Beruflich Dokumente
Kultur Dokumente
Contents
4 Configuring Tunnels and Tunnel Protection
4.1 Configuring an MPLS Tunnel
4.1.1 MPLS Tunnel Overview
4.1.1.1 MPLS and MPLS Tunnel
4.1.1.2 Application of the MPLS Tunnel
4.1.2 MPLS Tunnel Functions Supported by Chassis-shaped PTN Devices
4.1.3 MPLS Tunnel Functions Supported by Chase-shaped PTN Devices
4.1.4 Creating MPLS Tunnels in End-to-End Mode
4.1.4.1 Creating MPLS Tunnels One by One
4.1.4.2 Creating Tunnels in Batches
4.1.4.3 Parameter Description
4.1.5 Creating an MPLS Tunnel on a Per-NE Basis
4.1.5.1 Parameter Description
4.1.6 Managing and Maintaining MPLS Tunnels
4.1.6.1 Modifying the Interface of the Static Unicast MPLS Tunnel
4.1.6.2 Deleting an MPLS Tunnel on a Per-NE Basis
4.1.6.3 Testing Tunnel Connectivity on a Per-NE Basis
4.1.6.4 Checking the Correctness of the Tunnel Configuration in End-to-End Mode
4.2 Configuring an IP Tunnel
4.2.1 IP Tunnel Overview
4.2.2 IP Tunnel Functions Supported by Chassis-shaped PTN Devices
4.2.3 IP Tunnel Functions Supported by Case-shaped PTN Devices
4.2.4 Creating an IP Tunnel in End-to-End Mode
4.2.5 Creating IP Tunnels on a per-NE basis
4.3 Configuring a GRE Tunnel
4.3.1 GRE Tunnel Overview
4.3.2 GRE Tunnel Functions Supported by Chassis-shaped PTN Devices
4.3.3 GRE Tunnel Functions Supported by Case-shaped PTN Devices
4.3.4 Creating GRE Tunnels
4.3.5 Parameter Description
4.4 Unified E2E Tunnel Management and Maintenance
4.4.1 Modifying a Tunnel
4.4.2 Deleting a Tunnel
4.4.3 Deleting a tunnel from the network Side
4.4.4 Undeploying a tunnel
4.4.5 Viewing a Discrete Tunnel
4.4.6 Delete a Discrete Tunnel
4.4.7 Duplicating a Tunnel
4.4.8 Reoptimizing an RSVP TE Tunnel
4.4.9 Adjusting the Route for a Tunnel
4.4.10 Perform Tunnel Protection Group Switching
4.4.11 Querying Tunnels Carried by a Fiber
4.4.12 Viewing the VPN Service Carried on a Tunnel
4.4.13 Viewing the Topology of a Tunnel
4.4.14 Viewing the LSP Topology of a Tunnel
4.4.15 Monitoring the Running Status of a Tunnel
4.4.16 Monitoring the Alarms of a Tunnel
4.4.17 Viewing Tunnel Alarms
4.4.18 Monitoring the Performance of a Tunnel
4.4.19 Diagnosing a Tunnel
4.4.20 Diagnosing Tunnel Services Rapidly
4.5 Configuring a QinQ Link
4.5.1 Introduction to QinQ Links
4.5.2 QinQ Link Functions Supported by Chassis-shaped PTN Devices
4.5.3 QinQ Link Functions Supported by Case-shaped PTN Devices
4.5.4 Configuring a QinQ Link Interface
4.5.5 Creating a QinQ Link
4.5.6 Parameter Description
4.6 Configuring the MPLS Tunnel APS Protection
4.6.1 MPLS Tunnel APS Functions Supported by Chassis-shaped PTN Devices
4.6.2 MPLS Tunnel APS Functions Supported by Case-shaped PTN Devices
4.6.3 Configuration Flow for the Tunnel APS Protection
4.6.4 Creating an MPLS Tunnel APS Protection Group
4.6.4.1 Creating an MPLS Tunnel APS Protection Group on a Per-NE Basis
4.6.4.2 Creating an MPLS Tunnel APS Protection Group in End-to-End Mode
4.6.4.3 Configuring an APS Receiving Mode
4.6.5 Managing and Maintaining the MPLS Tunnel APS Protection Groups
4.6.5.1 Deleting a Tunnel APS Protection Group
4.6.5.2 Testing MPLS Tunnel APS Protection
4.6.6 Parameter Description
4.7 Configuring Offload Protection
4.7.1 Offload Protection Functions Supported by Chassis-shaped PTN Devices
4.7.2 Offload Protection Functions Supported by Case-shaped PTN Devices
4.7.3 Creating an Offload Protection Group
4.7.4 Parameter Description
4.8 MPLS-TP Ring Protection Configuration
4.8.1 MPLS-TP Ring Network Protection Functions Supported by Chassis-shaped PTN Devices
4.8.2 MPLS-TP Ring Network Protection Functions Supported by Case-shaped PTN Devices
4.8.3 MPLS-TP Ring Protection Configuration Process
4.8.4 Creating MPLS-TP Ring Protection
4.8.4.1 Creating an MPLS-TP Ring
4.8.4.2 Configuring Intersecting Nodes for MPLS-TP Ring Protection
4.8.4.3 Configuring an MPLS-TP Ring Binding
4.8.5 Managing and Maintaining MPLS-TP Ring Protection
4.8.5.1 Checking the Correctness of MPLS-TP Protection Ring
4.8.5.2 Test on Ring Protection Switching
4.8.5.3 Creating a Ring VPLS Service on an MPLS-TP Protection Ring
4.8.6 Parameter Description
4.9 Configuring PW APS
4.9.1 PW APS Functions Supported by Chassis-shaped PTN Devices
4.9.2 PW APS Functions Supported by Case-shaped PTN Devices
4.9.3 PW APS Configuration Flow
4.9.4 Creating a PW APS Protection Group
4.9.5 Starting the PW APS protocol
4.9.6 Binding PW APS Pairs
4.9.7 Testing PW APS
4.9.8 Parameter Description
4.10 Configuring PW FPS
4.10.1 PW FPS Functions Supported by Chassis-shaped PTN Devices
4.10.2 PW FPS Functions Supported by Case-shaped PTN Devices
4.10.3 Configuring a PW FPS 1:1
4.10.4 Configuring a PW FPS 1+1
1 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
The MPLS tunnel only provides an end-to-end channel, and does not care which service is encapsulated in the PW it carries. Data packets are first encapsulated in the PW, which is stuck with an MPLS label and sent to the MPLS tunnel for transmission.
At the sink end, data packets are recovered and retain the original service features. In the tunnel, the intermediate nodes are called Transit nodes. Hence, a tunnel contains the Ingress node, Egress node and Transit nodes.
An edge node in one network accesses the services from Node B, and transports the services to the RNC connected to another PE. For such transport, one point-to-point MPLS tunnel can be used.
On the U2000, two schemes can be used to create such a unicast tunnel.
Configuration on a per-NE basis: Configure the ingress port and the IP address of the next hop at each NE involved in the MPLS tunnel. In this way, one unicast MPLS tunnel is created.
Configuration by end-to-end function: This configuration is classified into static configuration and dynamic configuration.
Static configuration: Specify the source and sink NEs for the MPLS tunnel, and each NE involved in the tunnel. In this way, one unicast MPLS tunnel is created.
Dynamic configuration: Only specify the source and sink NEs of the MPLS tunnel. The equipment then creates a unicast MPLS tunnel through signaling.
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-1 MPLS tunnel specifications
2 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-2 MPLS tunnel specifications (on the PTN 910, PTN 910-F, PTN 950, and PTN 960)
Function Description PTN 910 PTN 910-F PTN 950 PTN 960
Table 4-3 MPLS tunnel specifications (on the PTN 905A, PTN 905B,PTN 906A and PTN 906B)
Function Description PTN 905A PTN 905B PTN 906A PTN 906B
Prerequisites
Context
During the creation of a tunnel configured with an APS group, the values of routes for the working tunnel cannot be all the same as those for the protection tunnel. Otherwise, the protection does not take effect.
Procedure
1. Choose Service > Tunnel > Create Tunnel from the Main Menu.
NOTE:
When you create a reverse tunnel, the U2000 automatically sets Tunnel Name to Forward Tunnel Name+_RVS.
If Signaling Type is set to Static CR, Direction is set to Unidirectional, and Create Reverse Tunnel is selected, the U2000 will create two unidirectional tunnels in two opposite directions. If Service Direction is set to Bidirectional, the U2000 will create a bidirectional tunnel.
If Signaling Type is set to Static CR and Protection Type is set to 1+1 or 1:1, a tunnel and a tunnel protection group will be created at the same time.
The Template parameter can be set only when Signaling Type is set to RSVP TE. You can use a template to configure tunnel details.
If you select the Configure As Bypass Tunnel check box when creating an RSVP TE tunnel , a bypass protection tunnel will be created.
a. Select the source and sink NEs or transit NEs. In the NE Role column, specify their locations on a tunnel.
NOTE:
If you create an IP tunnel or RSVP TE, , specify the source and sink NEs for the tunnel. If you create a static CR tunnel, specify the source and sink NEs or transit NEs for the tunnel.
Click Add and choose Virtual Node to specify the virtual nodes that the tunnel traverses. A virtual node refers to an NE not managed by the U2000. Virtual nodes are used to create a tunnel with an unterminated sink.
i. Optional: Select Auto-Calculate route. Then the U2000 automatically calculates the route for the tunnel after 2 and 3 are performed.
ii. Set Restriction Bandwidth.
iii. Specify route constraint nodes, that is, explicit and excluded nodes, by clicking Route Restriction or right-clicking the desired NEs in the topology view.
iv. Optional: If Auto-Calculate route is not selected, click Calculate Route to manually start route calculation on the U2000.
v. Optional: PTN 3900/3900-8/1900/910/910-F/950/960: Select Configure MPLS-TP OAM. In the dialog box, set MPLS-TP OAM parameters for the service.
NOTE:
A Layer 2 link must be configured before route calculation.
NEs or ports can be configured as route constraint nodes as needed. In the Layer 2 link topology view, selecting an NE or a port closest to the inbound node as a route constraint node is recommended.
If an NE is selected as a route constraint node, select the NE closest to the inbound node. Otherwise, route calculation fails.
By default, the shortest route is selected from the routes that are calculated based on Restriction Bandwidth and route constraints.
Tunnel loopbacks do not support automatic route calculation.
The service to be configured with MPLS-TP OAM must meet the following requirements:
Signaling is set to Static CR.
c. Optional: Use any of the following methods to configure route constraints for RSVP TE tunnels:
Method 1(PTN 3900/3900-8/1900/910/910-F/950/960): In the Main Topology, right-click an NE and choose Set Positive Primary Path Explicit Route > NE or Set Positive Primary Path Explicit Route > Interface from the
shortcut menu.
Method 2:
3 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Click Add on the right of Route Constraint, and set Interface IP Address and Restriction Type.
NOTE:
PTN NEs support route constraints only for primary paths.
4. PTN 3900/3900-8/1900/910/910-F/950: If you create an IP tunnel, configure tunnel information in the left-hand pane. If you create an MPLS tunnel, click Details to configure tunnel information.
NOTE:
Using a template to configure an RSVP TE tunnel is recommended.
For a static CR tunnel, Next Hop is the IP address of the inbound port of the next node on the tunnel.
For a static CR tunnel, double-click Out Interface or In Interface. In the dialog box, select an interface and click Configure to configure interface attributes or click Add VLN to create an Ethernet virtual interface.
For the TND1CXP board on a PTN 950, when rings, tunnels (excluding tunnels in ring networks) and QinQ bandwidth are configured, ensure that the total bandwidth of all CIRs does not exceed the port bandwidth minus 128 kbit/s and the bandwidth has been reserved for OAM
packets.
For the TNC1CXPA/B/G/H/I board on a PTN 910, when rings, tunnels (excluding tunnels in ring networks) and QinQ bandwidth are configured, ensure that the total bandwidth of all CIRs does not exceed the port bandwidth minus 128 kbit/s and the bandwidth has been reserved
for OAM packets.
For the TND3CXPA/B board on a PTN 960, when rings, tunnels (excluding tunnels in ring networks) and QinQ bandwidth are configured, ensure that the total bandwidth of all CIRs does not exceed the port bandwidth minus 128 kbit/s and the bandwidth has been reserved for
OAM packets.
If the Deploy check box is not selected, the configuration data is stored only on the U2000. If the Deploy check box is selected, the configuration data is stored on the U2000 and applied to NEs. By default, the Deploy check box is selected.
If the Deploy and Enable check boxes are selected, tunnels on NEs are available only when the tunnels are enabled.
If the Deploy check box is not selected during tunnel creation, right-click the tunnel on the Manage Tunnel tab page and choose Deploy from the shortcut menu after the tunnel has been created.
5. Optional: If Protection Type of a static CR tunnel is set to 1+1 or 1:1, click Configure Protection Group. In the dialog box, set protection group parameters. Click Details and Configure OAM. In the dialog box, set tunnel OAM parameters.
6. Click OK.
NOTE:
If Source Node, Sink Node, and Tunnel Interface for the working and protection tunnels are set to the same value, The same route is used for the working tunnel and protection tunnel in the protection group. is displayed after you click OK.
Click Yes. The U2000 then configures working and protection tunnels whose routes are the same.
Click No. The U2000 does not perform any operations.
Prerequisites
Procedure
1. Choose Service > Tunnel > Batch Create Tunnel from the Main Menu.
NOTE:
Currently, the U2000 supports the following networking modes:
1. Full-Mesh: All NEs are bidirectionally and fully connected.
2. Hub-Spoke: All spoke nodes are bidirectionally connected to any of the hub nodes, the hub nodes are bidirectionally and fully connected, and the spoke nodes are not connected with each other.
3. Ring: Bidirectional connections are generated based on rings.
Template can be set only when Signaling Type is set to RSVP TE.
a. Select NEs.
4. Click Auto-Assign. The U2000 then automatically assigns IDs to the tunnels created in batches.
NOTE:
Tunnel IDs can also be manually specified.
NOTE:
If an RSVP-TE tunnel needs to be created, set General, TE Information, Trail Information, Protection Attribute, QoS Information, and Advanced.
NOTE:
If the Deploy check box is selected, the configuration data is stored on the U2000 and applied to NEs. By default, the Deploy check box is selected.
If the Deploy and Enable check boxes are selected, tunnels on NEs are available only when the tunnels are enabled.
4 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
NOTE:
OptiX PTN 960 equipment do not support RSVP TE Tunnel, LDP Tunnel and Static Tunnel
NOTE:
OptiX PTN equipment support Static CR, and RSVP TE.
NOTE:
Only the dynamic tunnel can be configured as the bypass tunnel.
NE Name Definition: -
Indicates the name of the NE.
LSR ID Definition: -
Indicate the ID of an LSR.
NOTE:
The PTN equipment does not support the setting of this parameter.
NOTE:
The PTN equipment does not support the setting of this parameter.
Node Definition: -
Indicates the node where a tunnel is created.
5 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
NOTE:
An ingress node does not support setting the ingress interface.
