Configuration Practice Guide
94
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
95
OHCNATS11 Ethernet Configuration Practice Guide
96
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
NE A #5
NE B #5
NE C #5
NE D #5
NE E #5
97
OHCNATS11 Ethernet Configuration Practice Guide
5.2Service Requirement
Headquarters of company H, H1 is located at NE A while branches of
company H, H2 and H3 are located at NE B and NE D respectively. This is
the same for company G, headquarters G1 is located at NE A and its
branches G2 and G3 are located at NE B and NE D respectively. The
headquarters need to have Ethernet service communication with their
respective branches; furthermore the branches need to have Ethernet
service communication between branches within the same company. Each
of the company needed a bandwidth of 6Mbits/s.
5.3Parameters Description
The Ethernet services of the convergence node are received from an
external port and tagged with the corresponding VLAN IDs. After the
services are forwarded to an internal port through Layer 2 switching, the
VLAN IDs are stripped and then the services are transparently transmitted in
the SDH network. In this way, the node communicates with a remote node.
The Ethernet LAN services of company G:
− The Ethernet LAN services of company G occupy the first to third
VC-12 timeslots of the first VC-4 (VC4-1:VC12:1-3) on the SDH link
from NE A to NE B and first to third VC-12 timeslots of the first VC-4
(VC4-1:VC12:1-3) on the SDH link from NE A to NE D.
− The Ethernet LAN service between NE A and NE B is added and
dropped by using the first to third VC-12 timeslots of the first VC-4
(VC4-1:VC12:1-3) on the N1EFS4 board of NE A and the first to third
VC-12 timeslots of the fourth VC-4 (VC4-4:VC12:1-3) on the
N1EFS4 board of NEB.
98
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
Port Type PE PE PE PE
99
OHCNATS11 Ethernet Configuration Practice Guide
Port Type PE PE PE PE
Port Type PE PE PE PE
Board N2EFS4
VB Name VB1
100
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
PORT2 Hub
VCTRUNK1 Hub
VCTRUNK2 Hub
VCTRUNK3 Hub
VCTRUNK4 Hub
Board N2EFS4
Direction Bidirectional
Source C-VLAN
(e.g. 1,3-6)
Sink Port VCRTUNK1
101
OHCNATS11 Ethernet Configuration Practice Guide
Board N2EFS4
Direction Bidirectional
Source C-VLAN
(e.g. 1,3-6)
Sink Port VCRTUNK2
Board N2EFS4
Direction Bidirectional
Source C-VLAN
(e.g. 1,3-6)
Sink Port VCRTUNK1
Board N2EFS4
Direction Bidirectional
Source C-VLAN
(e.g. 1,3-6)
Sink Port VCRTUNK2
102
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
103
OHCNATS11 Ethernet Configuration Practice Guide
7 Click on the “TAG Attributes” tab, change the TAG to “Access” for Port
1 follow by changing the “Default VLAN ID” to 100 and change the TAG
to “Access” for Port 2 follow by changing the “Default VLAN ID” to 200.
Click “Apply” button to activate changes.
104
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
8 Select “Internal Port”, at the TAG Attributes tab, change the TAG to
“Access” for VCTRUNK 1, 2, 3 and 4 follow by assigning VLAN ID of 100,
100, 200 and 200 by sequence. Click “OK”.
105
OHCNATS11 Ethernet Configuration Practice Guide
2、 At the Ethernet LAN service panel, click “New”, (When the bridge
adopts the SVL learning mode, all the VLANs share the same MAC
address table. That is, the bridge learns and forwards the packets
according to the MAC address of the user packets only. The information
in the VLAN tags of the user packets, however, is not considered in the
learning and forwarding process.) Take note that the VB name must be
set, the VB name “AB_LAN” was set as shown below. Select the correct
parameters and click “Configure Mount”.
106
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
107
OHCNATS11 Ethernet Configuration Practice Guide
7 The configured service will be shown on the panel together with the
detail of the service as shown below.
