Configuration Examples for the Financial Industry Issue 03 Date 2017-05-08 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China Website: http://e.huawei.com Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. i Configuration Examples for the Financial Industry Contents Contents 1 Preface..............................................................................................................................................1 2 Traditional Data Center Deployment Solution....................................................................... 4 2.1 Overview........................................................................................................................................................................ 5 2.1.1 Purpose........................................................................................................................................................................ 5 2.1.2 Typical Networking..................................................................................................................................................... 5 2.1.2.1 Logic Architecture.................................................................................................................................................... 5 2.1.2.2 Physical Architecture................................................................................................................................................7 2.1.2.3 Products Used........................................................................................................................................................... 8 2.1.3 Network Architecture Design...................................................................................................................................... 9 2.1.3.1 Core Switching Area................................................................................................................................................ 9 2.1.3.2 Open Platform Area..................................................................................................................................................9 2.1.3.3 Development and Testing Area.............................................................................................................................. 10 2.1.3.4 Operation and Management Area........................................................................................................................... 11 2.1.3.5 Local User Access Area......................................................................................................................................... 12 2.1.3.6 MAN/WAN Access Area........................................................................................................................................13 2.1.3.7 Extranet Area.......................................................................................................................................................... 14 2.1.3.8 Firewall Deployment.............................................................................................................................................. 16 2.2 Service Design and Configuration................................................................................................................................17 2.2.1 System Configuration................................................................................................................................................ 18 2.2.1.1 Device Login Configuration................................................................................................................................... 18 2.2.1.2 Device Naming Configuration................................................................................................................................21 2.2.1.3 Device Management Configuration........................................................................................................................23 2.2.1.4 Network Management Configuration..................................................................................................................... 23 2.2.1.5 Information Center Configuration.......................................................................................................................... 24 2.2.1.6 NTP Configuration................................................................................................................................................. 25 2.2.2 Service Configuration................................................................................................................................................25 2.2.2.1 Interface Configuration...........................................................................................................................................26 2.2.2.2 VLAN Configuration..............................................................................................................................................26 2.2.2.3 Link Aggregation Configuration............................................................................................................................ 28 2.2.2.4 IP Address Configuration....................................................................................................................................... 29 2.2.2.5 STP Configuration.................................................................................................................................................. 30 2.2.3 Reliability Configuration........................................................................................................................................... 33 2.2.3.1 VRRP Configuration.............................................................................................................................................. 33 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. ii Configuration Examples for the Financial Industry Contents 2.2.3.2 Smart Link Configuration.......................................................................................................................................34 2.2.3.3 DLDP......................................................................................................................................................................36 2.2.4 Routing Configuration............................................................................................................................................... 37 2.2.4.1 LAN Routing Configuration...................................................................................................................................39 2.2.4.2 Extranet Routing Configuration............................................................................................................................. 43 2.2.4.3 MAN/WAN Routing Configuration....................................................................................................................... 44 2.2.5 Security...................................................................................................................................................................... 44 2.2.5.1 ACL-based Antivirus Configuration...................................................................................................................... 44 2.2.5.2 Broadcast Storm Suppression Configuration......................................................................................................... 45 2.2.5.3 MAC Address Flapping Detection......................................................................................................................... 45 2.2.5.4 MAC Address Triggered ARP Entry Update......................................................................................................... 45 2.2.5.5 Loopback Detection on a Single Interface..............................................................................................................46 2.2.5.6 ARP Attack Defense Configuration....................................................................................................................... 46 2.2.6 Firewall Configuration.............................................................................................................................................. 48 3 M-LAG Data Center Deployment Solution........................................................................... 52 3.1 Overview...................................................................................................................................................................... 53 3.1.1 Purpose...................................................................................................................................................................... 53 3.1.2 Typical Networking................................................................................................................................................... 53 3.1.2.1 Logical Architecture............................................................................................................................................... 53 3.1.2.2 Physical Architecture..............................................................................................................................................55 3.1.2.3 Products Used......................................................................................................................................................... 57 3.1.3 Network Architecture Design.................................................................................................................................... 57 3.1.3.1 Core Switching Area.............................................................................................................................................. 57 3.1.3.2 Open Platform Area................................................................................................................................................57 3.1.3.3 Development and Testing Area.............................................................................................................................. 58 3.1.3.4 Operation and Management Area...........................................................................................................................59 3.1.3.5 Local User Access Area......................................................................................................................................... 61 3.1.3.6 MAN/WAN Access Area........................................................................................................................................61 3.1.3.7 Extranet Area.......................................................................................................................................................... 62 3.1.3.8 Firewall Deployment.............................................................................................................................................. 65 3.2 Service Design and Configuration................................................................................................................................66 3.2.1 System Configuration................................................................................................................................................ 66 3.2.1.1 Device Login Configuration................................................................................................................................... 67 3.2.1.2 Device Naming Configuration................................................................................................................................70 3.2.1.3 Device Management Configuration........................................................................................................................71 3.2.1.4 Network Management Configuration..................................................................................................................... 72 3.2.1.5 Information Center Configuration.......................................................................................................................... 72 3.2.1.6 NTP Configuration................................................................................................................................................. 73 3.2.2 Service Configuration................................................................................................................................................74 3.2.2.1 Interface Configuration...........................................................................................................................................74 3.2.2.2 VLAN Configuration..............................................................................................................................................74 3.2.2.3 Link Aggregation Configuration............................................................................................................................ 75 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. iii Configuration Examples for the Financial Industry Contents 3.2.2.4 IP Address Configuration....................................................................................................................................... 76 3.2.2.5 STP Configuration.................................................................................................................................................. 77 3.2.3 Reliability Configuration........................................................................................................................................... 77 3.2.3.1 M-LAG Configuration............................................................................................................................................77 3.2.3.2 Monitor Link Configuration................................................................................................................................... 79 3.2.3.3 Dual-Active Gateway Configuration......................................................................................................................80 3.2.4 Routing Configuration............................................................................................................................................... 81 3.2.4.1 LAN Routing Configuration...................................................................................................................................84 3.2.4.2 Extranet Routing Configuration............................................................................................................................. 88 3.2.4.3 MAN/WAN Routing Configuration....................................................................................................................... 89 3.2.5 Security Configuration.............................................................................................................................................. 89 3.2.5.1 ACL-based Antivirus Configuration...................................................................................................................... 89 3.2.5.2 Broadcast Storm Suppression Configuration......................................................................................................... 90 3.2.5.3 MAC Address Flapping Detection......................................................................................................................... 90 3.2.5.4 MAC Address Triggered ARP Entry Update......................................................................................................... 90 3.2.5.5 Loopback Detection on a Single Interface..............................................................................................................91 3.2.5.6 ARP Attack Defense Configuration....................................................................................................................... 91 3.2.6 Firewall Configuration.............................................................................................................................................. 93 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network............................................................................................................................ 97 4.1 Overview...................................................................................................................................................................... 98 4.1.1 Purpose...................................................................................................................................................................... 98 4.1.2 Typical Networking................................................................................................................................................... 98 4.1.2.1 Logic Architecture.................................................................................................................................................. 98 4.1.2.2 Physical Architecture............................................................................................................................................100 4.1.3 Version Support....................................................................................................................................................... 101 4.1.4 Solution Restrictions................................................................................................................................................102 4.2 Network Deployment................................................................................................................................................. 105 4.2.1 Network Deployment Panorama............................................................................................................................. 105 4.2.2 Checking Software and Hardware Environments....................................................................................................106 4.2.3 Underlay Network Configuration............................................................................................................................ 109 4.2.3.1 Configuring Network Management......................................................................................................................109 4.2.3.2 Configuring TOR Stack Working Group..............................................................................................................109 4.2.3.3 Configuring a TOR M-LAG................................................................................................................................. 113 4.2.3.4 Configuring Spine Nodes......................................................................................................................................118 4.2.3.5 Configuring a Gateway M-LAG...........................................................................................................................121 4.2.3.6 Configuring Firewalls...........................................................................................................................................128 4.2.3.7 Configuring SNMP...............................................................................................................................................132 4.2.3.8 Configuring NETCONF....................................................................................................................................... 136 4.2.3.9 Configuring LLDP................................................................................................................................................138 4.2.3.10 Configuring VXLAN..........................................................................................................................................138 4.2.3.11 (Optional) Configuring Load Balancers............................................................................................................. 140 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. iv Configuration Examples for the Financial Industry Contents 4.2.4 Installing the AC-DCN............................................................................................................................................ 141 4.2.5 Pre-configuring the AC-DCN..................................................................................................................................142 4.2.5.1 Logging In to the AC-DCN.................................................................................................................................. 142 4.2.5.2 Applying For and Loading a License File............................................................................................................ 143 4.2.5.3 Discovering Network Devices..............................................................................................................................144 4.2.5.4 Creating and Configuring a POD......................................................................................................................... 144 4.2.5.5 Discovering and Adding Links.............................................................................................................................146 4.2.5.6 Defining Network Device Roles...........................................................................................................................147 4.2.5.7 Configuring an Access Switch Group, Gateway Group, and Firewall Group......................................................147 4.2.5.8 Adding LBs and Links..........................................................................................................................................148 4.2.5.9 Configuring NVE Nodes...................................................................................................................................... 149 4.2.5.10 Configuring Internal and External Links Between Firewalls and Gateways..................................................... 151 4.2.5.11 Configuring Resources for Interface Interconnection........................................................................................ 152 4.2.5.12 Configuring Available VNI, VLAN, and BD Ranges........................................................................................ 153 4.2.5.13 Configuring a PXE Network.............................................................................................................................. 154 4.2.6 Interconnecting the AC-DCN with FusionSphere OpenStack................................................................................ 155 4.2.6.1 Creating a Management Network for FusionSphere............................................................................................ 155 4.2.6.2 Installing and Configuring FusionSphere OpenStack.......................................................................................... 156 4.2.6.3 Installing Interconnection Plug-ins.......................................................................................................................157 4.2.6.4 Creating a Northbound Interface Operator........................................................................................................... 158 4.2.6.5 Configuring a Cloud Platform.............................................................................................................................. 159 4.2.6.6 Binding the Cloud Platform to a POD..................................................................................................................160 4.2.6.7 Adding Servers to the POD.................................................................................................................................. 160 4.2.6.8 Configuring External Networks............................................................................................................................162 4.2.6.9 Interconnecting FusionSphere with a VMM........................................................................................................ 164 4.2.7 Interconnecting the AC-DCN with Open-Source OpenStack................................................................................. 164 4.2.7.1 Creating a Management Network for OpenStack.................................................................................................164 4.2.7.2 Installing and Configuring OpenStack................................................................................................................. 166 4.2.7.3 Installing Interconnection Plug-ins.......................................................................................................................167 4.2.7.4 Configuring the Interconnection on OpenStack................................................................................................... 167 4.2.7.5 Creating a Northbound Interface Operator........................................................................................................... 172 4.2.7.6 Configuring a Cloud Platform.............................................................................................................................. 174 4.2.7.7 Binding the Cloud Platform to a POD..................................................................................................................175 4.2.7.8 Adding Servers to the POD.................................................................................................................................. 175 4.2.7.9 Configuring External Networks............................................................................................................................177 4.2.7.10 Interconnecting OpenStack with a VMM...........................................................................................................178 4.2.8 Deploying the Overlay Network..............................................................................................................................178 4.2.9 Common Operation Guide.......................................................................................................................................178 4.2.9.1 Adding a TOR Node.............................................................................................................................................179 4.2.9.2 Replacing a Device............................................................................................................................................... 180 4.2.9.3 Deleting a Device................................................................................................................................................. 181 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. v 1 Preface Configuration Examples for the Financial Industry 1 Preface The information in this document is subject to change without notice. It is provided only for reference. The commands and command outputs of different versions may be different; therefore, the command outputs on your device may be different from that provided in this document. Intended Audience This document is a reference for network planning and device configuration. This document is intended for: l Data configuration engineers l Commissioning engineers l Network monitoring engineers l System maintenance engineers Symbol Conventions The symbols that may be found in this document are defined as follows. Symbol Description Indicates an imminently hazardous situation which, if not avoided, will result in death or serious injury. Indicates a potentially hazardous situation which, if not avoided, could result in death or serious injury. Indicates a potentially hazardous situation which, if not avoided, may result in minor or moderate injury. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 1 Configuration Examples for the Financial Industry Symbol 1 Preface Description Indicates a potentially hazardous situation which, if not avoided, could result in equipment damage, data loss, performance deterioration, or unanticipated results. NOTICE is used to address practices not related to personal injury. Calls attention to important information, best practices and tips. NOTE is used to address information not related to personal injury, equipment damage, and environment deterioration. Command Conventions Convention Description Boldface The keywords of a command line are in boldface. Italic Command arguments are in italics. [] Items (keywords or arguments) in brackets [ ] are optional. { x | y | ... } Optional items are grouped in braces and separated by vertical bars. One item is selected. [ x | y | ... ] Optional items are grouped in brackets and separated by vertical bars. One item is selected or no item is selected. { x | y | ... }* Optional items are grouped in braces and separated by vertical bars. A minimum of one item or a maximum of all items can be selected. [ x | y | ... ]* Optional items are grouped in brackets and separated by vertical bars. Several items or no item can be selected. &<1-n> The parameter before the & sign can be repeated 1 to n times. # A line starting with the # sign is comments. Change History Changes between document issues are cumulative. Therefore, the latest document version contains all updates made to previous versions. Changes in Issue 03 (2017-05-08) for Product Version This version is updated according to product changes. Changes in Issue 02 (2016-09-10) for Product Version This version has the following updates: The following information is added: Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 2 Configuration Examples for the Financial Industry 1 Preface l M-LAG Data Center Deployment Solution l DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Changes in Issue 01 (2015-10-10) for Product Version Initial commercial release. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 3 Configuration Examples for the Financial Industry 2 2 Traditional Data Center Deployment Solution Traditional Data Center Deployment Solution 2.1 Overview 2.2 Service Design and Configuration Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 4 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution 2.1 Overview 2.1.1 Purpose This document provides a detailed data center design for a level-1 bank branch, covering the network architecture, IP address and VLAN planning, routing design, security design, network reliability design, and network management system design for the data center. You can use this document as a reference for data center project implementation. 2.1.2 Typical Networking 2.1.2.1 Logic Architecture The following figure shows the logical topology of the level-1 bank branch's data center network, which is divided into multiple areas depending on the functions provided. The following describes the functional areas. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 5 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution Area Function and Positioning Accessible To Open platform area: OP Provides access to running open systems, including the accounting system as well as other accounting relevant and irrelevant service systems. This area is a major business area for communication between production and office departments. Clients and servers Operation and management area: OM Has servers deployed for system operations, monitoring, and maintenance. This area is responsible for network and system management and maintenance. Only a few authorized maintenance users Development and testing area: DT Accommodates servers of systems that have not been put into use, including the hosts and open platform systems that are under development or testing. Clients and servers MAN/WAN access area (WN/MN) Connects the level-1 bank branch to the head office and its data center, downstream level-2 branches and outlets, as well as offices, branches, and outlets in the local city. This area provides connections to the level-1 bank branch's LANs and subordinate branches. ATM machines, POS machines, teller terminals, maintenance users, office terminals, and terminals in business centers Local user access area: LU Allows access of various user terminals. Local maintenance users, local office terminals, and terminals in local business centers DMZ Extranet: EP Implements interconnection with business platforms of partners, major accounts, and agents through lines of carriers. Partners, international branches, off-bank devices (3G/2G/PSTN), telephone banking systems, and customer service centers The level-1 bank branch's data center network is logically divided into three layers: core, distribution, and access layers. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 6 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution l Core layer: high-speed Layer 3 switching backbone network. This layer is not directly connected to terminals or servers and does not provide functions that will affect highspeed switching performance, such as ACL. l Distribution layer: boundary of Layer 2 and Layer 3 networks, and boundary of functional areas. This layer connects to the core layer at Layer 3 and connects to the access layer at Layer 2. It provides the following functions: l – Acts as a unified gateway for terminals and servers in the functional areas. – Summarizes routes within each functional area. – Implements intra-VLAN routing within each functional area. – Provides routing policies for communication between functional areas and the core layer. – Applies ACLs to control communication between systems within a functional area. – Has firewalls deployed to enforce access control between areas. Access layer: connects to the distribution layer and consists of the following devices: – Access switch (AS) Provides Layer 2 access for servers and terminals and isolates users through VLANs. – Access router (AR) Provides access to the WAN and MAN networks, and functions as autonomous system boundary router (ASBR) to implement routing control. 2.1.2.2 Physical Architecture The following figure shows the physical network connections of the level-1 bank branch's data center. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 7 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution In the core switching area, two high-performance data center switches are deployed, and they are interconnected through 10GE bundled links to provide highly reliable, high-speed switching. The switches in the core switching area and distribution layer are connected in square networking to implement redundancy of physical links, enhancing network reliability. The core switches and distribution switches are connected using bundled 10GE or GE links. The distribution layer of each area has two high-performance switches deployed for traffic aggregation in the area. The two switches are interconnected using bundled 10GE or GE links depending on the line cards used in the switches. Access switches in each area are dualhomed to two distribution switches. Firewalls are deployed in each area for access control. Firewalls are connected to distribution switches in bypass mode through bundled GE links The two firewalls in an area work in active/standby mode. If the active firewall fails, traffic can be switched to the standby firewall within a short time. If both firewalls fail, service traffic is switched to the bypass link without passing through the firewalls, ensuring nonstop data forwarding and service operations. The two pairs of firewalls in the extranet area are connected to distribution switches, access switches, and access routers in square networking to enhance network reliability. 2.1.2.3 Products Used Huawei CE12816, CE12808, and CE6800 switches are used at the core layer, distribution layer, and access layer, respectively. Huawei NE40E-X8 is used at the access layer as access router. Huawei USG5500 is used as firwall. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 8 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution 2.1.3 Network Architecture Design 2.1.3.1 Core Switching Area The following figure shows the core switching area of the level-1 bank branch's data center. The core layer connects to each functional area in the data center. Two high-performance CE12816 data center switches are deployed at the core layer, which are interconnected using an Eth-Trunk of two 10GE links to enhance connection reliability. Product model: Core switch (CS): Huawei CE12816 2.1.3.2 Open Platform Area The following figure shows the open platform area of the level-1 bank branch's data center. The distribution layer of the open platform area has two high-performance CE12808 data center switches, which use 2x10GE inter-card Eth-Trunk links to connect to each other and the upstream core switches. The CE6800 switches at the access layer are dual-homed to the CE12808 switches through GE links. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 9 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution The egress of the area has firewalls deployed in bypass mode to ensure secure communication between the open platform area and other functional areas. The firewalls use 4xGE inter-card Eth-Trunk links for uplink and downlink connections. Product models: Core switch (CS): Huawei CE12816 Distribution switch (DS): Huawei CE12808 Access switch (AS): Huawei CE6800 Firewall: Huawei USG5500 2.1.3.3 Development and Testing Area The following figure shows the development and testing area of the level-1 bank branch's data center. The distribution layer of the development and testing area has two high-performance CE12808 data center switches, which use 2x10GE inter-card Eth-Trunk links to connect to each other and the upstream core switches. The CE6800 switches at the access layer are dualhomed to the CE12808 switches through GE links. The egress of the area has firewalls deployed in bypass mode to ensure secure communication between the open platform area and other functional areas. The firewalls use 4xGE inter-card Eth-Trunk links for uplink and downlink connections. Product models: Core switch (CS): Huawei CE12816 Distribution switch (DS): Huawei CE12808 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 10 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution Access switch (AS): Huawei CE6800 Firewall: Huawei USG5500 2.1.3.4 Operation and Management Area The following figure shows the operation and management area of the level-1 bank branch's data center. This area is the network management and maintenance center of the level-1 bank branch. It collects running status data of managed systems and devices, monitors network and system status, issues management instructions, and detects system failures to help in troubleshooting. The distribution layer of the operation and management area has two high-performance CE12808 data center switches, which use inter-card Eth-Trunk links of two GE optical interfaces to connect to each other and the upstream core switches. The CE6800 switches at the access layer are dual-homed to the CE12808 switches through GE links. The egress of the area has firewalls deployed in bypass mode to ensure secure communication between the open platform area and other functional areas. The firewalls use inter-card EthTrunk links of two GE optical interfaces for uplink and downlink connections. The following systems are deployed in this area: Management server: uses the Simple Network Management Protocol (SNMP) to collect network and system running information and receive logs and alarms sent from various systems on the network. The management server summarizes and processes management information collected from the network, monitors running status of the data center network and systems, and generates network and system management reports. Management platform: enables maintenance personnel to access the management server to diagnose and rectify faults of devices. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 11 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution Security tools: guarantee system security. Security tools include RADIUS server, intrusion detection system (IDS) server, and antivirus server. Product models: Core switch (CS): Huawei CE12816 Distribution switch (DS): Huawei CE12808 Access switch (AS): Huawei CE6800 Firewall: Huawei USG5500 2.1.3.5 Local User Access Area The following figure shows the local user access area of the level-1 bank branch's data center. This area is designed to enable communication between various types of user terminals. The distribution layer of the operation and management area has two high-performance CE12808 data center switches, which use inter-card Eth-Trunk links of two GE optical interfaces to connect to each other and the upstream core switches. The CE6800 switches at the access layer are dual-homed to the CE12808 switches through GE links. The egress of the area has firewalls deployed in bypass mode to ensure secure communication between the open platform area and other functional areas. The firewalls use inter-card EthTrunk links of two GE optical interfaces for uplink and downlink connections. Product models: Core switch (CS): Huawei CE12816 Distribution switch (DS): Huawei CE12808 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 12 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution Access switch (AS): Huawei CE6800 Firewall: Huawei USG5500 2.1.3.6 MAN/WAN Access Area The following figure shows the MAN/WAN area of the level-1 bank branch's data center. This area connects upstream and downstream routers, and allows communication between access switches in the same city. The distribution layer of this area has two high-performance CE12808 data center switches, which use inter-card Eth-Trunk links of two GE optical interfaces to connect to each other and the upstream core switches. The access routers connect to the distribution switches in dualhoming mode. The MAN/WAN access area is only used for access to the WAN or MAN and has no servers, so no firewalls need to be deployed in this area. The offices and banking outlets in the same city or level-2 bank branches deploy the Unified Threat Management (UTM) system for security guarantee. Product models: Core switch (CS): Huawei CE12816 Distribution switch (DS): Huawei CE12808 Access router (AR): Huawei NE40E-X8 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 13 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution 2.1.3.7 Extranet Area The following figure shows the extranet area of the level-1 bank branch's data center. The extranet area provides network connections to partners. To improve security of the area and prevent Internet users from directly accessing servers of the bank, a two-layer heterogeneous firewall architecture is used to partition the entire area into three security subareas of different security levels: extranet area, DMZ, and intranet area. The following table describes functions of the three security subareas. Issue 03 (2017-05-08) Subarea Function Extranet area Allows partners to connect to the network through private lines and translates private IP addresses of packets sent from partners into private IP addresses in the DMZ. DMZ Deploys front end servers for partners. Intranet area Deploys systems on the level-1 bank branch's data center network. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 14 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution The access layer, distribution layer, and core layer of the extranet area provide different network functions, with ascending security levels. The following table describes devices in the extranet area. Role Function Extranet router To provide access for partners, two extranet routers connect to lines of different carriers. The primary line connects to the master router, and the backup line connects to the backup router, implementing link redundancy. The routers' interfaces connected to the external firewalls run the Virtual Router Redundancy Protocol (VRRP). Generally, data flows are forwarded through the master router. If the master router fails, traffic will be switched to the backup router. VRRP enhances system reliability through redundancy and prevents single-point failures. If routers are connected to links that do not support automatic link state detection, for example, ATM or MSTP links, configure a link failure detection protocol such as OAM or BFD on the interfaces. In this case, ensure that the remote ends also support the link failure detection protocol. External firewall Security policies need to be configured on the firewalls according to application requirements to implement logical isolation and security control between the extranet area and DMZ. The two firewalls work in NAT mode and use the two-node redundancy HA architecture. Generally, one firewall works in active mode, and the other works in standby mode. If the active firewall fails, traffic can be quickly switched to the standby firewall, ensuring uninterrupted data forwarding and normal service operations. Access switch The switches connect to front end servers in the extranet and connect to each other through a 2xGE Eth-Trunk link to enhance reliability. More access switches can be added to the extranet based on business requirements. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 15 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution Role Function Internal firewall Security policies need to be configured on firewalls according to application requirements to implement logical isolation and security control between the DMZ and intranet. The two firewalls work in NAT mode and use the two-node redundancy HA architecture. Generally, one firewall works in active mode, and the other works in standby mode. If the active firewall fails, traffic can be quickly switched to the standby firewall, ensuring uninterrupted data forwarding and normal service operations. Distribution switch The switches connect the extranet to the LANs on the data center network. The two switches are interconnected through two bundled links to enhance reliability. Product models: Core switch (CS): Huawei CE12816 Distribution switch (DS): Huawei CE12808 Access switch (AS): Huawei CE12808 Access router (AR): Huawei NE40E-X8 Firewall: Huawei USG5500 2.1.3.8 Firewall Deployment The level-1 bank branch's data center network has firewalls deployed in the open platform area (OP), development and testing area (DT), local user access area (LU), and operation and management area (OM) to improve network security. Access control policies are configured on the firewalls to isolate different functional areas, control communication between the areas, and protect servers in these areas. The firewalls are connected to distribution switches in bypass mode, as shown in the following figure. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 16 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution l The firewalls are deployed in the HA architecture and work in preemption mode. When both firewalls are running normally, FW1 acts as the active firewall, and FW2 acts as the standby firewall. l The two firewalls exchange heartbeat packets through two directly connected interfaces. l FW1 and FW2 are connected to the distribution switches in bypass mode. l Link aggregation is used between the firewalls and distribution switches. Two or four uplink interfaces of the active firewall FW1 are bundled into Eth-Trunk 1 and connected to DS1. Two or four downlink interfaces of FW1 are bundled into Eth-Trunk 2 and connected to DS1. The number of member interfaces in an Eth-Trunk is determined based on the requirements in the area. Two or four uplink interfaces of the standby firewall FW2 are bundled into Eth-Trunk 1 and connected to DS2. Two or four downlink interfaces of FW2 are bundled into Eth-Trunk 2 and connected to DS2. l The firewalls monitor the physical status of Eth-Trunk 1 and Eth-Trunk 2. If either EthTrunk interface fails, an active/standby switchover is triggered. Then FW2 becomes the active firewall, and FW1 becomes the standby firewall. l If both the two firewalls are faulty, manually switch data traffic to the bypass link so that the traffic does not pass through the firewalls. The bypass link is an independent link deployed between the uplink and downlink VRF instances. l The firewalls communicate with distribution switches using static routes and run the VRRP protocol. l Trusted and untrusted zones are defined on the firewalls, and security policies are configured based on application requires to implement isolation and security control between trusted and untrusted zones. Product models: Core switch (CS): Huawei CE12816 Distribution switch (DS): Huawei CE12808 Access switch (AS): Huawei CE6800 Firewall: Huawei USG5500 2.2 Service Design and Configuration Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 17 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution 2.2.1 System Configuration 2.2.1.1 Device Login Configuration Users can log in to the device through a console port, Telnet, or STelnet to perform local or remote device maintenance. A user must use the console port to log in to the device for the first time. Telnet or STelnet can be used to implement remote management and maintenance. The following describes how to log in to the device through the console port and STelnet. l Logging in to a device through a console port Before logging in to the device through a console port, complete the following tasks: a. Prepare a console cable. b. Install the terminal emulation software on the PC. NOTE You can use the built-in terminal emulation software (such as the HyperTerminal of Windows 2000) on the PC. If no built-in terminal emulation software is available, use the third-party terminal emulation software. For details, see the software user guide or online help. Procedure: Use the terminal simulation software to log in to the device through a console port. a. Issue 03 (2017-05-08) Insert a DB9 plug of a console cable delivered with the device into a 9-pin serial socket on a PC, and insert an RJ-45 connector into the console port of the device, as shown in the following figure. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 18 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution Figure 2-1 Connecting the PC to the device through the console port b. Start the terminal emulation software on the PC, establish a connection, and set the connected interface and communication parameters. NOTE One PC may have multiple connection interfaces. Select the interface connected to the console cable. Usually, the interface COM1 is selected. You must set the communication parameters of the PC to be the same as the changed communication parameters of the serial interface, and reconnect the PC to the serial interface. c. Press Enter until the system asks you to enter the password. (During AAA authentication, the system asks you to enter the user name and password. The following information is for your reference only.) Login authentication Password: You can run commands to configure the device. Enter a question mark (?) whenever you need help. l Logging in to the device using STelnet Before logging in to the device through STelnet, complete the following tasks: a. Configure routes between a terminal and the device. b. Install the SSH client software on the terminal. Procedure: Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 19 Configuration Examples for the Financial Industry a. 2 Traditional Data Center Deployment Solution Configure the STelnet server functions and parameters. <HUAWEI> system-view [~HUAWEI] rsa local-key-pair create The key name will be: HUAWEI_Host The range of public key size is (512 ~ 2048). NOTE: Key pair generation will take a short while. Input the bits in the modulus [default = 2048] : 2048 [*HUAWEI] stelnet server enable [*HUAWEI] commit b. Configure the SSH user login interface. [~HUAWEI] user-interface vty 0 4 [~HUAWEI-ui-vty0-4] authentication-mode aaa [*HUAWEI-ui-vty0-4] protocol inbound ssh [*HUAWEI-ui-vty0-4] commit [~HUAWEI-ui-vty0-4] quit c. Configure an SSH user. You need to configure the authentication mode. The device supports the following authentication modes: RSA, password, password-rsa, DSA, password-dsa, ECC, password-ecc, and all. The authentication modes are described as follows: password-rsa: The password and RSA authentication requirements must be met. password-dsa: The password and DSA authentication requirements must be met. password-ecc: The password and ECC authentication requirements must be met. all: The requirements of password, RSA, DSA, or ECC authentication are met. [~HUAWEI] ssh user client001 [*HUAWEI] ssh user client001 authentication-type password [*HUAWEI] ssh user client001 service-type stelnet [*HUAWEI] aaa [*HUAWEI-aaa] local-user client001 password irreversible-cipher Huawei@123 [*HUAWEI-aaa] local-user client001 level 3 [*HUAWEI-aaa] local-user client001 service-type ssh [*HUAWEI-aaa] quit [*HUAWEI] commit 4. Log in to the device through STelnet. The PuTTY software is used as an example. # Use the PuTTY software to log in to the device, enter the device IP address, and select the SSH protocol type, as shown in the following figure. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 20 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution Figure 2-2 Logging in to the SSH server through PuTTY in password authentication mode # Click Open. Enter the user name and password as prompted, and press Enter. You have logged in to the SSH server. (The following information is for your reference only.) login as: client001 Sent username "client001" client001@10.137.217.203's password: Warning: The initial password poses security risks. The password needs to be changed. Change now? [Y/N]: n Info: The max number of VTY users is 21, the number of current VTY users online is 2, and total number of terminal users online is 2. The current login time is 2012-08-04 20:09:11+00:00. First login successfully. <HUAWEI> 2.2.1.2 Device Naming Configuration Devices in this project are named using letters and numbers to facilitate tier-1 branch data center network implementation and branch network O&M. The name format is field 1_field 2_field 3_nn. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 21 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution Each field is described as follows according to the tier-1 branch data center network construction implementation objectives. Field 1 Identifies the device installation position. For a tier-1 branch data center, the value is as follows: Abbreviation of tier-1 branch area+ abbreviation of local area + bank level In the format: 1. Bank level Data center: 0 Tier-1 branch: 1 Tier-2 branch: 2 Tier-3 branch: 3 Reserved: 4 Outlet: 5 Downstream ATM: 6 For example, a branch at Changjiang Road in Hefei, Anhui province can be identified as AHCJL3. Field 2 Identifies a functional area. According to the network architecture of the tier-1 branch data center, areas are defined as follows: 1. Core area: CO 2. Open platform area: OP 3. Development and testing area: DT 4. Operation and management area: OM 5. Local user access area: LU 6. Extranet: EP 7. MAN/WAN access area: WN Field 3 Identifies device functions and is defined as follows according to the logical hierarchy of the tier-1 branch data center: 1. Core switch: CS 2. Aggregation switch: DS 3. Access switch: AS 4. WAN access router: AR 5. Firewall: FW nn Issue 03 (2017-05-08) Number of network devices of the same application system in the same area: 01 to 99 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 22 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution For example, DS 1 in the open platform area of xx Branch is named XX1_OP_DS_01. Common configuration: <HUAWEI> system-view [~HUAWEI] sysname XX1_OP_DS_01 [*HUAWEI] commit 2.2.1.3 Device Management Configuration Device management configuration includes restarting a device and specifying system startup files for the next startup. The recommended configuration is to specify startup files for the next startup. l Restarting a Device To make the specified system software and files take effect, restart the device after system startup configuration is complete. Devices can be restarted immediately or periodically. Example for restarting a device immediately: <HUAWEI> reboot Example for restarting a device periodically: <HUAWEI> schedule reboot at 22:00 Warning: The current configuration will be saved to the next startup savedconfiguration file. Continue? [Y/N]:y Now saving the current configuration... Save the configuration successfully. Info: Reboot system at 22:00:00 2015/07/17 UTC (in 15 hours and 49 minutes). Confirm? [Y/N]:y l Specifying system startup files Specify the system software and configuration file for system startup so that the device will start with the specified software and initialize with the specified configuration file. If a new patch needs to be loaded during system startup, specify a patch file. Example for specifying the system software for the next startup: <HUAWEI> startup system-software basicsoft.cc slave-board The optional parameter slave-board is valid only for switches with two MPUs. 2.2.1.4 Network Management Configuration Network management is an important part in the standard configuration. Currently, SNMP is widely used for network management. SNMP includes three versions: SNMPv1, SNMPv2c, and SNMPv3. SNMPv1 and SNMPv2c perform authentication using community names, resulting in security risks. SNMPv3 is recommended because it is more secure. The following example configures a device to communicate with the NMS using SNMPv3. 1. Enable the SNMP agent. <HUAWEI> system-view [~HUAWEI] snmp-agent 2. Configure the SNMP version to SNMPv3. [*HUAWEI] snmp-agent sys-info version v3 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 23 2 Traditional Data Center Deployment Solution Configuration Examples for the Financial Industry NOTE You can configure the SNMP version according to your requirements while ensuring that the device and NMS use the same SNMP version. If they use different SNMP versions, the device cannot connect to the NMS. 3. Configure user access rights. # Configure an ACL to allow only the packets with the source IP address 192.168.1.10 to pass through. [*HUAWEI] acl 2001 [*HUAWEI-acl4-basic-2001] rule permit source 192.168.1.10 0.0.0.0 [*HUAWEI-acl4-basic-2001] quit # Configure the MIB view as alliso and include the view iso. [*HUAWEI] snmp-agent mib-view include alliso iso NOTE You are advised to configure user access rights according to your requirements. 4. Set the SNMPv3 user group name to huawei_group, user name to huawei_user, and security level to privacy, and apply access control. [*HUAWEI] snmp-agent [*HUAWEI] snmp-agent [*HUAWEI] snmp-agent Please configure the Enter Password: Confirm Password: [*HUAWEI] snmp-agent Please configure the Enter Password: Confirm Password: 5. group v3 huawei_group privacy write-view alliso acl 2001 usm-user v3 huawei_user group huawei_group usm-user v3 huawei_user authentication-mode sha authentication password (8-255) //Enter an authentication password. //Confirm the authentication password. usm-user v3 huawei_user privacy-mode aes256 privacy password (8-255) //Enter an encryption password. //Confirm the encryption password. Configure a trap host. [*HUAWEI] snmp-agent target-host trap address udp-domain 192.168.1.10 params securityname huawei_user v3 privacy [*HUAWEI] commit 2.2.1.5 Information Center Configuration The operation and management area is the network management and maintenance center. It collects the device operating status. To monitor the device operating status and locate faults, you can send logs of devices to the management server in the maintenance and management area through the information center. Step 1 Enable the information center. <HUAWEI> system-view [~HUAWEI] info-center enable [*HUAWEI] commit Step 2 Configure the device to output logs to a log host. [~HUAWEI] info-center loghost 10.1.1.1 [*HUAWEI] commit ----End Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 24 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution 2.2.1.6 NTP Configuration An NTP clock source on a data center network provides clock signals for all network devices. All network devices in data centers synchronize their clocks with the NTP clock source. Set the NTP working mode of all network devices to the unicast server/client mode, configure CS1 as the primary time server, and ensure that CS1 has synchronized its time with an authoritative clock (global positioning system). Configure CS2, DS, and AS as clients. To ensure security, you are advised to enable the NTP authentication function. Configure the NTP master clock, and enable the NTP authentication and NTP server functions on CS1. <CS1> system-view [~CS1] ntp refclock-master 1 [*CS1] ntp authentication enable [*CS1] ntp authentication-keyid 42 authentication-mode hmac-sha256 Hello@123456 [*CS1] ntp trusted authentication-keyid 42 [*CS1] undo ntp server disable [*CS1] commit Specify CS1 as the NTP server on DS1. The other configurations are similar. <DS1> system-view [~DS1] ntp authentication enable [*DS1] ntp authentication-keyid 42 authentication-mode hmac-sha256 Hello@123456 [*DS1] ntp trusted authentication-keyid 42 [*DS1] ntp unicast-server 10.100.1.1 authentication-keyid 42 [*DS1] commit 2.2.2 Service Configuration Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 25 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution 2.2.2.1 Interface Configuration To ensure network reliability, physical interfaces comply with the following rules: l An interface uses the auto-negotiation mode by default. For example, the common configuration of a 10GE electrical interface is as follows: <HUAWEI> system-view [~HUAWEI] interface 10ge 1/0/1 [~HUAWEI-10GE1/0/1] undo negotiation disable [*HUAWEI-10GE1/0/1] speed auto 100 1000 10000 [*HUAWEI-10GE1/0/1] commit l The physical interface that is not in use must be in shutdown state. Common configuration: <HUAWEI> system-view [~HUAWEI] interface 10ge 1/0/1 [~HUAWEI-10GE1/0/1] shutdown [*HUAWEI-10GE1/0/1] commit l An interface has link fault detection enabled. Common configuration: <HUAWEI> system-view [~HUAWEI] interface 10ge 1/0/1 [~HUAWEI-10GE1/0/1] port crc-statistics trigger error-down [*HUAWEI-10GE1/0/1] commit l The interfaces that are used for device interconnection are enabled in descending order of interface number, and the interfaces that are used for terminal connections are enabled in ascending order of interface number. 2.2.2.2 VLAN Configuration The network is divided into multiple areas based on service types. In each area, there are multiple types of application systems. Each service involves multiple sub-systems, which have different service characteristics, protocol types, QoS requirements (such as the delay and jitter), and security levels. VLAN assignment needs to be configured to achieve the preceding network architecture. VLAN technology differentiates services to implement QoS. It also logically isolates services with different security levels, so that different security policies are enforced for different VLANs and applications to improve network security. Here, interface-based VLAN assignment is used. The principles and notes of VLAN assignment are as follows: 1. 2. Issue 03 (2017-05-08) VLAN assignment principles – Assign VLANs for interconnection between areas. VLAN IDs are valid only within an area. A VLAN cannot span multiple areas. – Assign a VLAN range in each functional area, and assign VLANs to applications of different levels within the VLAN range in each area. Reserve some VLANs for expansion of different application systems in each area. – Define different VLAN ranges for different areas and assign different VLANs to different service systems. Locate servers of the same service system in the same VLAN and assign VLANs in ascending order of VLAN IDs. MAN and WAN users share VLANs with local users. VLAN configuration notes Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 26 2 Traditional Data Center Deployment Solution Configuration Examples for the Financial Industry – In a functional area, all user VLANs are configured on ASs and DSs. AS-DS and DS-DS Eth-Trunk links allow packets from service VLANs in the local area to pass through. – An Eth-Trunk link cannot allow packets from all VLANs to pass through. – All Eth-Trunk links prevents packets from VLAN 1 from passing through. The following table describes the VLAN design. Table 2-1 VLAN design Issue 03 (2017-05-08) No. Function VLAN ID Remarks 1 Open platform area 200-399 - 2 Development and testing area 400-499 - 3 Operation and management area 500-599 - 4 Local user access area 850-949 Multiplexing by MAN and WAN users 5 Extranet 650-699 - 6 Network device interconnection 800-849 - 7 Network device management 600-649 - 8 Reserved 10-199, 700-799, and 950-1049 - Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 27 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution Configure AS-server links as access links and the AS-DS and DS-DS links as trunk links. VLAN configuration (AS1 is used as an example): <AS1> system-view [~AS1] vlan batch 200 [*AS1] interface ge 1/0/1 [*AS1-GE1/0/1] port default vlan 200 [*AS1-GE1/0/1] quit [*AS1] interface 10ge 1/0/11 [*AS1-10GE1/0/11] port link-type trunk [*AS1-10GE1/0/11] port trunk allow-pass vlan [*AS1-10GE1/0/11] undo port trunk allow-pass [*AS1-10GE1/0/11] quit [*AS1] interface 10ge 1/0/12 [*AS1-10GE1/0/12] port link-type trunk [*AS1-10GE1/0/12] port trunk allow-pass vlan [*AS1-10GE1/0/12] undo port trunk allow-pass [*AS1-10GE1/0/12] quit [*AS1] commit 200 vlan 1 200 vlan 1 2.2.2.3 Link Aggregation Configuration If high-bandwidth and high-reliability links are required, configure link aggregation. Bundle CS-CS, CS-DS, DS-DS, DS-firewall, AS-DS, and AS-server links, as well as heartbeat links between firewalls into link aggregation groups to improve bandwidth and reliability. Requirements for link aggregation deployment are: l Deploy member interfaces on different cards to improve link reliability when one card fails. l Configure the manual load balancing mode and use member interfaces of the same rate. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 28 Configuration Examples for the Financial Industry l 2 Traditional Data Center Deployment Solution Configure member interfaces to work in auto-negotiation mode. (If auto-negotiation fails, use the forcible mode and enable DLDP.) Link aggregation configuration (the DS-DS link is used as an example): <DS1> system-view [*DS1] interface eth-trunk 1 [*DS1-Eth-Trunk1] trunkport 10ge 1/0/3 [*DS1-Eth-Trunk1] trunkport 10ge 2/0/3 [*DS1-Eth-Trunk1] port link-type trunk [*DS1-Eth-Trunk1] port trunk allow-pass vlan [*DS1-Eth-Trunk1] undo port trunk allow-pass [*DS1-Eth-Trunk1] quit [*DS1] commit <DS2> system-view [*DS2] interface eth-trunk 1 [*DS2-Eth-Trunk1] trunkport 10ge 1/0/3 [*DS2-Eth-Trunk1] trunkport 10ge 2/0/3 [*DS2-Eth-Trunk1] port link-type trunk [*DS2-Eth-Trunk1] port trunk allow-pass vlan [*DS2-Eth-Trunk1] undo port trunk allow-pass [*DS2-Eth-Trunk1] quit [*DS2] commit 200 vlan 1 200 vlan 1 By default, an Eth-Trunk works in manual load balancing mode. 2.2.2.4 IP Address Configuration The IP address design for a new LAN of the branch data center should observe the following principles: l Use IPv4. l IP addresses of interconnected interfaces use a 29-bit subnet mask (255.255.255.248) to allow flexible network expansion and temporary deployment of test devices. One Class C address space offers 32 interconnected network segments of LANs. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 29 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution l Implement route summarization between the head office and branches. l The gateway address in a LAN uses the largest IP address on the local network segment. When VRRP or similar technologies are used, virtual addresses and actual addresses are allocated in descending order of IP address. l The management address (Loopback0) of a network device uses a 32-bit subnet mask (255.255.255.255), which is used as the ID of a routing protocol such as OSPF. Assign contiguous addresses on a network segment as management addresses of all network devices based on the network layers where they are located. l Assign IP addresses to devices in each area. Apply the IP address plan of an area to the downlink interfaces of aggregation switches in the area (including interconnection interfaces of the switches at the distribution layer) and access switches connected to the downlink interfaces. Apply the IP address plan of the core switching layer to core switches' interfaces connected to other areas. Apply the MAN/WAN IP address plan to DS switches' interfaces connected to WAN/MAN devices. Common configuration: <HUAWEI> system-view [~HUAWEI] interface vlanif 201 [*HUAWEI-Vlanif201] ip address 10.1.0.1 255.255.255.0 2.2.2.5 STP Configuration Loop prevention protocols are important on Layer 2 networks. It is recommended that STP and MSTP be used to eliminate loops. Here, the MSTP configuration is used as an example. When service and reliability requirements are met, simplify configurations as much as possible to achieve easy deployment and maintenance. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 30 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution A functional area in a data center is used as an example. Role MSTP Global Configuration MSTP Port Configuration DS1 1. Configure the root bridge (which also functions as the default VRRP master). 1. Disable MSTP on the ports connected to the CSs. 2. Configure TC protection. 2. If the DS is connected to a firewall working in routing mode, disable MSTP on the port connected to the firewall. 3. Configure root protection on the port connected to the AS. 4. Configure BPDU protection (only after edge ports are configured). DS2 1. Configure the secondary root bridge. 2. Configure TC protection. 3. Configure BPDU protection (only after edge ports are configured). 3. Configure the port directly connected to a server as an edge port. 1. Disable MSTP on the ports connected to the CSs. 2. If the DS is connected to a firewall working in routing mode, disable MSTP on the port connected to the firewall. 3. Configure the port directly connected to a server as an edge port. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 31 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution Role MSTP Global Configuration MSTP Port Configuration AS 1. Configure TC protection. 1. Configure the port directly connected to a terminal such as a server as an edge port. 2. Configure BPDU protection. MSTP configuration points: 1. Create MSTI 1 in MST region RG1 on DSs and ASs. DS1 is used as an example. The configurations of other switches are similar. <DS1> system-view [~DS1] stp region-configuration [~DS1-mst-region] region-name RG1 [*DS1-mst-region] instance 1 vlan 200 [*DS1-mst-region] quit [*DS1] commit 2. Configure DS1 as the root bridge and DS2 as the secondary root bridge in MSTI 1. [~DS1] [*DS1] [~DS2] [*DS2] 3. stp instance 1 root primary commit stp instance 1 root secondary commit Configure DS1 to use Huawei proprietary algorithm to calculate the path cost, and set the path cost of the blocked port to be larger than the default value in MSTI 1. [~DS1] stp pathcost-standard legacy [*DS1] commit [~DS2] stp pathcost-standard legacy [*DS2] commit [~AS1] stp pathcost-standard legacy [*AS1] interface 10ge 1/0/12 [*AS1-10GE1/0/12] stp instance 1 cost 20000 [*AS1-10GE1/0/12] quit [*AS1] commit [~AS2] stp pathcost-standard legacy [*AS2] interface 10ge 1/0/11 [*AS2-10GE1/0/11] stp instance 1 cost 20000 [*AS2-10GE1/0/11] quit [*AS2] commit 4. Enable MSTP to prevent loops. DS1 is used as an example. The configurations of other switches are similar. [~DS1] stp enable [*DS1] commit 5. Configure protection functions and configure the port connected to a server as an edge port. [~DS1] stp tc-protection [*DS1] interface 10ge 1/0/1 [*DS1-10GE1/0/1] stp root-protection [*DS1-10GE1/0/1] quit [*DS1] interface 10ge 1/0/2 [*DS1-10GE1/0/2] stp root-protection [*DS1-10GE1/0/2] quit [*DS1] commit [~DS2] stp tc-protection [*DS2] commit [~AS1] stp tc-protection [*AS1] interface ge 1/0/1 [*AS1-GE1/0/1] stp edged-port enable [*AS1-GE1/0/1] quit [*AS1] stp bpdu-protection [*AS1] commit [~AS2] stp tc-protection [*AS2] interface ge 1/0/1 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 32 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution [*AS2-GE1/0/1] stp edged-port enable [*AS2-GE1/0/1] quit [*AS2] stp bpdu-protection [*AS2] commit 2.2.3 Reliability Configuration 2.2.3.1 VRRP Configuration Generally, all hosts on a network are configured with the same default route that points to the egress gateway so that the hosts can communicate with external networks. When the egress gateway fails, the communication between the hosts and external networks is interrupted. VRRP virtualizes multiple routing devices into one logical device and uses the IP address of the logical device as the default gateway address so that the routing devices can communicate with external networks. When the gateway fails, VRRP can select a new gateway to transmit data traffic, ensuring network reliability. Different VLANs are created on DS1 and DS2, IP addresses are assigned to VLANIF interfaces, and VRRP is configured. Different VRRP virtual IP addresses are used as gateway addresses of server groups on ASs, and the Eth-Trunk between DS1 and DS2 allows packets from the VLANs to pass through. MSTP is deployed between ASs and DSs to eliminate loops, and the blocked point is configured on the link between the backup device and downlink switch. OSPF is configured on DSs and CSs to implement Layer 3 interworking. VRRP configuration points: 1. Create VRRP group 1 on DS1. <DS1> system-view [~DS1] interface vlanif 100 [~DS1-Vlanif100] vrrp vrid 1 virtual-ip 10.1.1.111 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 33 2 Traditional Data Center Deployment Solution Configuration Examples for the Financial Industry 2. Configure the priority of DS1 in the VRRP group. [*DS1-Vlanif100] vrrp vrid 1 priority 120 3. Set the preemption delay of VRRP group 1 on DS1 to 20s. [*DS1-Vlanif100] vrrp vrid 1 preempt timer delay 20 4. Set the interval for sending VRRP Advertisement packets of VRRP group 1 on DS1 to 2s. [*DS1-Vlanif100] vrrp vrid 1 timer advertise 2 [*DS1-Vlanif100] commit [~DS1-Vlanif100] quit 5. Create VRRP group 1 on DS2. <DS2> system-view [~DS2] interface vlanif 100 [~DS2-Vlanif100] vrrp vrid 1 virtual-ip 10.1.1.111 6. Set the interval for sending VRRP Advertisement packets of VRRP group 1 on DS2 to 2s. [*DS2-Vlanif100] vrrp vrid 1 timer advertise 2 [*DS2-Vlanif100] commit [~DS2-Vlanif100] quit 7. To implement load balancing, configure two or more VRRP groups on an interface. The VRRP groups are differentiated using VRIDs. – Configure VRRP group 2 and parameters on DS1. [~DS1] interface [~DS1-Vlanif100] [*DS1-Vlanif100] [*DS1-Vlanif100] [~DS1-Vlanif100] – vlanif 100 vrrp vrid 2 virtual-ip 10.1.1.112 vrrp vrid 2 timer advertise 2 commit quit Configure VRRP group 2 and parameters on DS2. [~DS2] interface [~DS2-Vlanif100] [*DS2-Vlanif100] [*DS2-Vlanif100] [*DS2-Vlanif100] [*DS2-Vlanif100] [~DS2-Vlanif100] vlanif 100 vrrp vrid 2 vrrp vrid 2 vrrp vrid 2 vrrp vrid 2 commit quit virtual-ip 10.1.1.112 priority 120 preempt timer delay 20 timer advertise 2 2.2.3.2 Smart Link Configuration Smart Link is used in dual-homing networking to implement link redundancy. Two uplinks constitute a backup link group. In a Smart link group, only the master interface is in active state, and the slave interface is in inactive state. When the active link in forwarding state fails, the Smart Link group blocks the master interface and switches the slave interface to the forwarding state. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 34 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution For the tier-1 branch data center shown in the networking, each AS is dual-homed to two DSs, two uplinks (uplinks can constitute an Eth-Trunk link) join one Smart Link group, and the entire network is loop-free. During topology calculation, ASs can use Smart Link to prevent loops without exchanging protocol packets with remote devices. The remote device needs to process Flush packets sent by an AS so that MAC address entries can be updated rapidly upon topology changes. Smart Link is a proprietary protocol. When DSs and ASs are devices of different vendors, DSs cannot update MAC address entries immediately because they cannot identify proprietary protocol packets. Servers continuously send various types of data packets, so such a problem has little impact. (There are differences between MAC address entry update mechanisms of technologies similar to Smart Link.) Smart Link configuration points: 1. Add two uplink interfaces to a Smart Link group. [~HUAWEI] interface 10ge 1/0/1 [~HUAWEI-10GE1/0/1] stp disable [*HUAWEI-10GE1/0/1] commit [~HUAWEI-10GE1/0/1] quit [~HUAWEI] interface 10ge 1/0/2 [~HUAWEI-10GE1/0/2] stp disable [*HUAWEI-10GE1/0/2] commit [~HUAWEI-10GE1/0/2] quit [~HUAWEI] smart-link group 1 [*HUAWEI-smlk-group1] port 10ge 1/0/1 master [*HUAWEI-smlk-group1] port 10ge 1/0/2 slave [*HUAWEI-smlk-group1] commit 2. Bind a protection instance to the Smart Link group. [~HUAWEI] smart-link group 1 [*HUAWEI-smlk-group1] protected-vlan reference-instance 10 3. Configure the device to send Flush packets. [*HUAWEI-smlk-group1] flush send control-vlan 200 password sha 123 [*HUAWEI-smlk-group1] quit [*HUAWEI] commit 4. Configure the device to receive Flush packets. For example, if AS1 is configured to send Flush packets, DS1 and DS2 need to be configured to receive Flush packets. [~HUAWEI] interface 10ge 1/0/1 [~HUAWEI-10GE1/0/1] stp disable [*HUAWEI-10GE1/0/1] smart-link flush receive control-vlan 200 password sha 123 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 35 Configuration Examples for the Financial Industry [*HUAWEI-10GE1/0/1] [~HUAWEI-10GE1/0/1] [~HUAWEI] interface [~HUAWEI-10GE1/0/2] [*HUAWEI-10GE1/0/2] [~HUAWEI-10GE1/0/2] 5. 2 Traditional Data Center Deployment Solution commit quit 10ge 1/0/2 smart-link flush receive control-vlan 200 password sha 123 commit quit To implement load balancing, create multiple VLAN instances and specify a load balancing instance. [~HUAWEI] stp region-configuration [~HUAWEI-mst-region] instance 10 vlan 201 [*HUAWEI-mst-region] commit [~HUAWEI-mst-region] quit [~HUAWEI] smart-link group 1 [~HUAWEI-smlk-group1] load-balance instance 10 slave [*HUAWEI-smlk-group1] commit 6. Set the WTR time to be more than 60s. [~HUAWEI-smlk-group1] restore enable [*HUAWEI-smlk-group1] timer wtr 120 [*HUAWEI-smlk-group1] commit 2.2.3.3 DLDP The Device Link Detection Protocol (DLDP) is used to detect unidirectional links. DLDP automatically shuts down or notifies the network administrator if a unidirectional link fault occurs. If optical fibers are intersected, an optical fiber is disconnected, or a line in the copper twisted pair wire or optical fiber is disconnected, the interface on one end of the link can receive the link layer packets from the remote device, but the remote device cannot receive packets from the local device. This link is a unidirectional link. The physical layer of a unidirectional link is in connected state and can work properly. The detection mechanisms at the physical layer such as auto-negotiation cannot detect faults on communication among devices. This may lead to incorrect traffic forwarding. As shown in the two figures, a unidirectional link fault may be caused by intersected fibers or disconnection of an optical fiber. DLDP can work in normal or enhanced mode: l Normal mode: DLDP can identify only unidirectional links caused by intersected fibers. l Enhanced mode: DLDP can identify unidirectional links caused by intersected fibers or disconnection of an optical fiber. By default, DLDP works in enhanced mode. Default values of DLDP parameters: Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 36 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution Parameter Default Value DLDP status Disabled DLDP working mode Enhanced Shutdown mode of an interface after a unidirectional link is detected Automatic The following DLDP configurations are recommended when DLDP needs to be enabled on the interconnected interfaces between devices. 1. Enable DLDP globally. <HUAWEI> system-view [~HUAWEI] dldp enable [*HUAWEI] commit 2. Enable DLDP on an interface. [~HUAWEI] interface 10ge 1/0/1 [~HUAWEI-10GE1/0/1] dldp enable [*HUAWEI-10GE1/0/1] commit 2.2.4 Routing Configuration The following figure shows routing design for a tier 1 branch data center. Data center design consists of LAN design and MAN&WAN design. Entire Routing Design Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 37 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution The MAN/WAN area uses BGP to exchange service routes with the head office and tier 2 branches and uses OSPF as an IGP within itself. In the LAN, the core area and other areas use OSPF to provide service routes, except that the extranet uses static routes between the DS and AR. EBGP The tier 1 branch is planned as an independent autonomous system (AS) and uses a private AS number. IBGP The WAN area of the tier 1 branch runs IBGP. OSPF 300 ensures connectivity for IBGP between the WN_DSs and WN_ARs in the WAN area. Three OSPF processes are designed on the network: OSPF 300, OSPF 400, and OSPF 500. OSPF 300 OSPF 300 ensures IBGP connectivity between the WN_DSs and WN_ARs in the WAN area. Links between the devices in the WAN area belong to Area 0. OSPF 400 OSPF 400 ensures that there are reachable routes between the MAN/WAN area of the tier 1 branch and intra-city organizations. Interconnected links belong to Area 0. OSPF 500 OSPF 500 ensure that there are reachable routes between the LAN area of branches and WN_DSs. Interconnected links belong to Area 0 to transmit services of the tier 1 branch. Static route The EP_AR in the extranet and external FW, external FW and internal FW, as well as internal FW and EP_DS use static routes to communicate. Routing Protocol Preference/Distance Design Preferences of routing protocols to be used on all network devices are planned to ensure consistent route selection between routing protocols on devices of different vendors. Issue 03 (2017-05-08) Protocol Preference Static route 5 OSPF 10 IBGP 170 EBGP 170 OSPF ASE 190 Floating static route 200 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 38 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution 2.2.4.1 LAN Routing Configuration Routing Design and Basic Function Configuration Figure 2-3 LAN routing design diagram In a data center LAN shown in the figure, ASs are access devices, LAN_DSs are aggregation devices in the LAN, gateways are configured on the aggregation devices, VRRP is configured on downlink interfaces of the LAN_DSs to ensure reliability. CSs are core forwarding devices, and WAN_DSs are aggregation devices in the MAN/WAN area to connect LAN core devices and network egress routers. This example uses OSPF to ensure intra-area connectivity. OSPF Area Partition The entire network uses OSPF process 500. Only a small number of devices run OSPF in the LAN. Therefore, OSPF 500 uses only the backbone area Area 0. The following interfaces and IP address need to be advertised in OSPF process 500: l Virtual IP address of the VRRP group on downlink interfaces of LAN_DSs l Interconnected interfaces between LAN_DSs and CSs, and between WAN_DSs and CSs l Loopback interface whose IP address will be used as a router ID (This interface does not need to participate in OSPF calculation and so is configured as a silent interface.) OSPF Router ID Design In each OSPF process, a router must have a unique router ID to identify itself. By default, the largest loopback interface IP address is used as the router ID. To ensure a stable OSPF router ID, specify the IP address of Loopback 0 as a router ID when configuring an OSPF process. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 39 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution Basic OSPF Function Configuration Here, LAN_DS_01 is used as an example: <LAN_DS_01> system-view [~LAN_DS_01] interface loopback 0 [*LAN_DS_01-LoopBack0] ip address 172.16.1.1 32 [*LAN_DS_01-LoopBack0] quit [*LAN_DS_01] ospf 500 router-id 172.16.1.1 [*LAN_DS_01-ospf-500] silent-interface loopback 0 [*LAN_DS_01-ospf-500] area 0 [*LAN_DS_01-ospf-500-area-0.0.0.0] network 10.1.1.0 0.0.0.255 [*LAN_DS_01-ospf-500-area-0.0.0.0] network 10.1.2.0 0.0.0.255 [*LAN_DS_01-ospf-500-area-0.0.0.0] network 10.1.3.0 0.0.0.255 [*LAN_DS_01-ospf-500-area-0.0.0.0] commit Here, CS_01 is used as an example: <CS_01> system-view [~CS_01] interface loopback 0 [*CS_01-LoopBack0] ip address 172.16.1.2 32 [*CS_01-LoopBack0] quit [*CS_01] ospf 500 router-id 172.16.1.2 [*CS_01-ospf-500] silent-interface loopback 0 [*CS_01-ospf-500] area 0 [*CS_01-ospf-500-area-0.0.0.0] network 10.1.2.0 0.0.0.255 [*CS_01-ospf-500-area-0.0.0.0] network 10.1.5.0 0.0.0.255 [*CS_01-ospf-500-area-0.0.0.0] network 10.1.6.0 0.0.0.255 [*CS_01-ospf-500-area-0.0.0.0] commit Routing Protocol Performance, Reliability, and Security Design and Configuration Here, CS_01 is used as an example. The configurations of other devices are similar to that of CS_01. OSPF Interface Network Type Design By default, the network type of OSPF interfaces on an Ethernet network is broadcast. In this example, every two OSPF neighbors are interconnected. To speed up OSPF neighbor relationship establishment and route convergence, you can set the network type of non-silent OSPF interfaces to point-to-point. <CS_01> system-view [~CS_01] interface 10ge 1/0/1 [~CS_01-10GE1/0/1] undo portswitch [*CS_01-10GE1/0/1] ospf network-type p2p OSPF Timer Design Unless special requirements need to be met, default OSPF timer values are recommended. This example uses default values of all OSPF timers. If you need to modify timer parameter values, ensure that neighbors use the same OSPF timer parameter values. For example, you can use the following commands to modify the interval for sending Hello packets to 20s: <CS_01> system-view [~CS_01] interface 10ge 1/0/1 [~CS_01-10GE1/0/1] undo portswitch [*CS_01-10GE1/0/1] ospf timer hello 20 OSPF Metric Design Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 40 2 Traditional Data Center Deployment Solution Configuration Examples for the Financial Industry By default, the metric value of an OSPF interface is automatically calculated using the formula: Reference bandwidth/Interface bandwidth. The reference bandwidth can be modified and defaults to 100 Mbps. In this example, to facilitate maintenance and management, you can manually configure and design the metric value of each link without using the preceding formula. Table 2-2 OSPF metric design No. Link Metric 1 East-to-west links between CSs, and between DSs 100 2 South-to-north links between CSs and DSs 100 3 DS service interfaces 1000 4 CS/DS loopback interfaces 0 (no need to configure) To set the metric of the link between CSs to 100, use the following commands: <CS_01> system-view [~CS_01] interface 10ge 1/0/1 [~CS_01-10GE1/0/1] undo portswitch [*CS_01-10GE1/0/1] ospf cost 100 BFD for OSPF In BFD for OSPF, a BFD session is associated with OSPF. The BFD session quickly detects a link fault and then notifies OSPF of the fault. This speeds up OSPF's response to the change of the network topology. A dynamic BFD session established between all non-silent OSPF interfaces and neighbors can implement millisecond-level detection of faults on the links between OSPF neighbors and associate fast OSPF neighbor status switching to trigger route convergence calculation. The link faults include physical link faults and upper-layer forwarding faults. All BFD sessions use the following parameters. Table 2-3 BFD for OSPF parameter design Issue 03 (2017-05-08) Parameter Parameter Description Recommended Value min-rx-interval Specifies the minimum interval at which BFD packets are received from the peer end. 1000 ms min-tx-interval Specifies the minimum interval for sending BFD packets to the peer end. 1000 ms detect-multiplier Specifies the local detection multiplier. 3 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 41 2 Traditional Data Center Deployment Solution Configuration Examples for the Financial Industry <CS_01> system-view [~CS_01] bfd [*CS_01-bfd] quit [*CS_01] ospf 500 [*CS_01-ospf-500] bfd all-interfaces enable [*CS_01-ospf-500] bfd all-interfaces min-tx-interval 1000 min-rx-interval 1000 detect-multiplier 3 OSPF Smart Timer Design In an unstable network, route calculation may be performed frequently, which consumes a great number of CPU resources. Especially on an unstable network, LSAs that describe unstable topology will be generated and advertised frequently. Processing such LSAs frequently affects network stability. The OSPF smart timer controls the route calculation, LSA generation, and receiving of LSAs to speed up network convergence. The OSPF smart timer speeds up network convergence in the following modes: l In a network where routes are frequently calculated, the OSPF smart timer dynamically adjusts the interval for calculating routes according to the user configuration and the exponential backoff technology. In this manner, the number of route calculations is reduced, and so CPU resource consumption is reduced. Routes are calculated after the network topology becomes table. l In an unstable network, if a router generates or receives LSAs due to frequent topology changes, the OSPF smart timer can dynamically adjust the interval for calculating routes. No LSA is generated or handled within an interval, which prevents invalid LSAs from being generated and advertised in the entire network. OSPF smart timer uses the following parameters. Table 2-4 OSPF smart timer design Smart Timer Description Recommended Value spf-schedule-interval Specifies the interval for calculating OSPF routes. The default value is recommended. That is, the maximum interval for SPF calculation is 10000 ms, the initial interval is 500 ms, and the base interval is 1000 ms. lsa-arrival-interval Specifies the interval for receiving LSAs. The default value is recommended. That is, the maximum interval for receiving LSAs is 1000 ms, the initial interval is 500 ms, and the base interval is 500 ms. lsa-originate-interval Specifies the interval for updating LSAs. The default value is recommended. That is, the maximum interval for updating LSAs is 5000 ms, the initial interval is 500 ms, and the base interval is 1000 ms. <CS_01> system-view [~CS_01] ospf 500 [*CS_01-ospf-500] lsa-arrival-interval intelligent-timer 1000 500 500 [*CS_01-ospf-500] lsa-originate-interval intelligent-timer 5000 500 1000 [*CS_01-ospf-500] spf-schedule-interval intelligent-timer 10000 500 1000 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 42 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution OSPF Route Authentication To prevent unauthorized devices from access an OSPF network to obtain network routing information, configure the OSPF route authentication function. In this example, OSPF area authentication is configured, the authentication mode is MD5, and the authentication password is not provided here, which can be specified according to your requirements. <CS_01> system-view [~CS_01] ospf 500 [*CS_01-ospf-500] area 0 [*CS_01-ospf-500-area-0.0.0.0] authentication-mode md5 1 cipher xxxxxxxx 2.2.4.2 Extranet Routing Configuration Figure 2-4 Extranet routing design diagram The extranet connects the data center to other service areas. Because fine-grained control is required for access rights, the extranet uses the in-line firewall connection for networking. In routing design, the extranet uses static specific routes and static default routes and is separated from the LAN in routes. The following provides key configuration of each device. Aggregation Switches (EP_DSs) in the Extranet Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 43 2 Traditional Data Center Deployment Solution Configuration Examples for the Financial Industry Aggregation switches (EP_DSs) in the extranet use OSPF to communicate with CSs of the LAN and need to have static specific routes to all extranet service network segments configured on downlink interfaces. The next-hop address of the routes is the uplink VRRP virtual address of firewalls (EP_FWs). For details about the configuration of OSPF 500 and VRRP, see the LAN Routing Configuration. The following provides only the static specific route configuration of EP_DS_01. The configuration of EP_DS_02 is the same as that of EP_DS_01. <EP_DS_01> system-view [~EP_DS_01] ip route-static 172.16.1.0 24 10.3.1.1 [*EP_DS_01] ip route-static 172.16.2.0 24 10.3.1.1 [*EP_DS_01] ip route-static 172.16.3.0 24 10.3.1.1 Firewall (EP_FW) EP_FWs communicate with uplink devices using static default routes with the next-hop address as the downlink VRRP virtual address of EP_DS. EP_FWs have static specific routes to all extranet service network segments configured on downlink interfaces. The next-hop address of the routes is the uplink VRRP virtual address of access devices (EP_ASs) in the extranet. The following provides only the static route configuration of EP_FW_01. The configuration of EP_FW_02 is the same as that of EP_FW_01. <EP_FW_01> system-view [~EP_FW_01] ip route-static [*EP_FW_01] ip route-static [*EP_FW_01] ip route-static [*EP_FW_01] ip route-static 172.16.1.0 24 10.1.1.1 172.16.2.0 24 10.1.1.1 172.16.3.0 24 10.1.1.1 0.0.0.0 0 10.4.1.1 Access Devices (EP_ASs) in the Extranet EP_ASs communicate with uplink devices using static default routes with the next-hop address as the downlink VRRP virtual address of EP_FW. EP_ASs have static specific routes to all extranet service network segments configured on downlink interfaces. The next-hop address of the routes is the IP address of the interface on the directly connected peer device. The following provides the static route configuration of EP_AS_01, in which x.x.x.x indicates the IP address of the interface on the directly connected peer device. <EP_AS_01> system-view [~EP_AS_01] ip route-static [*EP_AS_01] ip route-static [*EP_AS_01] ip route-static [*EP_AS_01] ip route-static 172.16.1.0 24 x.x.x.x 172.16.2.0 24 x.x.x.x 172.16.3.0 24 x.x.x.x 0.0.0.0 0 10.2.1.1 2.2.4.3 MAN/WAN Routing Configuration The MAN/WAN area uses BGP to exchange service routes with the head office and tier 2 branches. 2.2.5 Security 2.2.5.1 ACL-based Antivirus Configuration To prevent viruses with Layer 3 and Layer 4 characteristics, it is recommended that you configure ACLs on network devices to filter data flows, improving network security. The recommended antivirus configuration is as follows: [*HUAWEI]acl number 3000 [*HUAWEI-acl4-advence-3000]rule 0 deny tcp destination-port eq 445 [*HUAWEI-acl4-advence-3000]rule 1 deny udp destination-port eq 445 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 44 2 Traditional Data Center Deployment Solution Configuration Examples for the Financial Industry [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule 2 deny tcp destination-port eq 135 3 deny tcp destination-port eq 136 4 deny tcp destination-port eq 137 5 deny tcp destination-port eq 138 6 deny tcp destination-port eq 139 7 deny udp destination-port eq 135 8 deny udp destination-port eq 136 9 deny udp destination-port eq netbios-ns 10 deny udp destination-port eq netbios-dgm 11 deny udp destination-port eq netbios-ssn 12 deny udp destination-port eq 1434 13 deny udp destination-port eq 6667 14 deny udp destination-port eq 7626 15 deny udp destination-port eq 6789 16 deny udp destination-port eq 5800 17 deny udp destination-port eq 5900 18 deny tcp destination-port eq 5900 19 deny tcp destination-port eq 5800 20 deny tcp destination-port eq 1999 21 deny tcp destination-port eq 5554 22 deny tcp destination-port eq 9995 23 deny tcp destination-port eq 9996 24 deny udp destination-port eq 12345 25 deny udp destination-port eq 1057 26 deny udp destination-port eq 2616 2.2.5.2 Broadcast Storm Suppression Configuration A broadcast storm will greatly affect the network. The broadcast storm suppression function reduces the impact on a network. The antivirus effect is better when broadcast storm suppression is configured on the network devices closer to users. Therefore, configure it on the downstream interfaces of aggregation switches and all interfaces of access switches. When the average packet rate exceeds 5000 kbit/s, the devices discard excess packets. Run the following commands on the downstream interfaces of aggregation switches, interconnected interfaces between aggregation switches, and upstream interfaces of access switches: <HUAWEI> system-view [~HUAWEI] interface 10ge 1/0/1 [~HUAWEI-10GE1/0/1] storm suppression broadcast cir 5000 2.2.5.3 MAC Address Flapping Detection MAC address flapping means that a MAC address is learned by two interfaces in the same VLAN. The MAC address entry learned later replaces the earlier one. MAC address flapping detection enables devices to check whether MAC address flapping has occurred. When detecting a MAC address flapping, the devices report an alarm to the NMS for maintenance personnel to locate the fault. Common configuration: <HUAWEI> system-view [~HUAWEI] mac-address flapping detection 2.2.5.4 MAC Address Triggered ARP Entry Update A network device needs to search for the ARP table for Layer 3 forwarding, and forwards the packets matching entries. When logical locations of user terminals change (for example, an Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 45 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution active/standby switchover occurs between the network adapters of a server), the interfaces matching the changed IP addresses also change. The outbound interfaces in the MAC address table are updated after certain packets are received. The outbound interfaces in the ARP table are updated after the aging time expires. Therefore, the outbound interfaces in the MAC address and ARP tables may be inconsistent. For example, the outbound interfaces in the MAC address table are updated before the outbound interfaces in the ARP table are updated. To resolve this problem, you need to enable the function of MAC address triggered ARP entry update so that the outbound interfaces in the ARP table are updated immediately when the outbound interfaces in MAC address table are updated. Common configuration: <HUAWEI> system-view [~HUAWEI] mac-address update arp enable 2.2.5.5 Loopback Detection on a Single Interface STP cannot detect loops on a single interface. Loopback detection needs to be enabled on a single interface. Run the following commands on the downstream interface of an access switch: <HUAWEI> system-view [~HUAWEI] interface ge 1/0/1 [~HUAWEI-GE1/0/1] loopback-detect enable 2.2.5.6 ARP Attack Defense Configuration l Configure ARP rate limiting. If a host sends a large number of IP packets with unreachable destination IP addresses to a network device, the device is greatly affected. Configure ARP rate limiting in the system view: <HUAWEI> system-view [~HUAWEI] arp anti-attack rate-limit 200 Configure ARP rate limiting in the VLAN view: <HUAWEI> system-view [~HUAWEI] vlan 201 [*HUAWEI-vlan201] arp anti-attack rate-limit 200 l Configure ARP rate limiting based on source IP addresses. Considering the special requirements of some users, you can configure a different ARP rate limit for these users. NOTE By default, the source IP address-based ARP rate limit is 30 pps. When the gateway requests MAC addresses of many users on the network segment and the rate of ARP packets from the gateway IP address exceeds 30 pps, you must increase the source IP address-based ARP rate limit; otherwise, the ARP packets exceeding 30 pps will be discarded, causing a long delay on the gateway to learn ARP entries. If an ARP scanning attack occurs, reduce the source IP address-based ARP rate limit. Configure ARP rate limiting for any source IP address. <HUAWEI> system-view [~HUAWEI] arp anti-attack rate-limit source-ip maximum 100 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 46 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution Configure rate limit for the ARP packets from 10.1.1.1. <HUAWEI> system-view [~HUAWEI] arp anti-attack rate-limit source-ip 10.1.1.1 maximum 100 When both the preceding configurations are performed, the later configuration takes precedence. That is, if the source IP address of received ARP packets matches the IP address specified in rate limiting, the rate limit specified in the later configuration takes effect. If the source IP address of received ARP packets does not match the specified one, the rate limit in the previous configuration takes effect. l Configure ARP Miss rate limiting based on source IP addresses. Considering the special requirements of some users, you can configure a different ARP Miss rate limit for these users. NOTE By default, the source IP address-based ARP Miss rate limit is 30 pps. If a source IP address needs to frequently trigger ARP Miss messages of which the rate will exceed 30 pps, increase the source IP address-based ARP Miss rate limit. Otherwise, excessive ARP Miss messages from this source IP address will be discarded within 5 seconds after the rate limit is exceeded. As a result, this source IP address cannot trigger ARP learning. Configure ARP Miss rate limiting for any source IP address. <HUAWEI> system-view [~HUAWEI] arp miss anti-attack rate-limit source-ip maximum 60 Configure rate limiting for the ARP Miss messages from a specified IP address. <HUAWEI> system-view [~HUAWEI] arp miss anti-attack rate-limit source-ip 10.0.0.1 maximum 60 When both the preceding configurations are performed, the later configuration takes precedence. That is, if the source IP address of the IP packets triggering ARP Miss messages matches the IP address specified in rate limiting, the rate limit specified in the later configuration takes effect. If the source IP address of the IP packets does not match the specified one, the rate limit in the previous configuration takes effect. l Configure strict ARP learning. Strict ARP learning allows a device to learn ARP entries from only the ARP Reply packets in response to the ARP Request packets sent by itself. Configure strict ARP learning globally. <HUAWEI> system-view [~HUAWEI] arp learning strict Configure strict ARP learning on an interface. <HUAWEI> system-view [~HUAWEI] interface vlanif 201 [~HUAWEI-Vlanif201] arp learning strict force-enable l Configure ARP anti-spoofing. To prevent ARP anti-spoofing attack, enable ARP entry fixing. <HUAWEI> system-view [~HUAWEI] arp anti-attack entry-check fixed-mac enable l Prevent Man-in-the-Middle (MITM) attacks(excluding CE12800E and CE6880EI). To prevent MITM attacks, configure ARP packet checking on interfaces or in VLANs. If the packets received on an interface match a binding entry, the packets are forwarded; otherwise, the packets are discarded. In addition, you can configure the alarm function. When the number of discarded packets exceeds the threshold, an alarm is generated. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 47 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution NOTE This function applies only to DHCP users. The binding entries can be automatically generated after DHCP snooping is enabled. Enable dynamic ARP inspection to check ARP packets against binding entries. <HUAWEI> system-view [~HUAWEI] vlan 201 [*HUAWEI-vlan201] arp anti-attack check user-bind enable Configure check items for ARP packets. [*HUAWEI-vlan201] arp anti-attack check user-bind check-item ip-address To allow the ARP packets matching only one or two items in a binding entry to pass through, configure the device to match ARP packets against only one or two items. NOTE The specified check items do not take effect for the users with static binding entries configured. That is, the device still checks ARP packets against the static binding entries. 2.2.6 Firewall Configuration Firewalls are connected in bypass mode in the open platform area, development and testing area, operation and management area, and area egress to implement secure access of the local area and other functional areas. VRF instances are created on the aggregation layer to separate service network routes and public network routes. Firewalls are connected in bypass mode to ensure secure access between different areas, and firewalls work in hot standby mode to ensure high reliability. Different VLANs are created on DS1 and DS2, IP addresses are assigned to VLANIF interfaces, and VRRP is configured. Different VRRP virtual IP addresses are used as gateway addresses of server groups on ASs, and the Eth-Trunk between DS1 and DS2 allows packets from the VLANs to pass through. MSTP is deployed between AS and DSs to eliminate loops, and OSPF is configured on DSs and CSs to implement Layer 3 interworking. VRF-A is created on the DS, service interfaces and downlink interfaces connected to firewalls are bound to VRF-A, and the default route of VRF-A points to the downlink VRRP virtual IP address of firewalls. Static routes from DSs to service network segments are configured, and the next hop IP address is the uplink VRRP virtual IP address of firewalls. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 48 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution Configure static routes between firewalls and DSs. Firewalls are configured with the Huawei Redundancy Protocol (HRP) and security policies based on application requirements. 1. Create VLAN 200, VLAN 300, and VLAN 400 on DS1. Create VLANIF 200, VLANIF 300, and VLANIF 400. Configure 10GE1/0/1 and Eth-Trunk 1 to allow packets from VLAN 200 to pass through, Eth-Trunk 3 to allow packets from VLAN 300 to pass through, and Eth-Trunk 2 to allow packets from VLAN 400 to pass through. 2. Configure MSTP and VRRP on DS1 and DS2, and configure DS1 as the VRRP master. 3. Create VRF-A on DS1, bind VLANIF 200 and VLANIF300 connected to the downlink interface of the firewall to VRF-A. The default route of VRF-A points to the downlink VRRP virtual IP address of firewalls. NOTE When an interface is bound to VRF-A, the IP address of the interface will be deleted; therefore, you need to reconfigure the IP address. [~HUAWEI] ip vpn-instance VRF-A [*HUAWEI-vpn-instance-VRF-A] ipv4-family [*HUAWEI-vpn-instance-VRF-A-af-ipv4] route-distinguisher 100:1 [*HUAWEI-vpn-instance-VRF-A-af-ipv4] vpn-target 111:1 both [*HUAWEI-vpn-instance-VRF-A-af-ipv4] quit [*HUAWEI-vpn-instance-VRF-A] quit [*HUAWEI] interface vlanif 200 [*HUAWEI-Vlanif200] ip binding vpn-instance VRF-A [*HUAWEI-Vlanif200] ip address 10.10.1.1 24 [*HUAWEI-Vlanif200] quit [*HUAWEI] interface vlanif 300 [*HUAWEI-Vlanif300] ip binding vpn-instance VRF-A [*HUAWEI-Vlanif300] ip address 10.10.2.1 24 [*HUAWEI-Vlanif300] quit [*HUAWEI] ip route-static vpn-instance VRF-A 0.0.0.0 0.0.0.0 10.10.2.5 [*HUAWEI] commit 4. Configure a static route from DS1 to the service network segment. The next hop address is the uplink VRRP virtual IP address of firewalls. Run OSPF between DS1 and CS and import the static route to OSPF. [~HUAWEI] ip route-static 10.10.1.0 255.255.255.0 10.10.3.5 [*HUAWEI] ospf 100 [*HUAWEI-ospf-100] area 0 [*HUAWEI-ospf-100-area-0.0.0.0] network 10.10.4.0 0.0.0.255 [*HUAWEI-ospf-100-area-0.0.0.0] network 10.10.5.0 0.0.0.255 [*HUAWEI-ospf-100-area-0.0.0.0] quit [*HUAWEI-ospf-100] import-route static [*HUAWEI-ospf-100] quit [*HUAWEI] commit 5. 6. Perform basic configurations including the device name, interface, and IP address on firewalls. The configurations are not provided here. Configure zones on FW1. [FW1] firewall zone trust [FW1-zone-trust] add interface eth-trunk 3 [FW1-zone-trust] quit [FW1] firewall zone untrust [FW1-zone-untrust] add interface eth-trunk 2 [FW1-zone-untrust] quit [FW1] firewall zone dmz [FW1-zone-dmz] add interface eth-trunk 1 [FW1-zone-dmz] quit 7. Configure zones on FW2. [FW2] firewall zone trust [FW2-zone-trust] add interface eth-trunk 3 [FW2-zone-trust] quit [FW2] firewall zone untrust [FW2-zone-untrust] add interface eth-trunk 2 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 49 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution [FW2-zone-untrust] quit [FW2] firewall zone dmz [FW2-zone-dmz] add interface eth-trunk 1 [FW2-zone-dmz] quit 8. Configure a static route on FW1. The next hop address in the route used for access from the internal network to the external network is the IP address of VLANIF 300 that connects to the uplink interface of the firewall. The next hop address in the route used for access from the external network to the internal network is the IP address of VLANIF 200 that connects to the downlink interface of the firewall. [FW1] ip route-static 0.0.0.0 0.0.0.0 10.10.3.1 [FW1] ip route-static 10.10.1.0 255.255.255.0 10.10.2.1 9. Configure a static route on FW2. [FW2] ip route-static 0.0.0.0 0.0.0.0 10.10.3.1 [FW2] ip route-static 10.10.1.0 255.255.255.0 10.10.2.1 10. Configure HRP on FW1. [FW1] interface eth-trunk 3 [FW1-Eth-Trunk3] vrrp vrid 1 virtual-ip 10.10.2.5 24 master [FW1-Eth-Trunk3] quit [FW1] interface eth-trunk 2 [FW1-Eth-Trunk2] vrrp vrid 2 virtual-ip 10.10.3.5 24 master [FW1-Eth-Trunk2] quit [FW1] hrp interface eth-trunk 1 remote 10.1.1.2 [FW1] firewall packet-filter default permit interzone local dmz [FW1] hrp enable 11. Configure HRP on FW2. [FW2] interface eth-trunk 3 [FW2-Eth-Trunk3] vrrp vrid 1 virtual-ip 10.10.2.5 24 slave [FW2-Eth-Trunk3] quit [FW2] interface eth-trunk 2 [FW2-Eth-Trunk2] vrrp vrid 2 virtual-ip 10.10.3.5 24 slave [FW2-Eth-Trunk2] quit [FW2] hrp interface eth-trunk 1 remote 10.1.1.1 [FW2] firewall packet-filter default permit interzone local dmz [FW2] hrp enable NOTE After the HRP configuration is complete, the configurations and sessions on the active device are synchronized to the standby device; therefore, you only need to perform the following configurations on the active firewall FW1. 12. Configure the security policy and intrusion prevention system (IPS). NOTE Before configuring IPS, ensure that the IPS signature database uses the latest version. When configuring IPS, use the default IPS configuration file default. HRP_M[FW1] policy interzone trust untrust outbound HRP_M[FW1-policy-interzone-trust-untrust-outbound] policy 1 HRP_M[FW1-policy-interzone-trust-untrust-outbound-1] policy source 10.10.1.0 mask 24 HRP_M[FW1-policy-interzone-trust-untrust-outbound-1] action permit HRP_M[FW1-policy-interzone-trust-untrust-outbound-1] profile ips default HRP_M[FW1-policy-interzone-trust-untrust-outbound-1] quit HRP_M[FW1-policy-interzone-trust-untrust-outbound] quit HRP_M[FW1] policy interzone trust untrust inbound HRP_M[FW1-policy-interzone-trust-untrust-inbound] policy 1 HRP_M[FW1-policy-interzone-trust-untrust-inbound-1] policy destination 10.10.1.0 mask 24 HRP_M[FW1-policy-interzone-trust-untrust-inbound-1] policy service serviceset ftp http HRP_M[FW1-policy-interzone-trust-untrust-inbound-1] action permit HRP_M[FW1-policy-interzone-trust-untrust-inbound-1] profile ips default HRP_M[FW1-policy-interzone-trust-untrust-inbound-1] quit HRP_M[FW1-policy-interzone-trust-untrust-inbound] quit HRP_M[FW1] ips enable Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 50 Configuration Examples for the Financial Industry 2 Traditional Data Center Deployment Solution 13. Configure attack defense. NOTE The attack defense thresholds in this example are only for reference. Configure the thresholds according to the traffic volume on your network. HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] firewall firewall firewall firewall firewall firewall firewall firewall firewall firewall firewall firewall firewall defend syn-flood enable defend syn-flood zone untrust max-rate 20000 defend udp-flood enable defend udp-flood zone untrust max-rate 1500 defend icmp-flood enable defend icmp-flood zone untrust max-rate 20000 blacklist enable defend ip-sweep enable defend ip-sweep max-rate 4000 defend port-scan enable defend port-scan max-rate 4000 defend ip-fragment enable defend ip-spoofing enable 14. Configure ASPF. FTP is used as an example. If there are other applications on the internal network, enable ASPF. HRP_M[FW1] firewall interzone trust untrust HRP_M[FW1-interzone-trust-untrust] detect ftp HRP_M[FW1-interzone-trust-untrust] quit Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 51 Configuration Examples for the Financial Industry 3 3 M-LAG Data Center Deployment Solution M-LAG Data Center Deployment Solution 3.1 Overview 3.2 Service Design and Configuration Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 52 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution 3.1 Overview 3.1.1 Purpose This document provides a detailed data center design for a level-1 bank branch, covering the network architecture, IP address and VLAN planning, routing design, security design, network reliability design, and network management system design for the data center. You can use this document as a reference for data center project implementation. 3.1.2 Typical Networking 3.1.2.1 Logical Architecture The following figure shows the logical topology of the level-1 bank branch's data center network, which is divided into multiple areas depending on the functions provided. The following describes the functional areas. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 53 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution Area Function and Positioning Accessible To Open platform area: OP Provides access to running open systems, including the accounting system as well as other accounting relevant and irrelevant service systems. This area is a major business area for communication between production and office departments. Clients and servers Operation and management area: OM Has servers deployed for system operations, monitoring, and maintenance. This area is responsible for network and system management and maintenance. Only a few authorized maintenance users Development and testing area: DT Accommodates servers of systems that have not been put into use, including the hosts and open platform systems that are under development or testing. Clients and servers MAN/WAN access area (WN/MN) Connects the level-1 bank branch to the head office and its data center, downstream level-2 branches and outlets, as well as offices, branches, and outlets in the local city. This area provides connections to the level-1 bank branch's LANs and subordinate branches. ATM machines, POS machines, teller terminals, maintenance users, office terminals, and terminals in business centers Local user access area: LU Allows access of various user terminals. Local maintenance users, local office terminals, and terminals in local business centers DMZ Extranet: EP Implements interconnection with business platforms of partners, major accounts, and agents through lines of carriers. Partners, international branches, off-bank devices (3G/2G/PSTN), telephone banking systems, and customer service centers The level-1 bank branch's data center network is logically divided into three layers: core, distribution, and access layers. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 54 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution l Core layer: high-speed Layer 3 switching backbone network. This layer is not directly connected to terminals or servers and does not provide functions that will affect highspeed switching performance, such as ACL. l Distribution layer: boundary of Layer 2 and Layer 3 networks, and boundary of functional areas. This layer connects to the core layer at Layer 3 and connects to the access layer at Layer 2. It provides the following functions: l – Acts as a unified gateway for terminals and servers in the functional areas. – Summarizes routes within each functional area. – Implements intra-VLAN routing within each functional area. – Provides routing policies for communication between functional areas and the core layer. – Applies ACLs to control communication between systems within a functional area. – Has firewalls deployed to enforce access control between areas. Access layer: connects to the distribution layer and consists of the following devices: – Access switch (AS) Provides Layer 2 access for servers and terminals and isolates users through VLANs. – Access router (AR) Provides access to the WAN and MAN networks, and functions as autonomous system boundary router (ASBR) to implement routing control. 3.1.2.2 Physical Architecture The following figure shows the physical network connections of the level-1 bank branch's data center. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 55 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution In the core switching area, two high-performance data center switches are deployed, and they are interconnected through 10GE bundled links to provide highly reliable, high-speed switching. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 56 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution The switches in the core switching area and distribution layer are connected in square networking to implement redundancy of physical links, enhancing network reliability. The core switches and distribution switches are connected using bundled 10GE or GE links. The distribution layer of each area has two high-performance switches deployed for traffic aggregation in the area. The multi-level LAG is used to replace the traditional Layer 2 network where aggregation and access devices are used. Multi-level M-LAG ensures reliability, improves the link use efficiency, and expands the network scale in dual-homing mode. The gateway is deployed at the aggregation layer and supports application server cluster virtualization, facilitating deployment of the large Layer 2 network and fast service deployment and migration. Firewalls are deployed in each area for access control. Firewalls are connected to distribution switches in bypass mode through bundled GE links The two firewalls in an area work in active/standby mode. If the active firewall fails, traffic can be switched to the standby firewall within a short time. If both firewalls fail, service traffic is switched to the bypass link without passing through the firewalls, ensuring nonstop data forwarding and service operations. The two pairs of firewalls in the extranet area are connected to distribution switches, access switches, and access routers in square networking to enhance network reliability. 3.1.2.3 Products Used Huawei CE12816, CE12808, and CE6800 switches are used at the core layer, distribution layer, and access layer, respectively. Huawei NE40E-X8 is used at the access layer as the access router, and Huawei USG5500 is used as the firewall. 3.1.3 Network Architecture Design 3.1.3.1 Core Switching Area The following figure shows the core switching area of the level-1 bank branch's data center. The core layer connects to each functional area in the data center. Two high-performance CE12816 data center switches are deployed at the core layer, which are interconnected using an Eth-Trunk of two 10GE links to enhance connection reliability. Core switch (CS): Huawei CE12816 3.1.3.2 Open Platform Area The following figure shows the open platform area of the level-1 bank branch's data center. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 57 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution The distribution layer of the open platform area uses two-level M-LAG. The two highperformance CE12808 data center switches use 2x10GE inter-card Eth-Trunk links to connect to each other and function as dual-active gateways. OSPF is enabled on switches at the core and distribution layers to implement Layer 3 interworking. The access switch CE6800 is dualhomed to the distribution layer through M-LAG. The egress of the area has firewalls deployed in bypass mode to ensure secure communication between the open platform area and other functional areas. The firewalls use 4xGE inter-card Eth-Trunk links for uplink and downlink connections. Core switch (CS): Huawei CE12816 Distribution switch (DS): Huawei CE12808 Access switch (AS): Huawei CE6800 Firewall (FW): Huawei USG5500 3.1.3.3 Development and Testing Area The following figure shows the development and testing area of the level-1 bank branch's data center. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 58 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution The distribution layer of the development and testing area uses two-level M-LAG. The two high-performance CE12808 data center switches use 2x10GE inter-card Eth-Trunk links to connect to each other and function as dual-active gateways. OSPF is enabled on switches at the core and distribution layers to implement Layer 3 interworking. The access switch CE6800 is dual-homed to the distribution layer through M-LAG. The egress of the area has firewalls deployed in bypass mode to ensure secure communication between the development and testing area and other functional areas. The firewalls use 4xGE inter-card Eth-Trunk links for uplink and downlink connections. Core switch (CS): Huawei CE12816 Distribution switch (DS): Huawei CE12808 Access switch (AS): Huawei CE6800 Firewall (FW): Huawei USG5500 3.1.3.4 Operation and Management Area The following figure shows the operation and management area of the level-1 bank branch's data center. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 59 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution This area is the network management and maintenance center of the level-1 bank branch. It collects running status data of managed systems and devices, monitors network and system status, issues management instructions, and detects system failures to help in troubleshooting. The distribution layer of the operation and management area uses two-level M-LAG. The two high-performance CE12808 data center switches use inter-card Eth-Trunk links of two GE optical interfaces to connect to each other and function as dual-active gateways. OSPF is enabled on switches at the core and distribution layers to implement Layer 3 interworking. The access switch CE6800 is dual-homed to the distribution layer through M-LAG on the GE interface. The egress of the area has firewalls deployed in bypass mode to ensure secure communication between the open platform area and other functional areas. The firewalls use inter-card EthTrunk links of two GE optical interfaces for uplink and downlink connections. The following systems are deployed in this area: Management server: uses the Simple Network Management Protocol (SNMP) to collect network and system running information and receive logs and alarms sent from various systems on the network. The management server summarizes and processes management information collected from the network, monitors running status of the data center network and systems, and generates network and system management reports. Management platform: enables maintenance personnel to access the management server to diagnose and rectify faults of devices. Security tools: guarantee system security. Security tools include the RADIUS server, intrusion detection system (IDS) server, and antivirus server. Core switch (CS): Huawei CE12816 Distribution switch (DS): Huawei CE12808 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 60 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution Access switch (AS): Huawei CE6800 Firewall (FW): Huawei USG5500 3.1.3.5 Local User Access Area The following figure shows the local user access area of the level-1 bank branch's data center. This area is designed to enable communication between various types of user terminals. The distribution layer of the local user access area uses two-level M-LAG. The two highperformance CE12808 data center switches use 2x10GE inter-card Eth-Trunk links to connect to each other and function as dual-active gateways. OSPF is enabled on switches at the core and distribution layers to implement Layer 3 interworking. The access switch CE6800 is dualhomed to the distribution layer through M-LAG. The egress of the area has firewalls deployed in bypass mode to ensure secure communication between the open platform area and other functional areas. The firewalls use inter-card EthTrunk links of two GE optical interfaces for uplink and downlink connections. Core switch (CS): Huawei CE12816 Distribution switch (DS): Huawei CE12808 Access switch (AS): Huawei CE6800 Firewall (FW): Huawei USG5500 3.1.3.6 MAN/WAN Access Area The following figure shows the MAN/WAN area of the level-1 bank branch's data center. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 61 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution This area connects upstream and downstream routers, and allows communication between access switches in the same city. The distribution layer of this area has two high-performance CE12808 data center switches, which use inter-card Eth-Trunk links of two GE optical interfaces to connect to each other and the upstream core switches. The access routers connect to the distribution switches in dualhoming mode. The MAN/WAN access area is only used for access to the WAN or MAN and has no servers, so no firewalls need to be deployed in this area. The offices and banking outlets in the same city or level-2 bank branches deploy the Unified Threat Management (UTM) system for security guarantee. Core switch (CS): Huawei CE12816 Distribution switch (DS): Huawei CE12808 Access router (AR): Huawei NE40E-X8 3.1.3.7 Extranet Area The following figure shows the extranet area of the level-1 bank branch's data center. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 62 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution The extranet area provides network connections to partners. To improve security of the area and prevent Internet users from directly accessing servers of the bank, a two-layer heterogeneous firewall architecture is used to partition the entire area into three security subareas of different security levels: extranet area, DMZ, and intranet area. The following table describes functions of the three security subareas. Area Function Extranet Area Allows partners to connect to the network through private lines and translates private IP addresses of packets sent from partners into private IP addresses in the DMZ. DMZ Deploys front end servers for partners. Intranet area Deploys systems on the level-1 bank branch's data center network. The access layer, distribution layer, and core layer of the extranet area provide different network functions, with ascending security levels. The following table describes devices in the extranet area. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 63 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution Role Function Extranet router To provide access for partners, two extranet routers connect to lines of different carriers. The primary line connects to the master router, and the backup line connects to the backup router, implementing link redundancy. The routers' interfaces connected to the external firewalls run the Virtual Router Redundancy Protocol (VRRP). Generally, data flows are forwarded through the master router. If the master router fails, traffic will be switched to the backup router. VRRP enhances system reliability through redundancy and prevents single-point failures. If routers are connected to links that do not support automatic link state detection, for example, ATM or MSTP links, configure a link failure detection protocol such as OAM or BFD on the interfaces. In this case, ensure that the remote ends also support the link failure detection protocol. External firewall Security policies need to be configured on the firewalls according to application requirements to implement logical isolation and security control between the extranet area and DMZ. The two firewalls work in NAT mode and use the two-node redundancy HA architecture. Generally, one firewall works in active mode, and the other works in standby mode. If the active firewall fails, traffic can be quickly switched to the standby firewall, ensuring uninterrupted data forwarding and normal service operations. Access switch The switches connect to front end servers in the extranet and connect to each other through a 2xGE Eth-Trunk link to enhance reliability. More access switches can be added to the extranet based on business requirements. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 64 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution Role Function Internal firewall Security policies need to be configured on firewalls according to application requirements to implement logical isolation and security control between the DMZ and intranet. The two firewalls work in NAT mode and use the two-node redundancy HA architecture. Generally, one firewall works in active mode, and the other works in standby mode. If the active firewall fails, traffic can be quickly switched to the standby firewall, ensuring uninterrupted data forwarding and normal service operations. Distribution switch The switches connect the extranet to the LANs on the data center network. The two switches are interconnected through two bundled links to enhance reliability. Core switch (CS): Huawei CE12816 Distribution switch (DS): Huawei CE12808 Access switch (AS): Huawei CE12808 Access router (AR): Huawei NE40E-X8 Firewall (FW): Huawei USG5500 3.1.3.8 Firewall Deployment The level-1 bank branch's data center network has firewalls deployed in the open platform area (OP), development and testing area (DT), local user access area (LU), and operation and management area (OM) to improve network security. Access control policies are configured on the firewalls to isolate different functional areas, control communication between the areas, and protect servers in these areas. The firewalls are connected to distribution switches in bypass mode, as shown in the following figure. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 65 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution l The firewalls are deployed in the HA architecture and work in preemption mode. When both firewalls are running normally, FW1 acts as the active firewall, and FW2 acts as the standby firewall. l The two firewalls exchange heartbeat packets through two directly connected interfaces. l FW1 and FW2 are connected to the distribution switches in bypass mode. l Link aggregation is used between the firewalls and distribution switches. Two or four uplink interfaces of the active firewall FW1 are bundled into Eth-Trunk 1 and connected to DS1. Two or four downlink interfaces of FW1 are bundled into Eth-Trunk 2 and connected to DS1. The number of member interfaces in an Eth-Trunk is determined based on the requirements in the area. Two or four uplink interfaces of the standby firewall FW2 are bundled into Eth-Trunk 1 and connected to DS2. Two or four downlink interfaces of FW2 are bundled into Eth-Trunk 2 and connected to DS2. l The firewalls monitor the physical status of Eth-Trunk 1 and Eth-Trunk 2. If either EthTrunk interface fails, an active/standby switchover is triggered. Then FW2 becomes the active firewall, and FW1 becomes the standby firewall. l If both the two firewalls are faulty, manually switch data traffic to the bypass link so that the traffic does not pass through the firewalls. The bypass link is an independent link deployed between the uplink and downlink VRF instances. l The firewalls communicate with distribution switches using static routes and run the VRRP protocol. l Trusted and untrusted zones are defined on the firewalls, and security policies are configured based on application requirements to implement isolation and security control between trusted and untrusted zones. Core switch (CS): Huawei CE12816 Distribution switch (DS): Huawei CE12808 Access switch (AS): Huawei CE6800 Firewall (FW): Huawei USG5500 3.2 Service Design and Configuration 3.2.1 System Configuration Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 66 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution 3.2.1.1 Device Login Configuration Users can log in to the device through a console port, Telnet, or STelnet to perform local or remote device maintenance. A user must use the console port to log in to the device for the first time. Telnet or STelnet can be used to implement remote management and maintenance. The following describes how to log in to the device through the console port and STelnet. l Logging in to a device through a console port Before logging in to the device through a console port, complete the following tasks: a. b. Prepare a console cable. Install the terminal emulation software on the PC. NOTE You can use the built-in terminal emulation software (such as the HyperTerminal of Windows 2000) on the PC. If no built-in terminal emulation software is available, use the third-party terminal emulation software. For details, see the software user guide or online help. Procedure: Use the terminal simulation software to log in to the device through a console port. a. Insert a DB9 plug of a console cable delivered with the device into a 9-pin serial socket on a PC, and insert an RJ-45 connector into the console port of the device, as shown in the following figure. Figure 3-1 Connecting the PC to the device through the console port Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 67 Configuration Examples for the Financial Industry b. 3 M-LAG Data Center Deployment Solution Start the terminal emulation software on the PC, establish a connection, and set the connected interface and communication parameters. NOTE One PC may have multiple connection interfaces. Select the interface connected to the console cable. Usually, the interface COM1 is selected. You must set the communication parameters of the PC to be the same as the changed communication parameters of the serial interface, and reconnect the PC to the serial interface. c. Press Enter until the system asks you to enter the password. (During AAA authentication, the system asks you to enter the user name and password. The following information is for your reference only.) Login authentication Password: You can run commands to configure the device. Enter a question mark (?) whenever you need help. l Logging in to the device using STelnet Before logging in to the device through STelnet, complete the following tasks: a. Configure routes between a terminal and the device. b. Install the SSH client software on the terminal. Procedure: a. Configure the STelnet server functions and parameters. <HUAWEI> system-view [~HUAWEI] rsa local-key-pair create The key name will be: HUAWEI_Host The range of public key size is (512 - 2048). NOTE: Key pair generation will take a short while. Input the bits in the modulus [default = 2048] : 2048 //Starting from V200R001C00, the device supports only 2048 bits. Manual input is not required. [*HUAWEI] stelnet server enable [*HUAWEI] commit b. Configure the SSH user login interface. [~HUAWEI] user-interface vty 0 4 [~HUAWEI-ui-vty0-4] authentication-mode aaa [*HUAWEI-ui-vty0-4] protocol inbound ssh [*HUAWEI-ui-vty0-4] commit [~HUAWEI-ui-vty0-4] quit c. Configure an SSH user. You need to configure the authentication mode. The device supports the following authentication modes: RSA, password, password-rsa, DSA, password-dsa, ECC, password-ecc, and all. The authentication modes are described as follows: password-rsa: The password and RSA authentication requirements must be met. password-dsa: The password and DSA authentication requirements must be met. password-ecc: The password and ECC authentication requirements must be met. all: The requirements of password, RSA, DSA, or ECC authentication are met. [~HUAWEI] ssh [*HUAWEI] ssh [*HUAWEI] ssh [*HUAWEI] aaa [*HUAWEI-aaa] [*HUAWEI-aaa] Issue 03 (2017-05-08) user client001 user client001 authentication-type password user client001 service-type stelnet local-user client001 password irreversible-cipher Huawei@123 local-user client001 level 3 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 68 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution [*HUAWEI-aaa] local-user client001 service-type ssh [*HUAWEI-aaa] quit [*HUAWEI] commit 4. Log in to the device through STelnet. The PuTTY software is used as an example. # Use the PuTTY software to log in to the device, enter the device IP address, and select the SSH protocol type, as shown in the following figure. Figure 3-2 Logging in to the SSH server through PuTTY in password authentication mode # Click Open. Enter the user name and password as prompted, and press Enter. You have logged in to the SSH server. (The following information is for your reference only.) login as: client001 Sent username "client001" client001@10.137.217.203's password: Warning: The initial password poses security risks. The password needs to be changed. Change now? [Y/N]: n Info: The max number of VTY users is 21, the number of current VTY users online is 2, and total number of terminal users online is 2. The current login time is 2012-08-04 20:09:11+00:00. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 69 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution First login successfully. <HUAWEI> 3.2.1.2 Device Naming Configuration Devices in this project are named using letters and numbers to facilitate tier-1 branch data center network implementation and branch network O&M. The name format is field 1_field 2_field 3_nn. Each field is described as follows according to the tier-1 branch data center network construction implementation objectives. Field 1 Identifies the device installation position. For a tier-1 branch data center, the value is as follows: Abbreviation of tier-1 branch area+ abbreviation of local area + bank level In the format: 1. Bank level Data center: 0 Tier-1 branch: 1 Tier-2 branch: 2 Tier-3 branch: 3 Reserved: 4 Outlet: 5 Downstream ATM: 6 For example, a branch at Changjiang Road in Hefei, Anhui province can be identified as AHCJL3. Field 2 Identifies a functional area. According to the network architecture of the tier-1 branch data center, areas are defined as follows: 1. Core area: CO 2. Open platform area: OP 3. Development and testing area: DT 4. Operation and management area: OM 5. Local user access area: LU 6. Extranet: EP 7. MAN/WAN access area: WN Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 70 3 M-LAG Data Center Deployment Solution Configuration Examples for the Financial Industry Field 3 Identifies device functions and is defined as follows according to the logical hierarchy of the tier-1 branch data center: 1. Core switch: CS 2. Aggregation switch: DS 3. Access switch: AS 4. WAN access router: AR 5. Firewall: FW nn Number of network devices of the same application system in the same area: 01 to 99 For example, DS 1 in the open platform area of xx Branch is named XX1_OP_DS_01. Common configuration: <HUAWEI> system-view [~HUAWEI] sysname XX1_OP_DS_01 [*HUAWEI] commit 3.2.1.3 Device Management Configuration Device management configuration includes restarting a device and specifying system startup files for the next startup. The recommended configuration is to specify startup files for the next startup. l Restarting a Device To make the specified system software and files take effect, restart the device after system startup configuration is complete. Devices can be restarted immediately or periodically. Example for restarting a device immediately: <HUAWEI> reboot Example for restarting a device periodically: <HUAWEI> schedule reboot at 22:00 Warning: The current configuration will be saved to the next startup savedconfiguration file. Continue? [Y/N]:y Now saving the current configuration... Save the configuration successfully. Info: Reboot system at 22:00:00 2015/07/17 UTC (in 15 hours and 49 minutes). Confirm? [Y/N]:y l Specifying system startup files Specify the system software and configuration file for system startup so that the device will start with the specified software and initialize with the specified configuration file. If a new patch needs to be loaded during system startup, specify a patch file. Example for specifying the system software for the next startup: <HUAWEI> startup system-software basicsoft.cc slave-board The optional parameter slave-board is valid only for switches with two MPUs. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 71 3 M-LAG Data Center Deployment Solution Configuration Examples for the Financial Industry 3.2.1.4 Network Management Configuration Network management is an important part in the standard configuration. Currently, SNMP is widely used for network management. SNMP includes three versions: SNMPv1, SNMPv2c, and SNMPv3. SNMPv1 and SNMPv2c perform authentication using community names, resulting in security risks. SNMPv3 is recommended because it is more secure. The following example configures a device to communicate with the NMS using SNMPv3. 1. Enable the SNMP agent. <HUAWEI> system-view [~HUAWEI] snmp-agent 2. Configure the SNMP version to SNMPv3. [*HUAWEI] snmp-agent sys-info version v3 NOTE You can configure the SNMP version according to your requirements while ensuring that the device and NMS use the same SNMP version. If they use different SNMP versions, the device cannot connect to the NMS. 3. Configure user access rights. # Configure an ACL to allow only the packets with the source IP address 192.168.1.10 to pass through. [*HUAWEI] acl 2001 [*HUAWEI-acl4-basic-2001] rule permit source 192.168.1.10 0.0.0.0 [*HUAWEI-acl4-basic-2001] quit # Configure the MIB view as alliso and include the view iso. [*HUAWEI] snmp-agent mib-view include alliso iso NOTE You are advised to configure user access rights according to your requirements. 4. Set the SNMPv3 user group name to huawei_group, user name to huawei_user, and security level to privacy, and apply access control. [*HUAWEI] snmp-agent [*HUAWEI] snmp-agent [*HUAWEI] snmp-agent Please configure the Enter Password: Confirm Password: [*HUAWEI] snmp-agent Please configure the Enter Password: Confirm Password: 5. group v3 huawei_group privacy write-view alliso acl 2001 usm-user v3 huawei_user group huawei_group usm-user v3 huawei_user authentication-mode sha authentication password (8-255) //Enter an authentication password. //Confirm the authentication password. usm-user v3 huawei_user privacy-mode aes256 privacy password (8-255) //Enter an encryption password. //Confirm the encryption password. Configure a trap host. [*HUAWEI] snmp-agent target-host trap address udp-domain 192.168.1.10 params securityname huawei_user v3 privacy [*HUAWEI] commit 3.2.1.5 Information Center Configuration The operation and management area is the network management and maintenance center. It collects the device operating status. To monitor the device operating status and locate faults, you can send logs of devices to the management server in the maintenance and management area through the information center. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 72 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution Step 1 Enable the information center. <HUAWEI> system-view [~HUAWEI] info-center enable [*HUAWEI] commit Step 2 Configure the device to output logs to a log host. [~HUAWEI] info-center loghost 10.1.1.1 [*HUAWEI] commit ----End 3.2.1.6 NTP Configuration An NTP clock source on a data center network provides clock signals for all network devices. All network devices in data centers synchronize their clocks with the NTP clock source. Set the NTP working mode of all network devices to the unicast server/client mode, configure CS1 as the primary time server, and ensure that CS1 has synchronized its time with an authoritative clock (global positioning system). Configure CS2, DS, and AS as clients. To ensure security, you are advised to enable the NTP authentication function. Configure the NTP master clock, and enable the NTP authentication and NTP server functions on CS1. <CS1> system-view [~CS1] ntp refclock-master 1 [*CS1] ntp authentication enable [*CS1] ntp authentication-keyid 42 authentication-mode hmac-sha256 Hello@123456 [*CS1] ntp trusted authentication-keyid 42 [*CS1] undo ntp server disable [*CS1] commit Specify CS1 as the NTP server on DS1. The other configurations are similar. <DS1> system-view [~DS1] ntp authentication enable [*DS1] ntp authentication-keyid 42 authentication-mode hmac-sha256 Hello@123456 [*DS1] ntp trusted authentication-keyid 42 [*DS1] ntp unicast-server 10.100.1.1 authentication-keyid 42 [*DS1] commit Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 73 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution 3.2.2 Service Configuration 3.2.2.1 Interface Configuration To ensure network reliability, physical interfaces comply with the following rules: l An interface uses the auto-negotiation mode by default. For example, the common configuration of a 10GE electrical interface is as follows: <HUAWEI> system-view [~HUAWEI] interface 10ge 1/0/1 [~HUAWEI-10GE1/0/1] undo negotiation disable [*HUAWEI-10GE1/0/1] speed auto 100 1000 10000 [*HUAWEI-10GE1/0/1] commit l The physical interface that is not in use must be in shutdown state. Common configuration: <HUAWEI> system-view [~HUAWEI] interface 10ge 1/0/1 [~HUAWEI-10GE1/0/1] shutdown [*HUAWEI-10GE1/0/1] commit l An interface has link fault detection enabled. Common configuration: <HUAWEI> system-view [~HUAWEI] interface 10ge 1/0/1 [~HUAWEI-10GE1/0/1] port crc-statistics trigger error-down [*HUAWEI-10GE1/0/1] commit l The interfaces that are used for device interconnection are enabled in descending order of interface number, and the interfaces that are used for terminal connections are enabled in ascending order of interface number. 3.2.2.2 VLAN Configuration The network is divided into multiple areas based on service types. In each area, there are multiple types of application systems. Each service involves multiple sub-systems, which have different service characteristics, protocol types, QoS requirements (such as the delay and jitter), and security levels. VLAN assignment needs to be configured to achieve the preceding network architecture. VLAN technology differentiates services to implement QoS. It also logically isolates services with different security levels, so that different security policies are enforced for different VLANs and applications to improve network security. Here, interface-based VLAN assignment is used. The principles and notes of VLAN assignment are as follows: 1. Issue 03 (2017-05-08) VLAN assignment principles – Assign VLANs for interconnection between areas. VLAN IDs are valid only within an area. – Assign a VLAN range in each functional area, and assign VLANs to applications of different levels within the VLAN range in each area. Reserve some VLANs for expansion of different application systems in each area. – Define different VLAN ranges for different areas and assign different VLANs to different service systems. Locate servers of the same service system in the same Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 74 3 M-LAG Data Center Deployment Solution Configuration Examples for the Financial Industry VLAN and assign VLANs in ascending order of VLAN IDs. MAN and WAN users share VLANs with local users. 2. VLAN configuration notes – In a functional area, all user VLANs are configured on ASs and DSs. AS-DS and DS-DS Eth-Trunk links allow packets from service VLANs in the local area to pass through. – An Eth-Trunk link cannot allow packets from all VLANs to pass through. – All Eth-Trunk links prevents packets from VLAN 1 from passing through. The following table describes the VLAN design. Table 3-1 VLAN design No. Function VLAN ID Remarks 1 Open platform area 200-399 - 2 Development and testing area 400-499 - 3 Operation and management area 500-599 - 4 Local User Access Area 850-949 Multiplexing by MAN and WAN users 5 Extranet area 650-699 - 6 Network device interconnection 800-849 - 7 Network device management 600-649 - 8 Reserved 10-199, 700-799, and 950-1049 - 3.2.2.3 Link Aggregation Configuration If high-bandwidth and high-reliability links are required, configure link aggregation. Bundle CS-CS, CS-DS, DS-DS, DS-firewall, AS-DS, and AS-server links, as well as heartbeat links between firewalls into link aggregation groups to improve bandwidth and reliability. Requirements for link aggregation deployment: l Deploy member interfaces on different cards to improve link reliability when one card fails. l Configure the manual load balancing mode and use member interfaces of the same rate. l Configure member interfaces to work in auto-negotiation mode. (If auto-negotiation fails, use the forcible mode and enable DLDP.) Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 75 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution Figure 3-3 Networking diagram of link aggregation Link aggregation configuration (the DS-DS link is used as an example): <DS1> system-view [~DS1] vlan batch 200 [*DS1] interface eth-trunk 1 [*DS1-Eth-Trunk1] trunkport 10ge 1/0/1 [*DS1-Eth-Trunk1] trunkport 10ge 1/0/2 [*DS1-Eth-Trunk1] port link-type trunk [*DS1-Eth-Trunk1] port trunk allow-pass vlan 200 [*DS1-Eth-Trunk1] undo port trunk allow-pass vlan 1 [*DS1-Eth-Trunk1] quit [*DS1] commit [~DS1] interface eth-trunk 2 [*DS1-Eth-Trunk2] trunkport 10ge 1/0/3 [*DS1-Eth-Trunk2] trunkport 10ge 1/0/4 [*DS1-Eth-Trunk2] port link-type access [*DS1-Eth-Trunk2] port default vlan 200 [*DS1-Eth-Trunk2] undo port trunk allow-pass vlan 1 [*DS1-Eth-Trunk2] quit [*DS1] commit By default, an Eth-Trunk works in manual load balancing mode. 3.2.2.4 IP Address Configuration The IP address design for a new LAN of the branch data center should observe the following principles: l Use IPv4. l IP addresses of interconnected interfaces use a 29-bit subnet mask (255.255.255.248) to allow flexible network expansion and temporary deployment of test devices. One Class C address space offers 32 interconnected network segments of LANs. l Implement route summarization between the head office and branches. l The gateway address in a LAN uses the largest IP address on the local network segment. When VRRP or similar technologies are used, virtual addresses and actual addresses are allocated in descending order of IP address. l The management address (Loopback0) of a network device uses a 32-bit subnet mask (255.255.255.255), which is used as the ID of a routing protocol such as OSPF. Assign Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 76 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution contiguous addresses on a network segment as management addresses of all network devices based on the network layers where they are located. l Assign IP addresses to devices in each area. Apply the IP address plan of an area to the downlink interfaces of aggregation switches in the area (including interconnection interfaces of the switches at the distribution layer) and access switches connected to the downlink interfaces. Apply the IP address plan of the core switching layer to core switches' interfaces connected to other areas. Apply the MAN/WAN IP address plan to DS switches' interfaces connected to WAN/MAN devices. Common configuration: <HUAWEI> system-view [~HUAWEI] interface vlanif 201 [*HUAWEI-Vlanif201] ip address 10.1.0.1 255.255.255.0 3.2.2.5 STP Configuration Loop prevention protocols are important on a Layer 2 network. In multi-level M-LAG scenarios, the Virtual Spanning Tree Protocol (V-STP) can be used to prevent loops on the Layer 2 network. V-STP can detect the M-LAG master or backup status. After V-STP is enabled on the M-LAG master and backup devices and M-LAG master/backup negotiation is successful, two devices are virtualized into one device for port role calculation and fast convergence. When service and reliability requirements are met, simplify configurations as much as possible to achieve easy deployment and maintenance. V-STP configuration: Enable V-STP on the DS and AS. DS1 and DS2 are used as an example. Assume that DS1 is the M-LAG master device and DS2 is the M-LAG slave device. The configuration of AS1 and AS2 is the same. <DS1> system-view [~DS1] stp mode rstp [*DS1] stp v-stp enable [*DS1] commit <DS2> system-view [~DS2] stp mode rstp [*DS2] stp v-stp enable [*DS2] stp priority 36864 [*DS2] commit 3.2.3 Reliability Configuration 3.2.3.1 M-LAG Configuration The dual-active system that is set up based on M-LAG provides device-level reliability. MLAG virtualizes two devices into one device. M-LAG prevents loops on a Layer 2 network and implements redundancy. Multi-level M-LAG ensures reliability, improves the link use efficiency, and expands the network scale in dual-homing mode, meeting customer requirements. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 77 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution Figure 3-4 M-LAG network DS1 and DS2 constitute an M-LAG, whereas AS1 and AS2 constitute an M-LAG. The peer link is configured on the Eth-Trunk between DS1 and DS2 to exchange M-LAG synchronization packets. V-STP is configured between M-LAG devices to prevent loops. OSPF is configured on DSs and CSs to implement Layer 3 interworking. M-LAG configuration: The M-LAG composed of AS1 and AS2 is used as an example. The configuration of DSs is similar. 1. Configure IP addresses for main interfaces on AS1 and AS2 to ensure Layer 3 connectivity for transmission of heartbeat packets of M-LAG master and slave devices. <AS1> system-view [~AS1] interface meth 0/0/0 [~AS1-MEth0/0/0] ip address 10.1.1.1 24 [*AS1-MEth0/0/0] quit <AS2> system-view [~AS2] interface meth 0/0/0 [~AS2-MEth0/0/0] ip address 10.1.1.2 24 [*AS2-MEth0/0/0] quit 2. Configure a DFS group on AS1 and AS2. [*AS1] dfs-group 1 [*AS1-dfs-group-1] [*AS1-dfs-group-1] [*AS1-dfs-group-1] [*AS2] dfs-group 1 [*AS2-dfs-group-1] [*AS2-dfs-group-1] [*AS2-dfs-group-1] 3. source ip 10.1.1.1 priority 150 quit source ip 10.1.1.2 priority 120 quit Configure a peer link on AS1 and AS2. [*AS1] interface eth-trunk 0 [*AS1-Eth-Trunk0] trunkport 10ge 1/0/3 [*AS1-Eth-Trunk0] trunkport 10ge 1/0/4 [*AS1-Eth-Trunk0] mode lacp-static [*AS1-Eth-Trunk0] peer-link 1 [*AS1-Eth-Trunk0] quit [*AS2] interface eth-trunk 0 [*AS2-Eth-Trunk0] trunkport 10ge 1/0/3 [*AS2-Eth-Trunk0] trunkport 10ge 1/0/4 [*AS2-Eth-Trunk0] mode lacp-static Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 78 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution [*AS2-Eth-Trunk0] peer-link 1 [*AS2-Eth-Trunk0] quit 4. Configure M-LAG member interfaces on AS1 and AS2. [*AS1] vlan batch 11 [*AS1] interface eth-trunk 20 [*AS1-Eth-Trunk20] mode lacp-static [*AS1-Eth-Trunk20] port link-type trunk [*AS1-Eth-Trunk20] port trunk allow-pass vlan 11 [*AS1-Eth-Trunk20] trunkport 10ge 1/0/1 to 1/0/2 [*AS1-Eth-Trunk20] dfs-group 1 m-lag 1 [*AS1-Eth-Trunk20] quit [*AS1] interface eth-trunk 30 [*AS1-Eth-Trunk30] mode lacp-static [*AS1-Eth-Trunk30] port link-type trunk [*AS1-Eth-Trunk30] port trunk allow-pass vlan 11 [*AS1-Eth-Trunk30] trunkport 10ge 1/0/5 to 1/0/6 [*AS1-Eth-Trunk30] dfs-group 1 m-lag 2 [*AS1-Eth-Trunk30] quit [*AS1] commit [*AS2] vlan batch 11 [*AS2] interface eth-trunk 20 [*AS2-Eth-Trunk20] mode lacp-static [*AS2-Eth-Trunk20] port link-type trunk [*AS2-Eth-Trunk20] port trunk allow-pass vlan 11 [*AS2-Eth-Trunk20] trunkport 10ge 1/0/1 to 1/0/2 [*AS2-Eth-Trunk20] dfs-group 1 m-lag 1 [*AS2-Eth-Trunk20] quit [*AS2] interface eth-trunk 30 [*AS2-Eth-Trunk30] mode lacp-static [*AS2-Eth-Trunk30] port link-type trunk [*AS2-Eth-Trunk30] port trunk allow-pass vlan 11 [*AS2-Eth-Trunk30] trunkport 10ge 1/0/5 to 1/0/6 [*AS2-Eth-Trunk30] dfs-group 1 m-lag 2 [*AS2-Eth-Trunk30] quit [*AS2] commit 3.2.3.2 Monitor Link Configuration To prevent traffic loss due to an uplink fault, associate uplink and downlink interfaces with a Monitor Link group. As shown in the following figure, when the uplink of DS1 fails, user-side traffic that needs to be forwarded by DS1 will be discarded. To prevent this problem, associate uplink and downlink interfaces with a Monitor Link group on DS1. When the uplink interface enters the Down state, the downlink interface also goes Down so that user-side traffic is not forwarded by DS1. That is, traffic is forwarded normally by DS2. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 79 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution Monitor Link configuration: DS1 is used as an example. The configuration of DS2 is similar. 1. Associate uplink and downlink interfaces with a Monitor Link group. [~DS1] monitor-link group 1 [*DS1-mtlk-group1] port eth-trunk 10 uplink [*DS1-mtlk-group1] port eth-trunk 20 downlink 1 After the Monitor Link group is configured, the uplink interface is monitored in real time. When the uplink interface fails, all the downlink interfaces in the Monitor Link group enter the Error-Down state. The device sets an interface in Error-Down state when detecting a fault on the interface. The interface then cannot receive or send packets, and the interface indicator is off. 2. Set the WTR time of the Monitor Link group on DS1. [*DS1-mtlk-group1] timer recover-time 5 [*DS1-mtlk-group1] quit [*DS1] commit To restore the downlink interface in Error-Down state, rectify the fault of the uplink interface. After the uplink interface goes Up and the WTR time is reached, the downlink interface is restored. 3.2.3.3 Dual-Active Gateway Configuration Generally, all hosts on a network are configured with the same default route that points to the egress gateway so that the hosts can communicate with external networks. When the egress gateway fails, the communication between the hosts and external networks is interrupted. M-LAG virtualizes master and slave devices into one logical device and uses the IP address of the logical device as the default gateway to implement communication with external networks. When one gateway fails, M-LAG can select a new gateway to transmit data traffic, ensuring network reliability. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 80 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution Figure 3-5 Dual-active gateway configuration You can use the following methods to configure the dual-active gateway: l Configure VRRP. Create a VRRP group on VLANIF interfaces corresponding to MLAG member interfaces of M-LAG master and slave devices and configure the same virtual IP address and virtual MAC address for the VLANIF interfaces. l Configure the IP address and MAC address for each VLANIF interface. Configure the same IP address and MAC address for VLANIF interfaces. Configure the M-LAG dual-active gateway between DSs. DS1 is used as an example. The configuration of DS2 is similar. 1. Configure VRRP groups on VLANIF interfaces of DSs as the dual-active gateways of M-LAG master and slave devices. [~DS1] interface vlanif 11 [*DS1-Vlanif11] ip address 10.2.1.1 24 [*DS1-Vlanif11] vrrp vrid 1 virtual-ip 10.2.1.111 [*DS1-Vlanif11] vrrp vrid 1 priority 120 [*DS1-Vlanif11] quit [*DS1] commit 2. Configure the same IP address and MAC address for VLANIF interfaces on DSs as the dual-active gateways of M-LAG master and slave devices. [~DS1] interface vlanif 11 [*DS1-Vlanif11] ip address 10.2.1.1 24 [*DS1-Vlanif11] mac-address 0000-5e00-0101 [*DS1-Vlanif11] quit [*DS1] commit When the same IP address and MAC address are configured for VLANIF interfaces, an IP address conflict alarm will be generated. To disable the alarm, run the undo snmpagent trap enable feature-name arp trap-name hwethernetarpipconflictevent command. 3.2.4 Routing Configuration The following figure shows routing design for a tier 1 branch data center. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 81 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution Data center design consists of LAN design and MAN&WAN design. Entire Routing Design Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 82 3 M-LAG Data Center Deployment Solution Configuration Examples for the Financial Industry The MAN/WAN area uses BGP to exchange service routes with the head office and tier 2 branches and uses OSPF as an IGP within itself. In the LAN, the core area and other areas use OSPF to provide service routes, except that the extranet uses static routes between the DS and AR. EBGP The tier 1 branch is planned as an independent autonomous system (AS) and uses a private AS number. IBGP The WAN area of the tier 1 branch runs IBGP. OSPF 300 ensures connectivity for IBGP between the WN_DSs and WN_ARs in the WAN area. Three OSPF processes are designed on the network: OSPF 300, OSPF 400, and OSPF 500. OSPF 300 OSPF 300 ensures IBGP connectivity between the WN_DSs and WN_ARs in the WAN area. Links between the devices in the WAN area belong to Area 0. OSPF 400 OSPF 400 ensures that there are reachable routes between the MAN/WAN area of the tier 1 branch and intra-city organizations. Interconnected links belong to Area 0. OSPF 500 OSPF 500 ensure that there are reachable routes between the LAN area of branches and WN_DSs. Interconnected links belong to Area 0 to transmit services of the tier 1 branch. Static: The EP_AR in the extranet and external FW, external FW and internal FW, as well as internal FW and EP_DS use static routes to communicate. Routing Protocol Preference/Distance Design Preferences of routing protocols to be used on all network devices are planned to ensure consistent route selection between routing protocols on devices of different vendors. Issue 03 (2017-05-08) Protocol Preference Static route 5 OSPF 10 IBGP 170 EBGP 170 OSPF ASE 190 Floating static route 200 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 83 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution 3.2.4.1 LAN Routing Configuration Routing Design and Basic Function Configuration Figure 3-6 LAN routing design diagram In a data center LAN shown in the figure, ASs are access devices, LAN_DSs are aggregation devices in the LAN, gateways are configured on the aggregation devices, VRRP is configured on downlink interfaces of the LAN_DSs to ensure reliability. CSs are core forwarding devices, and WAN_DSs are aggregation devices in the MAN/WAN area to connect LAN core devices and network egress routers. This example uses OSPF to ensure intra-area connectivity. OSPF Area Partition The entire network uses OSPF process 500. Only a small number of devices run OSPF in the LAN. Therefore, OSPF 500 uses only the backbone area Area 0. The following interfaces and IP address need to be advertised in OSPF process 500: l Virtual IP address of the VRRP group on downlink interfaces of LAN_DSs l Interconnected interfaces between LAN_DSs and CSs, and between WAN_DSs and CSs l Loopback interface whose IP address will be used as a router ID (This interface does not need to participate in OSPF calculation and so is configured as a silent interface.) OSPF Router ID Design In each OSPF process, a router must have a unique router ID to identify itself. By default, the largest loopback interface IP address is used as the router ID. To ensure a stable OSPF router ID, specify the IP address of Loopback 0 as a router ID when configuring an OSPF process. Basic OSPF Function Configuration Here, LAN_DS_01 is used as an example: <LAN_DS_01> system-view [~LAN_DS_01] interface loopback 0 [*LAN_DS_01-LoopBack0] ip address 172.16.1.1 32 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 84 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution [*LAN_DS_01-LoopBack0] quit [*LAN_DS_01] ospf 500 router-id 172.16.1.1 [*LAN_DS_01-ospf-500] silent-interface loopback 0 [*LAN_DS_01-ospf-500] area 0 [*LAN_DS_01-ospf-500-area-0.0.0.0] network 10.2.1.0 0.0.0.255 [*LAN_DS_01-ospf-500-area-0.0.0.0] network 10.2.2.0 0.0.0.255 [*LAN_DS_01-ospf-500-area-0.0.0.0] commit Here, CS_01 is used as an example: <CS_01> system-view [~CS_01] interface loopback 0 [*CS_01-LoopBack0] ip address 172.16.1.2 32 [*CS_01-LoopBack0] quit [*CS_01] ospf 500 router-id 172.16.1.2 [*CS_01-ospf-500] silent-interface loopback 0 [*CS_01-ospf-500] area 0 [*CS_01-ospf-500-area-0.0.0.0] network 10.2.2.0 0.0.0.255 [*CS_01-ospf-500-area-0.0.0.0] network 10.2.4.0 0.0.0.255 [*CS_01-ospf-500-area-0.0.0.0] network 10.2.5.0 0.0.0.255 [*CS_01-ospf-500-area-0.0.0.0] commit Routing Protocol Performance, Reliability, and Security Design and Configuration Here, CS_01 is used as an example. The configurations of other devices are similar to that of CS_01. OSPF Interface Network Type Design By default, the network type of OSPF interfaces on an Ethernet network is broadcast. In this example, every two OSPF neighbors are interconnected. To speed up OSPF neighbor relationship establishment and route convergence, you can set the network type of non-silent OSPF interfaces to point-to-point. <CS_01> system-view [~CS_01] interface 10ge 1/0/1 [~CS_01-10GE1/0/1] undo portswitch [*CS_01-10GE1/0/1] ospf network-type p2p OSPF Timer Design Unless special requirements need to be met, default OSPF timer values are recommended. This example uses all OSPF timer values. If you need to modify timer parameter values, ensure that neighbors use the same OSPF timer parameter values. For example, you can use the following commands to change the interval for sending Hello packets to 20s: <CS_01> system-view [~CS_01] interface 10ge 1/0/1 [~CS_01-10GE1/0/1] undo portswitch [*CS_01-10GE1/0/1] ospf timer hello 20 OSPF Metric Design By default, the metric of an OSPF interface is automatically calculated using the formula: Reference bandwidth/Interface bandwidth. The reference bandwidth can be modified and the default value is 100 Mbit/s. In this example, to facilitate maintenance and management, you can manually configure and design the OSPF metric of each link without using the preceding formula. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 85 3 M-LAG Data Center Deployment Solution Configuration Examples for the Financial Industry Table 3-2 OSPF metric design No. Link Metric 1 East-to-west links between CSs, and between DSs 100 2 South-to-north links between CSs and DSs 100 3 DS service interfaces 1000 4 CS/DS loopback interfaces 0 (no need to configure) To set the metric of the link between CSs to 100, use the following commands: <CS_01> system-view [~CS_01] interface 10ge 1/0/1 [~CS_01-10GE1/0/1] undo portswitch [*CS_01-10GE1/0/1] ospf cost 100 BFD for OSPF In BFD for OSPF, a BFD session is associated with OSPF. The BFD session quickly detects a link fault and then notifies OSPF of the fault. This speeds up OSPF's response to the change of the network topology. A dynamic BFD session established between all non-silent OSPF interfaces and neighbors can implement millisecond-level detection of faults on the links between OSPF neighbors and associate fast OSPF neighbor status switching to trigger route convergence calculation. The link faults include physical link faults and upper-layer forwarding faults. All BFD sessions use the following parameters. Table 3-3 BFD for OSPF parameter design Parameter Parameter Description Recommended Value min-rx-interval Specifies the minimum interval at which BFD packets are received from the remote end. 1000 ms min-tx-interval Specifies the minimum interval for sending BFD packets to the remote end. 1000 ms detect-multiplier Specifies the local detection multiplier. 3 <CS_01> system-view [~CS_01] bfd [*CS_01-bfd] quit [*CS_01] ospf 500 [*CS_01-ospf-500] bfd all-interfaces enable Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 86 3 M-LAG Data Center Deployment Solution Configuration Examples for the Financial Industry [*CS_01-ospf-500] bfd all-interfaces min-tx-interval 1000 min-rx-interval 1000 detect-multiplier 3 OSPF Smart Timer Design On an unstable network, route calculation may be performed frequently, which consumes a great number of CPU resources. Especially on an unstable network, LSAs that describe unstable topology will be generated and advertised frequently. Processing such LSAs frequently affects network stability. The OSPF smart timer controls the route calculation, LSA generation, and receiving of LSAs to speed up network convergence. The OSPF smart timer speeds up network convergence in the following modes: l On a network where routes are frequently calculated, the OSPF smart timer dynamically adjusts the interval for calculating routes according to the user configuration and the exponential backoff technology. In this manner, the number of route calculations is reduced, and so CPU resource consumption is reduced. Routes are calculated after the network topology becomes table. l On an unstable network, if a router generates or receives LSAs due to frequent topology changes, the OSPF smart timer can dynamically adjust the interval for calculating routes. No LSA is generated or handled within an interval, which prevents invalid LSAs from being generated and advertised in the entire network. OSPF smart timer uses the following parameters. Table 3-4 OSPF smart timer design Smart Timer Description Recommended Value spf-schedule-interval Specifies the interval for calculating OSPF routes. The default value is recommended. That is, the maximum interval for SPF calculation is 10000 ms, the initial interval is 500 ms, and the base interval is 1000 ms. lsa-arrival-interval Specifies the interval for receiving OSPF LSAs. The default value is recommended. That is, the maximum interval for receiving OSPF LSAs is 1000 ms, the initial interval is 500 ms, and the base interval is 500 ms. lsa-originate-interval Specifies the interval for updating OSPF LSAs. The default value is recommended. That is, the maximum interval for updating OSPF LSAs is 5000 ms, the initial interval is 500 ms, and the base interval is 1000 ms. <CS_01> system-view [~CS_01] ospf 500 [*CS_01-ospf-500] lsa-arrival-interval intelligent-timer 1000 500 500 [*CS_01-ospf-500] lsa-originate-interval intelligent-timer 5000 500 1000 [*CS_01-ospf-500] spf-schedule-interval intelligent-timer 10000 500 1000 OSPF Route Authentication To prevent unauthorized devices from access an OSPF network to obtain network routing information, configure the OSPF route authentication function. In this example, OSPF area authentication is configured, the authentication mode is MD5, and the authentication password is not provided here, which can be specified according to your requirements. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 87 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution <CS_01> system-view [~CS_01] ospf 500 [*CS_01-ospf-500] area 0 [*CS_01-ospf-500-area-0.0.0.0] authentication-mode md5 1 cipher xxxxxxxx 3.2.4.2 Extranet Routing Configuration Figure 3-7 Extranet routing design diagram The extranet connects the data center to other service areas. Because fine-grained control is required for access rights, the extranet uses the in-line firewall connection for networking. In routing design, the extranet uses static specific routes and static default routes and is separated from the LAN in routes. The following provides key configuration of each device. Aggregation Switches (EP_DSs) in the Extranet Aggregation switches (EP_DSs) in the extranet use OSPF to communicate with CSs of the LAN and need to have static specific routes to all extranet service network segments configured on downlink interfaces. The next-hop address of the routes is the uplink VRRP virtual address of firewalls (EP_FWs). For details about the configuration of OSPF 500 and VRRP, see "LAN Routing Configuration." The following provides only the static specific route configuration of EP_DS_01. The configuration of EP_DS_02 is the same as that of EP_DS_01. <EP_DS_01> system-view [~EP_DS_01] ip route-static 172.16.1.0 24 10.3.1.1 [*EP_DS_01] ip route-static 172.16.2.0 24 10.3.1.1 [*EP_DS_01] ip route-static 172.16.3.0 24 10.3.1.1 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 88 3 M-LAG Data Center Deployment Solution Configuration Examples for the Financial Industry Firewall (EP_FW) EP_FWs communicate with uplink devices using static default routes with the next-hop address as the downlink VRRP virtual address of EP_DS. EP_FWs have static specific routes to all extranet service network segments configured on downlink interfaces. The next-hop address of the routes is the uplink VRRP virtual address of access devices (EP_ASs) in the extranet. The following provides only the static route configuration of EP_FW_01. The configuration of EP_FW_02 is the same as that of EP_FW_01. <EP_FW_01> system-view [~EP_FW_01] ip route-static [*EP_FW_01] ip route-static [*EP_FW_01] ip route-static [*EP_FW_01] ip route-static 172.16.1.0 24 10.1.1.1 172.16.2.0 24 10.1.1.1 172.16.3.0 24 10.1.1.1 0.0.0.0 0 10.4.1.1 Access Devices (EP_ASs) in the Extranet EP_ASs communicate with uplink devices using static default routes with the next-hop address as the downlink VRRP virtual address of EP_FW. EP_ASs have static specific routes to all extranet service network segments configured on downlink interfaces. The next-hop address of the routes is the IP address of the interface on the directly connected peer device. The following provides the static route configuration of EP_AS_01, in which x.x.x.x indicates the IP address of the interface on the directly connected peer device. <EP_AS_01> system-view [~EP_AS_01] ip route-static [*EP_AS_01] ip route-static [*EP_AS_01] ip route-static [*EP_AS_01] ip route-static 172.16.1.0 24 x.x.x.x 172.16.2.0 24 x.x.x.x 172.16.3.0 24 x.x.x.x 0.0.0.0 0 10.2.1.1 3.2.4.3 MAN/WAN Routing Configuration The MAN/WAN area uses BGP to exchange service routes with the head office and tier 2 branches. 3.2.5 Security Configuration 3.2.5.1 ACL-based Antivirus Configuration To prevent viruses with Layer 3 and Layer 4 characteristics, it is recommended that you configure ACLs on network devices to filter data flows, improving network security. The recommended antivirus configuration is as follows: [*HUAWEI]acl number 3000 [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule Issue 03 (2017-05-08) 0 deny tcp destination-port eq 445 1 deny udp destination-port eq 445 2 deny tcp destination-port eq 135 3 deny tcp destination-port eq 136 4 deny tcp destination-port eq 137 5 deny tcp destination-port eq 138 6 deny tcp destination-port eq 139 7 deny udp destination-port eq 135 8 deny udp destination-port eq 136 9 deny udp destination-port eq netbios-ns 10 deny udp destination-port eq netbios-dgm 11 deny udp destination-port eq netbios-ssn 12 deny udp destination-port eq 1434 13 deny udp destination-port eq 6667 14 deny udp destination-port eq 7626 15 deny udp destination-port eq 6789 16 deny udp destination-port eq 5800 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 89 3 M-LAG Data Center Deployment Solution Configuration Examples for the Financial Industry [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule [*HUAWEI-acl4-advence-3000]rule 17 18 19 20 21 22 23 24 25 26 deny deny deny deny deny deny deny deny deny deny udp tcp tcp tcp tcp tcp tcp udp udp udp destination-port destination-port destination-port destination-port destination-port destination-port destination-port destination-port destination-port destination-port eq eq eq eq eq eq eq eq eq eq 5900 5900 5800 1999 5554 9995 9996 12345 1057 2616 3.2.5.2 Broadcast Storm Suppression Configuration A broadcast storm will greatly affect the network. The broadcast storm suppression function reduces the impact on a network. The antivirus effect is better when broadcast storm suppression is configured on the network devices closer to users. Therefore, configure it on the downstream interfaces of aggregation switches and all interfaces of access switches. When the average packet rate exceeds 5000 kbit/s, the devices discard excess packets. Run the following commands on the downstream interfaces of aggregation switches, interconnected interfaces between aggregation switches, and upstream interfaces of access switches: <HUAWEI> system-view [~HUAWEI] interface 10ge 1/0/1 [~HUAWEI-10GE1/0/1] storm suppression broadcast cir 5000 3.2.5.3 MAC Address Flapping Detection MAC address flapping means that a MAC address is learned by two interfaces in the same VLAN. The MAC address entry learned later replaces the earlier one. MAC address flapping detection enables devices to check whether MAC address flapping has occurred. When detecting a MAC address flapping, the devices report an alarm to the NMS for maintenance personnel to locate the fault. Common configuration: <HUAWEI> system-view [~HUAWEI] mac-address flapping detection 3.2.5.4 MAC Address Triggered ARP Entry Update A network device needs to search for the ARP table for Layer 3 forwarding, and forwards the packets matching entries. When logical locations of user terminals change (for example, an active/standby switchover occurs between the network adapters of a server), the interfaces matching the changed IP addresses also change. The outbound interfaces in the MAC address table are updated after certain packets are received. The outbound interfaces in the ARP table are updated after the aging time expires. Therefore, the outbound interfaces in the MAC address and ARP tables may be inconsistent. For example, the outbound interfaces in the MAC address table are updated before the outbound interfaces in the ARP table are updated. To resolve this problem, you need to enable the function of MAC address triggered ARP entry update so that the outbound interfaces in the ARP table are updated immediately when the outbound interfaces in MAC address table are updated. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 90 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution Common configuration: <HUAWEI> system-view [~HUAWEI] mac-address update arp enable 3.2.5.5 Loopback Detection on a Single Interface STP cannot detect loops on a single interface. Loopback detection needs to be enabled on a single interface. Run the following commands on the downstream interface of an access switch: <HUAWEI> system-view [~HUAWEI] interface ge 1/0/1 [~HUAWEI-GE1/0/1] loopback-detect enable 3.2.5.6 ARP Attack Defense Configuration l Configure ARP rate limiting. If a host sends a large number of IP packets with unreachable destination IP addresses to a network device, the device is greatly affected. Configure ARP rate limiting in the system view: <HUAWEI> system-view [~HUAWEI] arp anti-attack rate-limit 200 Configure ARP rate limiting in the VLAN view: <HUAWEI> system-view [~HUAWEI] vlan 201 [*HUAWEI-vlan201] arp anti-attack rate-limit 200 l Configure ARP rate limiting based on source IP addresses. Considering the special requirements of some users, you can configure a different ARP rate limit for these users. NOTE By default, the source IP address-based ARP rate limit is 30 pps. When the gateway requests MAC addresses of many users on the network segment and the rate of ARP packets from the gateway IP address exceeds 30 pps, you must increase the source IP address-based ARP rate limit; otherwise, the ARP packets exceeding 30 pps will be discarded, causing a long delay on the gateway to learn ARP entries. If an ARP scanning attack occurs, reduce the source IP address-based ARP rate limit. Configure ARP rate limiting for any source IP address. <HUAWEI> system-view [~HUAWEI] arp anti-attack rate-limit source-ip maximum 100 Configure rate limit for the ARP packets from 10.1.1.1. <HUAWEI> system-view [~HUAWEI] arp anti-attack rate-limit source-ip 10.1.1.1 maximum 100 When both the preceding configurations are performed, the later configuration takes precedence. That is, if the source IP address of received ARP packets matches the IP address specified in rate limiting, the rate limit specified in the later configuration takes effect. If the source IP address of received ARP packets does not match the specified one, the rate limit in the previous configuration takes effect. l Configure ARP Miss rate limiting based on source IP addresses. Considering the special requirements of some users, you can configure a different ARP Miss rate limit for these users. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 91 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution NOTE By default, the source IP address-based ARP Miss rate limit is 30 pps. If a source IP address needs to frequently trigger ARP Miss messages of which the rate will exceed 30 pps, increase the source IP address-based ARP Miss rate limit. Otherwise, excessive ARP Miss messages from this source IP address will be discarded within 5 seconds after the rate limit is exceeded. As a result, this source IP address cannot trigger ARP learning. Configure ARP Miss rate limiting for any source IP address. <HUAWEI> system-view [~HUAWEI] arp miss anti-attack rate-limit source-ip maximum 60 Configure rate limiting for the ARP Miss messages from a specified IP address. <HUAWEI> system-view [~HUAWEI] arp miss anti-attack rate-limit source-ip 10.0.0.1 maximum 60 When both the preceding configurations are performed, the later configuration takes precedence. That is, if the source IP address of the IP packets triggering ARP Miss messages matches the IP address specified in rate limiting, the rate limit specified in the later configuration takes effect. If the source IP address of the IP packets does not match the specified one, the rate limit in the previous configuration takes effect. l Configure strict ARP learning. Strict ARP learning allows a device to learn ARP entries from only the ARP Reply packets in response to the ARP Request packets sent by itself. Configure strict ARP learning globally. <HUAWEI> system-view [~HUAWEI] arp learning strict Configure strict ARP learning on an interface. <HUAWEI> system-view [~HUAWEI] interface vlanif 201 [~HUAWEI-Vlanif201] arp learning strict force-enable l Configure ARP anti-spoofing. To prevent ARP anti-spoofing attack, enable ARP entry fixing. <HUAWEI> system-view [~HUAWEI] arp anti-attack entry-check fixed-mac enable l Prevent Man-in-the-Middle (MITM) attacks. To prevent MITM attacks, configure ARP packet checking on interfaces or in VLANs. If the packets received on an interface match a binding entry, the packets are forwarded; otherwise, the packets are discarded. In addition, you can configure the alarm function. When the number of discarded packets exceeds the threshold, an alarm is generated. NOTE This function applies only to DHCP users. The binding entries can be automatically generated after DHCP snooping is enabled. Enable dynamic ARP inspection to check ARP packets against binding entries. <HUAWEI> system-view [~HUAWEI] vlan 201 [*HUAWEI-vlan201] arp anti-attack check user-bind enable Configure check items for ARP packets. [*HUAWEI-vlan201] arp anti-attack check user-bind check-item ip-address To allow the ARP packets matching only one or two items in a binding entry to pass through, configure the device to match ARP packets against only one or two items. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 92 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution NOTE The specified check items do not take effect for the users with static binding entries configured. That is, the device still checks ARP packets against the static binding entries. 3.2.6 Firewall Configuration Firewalls are connected in bypass mode in the open platform area, development and testing area, operation and management area, and area egress to implement secure access between the local area and other functional areas. VRF instances are created on the aggregation layer to separate service network routes and public network routes. Firewalls are connected in bypass mode to ensure secure access between different areas, and firewalls work in hot standby mode to ensure high reliability. VRF-A is created on the DS, service interfaces and downlink interfaces connected to firewalls are bound to VRF-A, and the default route of VRF-A points to the downlink VRRP virtual IP address of firewalls. Static routes from DSs to service network segments are configured, and the next hop IP address is the uplink VRRP virtual IP address of firewalls. Static routes are configured between firewalls and DSs. Firewalls are configured with the Huawei Redundancy Protocol (HRP) and security policies based on application requirements. 1. M-LAG is configured between DS1 and DS2, and the VRRP group is used as the userside gateway and next hop of the firewall. A VRRP group is configured on VLANIF 200 as the next hop of uplink traffic on the firewall, and a VRRP group is configured on VLANIF 300 as the next hop of downlink traffic on the firewall. 2. Create VRF-A on DS1, bind VLANIF 200 and VLANIF300 connected to the downlink interface of the firewall to VRF-A. The default route of VRF-A points to the downlink VRRP virtual IP address of firewalls. NOTE When an interface is bound to VRF-A, the IP address of the interface will be deleted; therefore, you need to reconfigure the IP address. [~DS1] ip vpn-instance VRF-A [*DS1-vpn-instance-VRF-A] ipv4-family [*DS1-vpn-instance-VRF-A-af-ipv4] route-distinguisher 100:1 [*DS1-vpn-instance-VRF-A-af-ipv4] vpn-target 111:1 both [*DS1-vpn-instance-VRF-A-af-ipv4] quit [*DS1-vpn-instance-VRF-A] quit Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 93 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution [*DS1] interface vlanif 200 [*DS1-Vlanif200] ip binding vpn-instance VRF-A [*DS1-Vlanif200] ip address 10.10.1.1 24 [*DS1-Vlanif200] quit [*DS1] interface vlanif 300 [*DS1-Vlanif300] ip binding vpn-instance VRF-A [*DS1-Vlanif300] ip address 10.10.2.1 24 [*DS1-Vlanif300] quit [*DS1] ip route-static vpn-instance VRF-A 0.0.0.0 0.0.0.0 10.10.2.5 [*DS1] commit 3. Configure a static route from DS1 to the service network segment. The next hop address is the uplink VRRP virtual IP address of firewalls. Run OSPF between DS1 and CS and import the static route to OSPF. [~HUAWEI] ip route-static 10.10.1.0 255.255.255.0 10.10.3.5 [*HUAWEI] ospf 100 [*HUAWEI-ospf-100] area 0 [*HUAWEI-ospf-100-area-0.0.0.0] network 10.10.4.0 0.0.0.255 [*HUAWEI-ospf-100-area-0.0.0.0] network 10.10.5.0 0.0.0.255 [*HUAWEI-ospf-100-area-0.0.0.0] quit [*HUAWEI-ospf-100] import-route static [*HUAWEI-ospf-100] quit [*HUAWEI] commit 4. 5. Perform basic configurations including the device name, interface, and IP address on firewalls. The configurations are not provided here. Configure zones on FW1. [FW1] firewall zone trust [FW1-zone-trust] add interface eth-trunk 3 [FW1-zone-trust] quit [FW1] firewall zone untrust [FW1-zone-untrust] add interface eth-trunk 2 [FW1-zone-untrust] quit [FW1] firewall zone dmz [FW1-zone-dmz] add interface eth-trunk 1 [FW1-zone-dmz] quit 6. Configure zones on FW2. [FW2] firewall zone trust [FW2-zone-trust] add interface eth-trunk 3 [FW2-zone-trust] quit [FW2] firewall zone untrust [FW2-zone-untrust] add interface eth-trunk 2 [FW2-zone-untrust] quit [FW2] firewall zone dmz [FW2-zone-dmz] add interface eth-trunk 1 [FW2-zone-dmz] quit 7. Configure a static route on FW1. The next hop address in the route used for access from the internal network to the external network is the IP address of VLANIF 300 that connects to the uplink interface of the firewall. The next hop address in the route used for access from the external network to the internal network is the IP address of VLANIF 200 that connects to the downlink interface of the firewall. [FW1] ip route-static 0.0.0.0 0.0.0.0 10.10.3.1 [FW1] ip route-static 10.10.1.0 255.255.255.0 10.10.2.1 8. Configure a static route on FW2. [FW2] ip route-static 0.0.0.0 0.0.0.0 10.10.3.1 [FW2] ip route-static 10.10.1.0 255.255.255.0 10.10.2.1 9. Configure HRP on FW1. [FW1] interface eth-trunk 3 [FW1-Eth-Trunk3] vrrp vrid 1 virtual-ip 10.10.2.5 24 master [FW1-Eth-Trunk3] quit [FW1] interface eth-trunk 2 [FW1-Eth-Trunk2] vrrp vrid 2 virtual-ip 10.10.3.5 24 master [FW1-Eth-Trunk2] quit [FW1] hrp interface eth-trunk 1 remote 10.1.1.2 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 94 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution [FW1] firewall packet-filter default permit interzone local dmz [FW1] hrp enable 10. Configure HRP on FW2. [FW2] interface eth-trunk 3 [FW2-Eth-Trunk3] vrrp vrid 1 virtual-ip 10.10.2.5 24 slave [FW2-Eth-Trunk3] quit [FW2] interface eth-trunk 2 [FW2-Eth-Trunk2] vrrp vrid 2 virtual-ip 10.10.3.5 24 slave [FW2-Eth-Trunk2] quit [FW2] hrp interface eth-trunk 1 remote 10.1.1.1 [FW2] firewall packet-filter default permit interzone local dmz [FW2] hrp enable NOTE After the HRP configuration is complete, the configurations and sessions on the active device are synchronized to the standby device; therefore, you only need to perform the following configurations on the active firewall FW1. 11. Configure the security policy and intrusion prevention system (IPS). NOTE Before configuring IPS, ensure that the IPS signature database uses the latest version. When configuring IPS, use the default IPS configuration file default. HRP_M[FW1] policy interzone trust untrust outbound HRP_M[FW1-policy-interzone-trust-untrust-outbound] policy 1 HRP_M[FW1-policy-interzone-trust-untrust-outbound-1] policy source 10.10.1.0 mask 24 HRP_M[FW1-policy-interzone-trust-untrust-outbound-1] action permit HRP_M[FW1-policy-interzone-trust-untrust-outbound-1] profile ips default HRP_M[FW1-policy-interzone-trust-untrust-outbound-1] quit HRP_M[FW1-policy-interzone-trust-untrust-outbound] quit HRP_M[FW1] policy interzone trust untrust inbound HRP_M[FW1-policy-interzone-trust-untrust-inbound] policy 1 HRP_M[FW1-policy-interzone-trust-untrust-inbound-1] policy destination 10.10.1.0 mask 24 HRP_M[FW1-policy-interzone-trust-untrust-inbound-1] policy service serviceset ftp http HRP_M[FW1-policy-interzone-trust-untrust-inbound-1] action permit HRP_M[FW1-policy-interzone-trust-untrust-inbound-1] profile ips default HRP_M[FW1-policy-interzone-trust-untrust-inbound-1] quit HRP_M[FW1-policy-interzone-trust-untrust-inbound] quit HRP_M[FW1] ips enable 12. Configure attack defense. NOTE The attack defense thresholds in this example are only for reference. Configure the thresholds according to the traffic volume on your network. HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] HRP_M[FW1] firewall firewall firewall firewall firewall firewall firewall firewall firewall firewall firewall firewall firewall defend syn-flood enable defend syn-flood zone untrust max-rate 20000 defend udp-flood enable defend udp-flood zone untrust max-rate 1500 defend icmp-flood enable defend icmp-flood zone untrust max-rate 20000 blacklist enable defend ip-sweep enable defend ip-sweep max-rate 4000 defend port-scan enable defend port-scan max-rate 4000 defend ip-fragment enable defend ip-spoofing enable 13. Configure ASPF. FTP is used as an example. If there are other applications on the internal network, enable ASPF. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 95 Configuration Examples for the Financial Industry 3 M-LAG Data Center Deployment Solution HRP_M[FW1] firewall interzone trust untrust HRP_M[FW1-interzone-trust-untrust] detect ftp HRP_M[FW1-interzone-trust-untrust] quit Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 96 Configuration Examples for the Financial Industry 4 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network 4.1 Overview 4.2 Network Deployment Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 97 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network 4.1 Overview 4.1.1 Purpose This document provides a detailed data center design for a level-1 bank branch, covering the network architecture, IP address and VLAN planning, routing design, security design, network reliability design, and network management system design for the data center. You can use this document as a reference for data center project implementation. 4.1.2 Typical Networking 4.1.2.1 Logic Architecture The following figure shows the logical topology of the level-1 bank branch's data center network, which is divided into multiple areas depending on the functions provided. The following describes the functional areas. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 98 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Area Function and Positioning Accessible To Open platform area: OP Provides access to running open systems, including the accounting system as well as other accounting relevant and irrelevant service systems. This area is a major business area for communication between production and office departments. Clients and servers Operation and management area: OM Has servers deployed for system operations, monitoring, and maintenance. This area is responsible for network and system management and maintenance. Only a few authorized maintenance users Development and testing area: DT Accommodates servers of systems that have not been put into use, including the hosts and open platform systems that are under development or testing. Clients and servers MAN/WAN access area (WN/MN) Connects the level-1 bank branch to the head office and its data center, downstream level-2 branches and outlets, as well as offices, branches, and outlets in the local city. This area provides connections to the level-1 bank branch's LANs and subordinate branches. ATM machines, POS machines, teller terminals, maintenance users, office terminals, and terminals in business centers Local user access area: LU Allows access of various user terminals. Local maintenance users, local office terminals, and terminals in local business centers DMZ Extranet: EP Implements interconnection with business platforms of partners, major accounts, and agents through lines of carriers. Partners, international branches, off-bank devices (3G/2G/PSTN), telephone banking systems, and customer service centers Different from traditional DCN deployment solution, this DCN deployment solution is based on the cloud platform, Agile Controller, and integrated hardware overlay network. It uses Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 99 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Software-Defined Networking (SDN) technology to implement large-scale pooling of computing, storage, and network resources. Additionally, this solution uses a cloud platform to implement unified management on level-1 bank branch networks and invoke resources in resource pools as required to support functions of each area, enabling flexible network deployment and enhancing shared resource usage. 4.1.2.2 Physical Architecture The solution is based on the three-layer architecture and allows firewall management. Figure 4-1 shows the physical topology of this solution. Figure 4-1 Physical topology of the three-layer architecture firewall management solution l Servers: Virtualization platform servers, physical servers, cloud platform servers, and AC-DCN servers access the network through leaf switches. l Leaf nodes: Servers are connected to leaf nodes through stacking or Multichassis Link Aggregation Group (M-LAG). Leaf nodes and spine nodes communicate at Layer 3. A stack or M-LAG consisting of leaf nodes functions as a virtual tunnel end point (VTEP) to guide server traffic transmission on the VXLAN. l Spine nodes: A spine node connects to leaf nodes and gateways. Routing protocols are used to ensure that routes are reachable at Layer 3. The spine node does not function as a VTEP. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 100 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network l GWs: Two gateways constitute an M-LAG, and serve as dual-active gateways. The gateways and spine nodes communicate at Layer 3, and connect to external routers Router-1 and Router-2. l FWs: Two firewalls are configured to work in active/standby mirroring mode and connected to the two gateways in bypass mode. l LBs: The cloud platform manages LBs deployed by vendors. In SDN scenarios, LBs access the network at Layer 2 and share the same VBDIF gateway with member servers that process services. Therefore, it is recommended LBs be deployed in the same access mode as member servers to facilitate O&M. That is, connect the two LBs to leaf devices through Eth-Trunks. The floating IP addresses of the LBs are on the same subnet of the member servers, and the VBDIF gateway is shared by member servers and LBs. If LBs are connected to a CE12800 series gateway, FD and FDA cards, and SFUFs and SFUGs are required. 4.1.3 Version Support Table 4-1 describes products and version mapping involved in the networking. Table 4-1 Version Support Category Product Version Cloud platform FusionSphere OpenStack V100R006C00 + V100R006C00SPC001 OpenStack Kilo Controller Agile Controller-DCN V200R001C00SPC705 LB Hardware F5 BIG-IP Software version: 11.6.1 Plug-in versions: l 1.0.12.hw.fs.001 (for interconnection with FusionSphere) l 1.0.12.hw.os.001 (for interconnection with OpenStack) FW L3 Issue 03 (2017-05-08) Centrali zed VXLAN gateway Eudemon E8000E-X (provided by the carrier) V500R002C00SPC300 Eudemon E1000E-N (provided by the carrier) V500R002C00SPC300 USG6600 V500R001C30SPC300 USG9500 V500R001C30SPC300 CE12800 V200R001C00SPC700+ V200R001SPH001 CE7850/CE8860 V200R001C00SPC700 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 101 Configuration Examples for the Financial Industry Category L2 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Product Version TOR switch CE7850/ CE6855HI / CE6851HI/CE6850HI V200R001C00SPC700 vSwitch VDS vSphere 6.0 Hyper-V vSwitch 2012-R2 VMware vCenter vSphere 6.0 Microsoft System Center 2012-R2 VMM (not applicable when FusionSphere OpenStack is connected) Virtualization platform VMware ESX vSphere 6.0 Microsoft Hyper-V 2012-R2 (not applicable when FusionSphere OpenStack is connected) NOTE The AC-DCN does not manage Load balancers (LBs), and only manages firewalls provided by Huawei. 4.1.4 Solution Restrictions There are some restrictions in the networking of the solution. Consider these restrictions when planning a network. SDN Restrictions l When open-source OpenStack is connected, different VPCs cannot directly communicate with each other. In this scenario, VPCs can only communicate with each other through elastic IP addresses (EIPs). l At one POD, CE series switches of V100R006 and V200R001 cannot be used together. l When OpenStack or FusionSphere OpenStack connects to F5, pay attention to the following items: l HTTPS load balancing service in Secure Socket Layer (SSL) offloading mode is not supported. HTTPS load balancing service in default bypass mode is supported. l Weighted Round Robin (WRR) scheduling is not supported, whereas Round Robin (RR) scheduling is supported. l The AC-DCN cannot deliver user name and password configurations of the Simple Network Management Protocol (SNMP) to firewalls through NETCONF. The SNMP user name and password need to be manually configured on firewalls. AC-DCN Restrictions l Issue 03 (2017-05-08) The AC-DCN only manages the Admin-VS. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 102 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network l The AC-DCN does not support all-active gateway group in which more than two gateways are active. However, multiple groups of dual-active gateways are supported. l An external network cannot be bound to multiple gateway groups. l You can deploy networking through the AC-DCN or the CLI. Do not use the two methods simultaneously because manually configured CLIs may conflict with commands delivered by the AC-DCN. If this occurs, services cannot be automatically provisioned. l In full-meshed scenario where virtual private network (VPN) isolation is not configured for service gateways, IP addresses of tenant subnets cannot overlap, and firewalls and VPN services cannot be configured. l On the nodes in an AC-DCN cluster, the system time of the AC-DCN node server cannot be manually modified. If the system time of the AC-DCN node server is manually modified, the time of different AC-DCN nodes cannot be synchronized and system exceptions occur. The AC-DCN uses the Network Time Protocol (NTP) to synchronize time. NTP needs to be configured before you install the AC-DCN to implement clock synchronization. l When an AC-DCN cluster is running, the cluster capacity cannot be increased or decreased. Plan the cluster scale and deploy the cluster in the network construction phase. l When adding F5 LBs to the AC-DCN, set the device name to the default value F5LBAAS. If not, LB services cannot be delivered. l When firewalls work in active/standby mirroring mode, the AC-DCN manages them through Layer 3 main ports or Eth-Trunks, but not loopback or management (Meth) interfaces on the firewalls. l When multiple IP addresses are configured for a VM on the network interface card (NIC), only one IP address is displayed on the AD-DCN. That is, the AC-DCN only supports single path detection for a VM. l Paths can be detected only when VXLAN-enabled Huawei CE series switches are deployed on the paths. l The rollback function of the AC-DCN has the following restrictions: If function check (such as device auditing) or new service delivery cannot be implemented after a version upgrade, these two functions are unavailable after the version is rolled back. You are advised to reinstall the source AC-DCN version according to the upgrade guide, and implement rollback by restoring the database. Firewall Restrictions l Virtual system (VSYS) license shall be loaded on firewalls. l Firewalls can be physically connected to centralized VXLAN Layer 3 gateways directly or in bypass mode. l Non-firewall mode and 1+1 mirroring mode (same interface configurations are set for two firewalls, and the standby device does not provide services) are supported. 1+1 active/standby mode with Virtual Router Redundancy Protocol (VRRP) switchover and 1+1 dual-active mode are not supported. l Software distributed firewalls are not supported. LB Restrictions In the cloud-network integration scenario, F5 can be managed by FusionSphere OpenStack and open-source OpenStack after corresponding plug-ins are installed. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 103 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network LB devices can only access the network at Layer 2. If only FD and FDA interface cards, and SFUFs and SFUGs are configured for CE12800 series switches, LBs can be connected to VXLAN Layer 3 gateways in bypass mode. If other interface cards or SFUs are configured, LBs can only be connected to service leaf nodes or spine devices. CE Series Switch Restrictions l No licenses are required in deploying VXLANs for CE12800 series switches. Licenses are required in deploying VXLANs for CE8800, CE7800, and CE6800 series switches. l VXLAN packets cannot be fragmented or reassembled on CE devices. When both CE and non-CE devices are deployed on a VXLAN, VXLAN packets may be fragmented on non-CE devices. However, CE devices cannot reassemble these packets, resulting in a forwarding failure. To prevent this problem, you are advised to set the frame length threshold of packets to 1400 bytes on the server or increase the maximum transmission unit (MTU) value for non-CE devices that VXLAN packets pass through. l On a CE device, Multiprotocol Label Switching (MPLS) encapsulation cannot be implemented on packets after VXLAN encapsulation. The reverse encapsulation order is not supported either. This problem can be prevented by configuring a specific networking solution. For example, configure device A to implement VXLAN encapsulation on packets and forward the packets to device B, and configure device B to implement MPLS encapsulation. l The combination usage of EA and GE cards with EC, ED, EF, EG, FD, or FDA cards with VXLAN services deployed is not recommended. If so, the VXLAN packet forwarding performance of all EA, EC, ED, EF, EG, and GE cards on the device will decrease by around 50%. The performance will not be affected if only traditional VLAN services are deployed. l To configure a TOR fixed switch as a VXLAN Layer 3 gateway, you are advised to use the CE7855EI and CE6870EI. To configure the CE8860EI, CE7850EI, CE6850HI, CE6851HI, or CE6850UHI as a VXLAN Layer 3 gateway, you need to set some service interfaces to external loopback interfaces. These service interfaces cannot be used in other services, and optical modules and cable connection are not required. The bandwidth of a loopback interface shall double the bandwidth of a VXLAN Layer 3 gateway. The CE7855 and CE6855 do not require external loopback interfaces. l In the AC-DCN firewall management scenario, the CE6855 that works in single-node or stacking mode, or functions as a parent switch on a Super Virtual Fabric (SVF) system cannot be used as a VXLAN Layer 3 gateway. (When the CE6855 functions as a Layer 3 gateway, it can be connected to firewalls and routers only through VBDIF interfaces, but not VLANIF or main interfaces. However, when the AC-DCN manages firewalls, it automatically configures a VLAN on the interface of the gateway and creates a VLANIF interface for connecting to firewalls.) Therefore, the CE7855 and CE6870 are recommended. l EC, ED, EF, and EG cards do not support the concurrent Layer 2 and Layer 3 VXLAN scenario. In this scenario, both VXLAN Layer 2 sub-interface access and VXLAN tunnel access are enabled on a gateway, and the bridge domains (BDs) on the tunnel side correspond to the VBDIF interfaces on the gateway. To enable this scenario, configure the loopback mode through the CLI. However, in loopback mode, the VXLAN packet forwarding performance of EC, ED, EF, and EG cards will decrease by around 50%. l When an SVF system consisting of fixed switches functions as a leaf node, only paths between VTEPs can be detected, but not paths between VMs. The CE5810EI should not be used as a leaf device in an SVF system consisting of fixed switches. You are advised to configure the CE5855EI as a leaf device, which will provide GE access to servers. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 104 Configuration Examples for the Financial Industry l 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network In the three-layer network architecture, spine devices in the middle must be Huawei devices as well. If not, some O&M functions such as AC path detection may not be available. 4.2 Network Deployment 4.2.1 Network Deployment Panorama After hardware devices are installed and cables are connected, network engineers deploy the network. Figure 4-2 shows the network deployment process. Figure 4-2 Network deployment process Table 4-2 describes tasks in each phase. Table 4-2 Tasks in each network deployment phase Issue 03 (2017-05-08) Task Description Checking Software and Hardware Environments Check whether hardware and software versions and licenses are the same as planned. If not, upgrade or replace the hardware, software, or license. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 105 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Task Description Deploy the underlay network. Configure the management network and basic fabric network to enable the AC-DCN to manage the fabric network. Install the AC-DCN. Install the AC-DCN software on physical servers in a cluster. Pre-configure the ACDCN. Activate the AC-DCN license, configure the AC-DCN to automatically discover resources, create PODs, and preconfigure the resources for the overlay network deployment. Interconnect the AC-DCN with a cloud platform. Perform configurations on the AC-DCN and a cloud platform to connect the AC-DCN to the cloud platform, preparing for the overlay network deployment. Deploy the overlay network. Create and deliver services on the AC-DCN portal as required. Perform common operations. Use the AC-DCN to expand device capacity, or replace and delete devices as required. 4.2.2 Checking Software and Hardware Environments Before deployment, check whether hardware and software versions as well as patches meet requirements. For details about the requirements as described in section 4.1.3 Version Support. If not, replace or upgrade the devices. Checking CE Series Switch Version, License, and Running Status Step 1 Run the display version command to check the version of a CE series switch. <HUAWEI> display version //Check whether the current switch version is V200R001C00SPC700. Huawei Versatile Routing Platform Software VRP (R) software, Version 8.13 (CE12800 V200R001C00SPC700) Copyright (C) 2012-2016 Huawei Technologies Co., Ltd. HUAWEI CE12804 uptime is 0 day, 1 hour, 55 minutes <HUAWEI> display patch-information //Check whether the switch has loaded the latest patch. Patch Package Name :flash:/CE12800-V200R001SPH003.PAT Patch Package Version : V200R001SPH003 Patch Package State :Running //Check whether the patch is running. Patch Package Run Time:2016-11-09 17:57:27 Step 2 Run the display license command to check information about the CE series switch license. <HUAWEI> display license //TOR switches need VXLAN licenses, but CE series switches do not. MainBoard: Active License : flash:/CloudEngine7800.dat License state : Demo Revoke ticket : No ticket RD of Huawei Technologies Co., Ltd. Product name : CloudEngine 7800 Product version : V200R001 License Serial No : LIC201411261KSH50 Creator : Huawei Technologies Co., Ltd. Created Time : 2016-11-09 17:57:27 Feature name : CELIC Authorize type : demo Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 106 Configuration Examples for the Financial Industry Expired date Trial days 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network : 2017-02-20 : - Item name Item type Value Description ------------------------------------------------------------CE-LIC-VXLAN Function YES CE-LIC-VXLAN Step 3 To check the running status of the CE series switch, run the display device command to check whether all cards have been registered and run the display alarm active command to check the current active alarms. <HUAWEI> display device //If Registered is displayed under Register and Normal under Alarm, the switch is running properly. CE12804's Device status: --------------------------------------------------------------------Slot Card Type Online Power Register Alarm Primary --------------------------------------------------------------------3 CE-L24LQ-EA Present On Registered Normal NA 4 CE-L24XS-EA Present On Registered Normal NA 5 CE-MPUA Present On Registered Normal Master 7 CE-CMUA Present On Registered Normal Master 13 CE-SFU04C Present On Registered Normal NA PWR2 Present On Registered Normal NA FAN3 Present On Registered Normal NA FAN4 Present On Registered Normal NA FAN5 Present On Registered Normal NA FAN7 Present On Registered Normal NA FAN8 Present On Registered Normal NA FAN9 Present On Registered Normal NA --------------------------------------------------------------------<HUAWEI> display alarm active --------------------------------------------------------------------Sequence AlarmId Severity Date Time Description --------------------------------------------------------------------20 0x8520003 Major 2013-12-26 The interface status changes. (ifName= 09:10:31 Eth-Trunk19, AdminStatus=UP, OperStatu s=DOWN, Reason=The conditions for the activation of the interface are not me t, mainName=Eth-Trunk19) --------------------------------------------------------------------- ----End Checking Firewall Version, License, and Running Status Step 1 Run the display version command to check the version of a firewall. <USG9000> display version //Check whether the current firewall version is correct. Huawei Technologies Versatile Security Platform Software Software Version: USG9520&9560&9580 V500R001C30 (VRP (R) Software, Version 5.70) Copyright (C) 2007-2013 Huawei Technologies Co., Ltd. All rights reserved. Secospace USG9580 uptime is 0 day, 23 hours, 35 minutes USG9580 version information: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Step 2 Run the display license command to check the firewall license. <USG9000> display license //Check whether VSYS is enabled. MainBoard: Device ESN is: 030KKR10B1003130 The file activated is: cfcard:/license.dat The time when activated is: 2014/04/08 10:11:47 Firewall default Performance per cpu: 40Gbps Number of VPN Tunnels-R: 1000000 Number of Virtual Systems: 4095 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 107 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network GTP: Enable 6RD Session Scale: 1280M NAT64 Session Scale: 1280M DS-Lite Session Scale: 1280M Firewall Upgrade Additional Performance: 1280Gbps Expiration Date of The IPS Update Service: 2014-05-18 SlaveBoard: Device ESN is: 030KKR10B1000131 The file activated is: cfcard:/license.dat The time when activated is: 2014/04/08 10:11:47 Firewall default Performance per cpu: 40Gbps Number of VPN Tunnels-R: 1000000 Number of Virtual Systems: 4095 GTP: Enable 6RD Session Scale: 1280M NAT64 Session Scale: 1280M DS-Lite Session Scale: 1280M Firewall Upgrade Additional Performance: 1280Gbps Expiration Date of The IPS Update Service: 2014-05-18 Step 3 To check the running status of the firewall, run the display device command to check whether all cards have been registered and run the display alarm active command to check the current active alarms. <USG9000> display device //If Registered is displayed under Register and Normal under Alarm, the firewall is running properly. USG9580's Device status: Slot # Type Online Register Status Primary - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1 LPU Present Registered Normal NA 5 LPU Present Registered Normal NA 6 SPU Present Registered Normal NA 9 MPU Present Registered Normal Master 10 MPU Present Registered Normal Slave 13 SFU Present Registered Normal NA 14 SFU Present Registered Normal NA 15 CLK Present Registered Normal Master 16 CLK Present Registered Normal Slave 17 PWR Present Registered Normal NA 19 FAN Present Registered Normal NA <USG9000> display alarm all ---------------------------------------------------------------------------Index Level Date Time Info 1 Emergency abnormal.[LPU 5] 11-07-05 11:25:40 The 48 V power supply for the board was ----End Checking the AC-DCN Software Package In most cases, an AC-DCN software package consists of the following files: l An operating system image (.iso file) l An AC-DCN installation package (Install_Pkg) l An AC-DCN configuration package (Config_Pkg) l AC-DCN plug-in (eSDK) for interconnecting with a cloud platform l Cloud platform plug-ins (OPS_Plugin and FSP_Plugin) for interconnection l The Breeze iDeploy installation tool l Signature verification files (.asc files) of all the preceding files Step 1 Check whether the software versions are correct. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 108 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Step 2 Verify integrity of the files. You are advised to use Huawei PGPVerify. For details on how to use the PGPVerify tool, see File Signature Verification Guide Using Huawei PGPVerify. ----End 4.2.3 Underlay Network Configuration 4.2.3.1 Configuring Network Management Network management modes include in-band management and out-of-band management networks: l Out-of-band management indicates that devices are managed on the dedicated management interface, which isolates management and control. This method is recommended. This topic uses out-of-band management as an example. The customer management VLAN ID is 20 and network devices for out-of-band management include switches, firewalls, and load balancers (LBs). The management interfaces of network devices are connected to the management switches, and management addresses are configured for the management interfaces for remote login. For details about the management interface configuration and NE login configuration, see product documentation. The AC-DCN out-of-band management indicates that the BMC interface of the ACDCN is connected to the management switch and the IP address, mask, and management network segment are configured for the BMC interface for remote login. The management network segment configuration is similar to that of the AC-DCN. l In-band management indicates that devices are managed on the service interfaces. If errors occur on a service network, users may fail to log in to the devices. In-band management of network devices does not need additional costs. In this example, the loopback IP address of the Router-ID for each device can be used as the in-band management IP address. The details are not described in this topic. Configuring a TOR Stack 4.2.3.2 Configuring TOR Stack Working Group Configure Leaf-CE6851HI-1 and Leaf-CE6851HI-2 to set up a stack. The configuration roadmap is as follows: 1. Establishing a stack: Configure a stack and dual-active detection (DAD), restart the devices, and connect cables to make the stack take effect. 2. Configuring IP addresses: On the leaf nodes, configure IP addresses for the Layer 3 interfaces that connect to the spine nodes, the Loopback0 interfaces (the IP address is used as the Router-ID and VTEP IP address), the management interfaces Meth0/0/0, and the NVE1 interfaces (the IP address is the VTEP IP address). 3. Configuring server access: Configure Leaf-CE6851HI-1 and Leaf-CE6851HI-2 to enable service servers and the AC-DCN to access the stack. 4. Configuring routes: Configure BGP dynamic routes on the stack to connect the stacked switches to two spine devices and ensure that the routes between the stack and spine devices are reachable at Layer 3. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 109 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Establishing a Stack Step 1 On Leaf-CE6851HI-1, set the stack member ID to 1, stack priority to 150, and stack domain ID to 10. <HUAWEI> system-view [~HUAWEI] sysname Leaf-CE6851HI-1 [*HUAWEI] commit [~Leaf-CE6851HI-1] stack [~Leaf-CE6851HI-1-stack] stack member 1 priority 150 [*Leaf-CE6851HI-1-stack] stack member 1 domain 10 [*Leaf-CE6851HI-1-stack] quit [*Leaf-CE6851HI-1] commit Step 2 On Leaf-CE6851HI-2, set the stack domain ID to 10. <HUAWEI> system-view [~HUAWEI] sysname Leaf-CE6851HI-2 [*HUAWEI] commit [~Leaf-CE6851HI-2] stack [*Leaf-CE6851HI-2-stack] stack member 1 domain 10 [*Leaf-CE6851HI-2-stack] quit [*Leaf-CE6851HI-2] commit Step 3 Configure stack interfaces. # On Leaf-CE6851HI-1, add 40GE1/0/1 through 40GE1/0/2 to Stack-Port1/1. [~Leaf-CE6851HI-1] interface stack-port 1/1 [*Leaf-CE6851HI-1-Stack-Port1/1] port member-group interface 40ge 1/0/1 to 1/0/2 Warning: The interface(s) (40GE1/0/1-1/0/2) will be converted to stack mode and be configured with the port crc-statistics trigger error-down command if the configuration does not exist. After the configuration is complete, these interfaces may go Error-Down (crc-statistics) because there is no shutdown configuration on the interfaces. [Y/N]: y [*Leaf-CE6851HI-1-Stack-Port1/1] quit [*Leaf-CE6851HI-1] commit [~Leaf-CE6851HI-1] quit # On Leaf-CE6851HI-2, add 40GE1/0/1 through 40GE1/0/2 to Stack-Port1/1. [~Leaf-CE6851HI-2] interface stack-port 1/1 [*Leaf-CE6851HI-2-Stack-Port1/1] port member-group interface 40ge 1/0/1 to 1/0/2 Warning: The interface(s) (40GE1/0/1-1/0/2) will be converted to stack mode and be configured with the port crc-statistics trigger error-down command if the configuration does not exist. After the configuration is complete, these interfaces may go Error-Down (crc-statistics) because there is no shutdown configuration on the interfaces. [Y/N]: y [*Leaf-CE6851HI-2-Stack-Port1/1] quit [*Leaf-CE6851HI-2] commit [~Leaf-CE6851HI-2] quit Step 4 Configure DAD on Leaf-CE6851HI-1 and Leaf-CE6851HI-2 to avoid that the network has two network devices with conflicting configurations in case that the stack splits. # Configure DAD on Leaf-CE6851HI-1. [~Leaf-CE6851HI-1] interface Meth0/0/0 [~Leaf-CE6851HI-1-MEth0/0/0] dual-active detect enable [*Leaf-CE6851HI-1-MEth0/0/0] commit # Configure DAD on Leaf-CE6851HI-2. [~Leaf-CE6851HI-2] interface Meth0/0/0 [~Leaf-CE6851HI-2-MEth0/0/0] dual-active detect enable [*Leaf-CE6851HI-2-MEth0/0/0] commit Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 110 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network NOTE If in-band management is used on the network, you need to configure service interfaces on the switches and use DAD in direct mode. At least two direct links are required to ensure reliability. To implement DAD in direct mode on service interfaces, the configuration is as follows: [~Leaf-CE6851HI-1&CE6851HI-2] interface 10GE1/0/30 [~Leaf-CE6851HI-1&CE6851HI-2-10GE1/0/30] description "for DAD" [*Leaf-CE6851HI-1&CE6851HI-2-10GE1/0/30] dual-active detect mode [*Leaf-CE6851HI-1&CE6851HI-2-10GE1/0/30] interface 10GE1/0/31 [*Leaf-CE6851HI-1&CE6851HI-2-10GE1/0/31] description "for DAD" [*Leaf-CE6851HI-1&CE6851HI-2-10GE1/0/31] dual-active detect mode [*Leaf-CE6851HI-1&CE6851HI-2-10GE1/0/31] interface 10GE2/0/30 [*Leaf-CE6851HI-1&CE6851HI-2-10GE2/0/30] description "for DAD" [*Leaf-CE6851HI-1&CE6851HI-2-10GE2/0/30] dual-active detect mode [*Leaf-CE6851HI-1&CE6851HI-2-10GE2/0/30] interface 10GE2/0/31 [*Leaf-CE6851HI-1&CE6851HI-2-10GE2/0/31] description "for DAD" [*Leaf-CE6851HI-1&CE6851HI-2-10GE2/0/31] dual-active detect mode [*Leaf-CE6851HI-1&CE6851HI-2-10GE2/0/31] commit direct direct direct direct Step 5 Save the configuration and restart a switch. # Save the configuration on Leaf-CE6851HI-1 and restart the switch. Configurations on other TOR devices are similar to the configuration on Leaf-CE6851HI-1, and are not mentioned here. <Leaf-CE6851HI-1> save Warning: The current configuration will be written to the device. Continue? [Y/ N]: y <Leaf-CE6851HI-1> reboot Warning: The system will reboot. Continue? [Y/N]:y Step 6 Connect Leaf-CE6851HI-1 and Leaf-CE6851HI-2 using stack cables to set up a stack. Step 7 After the stack is set up, save the configuration. ----End Configuring IP Addresses Step 1 Configure IP addresses for the interconnection interfaces. NOTE Before switching the working mode of interfaces on a CE6855HI or CE7855EI series switch to Layer 3, run the vlan reserved for main-interface startvlanid to endvlanid command to specify a dedicated reserved VLAN for each Layer 3 main interface. [~Leaf-CE6851HI-1] sysname Leaf-CE6851HI-1&CE6851HI-2 [*Leaf-CE6851HI-1] commit [~Leaf-CE6851HI-1&CE6851HI-2] interface 40GE1/0/3 [~Leaf-CE6851HI-1&CE6851HI-2] description "to_Spine-CE12804-1-40GE1/0/0" [~Leaf-CE6851HI-1&CE6851HI-2-40GE1/0/3] undo portswitch [*Leaf-CE6851HI-1&CE6851HI-2-40GE1/0/3]ip address 11.254.40.157 30 [*Leaf-CE6851HI-1&CE6851HI-2-40GE1/0/3]commit [~Leaf-CE6851HI-1&CE6851HI-2-40GE1/0/3]quit [~Leaf-CE6851HI-1&CE6851HI-2] interface 40GE1/0/4 [~Leaf-CE6851HI-1&CE6851HI-2] description "to_Spine-CE12804-2-40GE1/0/1" [~Leaf-CE6851HI-1&CE6851HI-2-40GE1/0/4] undo portswitch [*Leaf-CE6851HI-1&CE6851HI-2-40GE1/0/4]ip address 11.254.40.165 30 [*Leaf-CE6851HI-1&CE6851HI-2-40GE1/0/4]commit [~Leaf-CE6851HI-1&CE6851HI-2-40GE1/0/4]quit [~Leaf-CE6851HI-1&CE6851HI-2] interface 40GE2/0/3 [~Leaf-CE6851HI-1&CE6851HI-2] description "to_Spine-CE12804-2-40GE1/0/0" [~Leaf-CE6851HI-1&CE6851HI-2-40GE2/0/3] undo portswitch [*Leaf-CE6851HI-1&CE6851HI-2-40GE2/0/3]ip address 11.254.40.161 30 [*Leaf-CE6851HI-1&CE6851HI-2-40GE2/0/3]commit [~Leaf-CE6851HI-1&CE6851HI-2-40GE2/0/3]quit Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 111 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network [~Leaf-CE6851HI-1&CE6851HI-2] interface 40GE2/0/4 [~Leaf-CE6851HI-1&CE6851HI-2] description "to_Spine-CE12804-1-40GE1/0/1" [~Leaf-CE6851HI-1&CE6851HI-2-40GE2/0/4] undo portswitch [*Leaf-CE6851HI-1&CE6851HI-2-40GE2/0/4]ip address 11.254.40.169 30 [*Leaf-CE6851HI-1&CE6851HI-2-40GE2/0/4]commit [~Leaf-CE6851HI-1&CE6851HI-2-40GE2/0/4]quit Step 2 Configure an IP address for the loopback interface. [~Leaf-CE6851HI-1&CE6851HI-2] interface loopback0 [~Leaf-CE6851HI-1&CE6851HI-2] description "VTEP&Router-ID" [*Leaf-CE6851HI-1&CE6851HI-2-LoopBack0] ip address 11.11.11.11 32 [*Leaf-CE6851HI-1&CE6851HI-2-LoopBack0] commit [~Leaf-CE6851HI-1&CE6851HI-2-LoopBack0] quit Step 3 Configure an IP address for the management interface. [~Leaf-CE6851HI-1&CE6851HI-2] interface Meth0/0/0 [*Leaf-CE6851HI-1&CE6851HI-2-Meth0/0/0] ip address 100.125.94.2 24 [*Leaf-CE6851HI-1&CE6851HI-2- Meth0/0/0] commit [~Leaf-CE6851HI-1&CE6851HI-2- Meth0/0/0] quit Step 4 Configure the VTEP IP address. [~Leaf-CE6851HI-1&CE6851HI-2] interface NVE1 [*Leaf-CE6851HI-1&CE6851HI-2-Nve1] source 11.11.11.11 [*Leaf-CE6851HI-1&CE6851HI-2-Nve1] commit [~Leaf-CE6851HI-1&CE6851HI-2-Nve1] quit ----End Configuring Server Access Configure Leaf-CE6851HI-1 and Leaf-CE6851HI-2 to enable service servers and the ACDCN server to access the stack. Step 1 Configure common service server access instances on Leaf-CE6851HI-1 and LeafCE6851HI-2. # Configure common service servers to access the stack in load balancing mode. [*Leaf-CE6851HI-1&CE6851HI-2] interface eth-trunk 1 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk1] mode lacp-static [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk1] port link-type trunk [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk1] undo port trunk allow-pass vlan 1 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk1] trunkport 10ge 1/0/1 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk1] trunkport 10ge 2/0/1 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk1] quit [*Leaf-CE6851HI-1&CE6851HI-2] commit # When common service servers access the stack in active/standby mode, interface configurations will be delivered by the AC-DCN after physical network cables are connected. Step 2 To connect the AC-DCN to the network through the M-LAG, see section 4.2.3.3 Configuring a TOR M-LAG . To connect the AC-DCN to the network through the TOR stack, configure as follows: 1. Configure an IP address for the AC-DCN service gateway. [~Leaf-CE6851HI-1&CE6851HI-2] VLAN 10 [*Leaf-CE6851HI-1&CE6851HI-2-vlan10] interface vlan 10 [*Leaf-CE6851HI-1&CE6851HI-2-Vlanif10] ip address 100.125.100.2 24 [*Leaf-CE6851HI-1&CE6851HI-2-Vlanif10] commit 2. Configure AC-DCN server access instances on Leaf-CE6851HI-1 and LeafCE6851HI-2. (The following uses the load balancing mode as an example.) [*Leaf-CE6851HI-1&CE6851HI-2] interface eth-trunk 100 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk100] mode lacp-static [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk100] port default vlan 10 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 112 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk100] trunkport 10ge 1/0/46 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk100] trunkport 10ge 2/0/46 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk100] quit [*Leaf-CE6851HI-1&CE6851HI-2] commit [*Leaf-CE6851HI-1&CE6851HI-2] interface eth-trunk 101 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk101] mode lacp-static [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk101] port default vlan 10 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk101] trunkport 10ge 1/0/47 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk101] trunkport 10ge 2/0/47 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk2] quit [*Leaf-CE6851HI-1&CE6851HI-2] commit [*Leaf-CE6851HI-1&CE6851HI-2] interface eth-trunk 102 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk102] mode lacp-static [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk102] port default vlan 10 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk102] trunkport 10ge 1/0/48 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk102] trunkport 10ge 2/0/48 [*Leaf-CE6851HI-1&CE6851HI-2-Eth-Trunk102] quit [*Leaf-CE6851HI-1&CE6851HI-2] commit ----End Configuring Routes Configure BGP routes on the stack to interconnect the switches with the spine devices. [~Leaf-CE6851HI-1&CE6851HI-2] BGP 65021 [*Leaf-CE6851HI-1&CE6851HI-2-bgp] router-id 11.11.11.11 [*Leaf-CE6851HI-1&CE6851HI-2-bgp] timer keepalive 10 hold 30 [*Leaf-CE6851HI-1&CE6851HI-2-bgp] group Spine-CE12804-1 external [*Leaf-CE6851HI-1&CE6851HI-2-bgp] peer Spine-CE12804-1 as-number 65009 [*Leaf-CE6851HI-1&CE6851HI-2-bgp] peer 11.254.40.158 as-number 65009 [*Leaf-CE6851HI-1&CE6851HI-2-bgp] peer 11.254.40.158 group_Spine-CE12804-1 [*Leaf-CE6851HI-1&CE6851HI-2-bgp] peer 11.254.40.170 as-number 65009 [*Leaf-CE6851HI-1&CE6851HI-2-bgp] peer 11.254.40.170 group Spine-CE12804-1 [*Leaf-CE6851HI-1&CE6851HI-2-bgp] group Spine-CE12804-2 external [*Leaf-CE6851HI-1&CE6851HI-2-bgp] peer Spine-CE12804-2 as-number 65010 [*Leaf-CE6851HI-1&CE6851HI-2-bgp] peer 11.254.40.166 as-number 65010 [*Leaf-CE6851HI-1&CE6851HI-2-bgp] peer 11.254.40.166 group Spine-CE12804-2 [*Leaf-CE6851HI-1&CE6851HI-2-bgp] peer 11.254.40.162 as-number 65010 [*Leaf-CE6851HI-1&CE6851HI-2-bgp] peer 11.254.40.162 group Spine-CE12804-2 [*Leaf-CE6851HI-1&CE6851HI-2-bgp] ipv4-family unicast [*Leaf-CE6851HI-1&CE6851HI-2-bgp-af-ipv4] preference 20 200 10 [*Leaf-CE6851HI-1&CE6851HI-2-bgp-af-ipv4] network 11.11.11.11 255.255.255.255 [*Leaf-CE6851HI-1&CE6851HI-2-bgp-af-ipv4] network 100.125.100.0 255.255.255.0 //If the AC-DCN accesses the network through the stack and service network segments are configured for the stack, advertise the network segments where the AC-DCN is located in BGP. [*Leaf-CE6851HI-1&CE6851HI-2-bgp-af-ipv4] maximum load-balancing 32 [*Leaf-CE6851HI-1&CE6851HI-2-bgp-af-ipv4] quit [*Leaf-CE6851HI-1&CE6851HI-2-bgp] quit [*Leaf-CE6851HI-1&CE6851HI-2] commit NOTE To access the AC-DCN server from an external network, configure static or dynamic routes on TOR switches to advertise the service address of the AC-DCN server, so that external networks can access this server and TOR switches can access external networks through the routes. 4.2.3.3 Configuring a TOR M-LAG Configure Leaf-CE6851HI-3 and Leaf-CE6851HI-4 to set up an M-LAG. The configuration roadmap is as follows: 1. Issue 03 (2017-05-08) Configuring IP addresses: On the leaf nodes, configure IP addresses for Layer 3 interfaces that connect to the spine nodes, the Loopback0 interfaces (the IP address is Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 113 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network used as the VTEP IP address), the Lookback1 interfaces (the IP address is used as the Router-ID), the management interfaces Meth0/0/0, the NVE1 interfaces (the same IP address shall be configured for the two devices, and the IP address is the VTEP IP address), and gateways of the AC-DCN (if the AC-DCN accesses the network through the M-LAG). 2. Configuring an M-LAG: On the switches, configure a global M-LAG, DFS groups, and peer-links, connect common service servers and the AC-DCN to the M-LAG, and associate uplink and downlink interfaces with the Monitor Link group. 