Out Interface Definition: Specify the egress interface for a transit node or an ingress node.
Indicates the egress interface.
NOTE:
The PTN equipment does not support the setting of this parameter.
6 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
next hop. By specifying a strict explicit route, you can control exactly the route
of an LSP.
Loosely include: Specifies an explicit node that the trail must traverse, but other
routers are allowed between the specified node and the previous hop.
Exclude: The LSP cannot contain the preceding IP address.
NOTE:
The PTN equipment does not support the setting of this parameter.
NOTE:
The PTN equipment do not support the setting of this parameter.
NOTE:
The PTN equipment does not support the setting of this parameter.
NOTE:
The PTN equipment does not support the setting of this parameter.
Auto BW Adjust Type Definition: Select a value from the drop-down list.
This function cannot be enabled when the route lockout and route reoptimization functions
are enabled.
Table 4-9 Parameters relevant to the configuration of an IP-based tunnel (PTN 3900/3900-8/1900/910/910-F/950)
7 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Prerequisites
Procedure
1. Select the source NE of the tunnel in the NE Explorer. Choose Configuration > MPLS Management > Unicast Tunnel Management from the Function Tree.
2. Optional: Create a unidirectional tunnel.
a. Click New > Unidirectional Tunnel. The New Unicast Tunnel dialog box is displayed.
b. Select Create Reverse Tunnel to set parameters for the forward and reverse tunnels. When creating an MPLS tunnel on a per-NE basis, see Table 4-10 for details on the related parameters.
NOTE:
When Node Type is set to Egress, Bandwidth (kbit/s) must be consistent with the tunnel bandwidth in the Ingress direction and cannot be set.
For Next Hop Address, select the IP address of the interface of the next node.
When the value of MTU is 0, there is no restriction. If the MTU value needs to be restricted, the value should not be greater than the MTU value of the physical port where the tunnel resides.
For the TND1CXP board on a PTN 950, when rings, tunnels (excluding tunnels in ring networks) and QinQ bandwidth are configured, ensure that the total bandwidth of all CIRs does not exceed the port bandwidth minus 128 kbit/s and the bandwidth has been reserved
for OAM packets.
For the TNC1CXPA/B/G/H/I board on a PTN 910, when rings, tunnels (excluding tunnels in ring networks) and QinQ bandwidth are configured, ensure that the total bandwidth of all CIRs does not exceed the port bandwidth minus 128 kbit/s and the bandwidth has
been reserved for OAM packets.
For the TND3CXPA/B board on a PTN 960, when rings, tunnels (excluding tunnels in ring networks) and QinQ bandwidth are configured, ensure that the total bandwidth of all CIRs does not exceed the port bandwidth minus 128 kbit/s and the bandwidth has been
reserved for OAM packets.
a. Click New > Bidirectional Tunnel. The New Bidirectional Tunnel dialog box is displayed.
b. Set parameters for the bidirectional tunnel.
Tunnel Key Tunnel ID(Source Node:LSR ID,Sink Node:LSR ID) Indicates the tunnel.
Name Example: name1 Indicates and specifies the name of the static tunnel.
Maximum length: 64 bytes
8 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Enable State Enabled, Disabled Indicates and specifies the state of the static tunnel.
Disabled: A tunnel is unreachable on the management plane, whereas tunnel NOTICE:
OAM is reachable. Although APS is configured for the tunnel, APS switching is Disabling the tunnel is risky, which may interrupt all services transmitted along the tunnel.
not performed, causing services transmitted along the tunnel to be interrupted. Evaluation the impact on the live network before your operation.
Enabled: A tunnel is reachable on the management plane and properly
transmitting services.
Node Type Ingress, Egress, Transit Indicates the node type. If the tunnel where the node resides is bound to the MPLS-TP
shared protection ring, the attributes configured for the ring vary with the Node Type.
Ingress: ingress node
Egress: egress node
Transit: pass-through node
Inbound Bearer Type MPLS-TP Shared Protection Ring, Port Specifies whether the tunnel is carried on an MPLS-TP shared protection ring or a port.
You can configure the attributes for the MPLS-TP shared protection ring or port according
to the value of Inbound Bearer Type.
NOTE:
If one end of a tunnel fails to be bound to the ring, the U2000 will try to roll back the
tunnel. For the tunnel that fails to be rolled back, you need to modify the inbound bearer
type to port for binding nodes.
When binding the tunnel to a port, update the remaining ring bandwidth of all nodes on
the tunnel.
Outbound Ring Example: 665 Indicates the outbound ring ID. When Node Type is Egress or Transit, you can configure
the shared protection ring ID after a service is bridged from one ring to another.
Outbound Ring Direction Westbound, Eastbound Eastbound: A service goes clockwise after being bridged from one ring to
another.
Westbound: A service goes counterclockwise after being bridged from one ring
to another.
CIR (kbit/s) For PTN 1900/3900/3900-8/910/950: No Limit, 1 to 2147483647 Commit the information rate for the service to pass
CBS (bytes) No Limit, 64 to 131072 Set the committed burst size for the traffic to pass in a short time.
PIR (kbit/s) For PTN 1900/3900/3900-8/910/950: No Limit, 64 to 2147483647 Set the maximum rate for the service to pass.
PBS (bytes) No Limit, 64 to 16777216 Set the maximum burst size for the traffic to pass in a short time.
In Board/Logic Interface Type Slot-Board Name Indicates and specifies the ingress card or logical port type.
In Port Port (Port No.) Indicates and specifies the ingress port of the static tunnel.
The egress node and transmit node support the setting of the ingress port, but the ingress
node does not.
Forward In Label 16 to 1048575 Indicates and specifies the ingress label of the tunnel.
The egress node and transmit node support the setting of the forward ingress label, but the
ingress node does not.
Reverse Out Label 16 to 1048575 Indicates and specifies the egress label of the tunnel.
0 The egress node and transmit node support the setting of the reverse egress label, but the
ingress node does not.
Inbound Ring Node ID Example: 8 Indicates the ID of the ring node where the service enters the shared protection ring.
Outbound Bearer Type MPLS-TP Shared Protection Ring, Port Specifies whether the tunnel is carried on an MPLS-TP shared protection ring or a port.
Inbound Ring Direction Westbound, Eastbound Eastbound: A service goes clockwise after being transmitted to a ring.
Eastbound: A service goes counterclockwise after being transmitted to a ring.
Inbound Ring Example: 821 Indicates the inbound ring ID. When the Node Type is Ingress or Transit, you need to
configure the shared protection ring ID for the service inbound node of a ring.
Out Board/Logic Interface Type Slot-Board Name Indicates and specifies the egress or logic interface type.
Out Port Port (Port No.) Indicates and specifies the egress port of the static tunnel.
The ingress node and transmit node support the setting of the egress port, but the egress
node does not.
Forward Out Label 16 to 1048575 Indicates and specifies the egress label of the tunnel.
The ingress node and transmit node support the setting of the forward egress label, but the
egress node does not.
Reverse In Label 16 to 1048575 Indicates and specifies the ingress label of the tunnel.
The ingress node and transmit node support the setting of the reverse ingress label, but the
ingress node does not.
Forward Next Hop Address Example: 192.168.0.2 Indicates and specifies the IP address of the egress next hop of the tunnel.
The ingress node and transmit node support the setting of the egress next hop address, but
the egress node does not.
Reverse Next Hop Address Example: 192.168.0.3 Indicates and specifies the IP address of the egress next hop of the tunnel.
The egress node and transmit node support the setting of the egress next hop address, but
the egress node does not.
Sink Node Example: 192.168.0.2 Indicates and specifies the sink node of the tunnel.
The egress node and transmit node support the setting of the sink node, but the ingress
node does not.
Source Node Example: 192.168.0.1 Indicates and specifies the source node of the tunnel.
The ingress node and transmit node support the setting of the source node, but the egress
node does not.
Ingress PW Priority 0, 1, 2, 3, 4, 5, 6, 7, None The E-LSP supports the ingress PW priority. The number 7 indicates the highest priority.
LSP Mode Pipe, Uniform The LSP mode of the tunnel determines whether to use the tunnel priority for scheduling.
Uniform: Uses the EXP values of the tunnel for scheduling.
Pipe: Uses the EXP values of the PW for scheduling.
MTU (bytes) No Limit, 1 to 9000 When the MTU value needs to the restricted, the value cannot be larger than the MTU
value of the physical port that houses the tunnel.
Protection Group Example: 5 Indicates the protection group that the tunnel belongs to.
VLAN ID Example: 3 Indicates the VLAN ID. In the case of an ingress tunnel, the VLAN ID can be set.
Deployment Status Deployed, Undeployed Display the deployment status of the tunnel.
Loopback Status No loopback, Bidirectional loopback A packet loss fault on a static bidirectional tunnel can be located by using the hop-by-hop
loopback test on the tunnel and the PRBS function of CES services.
NOTE:
This parameter applies to only the transit nodes on a static bidirectional tunnel.
This parameter applies to only the transit nodes on a static bidirectional tunnel.
OAM Recommendation MPLS OAM(Y.1711), MPLS-TP OAM(Y.1731) Display the OAM recommendation of the tunnel.
New Reverse Tunnel Checked, Unchecked Specifies a new reverse tunnel to set parameters of the forward and reverse tunnels.
Query Actual Bandwidth Checked, Unchecked When this parameter is specified, the actual effective bandwidth is queried. When this
parameter is not specified, the configured bandwidth is queried.
The OptiX PTN 950 does not support the query of actual bandwidth.
Outbound Ring Node ID Example: 10 Indicates the ID of the ring node where the service enters the shared protection ring.
Remote Tunnel ID Example: 398 Each of the two intersecting nodes has a tunnel. One tunnel works as the active tunnel
while the other works as the standby tunnel. Since the two tunnel IDs are different, the
remote tunnel ID will be saved for a tunnel at each node for unified management.
NOTE:
This parameter can be set when Node Type is Transit, and Outbound Bearer Type and
9 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Role Active, Standby Only two intersecting nodes are configured on the two-fiber bidirectional intersecting
rings. The two tunnels that pass through the two intersecting nodes separately are
configured as active and standby tunnels, so that if one intersecting node fails, services can
pass through the other intersecting node. Services will choose the standby tunnel when the
active tunnel is not available.
NOTE:
This parameter can be set when Node Type is Transit, and Outbound Bearer Type and
Inbound Bearer Type are MPLS-TP Shared Protection Ring.
The active and standby roles are configured for management convenience. The actual
service direction depends on the switching status of the shared protection ring other than
the role configurations.
Secondary Forward Label 16 to 1048575 Specifies the forward label of the standby tunnel.
Secondary Reverse Label 16 to 1048575 Specifies the reverse label of the standby tunnel.
Prerequisites
Context
This operation may interrupt services. Exercise caution with this operation.
Procedure
1. In the NE Explorer, select an NE and then choose Configuration > MPLS Management > Unicast Tunnel Management from the Function Tree. Click the Static Tunnel tab.
2. Optional: Modify the interface of the unidirectional tunnel.
a. Select a created unidirectional tunnel. Click Modify and the Modify Unicast Unidirectional Tunnel dialog box is displayed.
NOTE:
In the case of an ingress tunnel, the Out Board/Logic Interface Type, Out Port, Outgoing Label, and Next Hop Address can be changed.
In the case of a transit tunnel, the In Board/Logic Interface Type, In Port, Incoming Label, Out Board/Logic Interface Type, Out Port, Outgoing Label, and Next Hop Address can be changed.
In the case of an egress tunnel, the In Board/Logic Interface Type, In Port, and Incoming Label can be changed.
If a static MPLS tunnel is configured on a port, when changing the IP address of the port, you also need to change the next hop address of the tunnel.
a. Select a created bidirectional tunnel. Click Modify and the Modify Unicast Bidirectional Tunnel dialog box is displayed.
b. Modify the interface of the static tunnel.
4. Click OK. The Warning dialog box is displayed, indicating that the operation may interrupt services.
5. Click OK. The Operation Result dialog box is displayed.
10 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
6. Click Close.
Prerequisites
Procedure
1. Select the source NE of the tunnel in the NE Explorer. Choose Configuration > MPLS Management > Unicast Tunnel Management from the Function Tree.
2. Click the Static Tunnel tab. Select the tunnel to be deleted from the static MPLS tunnel list.
3. Click Delete. A dialog box is displayed for confirmation.
4. Follow Steps 1 - 3 to delete static tunnels for Transit nodes and the Egress node.
Prerequisites
Context
PTN 910/950: Table 4-11 list the Mapping between MPLS Tunnel types and Tunnel Ping/Tunnel Traceroute reply modes.
Table 4-11 Mapping between MPLS Tunnel types and Tunnel Ping/Tunnel Traceroute reply modes
Static Bidirectional MPLS Tunnel Application Control Channel Application Control Channel
No Response
Procedure
a. Select the NE in the NE Explorer. From the Function Tree, choose Configuration > MPLS Mangagement > Unicast Tunnel Management.
b. Click the OAM Parameters tab, and select a tunnel. Then, click OAM Operation, and select Ping Test. The Ping Test dialog box is displayed.
NOTE:
To support the ping test, Node Type of a unidirectional tunnel must be Ingress.
c. Set the related parameters. Table 4-12 lists the parameters for the ping test.
Table 4-12 Parameters for the ping test
Wait-to-Response Timeout Time (10ms) 50-6000 Specifies the wait-to-response timeout time.
Response Mode No Response No Response: The peer NE receives ping packets but do not send reply
IPv4 UDP Response packets. Instead, it directly reports an event.
Application Control Channel IPv4 UDP Response: The peer NE receives ping packets and sends reply
packets over dynamic links.
Application Control Channel: The peer NE receives ping packets and
sends reply packets over static tunnels.
If one of the following situations occurs, it is determined that the tunnel creation fails.
The number of response ping packets is different from the number of transmitted ping packets.
The packet loss ratio is excessively high.
a. Select the NE in the NE Explorer. From the Function Tree, choose Configuration > MPLS Mangagement > Unicast Tunnel Management.
b. Click the OAM Parameters tab, and select a tunnel. Then, click OAM Operation , and select Test. The Traceroute Test dialog box is displayed.
NOTE:
To support the traceroute test, Node Type of a tunnel must be Ingress.
c. Set the related parameters. Table 4-13 lists the parameters for the traceroute test.
11 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Wait-to-Response Timeout Time (10ms) 50-6000 Specifies the wait-to-response timeout time.
NOTE:
The range of the wait-to-response timeout time varies according to the equipment type. If
the wait-to-response timeout time is beyond the range, an error message is displayed on the
NMS.
Response Mode No Response,IPv4 UDP Response, Application Control Channel Specifies the response mode.
Prerequisites
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Right-click a service and choose Test and Check from the shortcut menu.
4. On the Configuration tab, select the paths to be commissioned. Click Options and select the path construction mode for the tunnel.
To check the tunnel based on the predefined check items and sequence, select Fault Check for one-key service fault location. Alternatively, select one or more check items, for example, Service Configuration Check and LSP Ping to check
the tunnel.
Select Fault Check and click Run. Then you can query the reason why the running status of the deployed dynamic tunnel is Down.