108
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
109
OHCNATS11 Ethernet Configuration Practice Guide
110
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
111
OHCNATS11 Ethernet Configuration Practice Guide
112
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
Configuration at NE B
Step 1 Configure Ethernet Port Parameters:
1 Login to U2000 Main Topology.
113
OHCNATS11 Ethernet Configuration Practice Guide
8 Select “Internal Port”. On the TAG Attributes tab, change the Entry
Detection of VCTRUNK1 and 2 to Disabled.
114
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
115
OHCNATS11 Ethernet Configuration Practice Guide
116
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
117
OHCNATS11 Ethernet Configuration Practice Guide
118
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
119
OHCNATS11 Ethernet Configuration Practice Guide
120
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
121
OHCNATS11 Ethernet Configuration Practice Guide
Configuration at NE D
Step 1 Configure Ethernet Port Parameters:
1 Login to U2000 Main Topology.
122
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
8 Select “Internal Port”. On the TAG Attributes tab, change the Entry
Detection of VCTRUNK1 and 2 to Disabled.
123
OHCNATS11 Ethernet Configuration Practice Guide
124
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
125
OHCNATS11 Ethernet Configuration Practice Guide
126
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
127
OHCNATS11 Ethernet Configuration Practice Guide
128
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
129
OHCNATS11 Ethernet Configuration Practice Guide
130
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
131
OHCNATS11 Ethernet Configuration Practice Guide
132
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
133
OHCNATS11 Ethernet Configuration Practice Guide
NE A #5
NE B #5
NE C #5
NE D #5
NE E #5
134
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
6.2Service Requirement
Service requirement description:Company H has two branches located at
NE A and NE C needed an Ethernet service communication with 6Mbits/s
bandwidth.
6.3Parameters Description
EPL service of company H:
− SDH service link time slot number 1 to 3 of VC-12 in VC-4 #1
VC4-1:VC12:1-3 ,is used for NE A and NE C, while service in NE B
is configures as pass-through.
− Time slot 1 to 3 of VC-12 in VC-4 #4 of N2EFS4 board in slot number
4 VC4-4:VC12:1-3 of NE A and NE C is used.
Parameter NE A NE C
Port Type PE PE
135
OHCNATS11 Ethernet Configuration Practice Guide
Parameter NE A NE C
Port Type PE PE
Board N2EFS4
136
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
6.4Configuration Procedure
Configure SDH Trail
1 Login to U2000 Main Topology.
3 At the Create SDH Trail panel, select Level as “VC4 Server Trail”.
137
OHCNATS11 Ethernet Configuration Practice Guide
4 Double click on the Source and Sink NE. The detailed information will be
shown as below. Click “OK” when finish.
5 System prompt will show that the configuration is successful. Confirm and
close the system prompt dialog box.
138
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
8 Now, create service trail between NE D and NE A, click “OK” when finish.
9 After configuring all the VC4 service, click “Cancel” to quit the Create
SDH Service Trail.
139
OHCNATS11 Ethernet Configuration Practice Guide
2 At the Create EPL panel, select “Port” as Port Usage Strategy and double
click on NE A.
140
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
3 At the NE A board slot panel, select the slot 5-N2EFS4 board, and then
select Port 1. Click “OK” to return to the Create Ethernet Service panel and
double click on NE B to select as Sink NE.
141
OHCNATS11 Ethernet Configuration Practice Guide
6 Select “3” for bandwidth and “VC-12 for X”. Click “Next” when done.
142
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
7 At the Port Attribute Setting, change TAG of Port 1 and Port 2 to “Access”
and change the Default VLAN to “100”.
8 System prompt will show that the configuration is successful. Confirm and
close the system prompt dialog box.