NOTE:
Information displayed on the Result tab page varies according to check items. The following figure shows the diagnosis results for Fault Check. The results for other check items are simple and not described here.
Check steps are ordered in logical sequence. You can reference the order for troubleshooting.
The check items vary according the static or dynamic tunnel type. For example, Service Configuration Check is applicable to static tunnels and static CR tunnels. Whether Out Interface and In Interface for the neighboring nodes of a tunnel are on the same network segment can
be checked. If they are on different network segments, Out Interface IP Address and In Interface IP Address are highlighted in red.
After completing the fault location, you can perform the following operations on the Result tab page:
In Check Result, check whether the test is successful. To view more information, click under Details.
When the check item is Service Configuration Check, click under Details to modify service attributes.
The following topology view shows the navigation path to OAM Tools. You can select the NE to be checked, right-click, and choose desired check items from the shortcut menu for further check.
Follow-up Procedure
12 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-14 IP tunnel specifications
Configuring an IP tunnel - √ √ √
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-15 IP tunnel specifications (on the PTN 910, PTN 910-F, PTN 950, and PTN 960)
Function Description PTN 910 PTN 910-F PTN 950 PTN 960
Configuring an IP tunnel - √ √ √ ×
Table 4-16 IP tunnel specifications (on the PTN 905A, PTN 905B, PTN 906A and PTN 906B)
Function Description PTN 905A PTN 905B PTN 906A PTN 906B
Configuring an IP tunnel - × × × ×
Prerequisites
Procedure
1. Choose Service > Tunnel > Create Tunnel from the Main Menu.
2. Configure basic information. Set Protocol Type to IP.
NOTE:
When you create a reverse tunnel, the U2000 automatically allocates different Tunnel Name to the forward and reverse tunnels. If you manually set Tunnel Name for the forward tunnel, the U2000 automatically set Tunnel Name to forward tunnel name+_RVS for the reverse
tunnel.
When the Protocol Type parameter is set to IP, the Signaling Type and Template parameters are not available.
3. Configure the NE list. Click the ADD button and select the source and sink NEs from the drop-down list. Then, click OK.
NOTE:
In the case of an IP tunnel, you need to specify only the source and sink nodes of the tunnel.
You can choose Add and select Virtual Node from the drop-down list to specify virtual nodes through which a tunnel travels. A virtual node simulates an NE beyond the management range of the U2000. The virtual node is used for creating a tunnel whose source NE is on the U2000 but the
sink NE is not on the U2000.
4. Configure details such as tunnel ID, egress, and destination IP address for the IP tunnel.
NOTE:
If you clear the Deploy check box, the configuration data information is stored only on the U2000. If you select the Deploy check box, the configuration data information is stored on the U2000 and applied to NEs. By default, the Deploy check box is selected.
When you select the Deploy and Enable check box, A tunnel is available on NEs only when it is enabled.
Prerequisites
Procedure
1. In the NE Explorer, select an NE and choose Configuration > IP/GRE Tunnel Management > IP Tunnel Management from the Function Tree.
2. Click New and the Create IP Tunnel dialog box is displayed.
NOTE:
Destination IP Address must be consistent with Sink Node IP Address in Static Route Management.
3. Set parameters.
4. Click OK. A prompt appears indicating that the operation was successful. Click Close.
13 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-17 GRE tunnel specifications
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-18 GRE tunnel specifications (on the PTN 910, PTN 910-F, PTN 950, and PTN 960)
Function Description PTN 910 PTN 910-F PTN 950 PTN 960
Table 4-19 GRE tunnel specifications (on the PTN 905A, PTN 905B, PTN 906A and PTN 906B)
Function Description PTN 905A PTN 905B PTN 906A PTN 906B
Prerequisites
Procedure
1. In the NE Explorer, click an NE. Choose Configuration > IP/GRE Tunnel Management > GRE Tunnel Management from the Function Tree.
2. Click New and the Create GRE Tunnel dialog box is displayed.
NOTE:
Destination IP Address must be consistent with Sink Node IP Address in Static Route Management. It is the IP address of the sink port.
Only OptiX PTN 910 and OptiX PTN 950 support setting Loopback Port. When Loopback Port is set to Used, Source Board and Source Port, is unavailable. In this case, Destination IP Address is set to the LSR ID of the sink NE.
3. Set parameters.For details on the parameters for GRE tunnel, see Table 4-20.
4. Click OK. A prompt is displayed indicating that the operation is successful. Click Close.
Tunnel ID 1-512 Display and set the tunnel ID. You can also select the automatic allocation.
Loopback Port
NOTE:
Only OptiX PTN 910 and OptiX PTN 950 support setting Loopback Port.
Source Board Example: Slot-Board Name Display and set the source board.
Source Port Example: Port (Port No.) Display and set the source port.
Destination IP Address Example: 1.16.0.3 Destination IP Address must be consistent with Sink Node IP Address in Static Route
Management. It is the IP address of the sink port.
Prerequisites
Context
Modifying configurations of a service may interrupt the service running. Exercise caution with this operation.
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
14 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Select a tunnel, and then click the related tabs to modify the related parameters.
NOTE:
If Source Node, Sink Node, and Tunnel Interface for the working and protection tunnels are set to the same value, The same route is used for the working tunnel and protection tunnel in the protection group. is displayed after you click OK.
Click Yes. The U2000 configures the working and protection tunnels whose routes are the same.
Click No. The U2000 does not perform any operation.
4. Optional: If you need to modify only the basic information about a tunnel, right-click the tunnel and choose Details from the shortcut menu. In the dialog box that is displayed, modify basic information about the tunnel.
5. Click Apply.
Prerequisites
Context
If the service has been deployed or partially deployed, undeploy the service. Service deletion and undeloyment are potentially service-affecting. Exercise caution when you perform these operations.
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Right-click one or more services and choose Delete from the shortcut menu. Alternatively, select one or more services and choose Delete > Delete.
4. In the Confirm dialog box, click Yes.
Prerequisites
Context
Deleting a tunnel from the NMS is to delete a tunnel from only the NMS. In this case, the tunnel data configured on the equipment still exists. The deleted tunnel is displayed as a discrete tunnel on the NMS.
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Right-click one or more services and choose Delete from Network Side from the shortcut menu. Alternatively, select one or more services and choose Delete > Delete from Network Side.
4. In the Confirm dialog box, click Yes.
Prerequisites
Context
Service undeployment is potentially service-affecting. Exercise caution when you perform this operation.
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Right-click a service with Deployment Status being Deployed or Partially Deployment and choose Undeploy from the shortcut menu.
4. In the Confirm dialog box, click Yes.
After the service is undeployed, the value of Deployment Status changes from Deployed or Partially Deployment to Undeployed.
Follow-up Procedure
After the service is undeployed, you can redeploy the service. If the service fails to be undeployed, you can modify the service based on the error message and undeploy the service again.
Prerequisites
Context
Tunnel parameters are modified in the NE Explorer. The parameters include In Port, In Label, Out Port, Out Label, and Next Hop Address.
Tunnels are deleted using the Delete from Network Side button or shortcut menu option.
Discrete services can be discovered as services by using the automatic IP service discovery function.
Procedure
1. Choose Service > Tunnel > Manage Discrete Tunnel from the Main Menu.
2. In the dialog box that is displayed, set filtering criteria and click Filter.
3. On the discrete tunnel management window, select a discrete tunnel, click the corresponding tab to view details.
4. Optional: Select a discrete tunnel, click Delete button and click Yes in the dialog box displayed.
NOTE:
After tunnel parameters are modified in the NE Explorer, two discrete tunnels are displayed on the Manage Discrete Tunnel tab page, not the Manage Tunnel tab page.
Prerequisites
Context
When you delete a discrete tunnel, the service carried by the tunnel may be interrupted. Exercise caution with this operation.
Procedure
15 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
1. Choose Service > Tunnel > Manage Discrete Tunnel from the Main Menu.
2. Click Filter Criteria. In the dialog box that is displayed, set filtering criteria and click OK.
3. On the discrete tunnel management window, select one or more discrete services, click Delete. Alternatively, right-click and choose Delete from the shortcut menu.
4. In the confirm dialog box, click OK.
Prerequisites
Context
The tunnel duplication function is applicable to typical IP RAN networks, such as the multipoint-point network, tangent ring, and intersecting ring. By using this function, you can quickly create and deploy tunnels whose configurations are similar.
Duplicate only a tunnel: When the original tunnel does not belong to a tunnel protection group, you can duplicate only the tunnel.
Duplicate a tunnel by protection group: The original tunnel belongs to a tunnel protection group. In this case, the U2000 automatically duplicates a tunnel protection group that is similar to the original tunnel protection group when you duplicate
such a tunnel. Only static CR tunnels can be duplicated in this mode.
Take the duplication of a tunnel as an example. As shown in Figure 4-6, a tunnel is deployed between PE1 and PE6. You can select this tunnel as the source tunnel and then duplicate multiple similar tunnels between PE2 and PE6, between PE3 and PE6,
and between PE1 and PE6. During the duplication, you can also modify the basic parameters of the new tunnels.
Figure 4-6 The Scene of copying tunnel
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
2. Right-click a tunnel to be duplicated and choose Copy from the shortcut menu. The Copy Tunnel window is displayed.
If the tunnel to be duplicated does not belong to a protection group, the U2000 automatically generates two unidirectional tunnels or a bidirectional tunnel, whose direction is reverse and share the same source and sink nodes with the
tunnel to be duplicated.
If the tunnel to be duplicated belongs to a protection group, the U2000 automatically generates the tunnel who shares the same source and sink nodes with the tunnel to be duplicated and a new protection group that contains the two
tunnels.
a. Set Tunnel Number of Copying and click Refresh. The U2000 automatically generates the specified number of tunnels that shares the same source and sink nodes.
b. Select Create Reverse Tunnel as required. By default, Create Reverse Tunnel is selected.
d. Optional: In the case of a static CR tunnel, configure the route calculation for the U2000 as follows:
i. Optional: Select Auto-Calculate route. Then the U2000 automatically calculates the routes for a tunnel after you finish Steps 2 and 3.
ii. Set Restriction Bandwidth (Kbit/s).
iii. Specify route constraint nodes. Specifically, you can click Route Restriction and specify route constraint nodes in the dialog box that is displayed. Alternatively, you can specify the explicit and excluded nodes using
shortcut menu options in the physical topology.
iv. Optional: If you do not select Auto-Calculate route, click Calculate Route to calculate the routes for a tunnel in the U2000.
NOTE:
By default, the shortest route is selected from the routes that are calculated according to Restriction Bandwidth (Kbit/s) and route constraints.
e. Select a tunnel and click Details to set the detailed parameters of the tunnel.
a. Copy Protection Group is selected by default. For details about how to duplicate a tunnel when Copy Protection Group is not selected, see 3.
b. By referring to 3.c and 3.d, adjust the source and sink nodes and configure the automatic route calculation.
NOTE:
After you change the source or sink node of a forward tunnel, the source or sink node of the reverse tunnel changes automatically.
c. Click Details. In the right-hand pane, click Hops Informationand Protection Group Information to configure details about the tunnels and parameters relevant to the protection group.
Prerequisites
Context
When you reoptimize a tunnel, the service may be interrupted. Exercise caution with this operation.
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Right-click the required tunnel and choose Reoptimize from the shortcut menu. The Reoptimization dialog box is displayed.
4. Click Add or Delete to set the route constraints for the reoptimization of the tunnel.
5. In the Confirm dialog box, click Yes. In the Reoptimization dialog box, click OK.
6. Right-click the tunnel and choose View LSP Topology from the shortcut menu to view the actual route of the tunnel after optimization.
Prerequisites
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
16 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Right-click the tunnel to be adjusted and choose Adjust Route from the shortcut menu. In the Confirm dialog box that indicates this operation is potentially service-affecting and may affect service operation, click Yes.
4. Adjust the route for a tunnel in the Adjust Tunnel Route window.
a. Optional: Select Auto-Calculate route. Then the U2000 automatically calculates the routes for a tunnel after you finish Steps 2 and 3.
b. Set Restriction Bandwidth.
c. Specify route constraint nodes. Specifically, you can click Route Restriction and specify route constraint nodes in the dialog box that is displayed. Alternatively, you can specify the explicit and excluded nodes using shortcut menu
options in the physical topology.
d. Optional: If you do not select Auto-Calculate route, click Calculate Route to calculate the routes for a tunnel in the U2000.
NOTE:
A Layer 2 link must be configured before route calculation. For details about how to configure a Layer 2 link, see the chapter topology management section.
By default, the shortest route is selected from the routes that are calculated according to Restriction Bandwidth and route constraints.
The configured In Interface and Out Interface can be deleted using the Delete shortcut key.
5. Optional: If the tunnel belongs to a protection group, adjust the route for the protection tunnel according to Step 4.
6. Optional: Adjust the route for a non-Layer 2 link tunnel.
a. Optional: On the Hop Information tab page, click Add, and select the transit node for the tunnel in the window that is displayed.
b. Optional: Select the related transit node for the tunnel, click Delete, and click OK in the window that is displayed to delete the node.
c. Optional: If there are two or more transit nodes, select a transit node and click UP or Down to adjust its location without changing its role.
d. Click Apply.
Prerequisites
Context
When other switching operations, excluding the exercise switching, are performed, the services may be interrupted.
Procedure
1. Choose Service > Tunnel > Manage Protection Group from the Main Menu.
2. Check the switching status of the tunnel protection group. Right-click the protection group under test, and choose Query Switching Status from the shortcut menu to refresh the status of the tunnel protection group.
3. Optional: When the Protocol Status is Disabled for the protection group, click Hop Information tab, set Protocol Status to Enabled for the device of protection group, click Apply.
NOTE:
When the Protocol Status is Enabled, you can perform tunnel protection switching.
a. Optional: Right-click one or more protection groups under test, and choose Switch > Clear.
b. Optional: Right-click one or more protection groups under test, and choose Switch > Force Switching.
c. Optional: Right-click one or more protection groups under test, and choose Switch > Manual Switching To Working.
d. Optional: Right-click one or more protection groups under test, and choose Switch > Manual Switching To Protection.
e. Optional: Right-click one or more protection groups under test, and choose Switch > Exercise Switching.
f. Optional: Right-click one or more protection groups under test, and choose Switch > Lockout of Protection.
Prerequisites
Procedure
1. In the Main Topology, right-click a fiber and choose Browse Relevant Tunnels from the shortcut menu. In the window that is displayed, view the information about the tunnels.
NOTE:
In the window that is displayed, the tunnels that pass through the fiber port are displayed. The table headings can be ordered.
You can click Filter Criteria to filter the tunnels again.
2. Click Port BW Utilization. In the window that is displayed, query the bandwidth usage of the tunnels of the port and bandwidth usage of the PWs carried by the tunnels.
3. Optional: In the tunnel list, select a tunnel that carries a service, and click Correlated Services to view the information about the service.
4. Optional: On the Correlated Services tab page, click Utilization of Tunnel Bandwidth. In the window that is displayed, view bandwidth usage of the tunnel and of the PW carried by the tunnel.