143
OHCNATS11 Ethernet Configuration Practice Guide
144
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
NE A #5
NE B #5
NE C #5
NE D #5
NE E #5
145
OHCNATS11 Ethernet Configuration Practice Guide
Parameters NE A NE B
Port Type PE PE
146
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
Parameters NE A NE B
Default VLAN
ID
Port Type PE PE
Board N2EFS4
147
OHCNATS11 Ethernet Configuration Practice Guide
Parameters NE A NE B
Port Type PE PE
Parameters NE A NE B
Default VLAN ID
Port Type PE PE
Board N2EFS4
148
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
3 Enter Create SDH Trail panel, select the level as “VC4 Server Trail”.
149
OHCNATS11 Ethernet Configuration Practice Guide
5 System prompt will show that the configuration is successful. Confirm and
close the system prompt dialog box.
150
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
6 Next, create service trail between NE B and NE C, click “OK” when finish.
7 Now, create service trail between NE C and NE D, click “OK” when done.
151
OHCNATS11 Ethernet Configuration Practice Guide
9 After all the VC4 server trail were successfully configured, click “”Cancel”
to exit SDH service trail panel.
152
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
3 At the NE A NE panel, select the N2EFS4 board and select Port 1. Click
“OK” when done. Now, double click on NE B to select the Sink Port.
153
OHCNATS11 Ethernet Configuration Practice Guide
5 At the Trunk Link Strategy option, select “Create Trunk Link Automatically”
select “3” for bandwidth and “VC-12”. At the VLAN ID tab, enter “100” as the
VLAN ID. Click “Next” when done.
154
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
6 AT the Port Attributes Setting, change Port 1 and Port2 TAG to “TAG
Aware”. Click “Finish”.
7 System prompt will show that the configuration is successful. Confirm and
close the system prompt dialog box.
155
OHCNATS11 Ethernet Configuration Practice Guide
10 At the board slot panel of NE B, select N1EFS4 board at slot 5 and select
Port 2, click “OK” when done.
156
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
11 At the Trunk Link Strategy option, select “Use existing Trunk Link” select
“3” for bandwidth and “VC-12”. At the VLAN ID tab, enter “200” as the VLAN
ID. Click “Next” when done.
12 At the Port Attributes Setting, change Port 1 and Port2 TAG to “TAG
Aware”. Click “Finish”.
157
OHCNATS11 Ethernet Configuration Practice Guide
158
Confidential Information of Huawei. No Spreading without Permission
OHCNATS11 Ethernet Configuration Practice Guide
PCs with IP addresses of 129.9.0.149 and 129.9.0.147 were used for the
“ping” test in this case. Assign a VLAN ID of “200” to the Port. The results
below show the EPL service is working normally.
159
The privilege of HCNA/HCNP/HCIE:
With any Huawei Career Certification, you have the privilege on http://learning.huawei.com/en to enjoy:
1、Comprehensive E-Learning Courses
Content:All Huawei Career Certification E-Learning courses
Methods to get the E-learning privilege : submit Huawei Account and email being used for Huawei Account
registration to [email protected] .
2、 Training Material Download
Content: Huawei product training material and Huawei career certification training material
Method:Logon http://learning.huawei.com/en and enter HuaWei Training/Classroom Training ,then you can
download training material in the specific training introduction page.
3、 Priority to participate in Huawei Online Open Class(LVC)
Content:The Huawei career certification training covering all ICT technical domains like R&S, UC&C, Security,
Storage and so on, which are conducted by Huawei professional instructors
Method:The plan and participate method please refer to LVC Open Courses Schedule
4、Learning Tool: eNSP
eNSP (Enterprise Network Simulation Platform) is a graphical network simulation tool which is developed by
Huawei and free of charge. eNSP mainly simulates enterprise routers, switches as close to the real hardware as
it possible, which makes the lab practice available and easy without any real device.
In addition, Huawei has built up Huawei Technical Forum which allows candidates to discuss technical issues with
Huawei experts , share exam experiences with others or be acquainted with Huawei Products(
http://support.huawei.com/ecommunity/)