Prerequisites
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Right-click a required tunnel and choose View VPN from the shortcut menu.
NOTE:
You can view the VPN service of only one tunnel at a time.
You can view the end-to-end services that are transmitted in a tunnel, but not the discrete services that are transmitted in the tunnel.
4. View information of the VPN service carried on the tunnel in View VPN window.
5. Optional: Select a required VPN service, click View Details. In the relevant service management window, you can view or modify parameters of the VPN service.
Prerequisites
17 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Select a required tunnel and view the topology of the tunnel on the Topology tab.
4. View Layer 2 link information.
b. Click .
a. Select an NE in the service topology, right-click, and then perform the following steps:
i. Choose Current Alarm from the shortcut menu to view current alarms.
ii. Choose History Alarm from the shortcut menu to view historical alarms.
iii. Choose NE Explorer from the shortcut menu to jump to the NE management window of the selected NE.
iv. Choose View Real-Time Performance from the shortcut menu to view real-time performance.
NOTE:
Real-time performance of only tunnels in the deployed state can be viewed.
b. Select a tunnel in the service topology, right-click, and then perform the following steps:
i. Choose Fast Diagnose from the shortcut menu to diagnose the selected tunnel.
ii. Choose View VPN from the shortcut menu to view the VPN service bound to the selected tunnel.
iii. Choose View LSP Topology from the shortcut menu to view the LSP topology of the selected tunnel.
NOTE:
LSP topologies of only RSVP TE tunnels in the running state can be viewed.
iv. Choose Current Alarm from the shortcut menu to view current alarms.
v. Choose History Alarm from the shortcut menu to view historical alarms.
6. Optional: In the window for creating a tunnel, click the Service Topology tab to view topology information about the new tunnel.
Prerequisites
Procedure
a. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
b. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
c. Select the desired tunnel and click View LSP Topology on the Topology tab page to view the routing information about the tunnel. The routing information is displayed in a table on the left and in a topology view on the right.
a. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
b. In the dialog box that is displayed, set filter criteria and click Filter.
c. Select one or more tunnels, right-click, and choose View LSP Topology from the shortcut menu.
d. In the Confirm dialog box, click OK. The window switches to the Main Topology and routing information about the tunnels is displayed.
Prerequisites
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Right-click the tunnel and select Update Running Status, view the Running Status parameter of a tunnel.
Prerequisites
Procedure
18 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
1. Choose Fault > Service Monitoring > IP Service Monitoring Template from the main menu.
2. Right-click in the list area and choose Select Monitoring Group from the shortcut menu. Alternatively, click Select Monitoring Group in the lower right corner.
3. In the dialog box that is displayed, select the desired monitoring group and then click OK.
NOTE:
If no desired monitoring group is available, you can click Add in the dialog box that is displayed to create a monitoring group.
4. Right-click the selected monitor group and choose Add Monitoring Service from the shortcut menu.
5. In the dialog box that is displayed, select the service to be monitored, and then click Add.
NOTE:
After adding the service to be monitored, double-click the cell in the row of the service to switch to the service.
Choose Service > Tunnel > Manage Tunnel from the Main Menu. In the Manage Tunnel dialog box, select a service, right-click, and choose Add To Monitoring Group from the shortcut menu. In this manner, you can also add a service to the monitor group.
Prerequisites
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area. View the service of tunnel by 3 or 4.
3. Optional: View the relevant alarm of tunnel.
Right-click the tunnel with the alarm and choose Alarm > Current Alarm from the shortcut menu to view the current alarms of the tunnel.
Right-click the tunnel and choose Alarm > History Alarm from the shortcut menu to view the history alarms of the tunnel.
c. Right-click the link where an alarm is generated and choose Current Alarm/History Alarm from the shortcut menu to view current/history alarms.
5. Select the service alarm in the alarm list and view the detailed alarm information in the details area.
Prerequisites
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. View the runtime performance of a tunnel. Right-click the NE and choose View Real-Time Performance from the shortcut menu in the topology view.
NOTE:
Only the source node of RSVP TE tunnel support this operation.
Only the source and sink node of Static CR tunnel support this operation.
4. Create a monitoring instance for a tunnel. For detailed operations, see Enabling the Performance Monitoring and Management Function in the "Supporting Tasks".
5. View the history performance of a tunnel. Right-click a required tunnel and choose Performance > View History Data from the shortcut menu.
Prerequisites
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Configure a scheduled test.
a. Right-click a required tunnel and choose Diagnose > Create Test Suite from the shortcut menu.
b. Select the tunnel to be diagnosed and click Next.
c. Select the LSP Ping check box and click Details. In the dialog box that is displayed, set advance test parameters and click OK.
d. Set parameters in the Test Time field, click Add, and then click Finish.
a. Right-click a required tunnel and choose Diagnose > View Test Strategy from the shortcut menu.
b. Click Condition. In the dialog box that is displayed, set relevant criteria and click OK. Click Query.
c. Select a record and click Task Information and Associated Test Suite to view relevant information.
a. Right-click a required tunnel and choose Diagnose > View Test Result from the shortcut menu.
c. Optional: Click Export Result to export the result of the scheduled test to local computer.
NOTE:
The result of a scheduled test can be exported in a .cvs, .html, .xls, .pdf or .txt file.
a. Right-click a required tunnel and choose Test and Check from the shortcut menu.
b. Optional: Select Service Check or Collect Information.
c. Optional: Select the VCCV ping, LSP Ping or ICMP Ping check box and click . In the dialog box that is displayed, set parameters of the ping test and click OK.
d. Optional: Select the VCCV Traceroute, LSP Traceroute or ICMP Traceroute check box and click . In the dialog box that is displayed, set parameters of the traceroute test and click OK.
e. Click Run and view the test result on the right pane.
19 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Prerequisites
Context
The U2000 supports multiple types of diagnosis tasks for tunnel services. You can choose to locate faults in a segment-by-segment (such as PE-PE or PE-CE) or layer-by-layer manner according to service requirements or fault symptoms. The
deployment scenarios for different types of diagnosis tasks are as follows.
Table 4-21 Deployment scenarios
LSP Ping This task is used to check whether an LSP is reachable. Perform this task to check connectivity of LSPs on a tunnel service.
ICMP Ping This task is used to check service connectivity at the network layer. Information such as packet loss ratio and This task is used to detect connectivity of a public network after you rectify VPN service faults.
delay in the operation results helps you learn the current network condition.
In addition, Tunnel services support LSP Traceroute, and ICMP Traceroute. The deployment scenarios are similar to those of the Ping diagnosis. The only difference is that Traceroute supports detection of transit NEs between the source and sink NEs to
obtain the packet loss ratio and delay between the source NE and each of the transit NE and determine the fault point, while Ping can check only the connectivity between the source and sink NEs.
In real-world scenarios, Ping can be performed to check the connectivity between the source and sink NEs, and then Traceroute can be used to determine the fault point.
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the Main Menu.
2. In the Set Filter Criteria dialog box, set the filter criteria. Then, click Filter. The tunnels meeting the filter criteria are displayed in the query result area.
3. Select the service to be viewed from the service list and click the Topology tab.
4. In the service topology, select the tunnel between NEs, right-click, and then choose Fast Diagnosis from the shortcut menu.
5. Set Test Type.
6. Click Run to start diagnosis. A progress bar is displayed showing the diagnosis progress. After diagnosis is complete, the diagnosis results are displayed on the Detail tab page.
Packet information such as packet loss ratio and delay is displayed in the diagnosis results. These information helps you learn the network connectivity and evaluate network path quality based on delay values.
7. Click Cancel to close the dialog box.
Basic Concepts
QinQ provides a Layer 2 virtual private network (VPN) solution. With the VLAN stacking and nesting technology, data packets carry two different VLAN tags to identify different data packets. This clears the limitation of the original solution in which
only one VLAN tag is used to identify different data packets. As a result, VLAN IDs are extended. The internal VLAN tag is referred to as C-VLAN, indicating the user VLAN; the external VLAN tag is referred to as S-VLAN, indicating the carrier
VLAN.
With help of the QinQ technology, the number of VLAN IDs is increased to 4094x4094. This greatly extends the VLAN ID resources.
The QinQ technology simplifies network configuration and maintenance as users and carriers can independently and flexibly plan VLAN resources.
Through the QinQ technology, the Ethernet service scale extends from the LAN to WAN.
Frame Format
The QinQ technology defines three Ethernet frame formats, including the Ethernet frame format with only a C-TAG, Ethernet frame format with a C-TAG and an S-TAG, and Ethernet frame format with only an S-TAG.
Ethernet frame with only a C-TAG
As shown in Figure 4-7, the Ethernet frame with only a C-TAG has the same format as that of the tagged frame defined in IEEE 802.1q. Hence, the tagged frame defined in IEEE 802.1q is equivalent to the Ethernet frame with only a C-TAG.
TAG has the following fields:
TPID: tagged protocol ID, which indicates TAG type, such as S-TAG and C-TAG.
Pri: priority, which indicates optimization priority.
CFI: canonical format indicator, which indicates an Ethernet frame or FDDI frame.
VLAN ID, which indicates the VLAN that the frame derives from.
As shown in Figure 4-8, in the case of the Ethernet frame with a C-TAG and an S-TAG, the S-TAG is added before the C-TAG. The differences between the S-TAG and C-TAG are as follows:
NOTE:
The TPID in the S-TAG can be set by modifying the type domain of the QinQ frame.
The drop eligible indicator (DEI) replaces the canonical format indicator (CFI).
DEI and Pri are used together to identify the priority of an S-TAG.
Application of QinQ
20 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
On this network, user packets are processed using the following procedure:
1. Assume that all CE equipment carries user packets of C-VLAN1. Then, every PE equipment sticks S-TAGs onto the data packets received from CE equipment: S-VLAN1, S-VLAN2, and S-VLAN3.
2. The PTN equipment identifies and forwards user packets by S-VLAN.
IEEE 802.1q
IEEE 802.1ad
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-22 QinQ link specifications
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-23 QinQ link specifications (on the PTN 910, PTN 910-F, PTN 950, and PTN 960)
Function Description PTN 910 PTN 910-F PTN 950 PTN 960
Table 4-24 QinQ link specifications (on the PTN 905A, PTN 905B,PTN 906A and PTN 906B)
Function Description PTN 905A PTN 905B PTN 906A PTN 906B
Prerequisites
Procedure
1. On the U2000 Main Topology, select and right-click the NE. In the shortcut menu, choose NE Explorer to display the NE Explorer window.
2. In the NE Explorer, select an NE, and choose Configuration > Interface Management > Ethernet Interface from the Function Tree.
3. Click the Basic Attributes tab page, select a port to be configured. Then, set Port Mode to Layer 2 and Encapsulation Type to QinQ. Click Apply. For details on the parameters for Basic Attributes of Ethernet interfaces, see Table 3-25.
4. Click the Layer 2 Attributes tab page, set QinQ Type Domain according to the network planning. Click Apply. For details on the parameters for Layer 2 Attributes of Ethernet interfaces, see Table 3-26.
5. Click Apply to display the Operation Result dialog box, indicating that the operation is successful.
6. Click Closein the Operation Result dialog box.
Prerequisites
Procedure
1. In the NE Explorer, click the NE and choose Configuration > Ethernet Service Management > QinQ Link from the Function Tree.
2. Click New. The New QinQ Link window is displayed.
3. Click the Basic Attributes tab. Set QinQ Link ID, Board, Port and S-Vlan ID.
4. Click the QoS tab to set the QoS-related parameters.
NOTE:
If Bandwidth Limit is set to Enabled, you can set CIR (kbit/s) and PIR (kbit/s) for the QinQ Link. You can also select a QinQ policy in Policy. Before selecting a policy, create a policy.
For the TND1CXP board on PTN 950, when rings, tunnels (excluding tunnels in ring networks) and QinQ bandwidth are configured, ensure that the total bandwidth of all CIRs does not exceed the port bandwidth minus 128kbps.
For the TNC1CXPG/H/I board on PTN 910, when rings, tunnels (excluding tunnels in ring networks) and QinQ bandwidth are configured, ensure that the total bandwidth of all CIRs does not exceed the port bandwidth minus 128kbps.
For the TND3CXPA/B board on PTN 960, when rings, tunnels (excluding tunnels in ring networks) and QinQ bandwidth are configured, ensure that the total bandwidth of all CIRs does not exceed the port bandwidth minus 128kbps.
5. Click OK.
QinQ Link ID Example: 5 Display and set the QinQ link ID.
21 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Port Example: Port (Port No.) Display and set the port.
Bandwidth Limit Enabled, Disabled Set and display the bandwidth limit.
If Bandwidth Limit is enabled, Committed Information Rate and Peak Information
Rate can be set.
CIR(kbit/s) Example: 16000 Set and display the committed information rate.
PIR (kbit/s) Example: 20000 Set and display the peak information rate.
Query Actual Bandwidth Checked, Unchecked When this parameter is selected, the actual effective bandwidth is queried. When this
parameter is not selected, the configured bandwidth is queried.
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-26 MPLS tunnel APS specifications
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-27 MPLS tunnel APS specifications (on the PTN 910, PTN 910-F, PTN 950, and PTN 960)
Function Description PTN 910 PTN 910-F PTN 950 PTN 960
Table 4-28 MPLS tunnel APS specifications (on the PTN 905A, PTN 905B, PTN 906A and PTN 906B)
Function Description PTN 905A PTN 905B PTN 906A PTN 906B
Operation Remarks
1. Creating Network To create a network, you need to create NEs, uploading NE Data, create fibers, and configure the clock.
2.Creating a Tunnel on a Per-NE Basis An MPLS tunnel is created on a per-NE basis and the MPLS tunnel OAM function is enabled.
3.Creating an MPLS APS Protection Group An APS protection group should be respectively configured at the source and sink of a tunnel.
4.Enable APS Protocol When an MPLS APS protection group is configured, the APS protocol must be disabled. After the MPLS APS protection group is
created, enable the APS protocol.
Prerequisites
22 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
The MPLS OAM packet type must be set to FFD and the Detection Packet Period must be set to 3.3 ms. For details, see 5.1.4.3.2 Enabling the CV/FFD of an MPLS Tunnel.
NOTE:
Detection Packet Period (ms) must be set to 3.3 ms for MPLS OAM so that the protection switching time is within 50 ms. Extensive delay variation on a network, however, results in repeated protection switching. Hence, the detection packet period must be larger than the maximum network
delay variation.
Configuration Guide
The configuration of tunnel APS protection group must be consistent at the source and sink ends.
NOTE:
The working and protection channels should be configured on different paths. For the source and sink nodes, the working and protection channels should be configured on different processing boards or interface boards corresponding to different processing boards.For intermediate nodes, the working and
protection channels should be configured on different NEs. If the working and protection channels are configured on the same NE, the working and protection channels will fail simultaneously when the NE is faulty.
Procedure
1. Select the source NE of the tunnel in the NE Explorer. Choose Configuration > APS Protection Management from the Function Tree.
2. Click New. The New Tunnel Protection Group dialog box is displayed.
3. Set parameters for the tunnel protection group. For details on the parameters for the tunnel protection group, see Table 4-30.
Protection Type: The protection type can be 1:1 or 1+1
Switching Mode: The switching mode can be single-ended or dual-ended.
Revertive Mode: The revertive mode can be non-revertive or revertive.
Hold-off Time (100 ms): The unit is 100 milliseconds. You can enter an integer from 0 to 100, that is, 0 to 10 seconds.
Working Tunnel Type and Protection Tunnel Type can be set to tunnel, IP Tunnel, or GRE Tunnel.
NOTE:
Either bidirectional MPLS tunnels or unidirectional MPLS tunnels can be configured in an APS protection group.
One bidirectional LSP and a pair of unidirectional LSPs can protect each other.
Bidirectional MPLS tunnels can protect each other.
For OptiX PTN 3900/3900-8/1900/910/910-F/950, bidirectional MPLS tunnels and IP/GRE tunnels can protect each other.
When Transmit and Receive Status of Protocol Packet is enabled, the protection group can receive and transmit APS protocol packets and supports the APS alarm function.
When the protection and working tunnels are the MPLS tunnels, Transmit and Receive Status of Protocol Packet is set to Enabled.
For OptiX PTN 3900/3900-8/1900/910/910-F/950, when the protection tunnel is the IP/GRE tunnel, Transmit and Receive Status of Protocol Packet is set to Disabled.
When Switching upon FD/FDV is enabled, the protection group supports switching upon FD/FDV.
NOTE:
Before you enable and configure switching upon FD/FDV, be sure to configure tunnel performance monitoring. For configuration details, see Enabling the Performance Monitoring and Management Function.
NOTICE:
When creating the protection group, you must set the Protocol Status to Disabled. If you enable the APS protocol at the local NE first and then the opposite NE when configuring the MPLS APS protection, the opposite NE may have an
anomaly in receiving services.
NOTE:
The bandwidth of the protection tunnel should be not less than that of the working tunnel. To increase the bandwidth of the working tunnel after the protection group is created, increase the bandwidth of the protection tunnel first.
a. Select the source NE of the tunnel in the NE Explorer. Choose Configuration > APS Protection Management from the Function Tree.
b. Right-click the APS protection group that is already created to choose Start Protocol from the shortcut menu.
c. A dialog box is displayed indicating that the operation is successful. Then, the Protocol Status of the APS protection group changes to Enabled.
Prerequisites
Configuration Guide
The configuration of tunnel APS protection group must be consistent at the source and sink ends.
NOTE:
The working and protection channels should be configured on different paths. For the source and sink nodes, the working and protection channels should be configured on different processing boards or interface boards corresponding to different processing boards.For intermediate nodes, the working and
protection channels should be configured on different NEs. If the working and protection channels are configured on the same NE, the working and protection channels will fail simultaneously when the NE is faulty.
Procedure
1. Choose Service > Tunnel > Create Protection Group from the Main Menu.
23 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
2. In the Basic Information area, set basic information about the protection group. That is, set Group Name, Protection Type, and Switching Mode.For details on the parameters, see Table 4-30.
Group Name: This parameter indicates the protection group name.
Protection Type: The protection type can be 1:1 or 1+1.
Switching Mode: The switching mode can be single-ended or double-ended.
3. Click Add. In the dialog box that is displayed, select the working and protection tunnels and then click OK.
4. Set the tunnel type.
Set Protection Type to Forward Working, Backward Working, Forward Protecting, and Backward Protecting.
5. In the Attributes area, set the following protection group attributes.
Protocol Status: This parameter indicates the protocol status. A protection group takes effect only after its status is set to Enabled.
Revertive Mode: The revertive mode can be non-revertive or revertive.
WTR Time: The WTR time can be set to an integer in the range of 60 to 720 (unit: second, and 60 as the spacing). The default value of the WTR time is 300.
Hold-off Time: The hold-off time can be set to an integer in the range of 0 to 100 (0s to 10s; unit: 100 ms). The default value is 0.
Switching upon FD: Switching upon FD can be either enabled or disabled. If it is enabled, a protection group supports switching upon FD.
FD Direction: The FD direction can be either unidirectional or bidirectional.
Switching Condition: This parameter indicates the switching priorty and can be set to FD or FDV.
Enable FD Difference: This option can be either selected or not selected.
FD Difference Threshold: The FD difference threshold is an integer in the range of 100 to 65535, in microseconds.
Enable FDV Difference: This option can be either selected or not selected.
FDV Difference Threshold: The FDV difference threshold is an integer in the range of 100 to 65535, in microseconds.
6. In the Tunnel area, click Configure OAM to display the Configure OAM dialog box. Set OAM Status to Enabled, Detection Packet Type to FFD, and Detection Packet Period (ms) to 3.3 for the protection group.
OAM Status: OAM can be set to Enable Send And Receive or Disabled. OAM must be set to Enable Send And Receive when MPLS tunnel APS is configured.
Detection Packet Type: The detection packet type can be CV or FFD. When the detection packet type is CV, the packet detection period is fixed; when the detection packet type is FFD, you can set the detection packet period.
Detection Packet Period (ms): This parameter indicates the detection packet period. The detection packet period can be set to 3.3, 10, 20, 50, 100, 200, 500, or 1000 (unit: ms). When the detection packet type is FFD, this parameter
can be set; when the detection packet type is CV, this parameter is always 1000.
NOTE:
Detection Packet Type must be set to 3.3 to ensure that the switching time is within 50 ms. When delay variation on a network is large, switching occurs frequently. Detection Packet Type must be set to a value greater than the maximum delay variation on the network.
Prerequisites
Procedure
1. In the NE Explorer, select the NE from the Function Tree and choose Configuration > APS Receiving Mode.
2. Set Receiving Mode toFast, and click Apply.
NOTE:
Fast indicates the dual receiving. Normal indicates the selective receiving. The default Receiving Mode is Fast.
4.6.5 Managing and Maintaining the MPLS Tunnel APS Protection Groups
4.6.5.1 Deleting a Tunnel APS Protection Group
To delete a tunnel APS protection group, the tunnel protection groups must be deleted at the source NE and sink NE.
Prerequisites
Procedure
24 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
1. Select the source NE of the Tunnel in the NE Explorer. Choose Configuration > APS Protection Management from the Function Tree.
2. Select a protection group that you want to delete.
3. Click Delete. A dialog box is displayed for confirmation.
4. Click Yes. The Operation Result dialog box is displayed.
5. Click Close.
6. On the NE Explorer, select the sink NE, and repeat the previous operations.
Prerequisites
Context
1+1 protection
Services are transmitted over the working tunnel and protection tunnel at the same time. Then, the receive end selects a tunnel according to the status of the two tunnels and receives the services from the tunnel. That is, the services are dually fed
and selectively received. When the receive end detects loss of signals over the working tunnel or when the working tunnel is detected as faulty by the MPLS OAM, the receive end receives the signals from the protection tunnel. In this manner,
the services are switched.
1:1 protection
Normally, services are transmitted over the working tunnel. That is, the services are singly fed and received. When the working tunnel is faulty, the equipment at the two ends negotiates through the APS protocol. Then, the transmit end transmits
the services over the protection tunnel and the receive end receives the services from the protection tunnel. In this manner, the services are switched.
Procedure
1. Check the switching status of the 1+1 or 1:1 MPLS tunnel protection group.
a. On the Main Topology of the U2000, right-click the source NE of the tunnels under test. Choose NE Explorer from the shortcut menu to display the NE Explorer window.
b. In the Function Tree of NE Explorer, choose Configuration > APS Protection Management.
c. Click the Tunnel APS Configuration tab, right-click the protection group under test, and choose Query Switching Status from the shortcut menu to refresh the status of the MPLS tunnel protection group configured on the NE.
d. Select the MPLS tunnel protection group under test and check the switching status of the MPLS tunnel protection group. Normally, the status of the protection group is No Request (Working Active).
a. In the Function Tree of NE Explorer, choose Configuration > APS Protection Management.
b. Click the Tunnel APS Configuration tab and select the protection group for service switching.
c. Right-click the protection group under test and choose Forced Switching from the shortcut menu. In this case, a message indicating that this operation will interrupt service is displayed. Then, click OK to perform the manual
switching.
3. Right-click the protection group under test and choose Query Switching Status from the shortcut menu. Check Switching Status of the protection group, which should be in Forced Switching state normally. Then, query Active Tunnel of the
protection group. After a normal switching, Working matches Standby and Protection matches Active.
NOTE:
If Forced Switching is performed at the previous step, the state of the protection group should be Forced Switching.
If Manual Switching to Protection is performed at the previous step, the state of the protection group should be Manual Switching to Protection.
4. Right-click the protection group under test and choose Clear from the shortcut menu to revert the services to the working tunnel.
Switching Mode Single-Ended, Dual-Ended Specifies the switching mode, which is adopted in the case of a fault on the tunnel.
Revertive Mode Non-Revertive, Revertive Specifies whether the service reverts to the original working tunnel after the fault is rectified. In the case of the Revertive mode, the service reverts to the original working tunnel. In
the case of the Non-Revertive mode, the service does not revert to the original working tunnel.
When the protection tunnel is the IP/GRE tunnel, Revertive Mode is always Revertive.
WTR Time (min) 1 to 12 Specifies the wait-to-restore (WTR) time for the protection group.
Default value for MPLS APS protection: 5 WTR Time (min) for offload protection is 1 min by default.
Default value for offload protection: 1
25 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Hold-off Time (100 ms) 0 to 100 Specifies the hold-off time of the protection group.
Default: 0 The hold-off time indicates the waiting time for the protection group after it detects trigger conditions for protection switching. During the hold-off time, the protection group stops
checking for trigger conditions for protection switching and protection switching does not occur. After the hold-off time times out, the protection group checks for trigger conditions
for protection switching again. If the protection group detects trigger conditions for protection switching, protection switching occurs.
The hold-off time is used to resolve the conflict between the protection group at the service layer and that at the upper layer when protection groups at multiple layers are coupled.
That is, the hold-off time is configured to prevent concurrent switching of protection groups at multiple layers. The value of the hold-off time must be larger than the switching time
of the protection group at the service layer.
For example, the tunnel APS protection is coupled with the LMSP protection, the LMSP protection is configured for the link carrying the working tunnel, and the LMSP protection
belongs to service-layer protection. In the case of a link fault, it is expected that the LMSP protection switching occurs first to rectify the link fault. After the LMSP protection
switching, if the working tunnel is normal, the tunnel APS protection switching does not occur. The LMSP protection switching requires a certain period of time, so you need to set
the hold-off time for the tunnel APS protection group to ensure that the LMSP can resolve problems at the service layer. The hold-off time for the tunnel APS protection group must
be larger than the LMSP protection switching time.
When the protection tunnel is the IP/GRE tunnel, Hold-off Time (100 ms) is always 0 ms.
Transmit and Receive Status of Enabled, Disabled Specifies whether to receive and transmit the APS protocol packets. If this parameter is enabled, the APS alarm can be detected.
Protocol Packet When the protection tunnel is the MPLS tunnel and the working tunnel is the IP/GRE tunnel, Transmit and Receive Status of Protocol Packet is always Enabled.
When both the protection tunnel and working tunnel are the MPLS tunnel, Transmit and Receive Status of Protocol Packet is always Enabled.
When both the protection tunnel and working tunnel are the IP/GRE Tunnel, Transmit and Receive Status of Protocol Packet is always Disabled.
Switching Status No Request (Working Active), No Request Indicates the switching status of the protection group.
(Protection Active), Lockout (Working Active),
Forced Switching(Protection Active), Working
Signal Failure (Protection Active), Protection
Signal Failure (Working Active), Protection Signal
Degrade (Working Active), Working Signal
Degrade (Protection Active), Manual Switch to
Working path, Manual Switch to Protection path,
Wait-to-Restore (Protection Active), Do Not Revert
(Protection Active), Exercise Switching (Working
Active), Exercise Switching (Protection Active),
Reverse Request (Working Active), Reverse
Request (Protection Active)
Deployment Status Deployed, Undeployed Display the deployment status of the tunnel.
Unit Working, Protection Specifies whether a tunnel is the working or protection tunnel.
Active Tunnel Active, Standby Indicates the tunnel that is currently used.
Tunnel Status Available, Unavailable Indicates the status of the working or protection tunnel.
Tunnel Type MPLS Tunnel, IP Tunnel, GRE Tunnel Specifies the type of the working tunnel.
Ingress Tunnel Example: IP Tunnel-1 Specifies the working and protection ingress tunnels.
Egress Tunnel Example: Tunnel005-MPLS Tunnel-5(Source Specifies the working and protection egress tunnels.
Node:1.0.0.14,Sink Node:1.1.1.2)
Switching upon FD/FDV Enabled, Disabled Specifies whether to enable switching upon FD/FDV.
FDV Difference Never trigger switching, 100-65535 Specifies the FDV difference.
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-31 Offload protection specifications
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-32 Offload protection specifications (on the PTN 910, PTN 910-F, PTN 950, and PTN 960)
Function Description PTN 910 PTN 910-F PTN 950 PTN 960
Table 4-33 Offload protection specifications (on the PTN 905A, PTN 905B,PTN 906A and PTN 906B)
Function Description PTN 905A PTN 905B PTN 906A PTN 906B
Prerequisites
Configuration Guide
The configuration of tunnel APS protection group must be consistent at the source and sink ends.
NOTE:
The working and protection channels should be configured on different paths. For the source and sink nodes, the working and protection channels should be configured on different processing boards or interface boards corresponding to different processing boards.For intermediate nodes, the working and
protection channels should be configured on different NEs. If the working and protection channels are configured on the same NE, the working and protection channels will fail simultaneously when the NE is faulty.
Procedure
1. Select the source NE of the tunnel in the NE Explorer. Choose Configuration > APS Protection Management from the Function Tree.
2. Click New, the New Tunnel Protection Group dialog box is displayed.
3. Set parameters for the tunnel protection group. Select the working tunnel and protection tunnel.For details on the parameters for protection group, see Table 4-35.
NOTE:
The offload supports only the 1:1 protection.
26 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Board Example: 23-ETFC Selects the board that transmits BFD packets.
Port Example: 1(PORT-1) Selects the port that transmits BFD packets.
Source Port IP Address Example: 10.70.12.33 Sets the IP address of the source port.
Sink Port IP Address Example: 10.70.12.34 Sets the IP address of the sink port.
Bound Port Example: Slot-Board Name-Port (Port No.) Configures the port bound with the BFD session status.
Bound Tunnel IP Tunnel:Tunnel ID(Sink Port IP Address), GRE Tunnel ID(Sink Port IP Address) Configures the bound tunnel for offload Protection.
Session Status Up, Down, AdminDown, Init Displays the BFD session status.
Local Send Interval of Packets(ms) 3 to 1000 Sets the local send interval of packets.
NOTE:
The interval between sending/receiving packets that PTN devices actually support is 3.3 ms, 10 ms,
20 ms, 50 ms, 100 ms, and 1s. If a configured value is different from the actually supported values,
a value close to and greater than the configured value is used by default. For example, if the
configured value is 150 ms, 1s is used by default.
Local Receive Interval of Packets(ms) 3 to 1000 Sets the local receive interval of packets.
NOTE:
The interval between sending/receiving packets that PTN devices actually support is 3.3 ms, 10 ms,
20 ms, 50 ms, 100 ms, and 1s. If a configured value is different from the actually supported values,
a value close to and greater than the configured value is used by default. For example, if the
configured value is 150 ms, 1s is used by default.
Local Detection Multiple of Packets 3 to 10 Sets the BFD packet detection multiples at the local end.
Negotiated Local Send Interval of Packets(ms) Example: 568 Displays the negotiated interval of transmitting packets at the local end.
Negotiated Local Receive Interval of Packets(ms) Example: 568 Displays the negotiated interval of receiving packets at the local end.
Negotiated Detection Time of Packets(ms) Example: 5 Displays the negotiated packet detection time at the local end.
Diagnosis Word 0 to 9 Indicates the cause of the state change of the latest session in the local BFD system.
0: indicates that no diagnosis word is available.
1: indicates that the detection time expires.
2: indicates that detection for echo packets fails.
3: indicates that neighbor notification fails.
4: indicates that the forwarding plane restarts.
5: indicates that the trail is down.
6: indicates that the concatenated trail fails.
7: indicates that the BFD session is administratively disabled.
8: indicates that the reverse concatenated trail fails.
9: indicates that ADMIN_DOWN packets are received.
VRF Example: vpn1 If Session Type is set to Multi-Hop, the VRF is supported to be set.
Displays the name of the public network VPN routes by default.
NOTICE:
For the OptiX PTN equipment, multi-hop BFDs can be bound to public VPN routes only.
RD Example: 100 Specifies the RD of a VPN instance. RDs are used to isolate VPN address spaces. A VPN
instance takes effect only after being configured with an RD.
Switching Mode Single-Ended, Dual-Ended Specifies the switching mode, which is adopted in the case of a fault on the tunnel.
Revertive Mode Non-Revertive, Revertive Specifies whether the service reverts to the original working tunnel after the fault is rectified. In the case of the Revertive mode, the service reverts to the original working tunnel. In
the case of the Non-Revertive mode, the service does not revert to the original working tunnel.
When the protection tunnel is the IP/GRE tunnel, Revertive Mode is always Revertive.
27 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
WTR Time (min) 1 to 12 Specifies the wait-to-restore (WTR) time for the protection group.
Default value for MPLS APS protection: 5 WTR Time (min) for offload protection is 1 min by default.
Default value for offload protection: 1
Hold-off Time (100 ms) 0 to 100 Specifies the hold-off time of the protection group.
Default: 0 The hold-off time indicates the waiting time for the protection group after it detects trigger conditions for protection switching. During the hold-off time, the protection group stops
checking for trigger conditions for protection switching and protection switching does not occur. After the hold-off time times out, the protection group checks for trigger conditions
for protection switching again. If the protection group detects trigger conditions for protection switching, protection switching occurs.
The hold-off time is used to resolve the conflict between the protection group at the service layer and that at the upper layer when protection groups at multiple layers are coupled.
That is, the hold-off time is configured to prevent concurrent switching of protection groups at multiple layers. The value of the hold-off time must be larger than the switching time
of the protection group at the service layer.
For example, the tunnel APS protection is coupled with the LMSP protection, the LMSP protection is configured for the link carrying the working tunnel, and the LMSP protection
belongs to service-layer protection. In the case of a link fault, it is expected that the LMSP protection switching occurs first to rectify the link fault. After the LMSP protection
switching, if the working tunnel is normal, the tunnel APS protection switching does not occur. The LMSP protection switching requires a certain period of time, so you need to set
the hold-off time for the tunnel APS protection group to ensure that the LMSP can resolve problems at the service layer. The hold-off time for the tunnel APS protection group must
be larger than the LMSP protection switching time.
When the protection tunnel is the IP/GRE tunnel, Hold-off Time (100 ms) is always 0 ms.
Transmit and Receive Status of Enabled, Disabled Specifies whether to receive and transmit the APS protocol packets. If this parameter is enabled, the APS alarm can be detected.
Protocol Packet When the protection tunnel is the MPLS tunnel and the working tunnel is the IP/GRE tunnel, Transmit and Receive Status of Protocol Packet is always Enabled.
When both the protection tunnel and working tunnel are the MPLS tunnel, Transmit and Receive Status of Protocol Packet is always Enabled.
When both the protection tunnel and working tunnel are the IP/GRE Tunnel, Transmit and Receive Status of Protocol Packet is always Disabled.
Switching Status No Request (Working Active), No Request Indicates the switching status of the protection group.
(Protection Active), Lockout (Working Active),
Forced Switching(Protection Active), Working
Signal Failure (Protection Active), Protection
Signal Failure (Working Active), Protection Signal
Degrade (Working Active), Working Signal
Degrade (Protection Active), Manual Switch to
Working path, Manual Switch to Protection path,
Wait-to-Restore (Protection Active), Do Not Revert
(Protection Active), Exercise Switching (Working
Active), Exercise Switching (Protection Active),
Reverse Request (Working Active), Reverse
Request (Protection Active)
Deployment Status Deployed, Undeployed Display the deployment status of the tunnel.
Unit Working, Protection Specifies whether a tunnel is the working or protection tunnel.
Active Tunnel Active, Standby Indicates the tunnel that is currently used.
Tunnel Status Available, Unavailable Indicates the status of the working or protection tunnel.
Tunnel Type MPLS Tunnel, IP Tunnel, GRE Tunnel Specifies the type of the working tunnel.
Ingress Tunnel Example: IP Tunnel-1 Specifies the working and protection ingress tunnels.
Egress Tunnel Example: Tunnel005-MPLS Tunnel-5(Source Specifies the working and protection egress tunnels.
Node:1.0.0.14,Sink Node:1.1.1.2)
Switching upon FD/FDV Enabled, Disabled Specifies whether to enable switching upon FD/FDV.
FDV Difference Never trigger switching, 100-65535 Specifies the FDV difference.
4.8.1 MPLS-TP Ring Network Protection Functions Supported by Chassis-shaped PTN Devices
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-36 MPLS-TP ring network protection specifications
4.8.2 MPLS-TP Ring Network Protection Functions Supported by Case-shaped PTN Devices
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-37 MPLS-TP ring network protection specifications (on the PTN 910, PTN 910-F, PTN 950, and PTN 960)
Function Description PTN 910 PTN 910-F PTN 950 PTN 960
Table 4-38 MPLS-TP ring network protection specifications (on the PTN 905A, PTN 905B, PTN 906A and PTN 906B)
Function Description PTN 905A PTN 905B PTN 906A PTN 906B
28 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
NOTICE:
Before configuring MPLS-TP ring binding, ensure that the MPLS-TP ring protection group is functioning properly, avoiding service interruption after the binding. For details, see 4.8.5.1 Checking the Correctness of MPLS-TP Protection Ring.
Figure 4-12 shows the configuration process of MPLS-TP single-ring protection. For details on each task, see the corresponding topic.
Figure 4-12 Configuration process of MPLS-TP single-ring protection
Task Remarks
1. Creating Network To create a network, you need to create NEs, uploading NE Data, create fibers, and configure the clock.
2. Configuring the Interface Set the Basic Attributes and Layer 3 attributes (tunnel enable status and IP address) for interfaces to carry the tunnel carrying.
3. Configuring the Tunnel Configure a static MPLS tunnel.
Configure an MPLS tunnel in the per-NE or end-to-end mode. Specify the tunnel ID, set signaling type to static CR, name the tunnel, and specify the ingress node, egress node, and transit node.
4. Creating an MPLS-TP Protection Ring Set the ring name, east/west interfaces, OAM attributes, APS attributes, and advanced attributes.
5. Configuring an MPLS-TP Ring Binding Bind a static MPLS tunnel to the MPLS-TP ring protection.
Figure 4-13 shows the configuration process of MPLS-TP intersecting-ring protection. You are advised to configure and manage the MPLS-TP ring protection based on this process.
Figure 4-13 Configuration process of MPLS-TP intersecting-ring protection
Task Remarks
1. Creating Network To create a network, you need to create NEs, uploading NE Data, create fibers, and configure the clock.
2. Configuring the Interface Set the Basic Attributes and Layer 3 attributes (tunnel enable status and IP address) for interfaces to carry the tunnel carrying.
3. Configuring the Tunnel Configure a static MPLS tunnel.
Configure an MPLS tunnel in the per-NE or end-to-end mode. Specify the tunnel ID, set signaling type to static CR, name the tunnel, and specify the ingress node, egress node, and transit node.
4. Creating MPLS-TP Protection Rings Set the ring names, east/west interfaces, OAM attributes, APS attributes, and advanced attributes.
5. Configuring Intersecting Nodes for MPLS-TP Ring Protection Configure intersecting nodes to achieve cross-ring protection.
6. Configuring an MPLS-TP Ring Binding Bind a static MPLS tunnel to the MPLS-TP ring protection.
Prerequisites
Context
It is recommended that you add NEs clockwise or anti-clockwise on the main topology. Then the NMS creates an MPLS protection ring according to the sequence in which NEs are added.
Each node on a ring network uses two ports to transmit and receive data. The two ports are referred to as east or west ports according to their roles on the ring topology. The west or east attribute is independent of the NE positions on the physical
topology, but depends on the order in which NEs are added .East and west interfaces are generated as follows:
If NEs are added to a ring network clockwise, the clockwise inbound interfaces are east interfaces, and the clockwise outbound interfaces are west interfaces.
If NEs are added to a ring network clockwise, the clockwise inbound interfaces are east interfaces, and the counterclockwise outbound interfaces are west interfaces.
Configuration Guide
29 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
NOTE:
PTN 3900/3900-8/1900/910/950/960: On a ring network, the east and west ports on the same NE should be configured on different processing boards or interface boards corresponding to different processing boards. If the east and west ports on the same NE are configured on the same board,
ring network protection will fail when the NE is faulty.
Table 4-41 lists the interface groups for OptiX PTN 1900. When TN73CXP is used to configure ring network protection, if an interface in one group is used as an east port, the west port must be a port in the other group. If the interface board corresponding to TN73CXP is housed in slot 3, ring
network protection cannot be configured.
Before creating a ring network, choose Service > IP Protection Subnet > Search for Ring-bindable Tunnel to search for the tunnels that can be bound. After creating the ring network, re-search for the tunnels that can be bound and compare the two search results to determine the tunnels that
are bound to the ring network.
Interface Group Port on TN73CXP Port on Interface Board (Used with TN73CXP)
Procedure
1. Choose Service > IP Protection Subnet > Create MPLS Protection Ring from the main menu.
2. Configure basic information. For details on the parameters for MPLS-TP protection ring, see Descriptions of the parameters for creating MPLS-TP protection ring.
NOTE:
PTN equipment only supports ring protection of wrapping type. In wrapping mode, protection switching is triggered by a fault detection point and auto-loopback is performed on the fault node.
NOTE:
If the position of an NE needs to be changed after it is added on the ring network, click Up or Down to move the NE on the MPLS protection ring.
4. Click Detail. Set the advanced parameters, OAM parameters, and APS parameters.
a. Optional: Click the Advanced Properties tab and set the bandwidth parameters.
NOTE:
The CIR of all the tunnels bound to a ring cannot exceed half of the CIR of the ring. The CIR of all the tunnels that are not bound to any ring on the port plus the CIR of all the rings on the port cannot be larger than the maximum CIR reserved for the port. The CIR of a
ring minus the CIR of all the tunnels bound to the ring is the remaining bandwidth of the ring.
The PIR of the tunnels bound to a ring must not exceed the PIR of the ring.
For the TND1CXP board on a PTN 950, when rings, tunnels (excluding tunnels in ring networks) and QinQ bandwidth are configured, ensure that the total bandwidth of all CIRs does not exceed the port bandwidth minus 128 kbit/s and the bandwidth has been reserved
for OAM packets.
For the TNC1CXPA/B/G/H/I board on a PTN 910, when rings, tunnels (excluding tunnels in ring networks) and QinQ bandwidth are configured, ensure that the total bandwidth of all CIRs does not exceed the port bandwidth minus 128 kbit/s and the bandwidth has
been reserved for OAM packets.
For the TND3CXPA/B board on a PTN 960, when rings, tunnels (excluding tunnels in ring networks) and QinQ bandwidth are configured, ensure that the total bandwidth of all CIRs does not exceed the port bandwidth minus 128 kbit/s and the bandwidth has been
reserved for OAM packets.
Reserved bandwidth can be specified for a tunnel. To specify reserve bandwidth for a tunnel, select the desired NE in the NE Explorer, click Configuration > MPLS Management > MPLS-TP Shared Protection Ring Management, and choose the Reserved
Bandwidth tab. For related parameters, see Table 4-54.
b. Optional: Click the OAM tab and set the OAM parameters.
NOTE:
Enable the OAM function to detect the network continuity.
Set Frequency to 3.3 ms to ensure that protection switching time is within 50 ms.
The SD Threshold (%) is smaller than or equal to the SF Threshold (%).
c. Optional: Click the APS tab and set the APS parameters.
NOTE:
Enable the APS function so that protection switching can be triggered when a fault is detected using OAM packets.
5. Click OK.
Follow-up Procedure
NOTICE:
Before deleting a protection ring, delete the service-free tunnels and intersecting nodes on a protection ring.
1. Choose Service > IP Protection Subnet > Manage MPLS Protection Ring from the main menu.
30 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Select one or more protection rings to be deleted, right-click, and choose Delete ServiceDelete.
4. The Warning dialog box is displayed, indicating that this operation may interrupt services. Click Yes.
5. The Rewarning dialog box is displayed. Click Yes.
Prerequisites
Procedure
1. Choose Service > IP Protection Subnet > Manage MPLS Protection Ring from the main menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Select a ring and click the Intersecting MPLS Ring tab in the lower-left corner.
4. Click Add Virtual Node. In the Add Virtual Node dialog box, select a protection ring that intersects with the selected ring.
NOTE:
If two intersecting rings have multiple intersecting nodes, the NMS automatically selects the two intersecting nodes that are farthest apart as the intersecting node for ring protection.
5. Click OK.
6. The Result dialog box is displayed, indicating that the operation succeeds. Click Close.
Follow-up Procedure
1. Choose Service > IP Protection Subnet > Manage MPLS Protection Ring from the main menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Select a ring and click the Intersecting MPLS Ring tab in the lower-left corner.
4. Select an intersecting ring to be deleted, and click Delete Virtual Node.
5. The Prompt dialog box is displayed. Click Yes.
6. The Result dialog box is displayed, indicating that the operation succeeds. Click Close.
Prerequisites
NOTICE:
Before configuring MPLS-TP ring binding, ensure that the MPLS-TP ring protection group is functioning properly, avoiding service interruption after the binding. For details, see 4.8.5.1 Checking the Correctness of MPLS-TP Protection Ring.
NOTE:
An MPLS protection ring can be bound to a tunnel only when at least two intersecting points are available for the ring and tunnel.
Procedure
1. Choose Service > Tunnel > Manage Tunnel from the main menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
NOTE:
Alternatively, you can choose Service > IP Protection Subnet > Search for Ring-bindable Tunnel to access the Manage Tunnel window.
3. Right-click one or more static tunnels and choose Bind MPLS Ring from the shortcut menu. The Binding MPLS protection ring dialog box is displayed.
NOTE:
Select the tunnel to be bound to the ring network, right-click, and choose Protection Group > Query Switching Status from the shortcut menu to check whether tunnel protection is configured and whether the status is normal. If the status is abnormal, troubleshoot it.
The ring network does not support 1+1 APS protection. If 1+1 APS protection is configured for the tunnel, right-click the tunnel, choose Protection Group > View Protection Group from the shortcut menu to access the Manage Protection Group window, and change the
protection mode to 1:1.
4. In the Binding MPLS protection ring dialog box, select a desired tunnel and click the Ring Binding tab. On the Ring Binding tab, select a protection ring to be bound.
NOTE:
You can select one or more tunnels and bound the tunnels to rings in batches,A maximum of 200 tunnels can be selected.
The default optimal ring is selected by observing the following rule: Service traffic must be switched to the ring from the first possible node and leaves the ring at the farthest node after traveling along an as-long-as-possible path.
The U2000 allows you to specify a required protection ring based on the following rule: A newly bound ring cannot overwrite or be overwritten by the ring that has been bound to the specific tunnel.
If ring binding fails, the tunnel automatically rolls back to the status before the binding.
5. Click OK.
6. The Warning dialog box is displayed, indicating that this operation may interrupt services. Click Yes.
7. The Rewarning dialog box is displayed. Click Yes.
31 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
8. The Result dialog box is displayed, indicating that the operation succeeds. Click Close.
Follow-up Procedure
Method 1:
1. Choose Service > IP Protection Subnet > Manage MPLS Protection Ring from the main menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Select a ring and click the Binded Tunnel tab in the lower-left corner.
4. Select one or more tunnels to be unbinded. Click Unbind MPLS Protection Ring.
5. The Confirm dialog box is displayed, indicating that this operation may interrupt services. Click OK.
6. The Rewarning dialog box is displayed. Click Yes.
7. The Result dialog box is displayed, indicating that the operation succeeds. Click Close.
Method 2:
1. Choose Service > Tunnel > Manage Tunnel from the main menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Select a static tunnel and click the MPLS Protection Ring tab in the lower-left corner.
4. select a ring binded and click Unbind MPLS Protection Ring.
5. The Warning dialog box is displayed, indicating that this operation may interrupt services. Click Yes.
6. The Rewarning dialog box is displayed. Click Yes.
7. The Result dialog box is displayed, indicating that the operation succeeds. Click Close.
Prerequisites
Procedure
1. Choose Service > IP Protection Subnet > Manage MPLS Protection Ring from the main menu.
2. In the Set Filter Criteria dialog box, set filter criteria as required. Then click Filter. The services meeting the filter criteria are displayed in the query result area.
3. Optional: Select related MPLS-TP protection ring, and query and correct the attributes of the protection ring in the Topology, Bound Tunnel, Intersecting MPLS Ring, Protection Attribute, and Advanced Attribute tabs below. For the
relevant parameters, refer to Descriptions of the parameters for MPLS protection ring management.
4. Right-click an MPLS-TP protection ring and choose Test and Check from the shortcut menu.
5. In the dialog box that is displayed, select the trail to be checked.
6. Set Diagnosis Option.
NOTICE:
The ping and tracert operations cannot be initiated at the same time. If ping and tracert operations are initiated at the same time, the operation results may be incorrect.
7. Click Run.
8. View the check results.
Prerequisites
Procedure
a. Choose Service > IP Protection Subnet > Manage MPLS Protection Ring from the main menu, and then the Manage MPLS Protection Ring and Set Filter Criteria windows are displayed.
b. Enter the filter criteria in the Set Filter Criteria window to filter the ring protection to be tested, and click Filter.
c. Right-click on the ring protection to be tested, and choose a window is displayed. Choose the Topo tab, and check West Status or East Status of the ring protection to be tested. Normally, the status is Idle State.
32 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
2. Perform a forced switching to the east or west ring protection and check its status after the switching.
a. Select the ring node to be tested, click East Maintance or West Maintance at the right bottom of the Topo tab, and select Manual Switching from the drop-down list. A warning dialog box is displayed prompting that services will
be interrupted by this action, and click OK to proceed the Manual switching.
b. Check West Status or East Status of the ring node to be tested. If the status is Manual switch, the Manual switching succeeds.
3. Click Clear All at the right bottom of the window, and then the ring protection is restored to normal status.
Prerequisites
NOTE:
If no tunnel is created before you create a VPLS service, choose Service > VPLS Service > Create VPLS Service > Details > PW Configuration > PW Configuration and click Create and Fill Tunnel to create tunnels. Note that you need to manually bind the created tunnels to the MPLS-
TP protection ring. If the tunnels are not bound to the ring, the created VPLS service cannot be protected by MRPS.
Procedure
1. Choose Service > VPLS Service > Create VPLS Service from the main menu.
2. In the Create VPLS Service dialog box, set Networking Mode to Ring and click Add. In the Select Ring dialog box, select the MPLS-TP protection ring for carrying the VPLS service.
3. Click Details, and set parameters on the VSI Configuration, PW Configuration, and SAI Configuration tab pages based on the plan.
NOTE:
Only In Block Point or Out Block Point of one PW on the PW Configuration sub-tab page that is on the PW Configuration tab page can be set to Enable, because only one block point can be configured for an MPLS-TP protection ring.
The values of In Block Point and Out Block Point of a PW are associated as follows: When In Block Point of a PW is set to Enable, Out Block Point of the PW is automatically set to Disable and cannot be changed; the opposite is also true.
After you set block points on a PW, the services carried on the PW and configure OAM are interrupted. Therefore, when you enable PW OAM for the PW, OAM alarms are reported. These alarms do not actually indicate that the services are affected as the PW normally does not
carry services. It is recommended that you disable PW OAM before setting block points on a PW.
Only one PW can be configured between intersecting nodes of intersecting rings.
4. Click OK.
5. The Warning dialog box is displayed, indicating that this operation may interrupt services. Click Yes.
6. The Rewarning dialog box is displayed. Click Yes.
7. The Result dialog box is displayed, indicating that the operation is successful. Click Close.
LSR ID Definition: -
Indicates the LSR ID of an NE. The ID must be unique on the network.
33 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Indicates the committed information rate for a service that traverses the tunnel. The packets The committed bandwidth must be smaller than or equal to the remaining uplink bandwidth on a
within this bandwidth range can be completely forwarded. If the rate of the packets entering the link.
queue is smaller than or equal to the CIR, all the packets are forwarded. If the rate of the packets Example:
entering the queue is bigger than the CIR, the scheduling algorithm discards packets according to 100 Mbit/s
a certain packet loss policy.
NOTE:
Only one OAM mode takes effect, even if the NE supports both OAM modes. To modify the OAM mode,
choose Configuration > NE Batch Configuration > MPLS OAM Configuration from the main menu.
NOTE:
This parameter is associated with Enable Status on the APS tab page. When this parameter is set to
Enabled, Enable Status on the APS tab page is set to Enabled automatically.
SD Definition: Rule:
Specifies an SD threshold. An SD alarm is reported if the packet loss ratio of OAM packets on The SF threshold must be equal to or greater than the SD threshold.
the detection path exceeds the SD threshold.
SF Definition:
Specifies an SF threshold. An SF alarm is reported if the packet loss ratio of OAM packets on the
detection path exceeds the SF threshold.
NOTE:
This parameter is associated with Enable Status on the OAM tab page. When this parameter is set to
Enabled, Enable Status on the OAM tab page is set to Enabled automatically.
Parameter Description
Button Description
Lock All Locks all NEs on an MPLS protection ring to the working path.
Clear All Clears the switching on the entire MPLS protection ring to restore the MPLS protection ring to the initial state.
East Maintance Clear Switching To restore an MPLS protection ring to the initial state, perform any of the following operations before clearing switching.
West Maintance
Lock Switching If lockout of switching is configured, an interface is not switched when it should be switched but is recovered when it should be recovered. Services are locked to the working path no matter
whether the working or protection path is functioning properly.
34 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Button Description
Force Switching Force switching is to forcibly switch services from the working path to the protection path, regardless of the MPLS protection ring status.
Manual Switching Manual switching is to switch services from the working path to the protection path. If the protection path is functioning properly, the switching can be performed. If the protection path is
faulty or is serving a high-priority switching, the switching cannot be performed.
Exercise Switching Exercise switching is to simulate a switching to test the protection function of a protection group. Services are not interrupted.
Parameter Description
Direction Definition:
Indicates the direction of a tunnel. The available options are Unidirectional and Bidirectional.
Tunnel ID Definition:
Indicates the ID of a tunnel. Tunnels are queried based on their IDs. A tunnel ID must be unique on the network.
Parameter Description
Node Definition: -
Indicates the name of an NE on an MPLS protection ring.
35 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Reserved Bandwidth on Eastern Interface(kbit/s) Example: 125 Specifies the reserved bandwidth on the east port.
NOTE:
Do not set reserved bandwidth on both the east port and the west port to 0.
Reserve bandwidth on the east and west ports for a bidirectional tunnel and reserve bandwidth only on the
outgoing port for a unidirectional tunnel.
Reserved Bandwidth on Western Interface(kbit/s) Example: 214 Specifies the reserved bandwidth on the west port.
PIR(kbit/s) Example: 248 Specifies the peak information rate (PIR) of a tunnel. The PIR of each tunnel cannot be higher
than the PIR of the ring.
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-55 PW APS specification
Configuring PW APS - √ √ √
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-56 PW APS specifications (on the PTN 910, PTN 910-F, PTN 950, and PTN 960)
Function Description PTN 910 PTN 910-F PTN 950 PTN 960
Configuring PW APS - √ √ √ √
Table 4-57 PW APS specifications (on the PTN 905A, PTN 905B,PTN 906A and PTN 906B)
Function Description PTN 905A PTN 905B PTN 906A PTN 906B
Configuring PW APS - √ √ √ √
Task Remarks
1. Create a working PW, a protection PW, and a PW APS protection group. Mandatory
1. When creating a service, create a working PW and a protection PW for the service. Set the parameters such as PW signal type, egress/incoming label, and bearer tunnel.
2. Create a protection group and set parameters such as protection group ID, WTR time (min), and hold-off time (ms).
NOTE:
For an MS PW, create an MS PW cross-connection. Set the parameters such as MS PW ID, forward PW, and backward PW. For configuration details see 7.13.4 Configuring an MS-PW.
Prerequisites
Configuration Guide
PW APS protection can be created for the CES service, ATM service, E-Line service, IP over PW service, or E-LAN service that is transported over PWs. You can also configure a PW APS protection group for a service either before or after creation of
the service.
When configuring a service, set Protection to PW APS, and create a working PW, a protection PW, and a PW APS protection group.
To create a PW APS protection group to an existing service, click the Protect Group tab.
To configure PW APS protection for SS-PWs or MS-PWs, create a PW APS protection group at the source and sink NEs.
NOTE:
This section considers the configuration of PW APS for an E-Line service as an example to show how to create a PW APS protection group.
PTN 3900/3900-8/1900/910/910-F/950/960/905A: For creation process of a CES service, see 7.4.5.4 Creating a UNI-NNI CES Service on a Per-NE Basis.
PTN 3900/3900-8/1900/910/910-F/950/960: For creation process of an ATM service, see 7.5.5.5 Creating ATM Services on a Per-NE Basis.
For creation process of an E-Line service, see 7.6.5.4 Creating a UNI-NNI E-Line Service Carried by a PW on a Per-NE Basis.
For creation process of an E-LAN service, see 7.7.5 Configuring a UNI-NNI E-LAN Service.
NOTE:
36 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
The working and protection channels should be configured on different paths. For the source and sink nodes, the working and protection channels should be configured on different processing boards or interface boards corresponding to different processing boards.For intermediate nodes, the working and
protection channels should be configured on different NEs. If the working and protection channels are configured on the same NE, the working and protection channels will fail simultaneously when the NE is faulty.
Procedure
1. In the NE Explorer, select an NE and choose Configuration > Ethernet Service Management > E-Line Service from the Function Tree.
2. Click the UNI tab and click New. Then, the New E-Line Service dialog box is displayed.
3. Set the parameters related to the E-Line service according to the networking planning. Set Direction to UNI-NNI, Protection Type to PW APS.
5. Set the parameters related to working PW and protection PW in the Basic Attributes tab.
6. Set the parameters related to the PW APS protection group in the Protect Group tab.
NOTE:
Enabling Status: When creating a PW APS protection group, set this parameter to Disabled. After creating APS protection groups on the nodes at both ends, start the APS protocol. For details, see 4.9.5 Starting the PW APS protocol.
Switchover WTR Time (min): indicates the time from recovery of the working PW to service switchover from the protection PW to the working PW. The WTR time setting helps avoid frequency switching caused by unstable quality of the working PW.
Switchover Hold-off Time (100 ms): When the SF state of the working PW is detected, protection switching does not occur immediately. Instead, protection switching occurs only on the condition that the SF state persists when the hold-off time expires. The hold-off time setting
helps avoid protection switching caused by the SF state that lasts transiently.
Enable PW OAM: When creating a PW APS protection group, also enable PW OAM to detect the status of a PW.
When Switching upon FD/FDV is enabled, the protection group supports switching upon FD/FDV. Before you enable and configure switching upon FD/FDV, be sure to configure PW performance monitoring. For configuration details, see Enabling the Performance Monitoring
and Management Function.
7. Click OK .
8. Refer to the preceding steps to configure the protection group on the sink NE.
9. Set Detection Packet Type to FFD and Detection Packet Period (ms) to 3.3 ms for PW OAM of the working PW and protection PW. For details, see 5.1.5.3.1 Starting the CV/FFD Check for a PW.
NOTE:
Detection Packet Period (ms) must be set to 3.3 ms for PW OAM so that the protection switching time is within 50 ms. Extensive delay variation on a network, however, results in repeated protection switching. Hence, the detection packet period must be larger than the maximum
network delay variation.
1. In the NE Explorer, select an NE and choose Configuration > Ethernet Service Management > E-Line Service from the Function Tree.
3. Select the E-Line service flow which the protection group is to be configured, click the Protect Group tab, and click PW APS.
6. Optional: Set the parameters related to QoS according to the networking planning in the QoS tab.
NOTE:
Bandwidth Limit: When you set this parameter to Enabled, you can set CIR(kbit/s) and PIR(kbit/s).
Policy: Select a policy from the created PW policy template.
7. Set the parameters related to the PW APS protection group in the Protection tab.
8. Click OK.
9. Refer to the preceding steps to configure the protection group on the sink NE.
10. Set Detection Packet Type to FFD and Detection Packet Period (ms) to 3.3 ms for PW OAM of the working PW and protection PW. For details, see 5.1.5.3.1 Starting the CV/FFD Check for a PW.
NOTE:
Detection Packet Period (ms) must be set to 3.3 ms for PW OAM so that the protection switching time is within 50 ms. Extensive delay variation on a network, however, results in repeated protection switching. Hence, the detection packet period must be larger than the maximum
network delay variation.
Result
1. In the NE Explorer, select an NE and choose Configuration > Ethernet Service Management > E-Line Service from the Function Tree.
2. Click Query in the Protect Group > PW APS tab, to check the status of the working PW and protection PW.
37 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
3. Click the Working PW ID or Protection PW ID parameter field, the PW Management interface is displayed.
4. Click Query, and close the Operation Result window.
5. Check Local Operating Status, Remote Operating Status, and Overall Operating Status of the working and protection PWs.
If the status is displayed as Up, the PW is normal.
If the status is displayed as Down, the PW is faulty. For details on how to rectify a PW fault, see the Troubleshooting.
Check whether the protection group is normal. For details, see 4.9.7 Testing PW APS.
Prerequisites
Procedure
1. In the NE Explorer, select an NE and choose Configuration > APS Protection Management from the Function Tree.
2. Click the PW APS Management tab, right-click the created APS protection group, and choose Start Protocol.
3. A dialog box is displayed, indicating that the operation is successful. In this case, Protection Group Status is displayed as Enabled.
4. Display the NE Explorer of the opposite NE and repeat the preceding steps to enable the PW APS protocol.
Prerequisites
Context
In the case of CES service, ATM service, E-Line services or E-LAN services carried over PWs, you can create PW APS protection pairs for them and bind the protection pairs to a PW APS protection group. You can bind the protection pairs during or
after creation of the services.
To bind a protection pair during service creation, set Protection Type to Slave Protection Pair, create the working PW and protection PW, and bind the protection pair to a PW APS protection group.
To bind a protection pair after service creation, choose Protection Group > Slave Protection Pair and add the protection pair to a PW APS protection group.
For PW APS binding of SS-PW or MS-PW, bind the protection pair at both the source NE and sink NE.
This section describes how to bind a protection pair for an E-Line service. Binding a protection group for other services is similar.
Procedure
1. In the NE Explorer, select an NE and choose Configuration > Ethernet Service Management > E-Line Service from the Function Tree.
2. Click the New. Then, the New E-Line Service dialog box is displayed.
3. Set the parameters related to the E-Line service according to the networking planning. Set the Direction to UNI-NNI and Protection Type to Slave Protection Pair.
4. Click Configure PW to display the Configure PW dialog box.
5. Set the parameters related to working PW and protection PW on the General Attributes tab
6. On the Protect Group tab, select the protection group to which the protection pair is to be bound.
7. Click OK.
1. In the NE Explorer, select an NE and choose Configuration > Ethernet Service Management > E-Line Service from the Function Tree.
3. Select the E-Line service for which a PW APS pair is to be created. Then, click Slave Protection Pair on the Protection Group tab.
5. Set the parameters related to protection PW according to the networking planning on the General Attributes tab.
6. Optional: Set the parameters related to QoS according to the networking planning on the QoS tab.
NOTE:
Bandwidth Limit: When you set this parameter to Enabled, you can set CIR(kbit/s) and PIR(kbit/s).
Policy: Select a policy from a created PW policy template.
38 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
7. On the Protection Group tab, select the protection group to which the protection pair is to be bound.
8. Click OK.
9. Display the NE Explorer of the opposite NE and repeat the preceding steps to create a protection pair on the opposite NE.
Result
1. In the NE Explorer, select an NE and choose Configuration > Ethernet Service Management > E-Line Service from the Function Tree.
2. Click Query on the Protection Group > Slave Protection Pair tab to check the status of the working PW and protection PW.
3. Click the Working PW ID or Protection PW ID parameter field, the PW Management interface is displayed.
4. Click Query, and close the Operation Result window.
5. Check Local Operating Status, Remote Operating Status, and Overall Operating Status of the working and protection PWs.
If the status is displayed as Up, the PW is normal.
If the status is displayed as Down, the PW is faulty. For details on how to rectify a PW fault, see the Troubleshooting.
Prerequisites
Context
You can check the PW connectivity through the PW OAM. For details, see 5.1.5.3 Configuring the MPLS PW OAM.
Procedure
1. In the NE Explorer, select an NE and choose Configuration > APS Protection Group from the Function Tree.
2. Click the PW APS Management tab, select the PW to be Queried, and right-click Query Switching Status. Normally, Working Path Availability and Protection Path Availability are displayed as Valid, Switchover Status as working and
Protocol Status as No Request(Working Active).
NOTE:
When both the working PW and protection PW are normal, the status is displayed as Valid. In case of a PW exception, the status is displayed as Invalid. In this case, rectify the PW fault. Double-click PW ID to display the PW Management interface. In the interface, check the status of the
PW and rectify the fault according to the PW status information.
3. Select a created protection group and choose Function > Manual Switching to Protection to switch the service to the protection PW.
4. Select the PW to be Queried, and right-click Query Switching Status,Switchover Status is displayed as Protecting and Protocol Status is displayed as Forced Switching(Protecting Active). This indicates that the service is switched to the
protection PW.
5. Choose Configuration > Ethernet Service Management > E-Line Service from the Function Tree.
6. Choose the service protected by the protection group, right-click it, and choose Browse Current Alarms from the shortcut menu. Then, check whether alarms are generated after the switching.
NOTE:
If alarms are generated, see Alarm Handling to handle the alarms.
If no alarm is generated, proceed to the next step.
7. Perform the service connectivity check through the Ethernet service OAM and check whether the services after switching are normal.
NOTE:
If the services are normal, the PW APS protection group is normal.
If the services are abnormal, the protection switching fails. For how to handle this fault, see Troubleshooting.
Follow-up Procedure
In the NE Explorer, select an NE and choose Configuration > APS Protection Group from the Function Tree.
Right-click the protection group under test and choose Clear from the shortcut menu to revert the services to the original working PW.
Peer Protection Group ID For example: 12 Specifies the ID of a peer protection group.
NOTE:
For the inter-NE protection, you need to specify the ID of the protection group of the peer NE. In
this way, the protection groups on both ends can negotiate and together implement the inter-NE PW
protection.
Protection Type No Protection, PW APS, MC PW APS, PW FPS, Slave Protection Pair Indicates the protection type of a protection group.
Protection Mode 1:1 When the protection type is 1:1 protection, the service is in the single-fed and single-
receiving mode.
Switchover Mode Dual-ended switching Indicates the switching status of a protection group.
NOTE:
OptiX PTN equipment support only the dual-ended switching.
Revertive Mode Non-Revertive, Revertive Determines whether the services are restored to the original working PW after the fault is
removed.
Revertive: In this mode, services are switched from the protection PW back to the
working PW after the working PW recovers. Generally, the revertive mode is
recommended, because the working PW has better performance than the protection PW.
Non-Revertive: In this mode, services keep traveling along the protection PW after the
working PW recovers. Because services will be temporarily interrupted during revertive
switching, using the non-revertive mode for services that require high reliability is
recommended.
Switchover WTR Time (min) 0 to 12 Specifies a delay in switching services back to the working PW after the working PW
recovers.
The switchover WTR time helps prevent services from frequently switching between the
working and protection PWs when the working PW is unstable.
Swtichover Hold-Off Time (100 ms) 0 to 100 Specifies a delay in switching services to the protection PW after the working PW fails.
If PW protection couples with another protection mechanism, an appropriately configured
switchover hold-off time can prevent switching conflicts between the two protection
mechanisms when a fault occurs.
Switchover Status In Working, In Protection Indicates the switching status of a protection group.
39 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
Protocol Status No Request (Working Active), No Request (Protection Active), Lockout (Working Indicates the protocol status.
Active), Forced Switching(Protection Active), Working Signal Failure (Protection Active),
Protection Signal Failure (Working Active), Protection Signal Degrade (Working Active),
Working Signal Degrade (Protection Active), Manual Switch to Working path, Manual
Switch to Protection path, Wait-to-Restore (Protection Active), Do Not Revert (Protection
Active), Exercise Switching (Working Active), Exercise Switching (Protection Active),
Reverse Request (Working Active), Reverse Request (Protection Active)
Working Path Availability Available, Unavailable Indicates the status of the working channel in a protection group.
Protection Path Availability Available, Unavailable Indicates the status of the protection channel in a protection group.
Deployment Status Deployed, Undeployed Display the deployment status of the protection group.
Switching upon FD/FDV Enabled, Disabled Specifies whether to enable switching upon FD/FDV.
FDV Difference Never trigger switching, 100-65535 Specifies the FDV difference.
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-60 PW FPS specification
Specifications
√ indicates that the PTN device supports this function, and × indicates that the PTN device does not support this function.
Table 4-61 PW FPS specifications (on the PTN 910, PTN 910-F, PTN 950, and PTN 960)
Function Description PTN 910 PTN 910-F PTN 950 PTN 960
Table 4-62 PW FPS specifications (on the PTN 905A, PTN 905B, PTN 906A and PTN 906B)
Function Description PTN 905A PTN 905B PTN 906A PTN 906B
Prerequisites
Context
Configure PW FPS 1:1 when you configure services. For details, see the procedure.
Configure PW FPS 1:1 for unprotected Ethernet services.
1. In the NE Explorer, select an NE and choose Configuration > Ethernet Service Management > E-Line Service from the Function Tree.
2. Click the Protect Group tab and then select PW FPS tab.
3. Click New. The Configure PW dialog box is displayed. Set parameters for the protection PW and PW FPS based on 5 to 8.
Procedure
1. In the NE Explorer, select an NE and choose Configuration > Ethernet Service Management > E-Line Service from the Function Tree.
2. Click New. Then, the New E-Line Service dialog box is displayed.
3. Set the parameters related to the E-Line service according to the networking planning. Set Direction to UNI-NNI, Protection Type to PW FPS.
4. Click Configure PW. The Configure PW dialog box is displayed.
5. Set the parameters related to working PW and protection PW in the Basic Attributes tab.
6. Optional: Set the parameters related to QoS according to the networking planning in the QoS tab.
NOTE:
Bandwidth Limit: When you set this parameter to Enabled, you can set CIR(kbit/s) and PIR(kbit/s).
7. Set the parameters related to the PW FPS protection group in the Protect Group tab.
40 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
NOTE:
PW FPS is configured only on the access side of PTN equipment. When creating a PW FPS protection group, set Enabling Status to Enabled.
Switchover WTR Time (min): indicates the time from recovery of the working PW to service switchover from the protection PW to the working PW. The WTR time setting helps avoid frequency switching caused by unstable quality of the working PW.
Switchover Hold-off Time (100 ms): When the SF state of the working PW is detected, protection switching does not occur immediately. Instead, protection switching occurs only on the condition that the SF state persists when the hold-off time expires. The hold-off time setting helps avoid
protection switching caused by the SF state that lasts transiently.
NOTE:
Detection Packet Type of working PW must be set to FFD, and Detection Packet Period (ms) of working PW must be set to 3.3 ms for PW OAM so that the protection switching time is within 50 ms. Extensive delay variation on a network, however, results in repeated protection
switching. Hence, the detection packet period must be larger than the maximum network delay variation.
9. Click OK. Then the New E-Line Service dialog box is displayed.
10. Optional: Configure a QoS policy.
a. Click Configure QoS. The Configure QoS dialog box is displayed. Click the blank area below Policy. Then a dialog box for selecting a V-UNI ingress policy is displayed.
b. Click OK to close the active dialog box and display the New E-Line Service dialog box.
11. Click OK to display the Operation Result dialog box, which indicates that the operation is successful. Then, click Close.
Result
1. In the NE Explorer, select an NE and choose Configuration > Ethernet Service Management > E-Line Service from the Function Tree.
2. Click Query in the Protection Group > PW FPS tab, to check the status of the working PW and protection PW.
3. Click the Working PW ID or Protection PW ID parameter field, the PW Management interface is displayed.
4. Click Query, and close the Operation Result window.
5. Check Local Operating Status, Remote Operating Status, and Overall Operating Status of the working and protection PWs.
If the status is displayed as Up, the PW is normal.
If the status is displayed as Down, the PW is faulty. For details on how to rectify a PW fault, see the Troubleshooting.
Check whether the protection group is normal. For details, see 4.9.7 Testing PW APS.
Prerequisites
Context
You can also configure a PW FPS 1+1 protection group for a CES service either before or after creation of the CES service.
Configure PW FPS 1+1 when you configure services. For details, see the procedure.
Configure PW FPS 1+1 for unprotected CES services.
1. In the NE Explorer, select an NE and choose Configuration > CES Service Management.
2. Click the Protect Group tab and then select PW FPS tab.
3. Click New. The Configure PW dialog box is displayed. Set parameters for the protection PW and PW FPS based on 5 to 9.
Procedure
1. In the NE Explorer, select an NE and choose Configuration > CES Service Management.
2. Click New. Then, the Create CES Service dialog box is displayed.
3. Set the parameters related to the CES service according to the networking planning. Set Mode to UNI-NNI, Protection Type to PW FPS. For details on the parameters for UNI-NNI service of CES, see Table 7-13.
41 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
6. Optional: Click QoS tab and set the related parameters. For details on the parameters for QoS, see Table 7-14.
NOTE:
EXP: Set the Ingress value only. 7 indicates the highest priority.
7. Click Advanced Attributes tab, and configure the related parameters. For details on the parameters for advanced attributes, see Table 7-15.
8. Click Protect Group tab and set the parameters related to the PW FPS protection group.
NOTE:
PW FPS is configured only on the access side of PTN equipment. When creating a PW FPS protection group, set Enabling Status to Enabled.
Switchover WTR Time (min): indicates the time from recovery of the working PW to service switchover from the protection PW to the working PW. The WTR time setting helps avoid frequency switching caused by unstable quality of the working PW.
Switchover Hold-off Time (100 ms): When the SF state of the working PW is detected, protection switching does not occur immediately. Instead, protection switching occurs only on the condition that the SF state persists when the hold-off time expires. The hold-off time setting helps avoid
protection switching caused by the SF state that lasts transiently.
9. Click PW OAM tab and set the parameters related to the PW OAM.
42 of 43 13-May-19, 7:41 PM
Configuring Tunnels and Tunnel Protection http://support.huawei.com/enterprise/docinforeader!loadDocument1.ac...
10. Click OK. Then the Create CES Service dialog box is displayed.
11. Click OK to display the Operation Result dialog box, which indicates that the operation is successful. Then, click Close.
Result
1. In the NE Explorer, select an NE and choose Configuration > CES Service Management.
2. Click Query in the Protection Group > PW FPS tab, to check the status of the working PW and protection PW.
3. Click the Working PW ID or Protection PW ID parameter field, the PW Management interface is displayed.
4. Click Query in the PW Management page, the Operation Result dialog box is displayed. Then, click Close.
5. Check Local Operating Status, Remote Operating Status, and Overall Operating Status of the working and protection PWs.
If the status is displayed as Up, the PW is normal.
If the status is displayed as Down, the PW is faulty. For details on how to rectify a PW fault, see the Troubleshooting.
43 of 43 13-May-19, 7:41 PM