3. Configuring routes: Configure BGP dynamic routes on the M-LAG to connect the switches to two spine devices and ensure that the routes between the M-LAG and spine devices are reachable at Layer 3. Configuring IP Addresses Step 1 Configure IP addresses for the interconnection interfaces on Leaf-CE6851HI-3 and LeafCE6851HI-4. NOTE Before switching the working mode of interfaces on a CE6855HI or CE7855EI series switch to Layer 3, run the vlan reserved for main-interface startvlanid to endvlanid command to specify a dedicated reserved VLAN for each Layer 3 main interface. [~HUAWEI] sysname Leaf-CE6851HI-3 [*Leaf-CE6851HI-3] commit [~Leaf-CE6851HI-3] interface 40GE1/0/3 [~Leaf-CE6851HI-3-40GE1/0/3] description "to_Spine-CE12804-1-40GE1/0/2" [~Leaf-CE6851HI-3-40GE1/0/3] undo portswitch [*Leaf-CE6851HI-3-40GE1/0/3] ip address 11.254.41.157 30 [*Leaf-CE6851HI-3-40GE1/0/3] commit [~Leaf-CE6851HI-3-40GE1/0/3] quit [~Leaf-CE6851HI-3] interface 40GE1/0/4 [~Leaf-CE6851HI-3-40GE1/0/3] description "to_Spine-CE12804-2-40GE1/0/3" [~Leaf-CE6851HI-3-40GE1/0/4] undo portswitch [*Leaf-CE6851HI-3-40GE1/0/4] ip address 11.254.41.165 30 [*Leaf-CE6851HI-3-40GE1/0/4] commit [~Leaf-CE6851HI-3-40GE1/0/4] quit [~HUAWEI] sysname Leaf-CE6851HI-4 [*Leaf-CE6851HI-4] commit [~Leaf-CE6851HI-4] interface 40GE1/0/3 [~Leaf-CE6851HI-4-40GE1/0/3] description "to_Spine-CE12804-1-40GE1/0/2" [~Leaf-CE6851HI-4-40GE1/0/3] undo portswitch [*Leaf-CE6851HI-4-40GE1/0/3] ip address 11.254.41.169 30 [*Leaf-CE6851HI-4-40GE1/0/3] commit [~Leaf-CE6851HI-4-40GE1/0/3] quit [~Leaf-CE6851HI-4] interface 40GE1/0/4 [~Leaf-CE6851HI-4-40GE1/0/3] description "to_Spine-CE12804-2-40GE1/0/3" [~Leaf-CE6851HI-4-40GE1/0/4] undo portswitch [*Leaf-CE6851HI-4-40GE1/0/4] ip address 11.254.41.161 30 [*Leaf-CE6851HI-4-40GE1/0/4] commit [~Leaf-CE6851HI-4-40GE1/0/4] quit Step 2 Configure IP addresses for the loopback interfaces. The IP address of Loopback0 is used as the VTEP IP address and IP address of Loopback1 is used as the Router-ID. [~Leaf-CE6851HI-3] interface as the VTEP IP address. [*Leaf-CE6851HI-3-LoopBack0] [*Leaf-CE6851HI-3-LoopBack0] [~Leaf-CE6851HI-3-LoopBack0] [~Leaf-CE6851HI-3] interface [*Leaf-CE6851HI-3-LoopBack1] [*Leaf-CE6851HI-3-LoopBack1] [~Leaf-CE6851HI-3-LoopBack1] Issue 03 (2017-05-08) loopback0 //IP address of this interfaces is used ip address 11.11.11.12 32 commit quit loopback1 ip address 13.13.13.13 32 commit quit Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 114 Configuration Examples for the Financial Industry [~Leaf-CE6851HI-4] interface also the VTEP IP address. [*Leaf-CE6851HI-4-LoopBack0] [*Leaf-CE6851HI-4-LoopBack0] [~Leaf-CE6851HI-4-LoopBack0] [~Leaf-CE6851HI-4] interface [*Leaf-CE6851HI-4-LoopBack1] [*Leaf-CE6851HI-4-LoopBack1] [~Leaf-CE6851HI-4-LoopBack1] 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network loopback0 //IP address of this interfaces is ip address 11.11.11.12 32 commit quit loopback1 ip address 14.14.14.14 32 commit quit Step 3 Configure IP addresses for the management interfaces. [~Leaf-CE6851HI-3] [*Leaf-CE6851HI-3[*Leaf-CE6851HI-3[~Leaf-CE6851HI-3- interface Meth0/0/0 Meth0/0/0] ip address 100.125.94.3 24 Meth0/0/0] commit Meth0/0/0] quit [~Leaf-CE6851HI-4] [*Leaf-CE6851HI-4[*Leaf-CE6851HI-4[~Leaf-CE6851HI-4- interface Meth0/0/0 Meth0/0/0] ip address 100.125.94.4 24 Meth0/0/0] commit Meth0/0/0] quit Step 4 Configure the VTEP IP address. Configure the same IP address for interfaces on the two devices. [~Leaf-CE6851HI-3] interface NVE1 [*Leaf-CE6851HI-3-Nve1] source 11.11.11.12 [*Leaf-CE6851HI-3-Nve1] commit [~Leaf-CE6851HI-3-Nve1] quit [~Leaf-CE6851HI-4] interface NVE1 [*Leaf-CE6851HI-4-Nve1] source 11.11.11.12 [*Leaf-CE6851HI-4-Nve1] commit [*Leaf-CE6851HI-4-Nve1] quit Step 5 Configure IP addresses for the AC-DCN service gateways. [~Leaf-CE6851HI-3] VLAN 10 [*Leaf-CE6851HI-3-vlan10] interface vlanif 10 [*Leaf-CE6851HI-3-Vlanif10] ip address 100.125.100.2 24 [*Leaf-CE6851HI-3-Vlanif10] vrrp vrid 1 virtual-ip 100.125.100.1 [~Leaf-CE6851HI-3-Vlanif10] commit [~Leaf-CE6851HI-4] VLAN 10 [*Leaf-CE6851HI-4-vlan10] interface vlanif 10 [*Leaf-CE6851HI-4-Vlanif10] ip address 100.125.100.3 24 [*Leaf-CE6851HI-4-Vlanif10] vrrp vrid 1 virtual-ip 100.125.100.1 [*Leaf-CE6851HI-4-Vlanif10] commit ----End Configuring an M-LAG Step 1 Configure an M-LAG. <Leaf-CE6851HI-3> system-view [~Leaf-CE6851HI-3] stp mode rstp [*Leaf-CE6851HI-3] stp v-stp enable [*Leaf-CE6851HI-3] commit [~Leaf-CE6851HI-3] lacp m-lag system-id 00e0-fc00-0001 [*Leaf-CE6851HI-3] commit <Leaf-CE6851HI-4> system-view [~Leaf-CE6851HI-4] stp mode rstp [*Leaf-CE6851HI-4] stp v-stp enable [*Leaf-CE6851HI-4] commit [~Leaf-CE6851HI-4] lacpm-lag system-id 00e0-fc00-0001 Step 2 Configure DFS groups of the M-LAG on Leaf-CE6851HI-3 and Leaf-CE6851HI-4. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 115 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network [~Leaf-CE6851HI-3] dfs-group 1 [*Leaf-CE6851HI-3-dfs-group-1] source ip 13.13.13.13 [*Leaf-CE6851HI-3-dfs-group-1] priority 150 [*Leaf-CE6851HI-3-dfs-group-1] quit [*Leaf-CE6851HI-3] commit [*Leaf-CE6851HI-4] dfs-group 1 [*Leaf-CE6851HI-4-dfs-group-1] source ip 14.14.14.14 [*Leaf-CE6851HI-4-dfs-group-1] priority 120 [*Leaf-CE6851HI-4-dfs-group-1] quit [*Leaf-CE6851HI-4] commit Step 3 Configure peer-links of the M-LAG on Leaf-CE6851HI-3 and Leaf-CE6851HI-4. [~Leaf-CE6851HI-3] interface eth-trunk 0 [*Leaf-CE6851HI-3-Eth-Trunk0] trunkport 40ge 1/0/1 [*Leaf-CE6851HI-3-Eth-Trunk0] trunkport 40ge 1/0/2 [*Leaf-CE6851HI-3-Eth-Trunk0] mode lacp-static [*Leaf-CE6851HI-3-Eth-Trunk0] peer-link 1 [*Leaf-CE6851HI-3-Eth-Trunk0] quit [*Leaf-CE6851HI-3] commit [*Leaf-CE6851HI-4] interface eth-trunk 0 [*Leaf-CE6851HI-4-Eth-Trunk0] trunkport 40ge 1/0/1 [*Leaf-CE6851HI-4-Eth-Trunk0] trunkport 40ge 1/0/2 [*Leaf-CE6851HI-4-Eth-Trunk0] mode lacp-static [*Leaf-CE6851HI-4-Eth-Trunk0] peer-link 1 [*Leaf-CE6851HI-4-Eth-Trunk0] quit [*Leaf-CE6851HI-4] commit Step 4 Configure servers to access the M-LAG. # Configure the member interfaces of the M-LAG (servers connect to the M-LAG in load balancing mode) on Leaf-CE6851HI-3 and Leaf-CE6851HI-4. [*Leaf-CE6851HI-3] interface eth-trunk 1 [*Leaf-CE6851HI-3-Eth-Trunk1] mode lacp-static [*Leaf-CE6851HI-3-Eth-Trunk1] port link-type trunk [*Leaf-CE6851HI-3-Eth-Trunk1] undo port trunk allow-pass vlan 1 [*Leaf-CE6851HI-3-Eth-Trunk1] trunkport 10ge 1/0/1 [*Leaf-CE6851HI-3-Eth-Trunk1] dfs-group1 m-lag 1 [*Leaf-CE6851HI-3-Eth-Trunk1] quit [*Leaf-CE6851HI-3] commit [*Leaf-CE6851HI-4] interface eth-trunk 1 [*Leaf-CE6851HI-4-Eth-Trunk1] mode lacp-static [*Leaf-CE6851HI-4-Eth-Trunk1] port link-type trunk [*Leaf-CE6851HI-4-Eth-Trunk1] trunkport 10ge 1/0/1 [*Leaf-CE6851HI-4-Eth-Trunk1] undo port trunk allow-pass vlan 1 [*Leaf-CE6851HI-4-Eth-Trunk1] dfs-group1 m-lag 1 [*Leaf-CE6851HI-4-Eth-Trunk1] quit [*Leaf-CE6851HI-4] commit # If servers connect to the M-LAG in active/standby mode, the interface on the access switch connecting to the server cannot be a member interface of the M-LAG. The AC-DCN delivers all access configurations of ports. Step 5 Configure the member interfaces of the M-LAG (if the AC-DCN connects to the network in load balancing mode) on Leaf-CE6851HI-3 and Leaf-CE6851HI-4. [~Leaf-CE6851HI-3] interface eth-trunk 100 [*Leaf-CE6851HI-3-Eth-Trunk100] mode lacp-static [*Leaf-CE6851HI-3-Eth-Trunk100] port default vlan 10 [*Leaf-CE6851HI-3-Eth-Trunk100] trunkport 10ge 1/0/44 [*Leaf-CE6851HI-3-Eth-Trunk100] dfs-group1 m-lag 40 [*Leaf-CE6851HI-3-Eth-Trunk100] quit [*Leaf-CE6851HI-4] interface eth-trunk 100 [*Leaf-CE6851HI-4-Eth-Trunk100] mode lacp-static [*Leaf-CE6851HI-4-Eth-Trunk100] port defaultvlan 10 [*Leaf-CE6851HI-4-Eth-Trunk100] trunkport 10ge 1/0/44 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 116 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network [*Leaf-CE6851HI-4-Eth-Trunk100] dfs-group1 m-lag 40 [*Leaf-CE6851HI-4-Eth-Trunk100] quit [*Leaf-CE6851HI-4] commit [~Leaf-CE6851HI-3] interface eth-trunk 101 [*Leaf-CE6851HI-3-Eth-Trunk101] mode lacp-static [*Leaf-CE6851HI-3-Eth-Trunk101] port defaultvlan 10 [*Leaf-CE6851HI-3-Eth-Trunk101] trunkport 10ge 1/0/45 [*Leaf-CE6851HI-3-Eth-Trunk101] dfs-group1 m-lag 41 [*Leaf-CE6851HI-3-Eth-Trunk101] quit [*Leaf-CE6851HI-4] interface eth-trunk 101 [*Leaf-CE6851HI-4-Eth-Trunk101] mode lacp-static [*Leaf-CE6851HI-4-Eth-Trunk101] port default vlan 10 [*Leaf-CE6851HI-4-Eth-Trunk101] trunkport 10ge 1/0/45 [*Leaf-CE6851HI-4-Eth-Trunk101] dfs-group1 m-lag 41 [*Leaf-CE6851HI-4-Eth-Trunk101] quit [*Leaf-CE6851HI-4] commit [~Leaf-CE6851HI-3] interface eth-trunk 102 [*Leaf-CE6851HI-3-Eth-Trunk102] mode lacp-static [*Leaf-CE6851HI-3-Eth-Trunk102] port default vlan 10 [*Leaf-CE6851HI-3-Eth-Trunk102] trunkport 10ge 1/0/46 [*Leaf-CE6851HI-3-Eth-Trunk102] dfs-group1 m-lag 42 [*Leaf-CE6851HI-3-Eth-Trunk102] quit [*Leaf-CE6851HI-4] interface eth-trunk 102 [*Leaf-CE6851HI-4-Eth-Trunk102] mode lacp-static [*Leaf-CE6851HI-4-Eth-Trunk102]port default vlan 10 [*Leaf-CE6851HI-4-Eth-Trunk102] trunkport 10ge 1/0/46 [*Leaf-CE6851HI-4-Eth-Trunk102] dfs-group1 m-lag 42 [*Leaf-CE6851HI-4-Eth-Trunk102] quit [*Leaf-CE6851HI-4] commit NOTE If the AC-DCN connects to the M-LAG in active/standby mode, the interface on the access switch connecting to the AC-DCN cannot be a member interface of the M-LAG. Only VLAN needs to be configured on the ports. Step 6 Associate uplink and downlink interfaces with a Monitor Link group on Leaf-CE6851HI-3 and Leaf-CE6851HI-4 to prevent a user-side traffic forwarding failure on a device in case all uplinks on the device fail. [~Leaf-CE6851HI-3] monitor-link group 1 [*Leaf-CE6851HI-3-mtlk-group1] port 40GE1/0/3 uplink [*Leaf-CE6851HI-3-mtlk-group1] port 40GE1/0/4 uplink [*Leaf-CE6851HI-3-mtlk-group1] port 10GE1/0/1 downlink 1 [~Leaf-CE6851HI-4] monitor-link group 1 [*Leaf-CE6851HI-4-mtlk-group1] port 40GE1/0/3 uplink [*Leaf-CE6851HI-4-mtlk-group1] port 40GE1/0/4 uplink [*Leaf-CE6851HI-4-mtlk-group1] port 10GE1/0/1 downlink 1 ----End Configuring Routes Step 1 Configure BGP routes on Leaf-CE6851HI-3 to interconnect Leaf-CE6851HI-3 with the spine devices. [~Leaf-CE6851HI-3]BGP 65022 [*Leaf-CE6851HI-3-bgp] router-id 13.13.13.13 [*Leaf-CE6851HI-3-bgp] timer keepalive 10 hold 30 [*Leaf-CE6851HI-3-bgp] group Spine-CE12804-1 external [*Leaf-CE6851HI-3-bgp] peer Spine-CE12804-1 as-number 65009 [*Leaf-CE6851HI-3-bgp] peer 11.254.41.158 as-number 65009 [*Leaf-CE6851HI-3-bgp] peer 11.254.41.158 group Spine-CE12804-1 [*Leaf-CE6851HI-3-bgp] group Spine-CE12804-2 external [*Leaf-CE6851HI-3-bgp] peer Spine-CE12804-2 as-number 65010 [*Leaf-CE6851HI-3-bgp] peer 11.254.41.166 as-number 65010 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 117 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network [*Leaf-CE6851HI-3-bgp] peer 11.254.41.166 group Spine-CE12804-2 [*Leaf-CE6851HI-3-bgp] ipv4-family unicast [*Leaf-CE6851HI-3-bgp-af-ipv4] preference 20 200 10 [*Leaf-CE6851HI-3-bgp-af-ipv4] network 11.11.11.12 255.255.255.255 [*Leaf-CE6851HI-3-bgp-af-ipv4] network 100.125.100.0 255.255.255.0 [*Leaf-CE6851HI-3-bgp-af-ipv4] network 13.13.13.13 255.255.255.255 [*Leaf-CE6851HI-3-bgp-af-ipv4] maximum load-balancing 32 [*Leaf-CE6851HI-3-bgp-af-ipv4] quit [*Leaf-CE6851HI-3-bgp] quit [*Leaf-CE6851HI-3] commit Step 2 Configure BGP routes on Leaf-CE6851HI-4 to interconnect Leaf-CE6851HI-4 with the spine devices. [~Leaf-CE6851HI-4]BGP 65023 [*Leaf-CE6851HI-4-bgp] router-id 14.14.14.14 [*Leaf-CE6851HI-4-bgp] timer keepalive 10 hold 30 [*Leaf-CE6851HI-4-bgp] group Spine-CE12804-1 external [*Leaf-CE6851HI-4-bgp] peer Spine-CE12804-1 as-number 65009 [*Leaf-CE6851HI-4-bgp] peer 11.254.41.170 as-number 65009 [*Leaf-CE6851HI-4-bgp] peer 11.254.41.170 group Spine-CE12804-1 [*Leaf-CE6851HI-4-bgp] group Spine-CE12804-2 external [*Leaf-CE6851HI-4-bgp] peer Spine-CE12804-2 as-number 65010 [*Leaf-CE6851HI-4-bgp] peer 11.254.41.162 as-number 65010 [*Leaf-CE6851HI-4-bgp] peer 11.254.41.162 group Spine-CE12804-2 [*Leaf-CE6851HI-4-bgp] ipv4-family unicast [*Leaf-CE6851HI-4-bgp-af-ipv4] preference 20 200 10 [*Leaf-CE6851HI-4-bgp-af-ipv4] network 11.11.11.12 255.255.255.255 [*Leaf-CE6851HI-4-bgp-af-ipv4] network 100.125.100.0 255.255.255.0 [*Leaf-CE6851HI-4-bgp-af-ipv4] network 14.14.14.14 255.255.255.255 [*Leaf-CE6851HI-4-bgp-af-ipv4] maximum load-balancing 32 [*Leaf-CE6851HI-4-bgp-af-ipv4] quit [*Leaf-CE6851HI-4-bgp] quit [*Leaf-CE6851HI-4] commit NOTE To access the AC-DCN server from an external network, configure static or dynamic routes on TOR switches to advertise the service address of the AC-DCN server, so that external networks can access this server and TOR switches can access external networks through the routes. ----End 4.2.3.4 Configuring Spine Nodes Configure addresses and routes for the uplink and downlink interconnection interfaces on the two spine nodes to enable the underlay network communication at Layer 3. The configuration roadmap is as follows: 1. Configuring IP addresses: On the spine nodes, configure IP addresses for interfaces that connect to the leaf nodes and gateways, the management interfaces Meth0/0/0, and the loopback interfaces (the IP address is used as the Router-ID). 2. Configuring routes: Configure BGP dynamic routes on the spine nodes to connect the spine devices to the two stacked switches (leaf nodes), two M-LAG switches (leaf nodes), and two M-LAG gateways. Ensure that the routes are reachable at Layer 3. Configuring IP Addresses Step 1 Configure IP addresses for interconnection the interfaces. # Configure IP addresses for interfaces on Spine-CE12804-1. [~HUAWEI] sysname Spine-CE12804-1 [*Spine-CE12804-1] commit [~Spine-CE12804-1] interface 40GE1/0/0 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 118 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network [~Spine-CE12804-1-40GE1/0/0] undo portswitch [*Spine-CE12804-1-40GE1/0/0] ip address 11.254.40.158 30 [*Spine-CE12804-1-40GE1/0/0] commit [~Spine-CE12804-1-40GE1/0/0]quit [~Spine-CE12804-1] interface 40GE1/0/1 [~Spine-CE12804-1-40GE1/0/1] undo portswitch [*Spine-CE12804-1-40GE1/0/1] ip address 11.254.40.170 30 [*Spine-CE12804-1-40GE1/0/1] commit [~Spine-CE12804-1-40GE1/0/1] quit [~Spine-CE12804-1] interface 40GE1/0/2 [~Spine-CE12804-1] description "to-Leaf-CE6851-3-40GE1/0/3" [~Spine-CE12804-1-40GE1/0/2] undo portswitch [*Spine-CE12804-1-40GE1/0/2] ip address 11.254.41.158 30 [*Spine-CE12804-1-40GE1/0/2] commit [~Spine-CE12804-1-40GE1/0/2] quit [~Spine-CE12804-1] interface 40GE1/0/3 [*Spine-CE12804-1] description "to-Leaf-CE6851-4-40GE1/0/4" [~Spine-CE12804-1-40GE1/0/3] undo portswitch [*Spine-CE12804-1-40GE1/0/3] ip address 11.254.41.170 30 [*Spine-CE12804-1-40GE1/0/3] commit [~Spine-CE12804-1-40GE1/0/3] quit [~Spine-CE12804-1] interface 40GE1/0/4 [~Spine-CE12804-1-40GE1/0/4] undo portswitch [*Spine-CE12804-1-40GE1/0/4] ip address 11.254.42.157 30 [*Spine-CE12804-1-40GE1/0/4] commit [~Spine-CE12804-1-40GE1/0/4] quit [~Spine-CE12804-1] interface 40GE1/0/5 [~Spine-CE12804-1-40GE1/0/5] undo portswitch [*Spine-CE12804-1-40GE1/0/5] ip address 11.254.42.161 30 [*Spine-CE12804-1-40GE1/0/5] commit [~Spine-CE12804-1-40GE1/0/5] quit # Configure IP addresses for interfaces on Spine-CE12804-2. [~HUAWEI] sysname Spine-CE12804-2 [*Spine-CE12804-2] commit [~Spine-CE12804-2] interface 40GE1/0/0 [~Spine-CE12804-2-40GE1/0/0] undo portswitch [*Spine-CE12804-2-40GE1/0/0] ip address 11.254.40.162 30 [*Spine-CE12804-2-40GE1/0/0] commit [~Spine-CE12804-2-40GE1/0/0] quit [~Spine-CE12804-2] interface 40GE1/0/1 [~Spine-CE12804-2-40GE1/0/1] undo portswitch [*Spine-CE12804-2-40GE1/0/1] ip address 11.254.40.166 30 [*Spine-CE12804-2-40GE1/0/1] commit [~Spine-CE12804-2-40GE1/0/1] quit [~Spine-CE12804-2] interface 40GE1/0/2 [*Spine-CE12804-2] description "to-Leaf-CE6851-4-40GE1/0/3" [~Spine-CE12804-2-40GE1/0/2] undo portswitch [*Spine-CE12804-2-40GE1/0/2] ip address 11.254.41.162 30 [*Spine-CE12804-2-40GE1/0/2] commit [~Spine-CE12804-2-40GE1/0/2] quit [~Spine-CE12804-2] interface 40GE1/0/3 [*Spine-CE12804-2] description "to-Leaf-CE6851-3-40GE1/0/4" [~Spine-CE12804-2-40GE1/0/3] undo portswitch [*Spine-CE12804-2-40GE1/0/3] ip address 11.254.41.166 30 [*Spine-CE12804-2-40GE1/0/3] commit [~Spine-CE12804-2-40GE1/0/3] quit [~Spine-CE12804-2] interface 40GE1/0/4 [~Spine-CE12804-2-40GE1/0/4] undo portswitch [*Spine-CE12804-2-40GE1/0/4] ip address 11.254.43.157 30 [*Spine-CE12804-2-40GE1/0/4] commit [~Spine-CE12804-2-40GE1/0/4]quit [~Spine-CE12804-2] interface 40GE1/0/5 [~Spine-CE12804-2-40GE1/0/5] undo portswitch [*Spine-CE12804-2-40GE1/0/5] ip address 11.254.43.161 30 [*Spine-CE12804-2-40GE1/0/5] commit [~Spine-CE12804-2-40GE1/0/5] quit Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 119 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Step 2 Configure IP addresses for the management interfaces. [~Spine-CE12804-1] [*Spine-CE12804-1[*Spine-CE12804-1[~Spine-CE12804-1- interface Meth0/0/0 Meth0/0/0] ip address 100.125.94.5 24 Meth0/0/0] commit Meth0/0/0] quit [~Spine-CE12804-2] [*Spine-CE12804-2[*Spine-CE12804-2[~Spine-CE12804-2- interface Meth0/0/0 Meth0/0/0] ip address 100.125.94.6 24 Meth0/0/0] commit Meth0/0/0] quit Step 3 Configure IP addresses for the loopback interfaces. [~Spine-CE12804-1] interface [*Spine-CE12804-1-LoopBack0] [*Spine-CE12804-1-LoopBack0] [~Spine-CE12804-1-LoopBack0] loopback0 ip address 11.11.11.14 32 commit quit [~Spine-CE12804-2] interface [*Spine-CE12804-2-LoopBack0] [*Spine-CE12804-2-LoopBack0] [~Spine-CE12804-2-LoopBack0] loopback0 ip address 11.11.11.15 32 commit quit ----End Configuring Routes Step 1 Configure BGP routes on Spine-CE12804-1. [~Spine-CE12804-1]BGP 65009 [*Spine-CE12804-1-bgp] router-id 11.11.11.14 [*Spine-CE12804-1-bgp] timer keepalive 10 hold 30 [*Spine-CE12804-1-bgp] group Leaf-CE6851HI-1&CE6851HI-2 external [*Spine-CE12804-1-bgp] peer Leaf-CE6851HI-1&CE6851HI-2 as-number 65021 [*Spine-CE12804-1-bgp] peer 11.254.40.157 as-number 65021 [*Spine-CE12804-1-bgp] peer 11.254.40.157 group Leaf-CE6851HI-1&CE6851HI-2 [*Spine-CE12804-1-bgp] peer 11.254.40.169 as-number 65021 [*Spine-CE12804-1-bgp] peer 11.254.40.169 group Leaf-CE6851HI-1&CE6851HI-2 [*Spine-CE12804-1-bgp] group Leaf-CE6851HI-3 external [*Spine-CE12804-1-bgp] peer Leaf-CE6851HI-3 as-number 65022 [*Spine-CE12804-1-bgp] peer 11.254.41.157 as-number 65022 [*Spine-CE12804-1-bgp] peer 11.254.41.157 group Leaf-CE6851HI-3 [*Spine-CE12804-1-bgp] group Leaf-CE6851HI-4 external [*Spine-CE12804-1-bgp] peer Leaf-CE6851HI-4 as-number 65023 [*Spine-CE12804-1-bgp] peer 11.254.41.169 as-number 65023 [*Spine-CE12804-1-bgp] peer 11.254.41.169 group Leaf-CE6851HI-4 [*Spine-CE12804-1-bgp] group Gateway-CE12808-1 external [*Spine-CE12804-1-bgp] peer Gateway-CE12808-1 as-number 65000 [*Spine-CE12804-1-bgp] peer 11.254.42.158 as-number 65000 [*Spine-CE12804-1-bgp] peer 11.254.42.158 group Gateway-CE12808-1 [*Spine-CE12804-1-bgp] group Gateway-CE12808-2 external [*Spine-CE12804-1-bgp] peer Gateway-CE12808-2 as-number 65001 [*Spine-CE12804-1-bgp] peer 11.254.42.162 as-number 65001 [*Spine-CE12804-1-bgp] peer 11.254.42.162 group Gateway-CE12808-2 [*Spine-CE12804-1-bgp] ipv4-family unicast [*Spine-CE12804-1-bgp-af-ipv4] preference 20 200 10 [*Spine-CE12804-1-bgp-af-ipv4] network 11.11.11.14 255.255.255.255 [*Spine-CE12804-1-bgp-af-ipv4] maximum load-balancing 32 [*Spine-CE12804-1-bgp-af-ipv4] quit [*Spine-CE12804-1-bgp] quit [*Spine-CE12804-1] commit Step 2 Configure BGP routes on Spine-CE12804-2. [~Spine-CE12804-2]BGP 65010 [*Spine-CE12804-2-bgp] router-id 11.11.11.15 [*Spine-CE12804-2-bgp] timer keepalive 10 hold 30 [*Spine-CE12804-2-bgp] group Leaf-CE6851HI-1&CE6851HI-2 external [*Spine-CE12804-2-bgp] peer Leaf-CE6851HI-1&CE6851HI-2 as-number 65021 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 120 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network [*Spine-CE12804-2-bgp] peer 11.254.40.165 as-number 65021 [*Spine-CE12804-2-bgp] peer 11.254.40.165 group Leaf-CE6851HI-1&CE6851HI-2 [*Spine-CE12804-2-bgp] peer 11.254.40.161 as-number 65021 [*Spine-CE12804-2-bgp] peer 11.254.40.161 group Leaf-CE6851HI-1&CE6851HI-2 [*Spine-CE12804-2-bgp] group Leaf-CE6851HI-3 external [*Spine-CE12804-2-bgp] peer Leaf-CE6851HI-3 as-number 65022 [*Spine-CE12804-2-bgp] peer 11.254.41.165 as-number 65022 [*Spine-CE12804-2-bgp] peer 11.254.41.165 group Leaf-CE6851HI-3 [*Spine-CE12804-2-bgp] group Leaf-CE6851HI-4 external [*Spine-CE12804-2-bgp] peer Leaf-CE6851HI-4 as-number 65023 [*Spine-CE12804-2-bgp] peer 11.254.41.161 as-number 65023 [*Spine-CE12804-2-bgp] peer 11.254.41.161 group Leaf-CE6851HI-4 [*Spine-CE12804-2-bgp] group Gateway-CE12808-1 external [*Spine-CE12804-2-bgp] peer Gateway-CE12808-1 as-number 65000 [*Spine-CE12804-2-bgp] peer 11.254.43.158 as-number 65000 [*Spine-CE12804-2-bgp] peer 11.254.43.158 group Gateway-CE12808-1 [*Spine-CE12804-2-bgp] group Gateway-CE12808-2 external [*Spine-CE12804-2-bgp] peer Gateway-CE12808-2 as-number 65001 [*Spine-CE12804-2-bgp] peer 11.254.43.162 as-number 65001 [*Spine-CE12804-2-bgp] peer 11.254.43.162 group Gateway-CE12808-2 [*Spine-CE12804-2-bgp] ipv4-family unicast [*Spine-CE12804-2-bgp-af-ipv4] preference 20 200 10 [*Spine-CE12804-2-bgp-af-ipv4] network 11.11.11.15 255.255.255.255 [*Spine-CE12804-2-bgp-af-ipv4] maximum load-balancing 32 [*Spine-CE12804-2-bgp-af-ipv4] quit [*Spine-CE12804-2-bgp] quit [*Spine-CE12804-2] commit ----End 4.2.3.5 Configuring a Gateway M-LAG Configure Gateway-CE12808-1 and Gateway-CE12808-2 to set up an M-LAG. The configuration roadmap is as follows: 1. Configuring IP addresses: Configure IP addresses for interfaces that connect to the spine nodes, the management VLANs of the firewalls, the Loopback0 interfaces (the IP address is used as the VTEP IP address), the Loopback1 interfaces (the IP address is used as Router-ID), the management interfaces Meth0/0/0, and the NVE1 interfaces (the same IP address shall be configured for the two devices, and the IP address is the VTEP IP address). 2. Configuring the M-LAG: On the gateways, configure a global M-LAG, a DFS group, and peer-links, and configure VLANs for management and interconnection interfaces, and service links between the M-LAG and firewalls. 3. Configuring routes: Configure BGP dynamic routes on the gateways to connect the gateways to the spine devices and ensure that the routes are reachable at Layer 3. Configure routes between the gateways and external routers. 4. Configuring a MAC address flapping whitelist: On the gateways, configure a whitelist for the MAC addresses of the Layer 3 interfaces on the gateways that connect to the spine devices. MAC address flapping detection will not be performed for the MAC addresses in the whitelist. 5. Configure interconnection between the gateways and external routers to form a squareshaped ring egress network: Set interface addresses to interconnect the gateways with the external routers, set interface addresses to interconnect the gateways, and set egress routing protocols on the gateways. (The configurations on the external routers are similar to those on the gateways, and are not provided here.) Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 121 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Configuring IP Addresses Step 1 Configure IP addresses for gateway interfaces. # Configure IP addresses for interfaces on Gateway-CE12808-1. [~Gateway-CE12808-1] interface 40GE1/0/0//Connect the interface to a spine node. [~Gateway-CE12808-1-40GE1/0/0] undo portswitch [*Gateway-CE12808-1-40GE1/0/0] ip address 11.254.42.158 30 [*Gateway-CE12808-1-40GE1/0/0] commit [~Gateway-CE12808-1-40GE1/0/0]quit [~Gateway-CE12808-1] interface 40GE1/0/1 //Connect the interface to another spine node. [~Gateway-CE12808-1-40GE1/0/1] undo portswitch [*Gateway-CE12808-1-40GE1/0/1] ip address 11.254.43.162 30 [*Gateway-CE12808-1-40GE1/0/1] commit [~Gateway-CE12808-1-40GE1/0/1] quit [*Gateway-CE12808-1] vlan batch 11 [~Gateway-CE12808-1] interface vlanif 11//Configure the VLAN for management and interconnection between the gateway and firewalls. [*Gateway-CE12808-1-vlanif11] description "to firewall-1~2" [*Gateway-CE12808-1-vlanif11] ip address 11.254.45.154 29 [*Gateway-CE12808-1-vlanif11] vrrp vrid 1 virtual-ip 11.254.45.153 [*Gateway-CE12808-1-vlanif11] commit [~Gateway-CE12808-1-vlanif11] quit # Configure IP addresses for interfaces on Gateway-CE12808-2. [~Gateway-CE12808-2] interface 40GE1/0/0//Connect the interface to a spine node. [~Gateway-CE12808-2-40GE1/0/0] undo portswitch [*Gateway-CE12808-2-40GE1/0/0] ip address 11.254.42.162 30 [*Gateway-CE12808-2-40GE1/0/0] commit [~Gateway-CE12808-2-40GE1/0/0]quit [~Gateway-CE12808-2] interface 40GE1/0/1 //Connect the interface to another spine node. [~Gateway-CE12808-2-40GE1/0/1] undo portswitch [*Gateway-CE12808-2-40GE1/0/1] ip address 11.254.43.158 30 [*Gateway-CE12808-2-40GE1/0/1] commit [~Gateway-CE12808-2-40GE1/0/1] quit [~Gateway-CE12808-2] vlan batch 11 [*Gateway-CE12808-2] interface vlanif 11//Configure the VLAN for management and interconnection between the gateway and firewalls. [*Gateway-CE12808-2-vlanif11] description "to firewall-1-2" [*Gateway-CE12808-2-vlanif11] ip address 11.254.45.155 29 [*Gateway-CE12808-2-vlanif11] vrrp vrid 1 virtual-ip 11.254.45.153 [*Gateway-CE12808-2-vlanif11] commit [*Gateway-CE12808-2-vlanif11] quit Step 2 Configure IP addresses for the loopback interfaces. [~Gateway-CE12808-1] interface IP address. [*Gateway-CE12808-1-LoopBack0] [*Gateway-CE12808-1-LoopBack0] [~Gateway-CE12808-1-LoopBack0] [~Gateway-CE12808-1] interface [*Gateway-CE12808-1-LoopBack1] [*Gateway-CE12808-1-LoopBack1] [~Gateway-CE12808-1-LoopBack1] [~Gateway-CE12808-1] interface [*Gateway-CE12808-1-LoopBack2] [*Gateway-CE12808-1-LoopBack2] [~Gateway-CE12808-1-LoopBack2] [~Gateway-CE12808-2] interface IP address. [*Gateway-CE12808-2-LoopBack0] [*Gateway-CE12808-2-LoopBack0] [~Gateway-CE12808-2-LoopBack0] [~Gateway-CE12808-2] interface [*Gateway-CE12808-2-LoopBack1] Issue 03 (2017-05-08) loopback0 //The IP address is used as the VTEP ip address 11.11.11.16 32 commit quit loopback1 ip address 18.18.18.18 32 commit quit loopback2 ip address 21.21.21.21 32 commit quit loopback0 //The IP address is used as the VTEP ip address 11.11.11.16 32 commit quit loopback1 ip address 19.19.19.19 32 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 122 Configuration Examples for the Financial Industry [*Gateway-CE12808-2-LoopBack1] [~Gateway-CE12808-2-LoopBack1] [~Gateway-CE12808-2] interface [*Gateway-CE12808-2-LoopBack2] [*Gateway-CE12808-2-LoopBack2] [~Gateway-CE12808-2-LoopBack2] 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network commit quit loopback2 ip address 22.22.22.22 32 commit quit Step 3 Configure IP addresses for the management interfaces. [~Gateway-CE12808-1] interface Meth0/0/0 [*Gateway-CE12808-1-Meth0/0/0] ip address 100.125.94.7 24 [*Gateway-CE12808-1- Meth0/0/0] commit [~Gateway-CE12808-1- Meth0/0/0] quit [~Gateway-CE12808-2] interface Meth0/0/0 [*Gateway-CE12808-2-Meth0/0/0] ip address 100.125.94.8 24 [*Gateway-CE12808-2- Meth0/0/0] commit [~Gateway-CE12808-2- Meth0/0/0] quit Step 4 Configure the VTEP IP address. [~Gateway-CE12808-1] interface NVE1 [*Gateway-CE12808-1-Nve1] source 11.11.11.16 [*Gateway-CE12808-1-Nve1] commit [~Gateway-CE12808-1-Nve1] quit [~Gateway-CE12808-2] interface NVE1 [*Gateway-CE12808-2-Nve1] source 11.11.11.16 [*Gateway-CE12808-2-Nve1] commit [~Gateway-CE12808-2-Nve1] quit ----End Configuring an M-LAG Step 1 Configure an M-LAG. < Gateway-CE12808-1> [~Gateway-CE12808-1] [*Gateway-CE12808-1] [*Gateway-CE12808-1] system-view stp mode rstp stp v-stp enable lacp m-lag priority 10 [~Gateway-CE12808-1] lacp m-lag system-id 00e0-fc00-0101 //You are advised to set system-id to the MAC address of the system on the master device of the M-LAG. Set system-id on the remote device to the same value. You can run the display system mac-address command to check the MAC address of a system. [*Gateway-CE12808-1] commit <Gateway-CE12808-2> system-view [~Gateway-CE12808-2] stp mode rstp [*Gateway-CE12808-2] stp v-stp enable [*Gateway-CE12808-2] commit [*Gateway-CE12808-1] lacp m-lag priority 10 [~Gateway-CE12808-2] lacp m-lag system-id 00e0-fc00-0101 [*Gateway-CE12808-2] commit Step 2 Create DFS groups and configure Gateway-CEE12808-1 and Gateway-CEE12808-2 to work in dual-active mode. [~Gateway-CE12808-1] dfs-group 1 [*Gateway-CE12808-1-dfs-group-1] source ip 18.18.18.18 [*Gateway-CE12808-1-dfs-group-1] priority 150 [*Gateway-CE12808-1-dfs-group-1] active-active-gateway [*Gateway-CE12808-1-dfs-group-1-active-active-gateway] peer 19.19.19.19 [*Gateway-CE12808-1-dfs-group-1-active-active-gateway] quit [*Gateway-CE12808-1-dfs-group-1] quit [*Gateway-CE12808-1] commit [*Gateway-CE12808-2] dfs-group 1 [*Gateway-CE12808-2-dfs-group-1] source ip 19.19.19.19 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 123 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network [*Gateway-CE12808-2-dfs-group-1] priority 120 [*Gateway-CE12808-2-dfs-group-1] active-active-gateway [*Gateway-CE12808-1-dfs-group-1-active-active-gateway] peer 18.18.18.18 [*Gateway-CE12808-2-dfs-group-1-active-active-gateway] quit [*Gateway-CE12808-2-dfs-group-1] quit [*Gateway-CE12808-2] commit Step 3 Configure peer-links of the M-LAG on Gateway-CE12808-1 and Gateway-CE12808-2. [*Gateway-CE12808-1] interface eth-trunk 0 [*Gateway-CE12808-1-Eth-Trunk0] trunkport 40ge 1/0/23 [*Gateway-CE12808-1-Eth-Trunk0] trunkport 40ge 2/0/23 [*Gateway-CE12808-1-Eth-Trunk0] mode lacp-static [*Gateway-CE12808-1-Eth-Trunk0] peer-link 1 [*Gateway-CE12808-1-Eth-Trunk0] quit [*Gateway-CE12808-1] commit [*Gateway-CE12808-2] interface eth-trunk 0 [*Gateway-CE12808-2-Eth-Trunk0] trunkport 40ge 1/0/23 [*Gateway-CE12808-2-Eth-Trunk0] trunkport 40ge 2/0/23 [*Gateway-CE12808-2-Eth-Trunk0] mode lacp-static [*Gateway-CE12808-2-Eth-Trunk0] peer-link 1 [*Gateway-CE12808-2-Eth-Trunk0] quit [*Gateway-CE12808-2] commit Step 4 Configure the M-LAG member interfaces (interconnecting with firewall instances) on Gateway-CE12808-1 and Gateway-CE12808-2. # Configure interconnection between Gateway-CE12808-1 and the firewalls. [*Gateway-CE12808-1] interface eth-trunk 20 [*Gateway-CE12808-1] description "to-FW-USG9560-1-GE1/0/1" [*Gateway-CE12808-1-Eth-Trunk20] port default vlan 11 [*Gateway-CE12808-1-Eth-Trunk20] trunkport 10ge 3/0/0 [*Gateway-CE12808-1-Eth-Trunk20] dfs-group 1 m-lag 1 [*Gateway-CE12808-1-Eth-Trunk20] quit [*Gateway-CE12808-1] interface eth-trunk 30 [*Gateway-CE12808-1] description "to-FW-USG9560-2-GE1/0/1" [*Gateway-CE12808-1-Eth-Trunk30] port default vlan 11 [*Gateway-CE12808-1-Eth-Trunk30] trunkport 10ge 3/0/1 [*Gateway-CE12808-1-Eth-Trunk30] dfs-group 1 m-lag 2 [*Gateway-CE12808-1-Eth-Trunk30] quit [*Gateway-CE12808-1] commit [*Gateway-CE12808-1] interface eth-trunk 21 //Configure service links between the gateway and firewalls. The AC-DCN delivers the interconnection IP addresses, VLANs, and routes. You need to connect the cables and configure Eth-Trunks and the M-LAG. [*Gateway-CE12808-1] description "to-FW-USG9560-1-GE1/0/3" [*Gateway-CE12808-1-Eth-Trunk21] port link-type trunk [*Gateway-CE12808-1-Eth-Trunk21] undo port trunk allow-pass vlan 1 [*Gateway-CE12808-1-Eth-Trunk21] trunkport 10ge 3/0/2 [*Gateway-CE12808-1-Eth-Trunk21] dfs-group 1 m-lag 3 [*Gateway-CE12808-1-Eth-Trunk21] quit [*Gateway-CE12808-1] interface eth-trunk 31 [*Gateway-CE12808-1] description "to-FW-USG9560-2-GE1/0/3" [*Gateway-CE12808-1-Eth-Trunk31] port link-type trunk [*Gateway-CE12808-1-Eth-Trunk31] undo port trunk allow-pass vlan 1 [*Gateway-CE12808-1-Eth-Trunk31] trunkport 10ge 3/0/3 [*Gateway-CE12808-1-Eth-Trunk31] dfs-group 1 m-lag 4 [*Gateway-CE12808-1-Eth-Trunk31] quit [*Gateway-CE12808-1] commit # Configure interconnection between Gateway-CE12808-2 and the firewalls. [*Gateway-CE12808-2] interface eth-trunk 20 [*Gateway-CE12808-2] description "to-FW-USG9560-1-GE1/0/2" [*Gateway-CE12808-2-Eth-Trunk20] port default vlan 11 [*Gateway-CE12808-2-Eth-Trunk20] trunkport 10ge 3/0/0 [*Gateway-CE12808-2-Eth-Trunk20] dfs-group 1 m-lag 1 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 124 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network [*Gateway-CE12808-2-Eth-Trunk20] quit [*Gateway-CE12808-2] interface eth-trunk 30 [*Gateway-CE12808-2] description "to-FW-USG9560-2-GE1/0/2" [*Gateway-CE12808-2-Eth-Trunk30] port default vlan 11 [*Gateway-CE12808-2-Eth-Trunk30] trunkport 10ge 3/0/1 [*Gateway-CE12808-2-Eth-Trunk30] dfs-group 1 m-lag 2 [*Gateway-CE12808-2-Eth-Trunk30] quit [*Gateway-CE12808-2] commit [*Gateway-CE12808-2] interface eth-trunk 21 //Configure service links between the gateway and firewalls. The AC-DCN delivers the interconnection IP addresses, VLANs, and routes. You need to connect the cables and configure Eth-Trunks and the M-LAG. [*Gateway-CE12808-2] description "to-FW-USG9560-1-GE1/0/4" [*Gateway-CE12808-2-Eth-Trunk21] port link-type trunk [*Gateway-CE12808-2-Eth-Trunk21] trunkport 10ge 3/0/2 [*Gateway-CE12808-2-Eth-Trunk21] dfs-group 1 m-lag 3 [*Gateway-CE12808-2-Eth-Trunk21] quit [*Gateway-CE12808-2] interface eth-trunk 31 [*Gateway-CE12808-2] description "to-FW-USG9560-2-GE1/0/4" [*Gateway-CE12808-2-Eth-Trunk31] port link-type trunk [*Gateway-CE12808-2-Eth-Trunk31] trunkport 10ge 3/0/3 [*Gateway-CE12808-2-Eth-Trunk31] dfs-group 1 m-lag 4 [*Gateway-CE12808-2-Eth-Trunk31] quit [*Gateway-CE12808-2] commit NOTE In an SDN scenario where firewalls interconnect with gateways in M-LAG mode, the LAG mode can only be manual load balancing mode. ----End Configuring Routes Step 1 Configure BGP routes on Gateway-CE12808-1 to set up routes for the underlay network. [~Gateway-CE12808-1]BGP 65000 [*Gateway-CE12808-1-bgp] router-id 18.18.18.18 [*Gateway-CE12808-1-bgp] timer keepalive 10 hold 30 [*Gateway-CE12808-1-bgp] group Spine-CE12804-1 external //Configure the route to connect the gateway to Spine-CE12804-1. [*Gateway-CE12808-1-bgp] peer Spine-CE12804-1 as-number 65009 [*Gateway-CE12808-1-bgp] peer 11.254.42.157 as-number 65009 [*Gateway-CE12808-1-bgp] peer 11.254.42.157 group Spine-CE12804-1 [*Gateway-CE12808-1-bgp] group Spine-CE12804-2 external [*Gateway-CE12808-1-bgp] peer Spine-CE12804-2 as-number 65010 [*Gateway-CE12808-1-bgp] peer 11.254.43.161 as-number 65010 [*Gateway-CE12808-1-bgp] peer 11.254.43.161 group Spine-CE12804-2 [*Gateway-CE12808-1-bgp] ipv4-family unicast [*Gateway-CE12808-1-bgp-af-ipv4] preference 20 200 10 [*Gateway-CE12808-1-bgp-af-ipv4] network 11.11.11.16 255.255.255.255 [*Gateway-CE12808-1-bgp-af-ipv4] network 18.18.18.18 255.255.255.255 [*Gateway-CE12808-1-bgp-af-ipv4] network 11.254.45.152 255.255.255.248 [*Gateway-CE12808-1-bgp-af-ipv4] maximum load-balancing 32 [*Gateway-CE12808-1-bgp-af-ipv4] quit [*Gateway-CE12808-1-bgp] quit [*Gateway-CE12808-1] commit Step 2 Configure BGP routes on Gateway-CE12808-2 to set up routes for the underlay network. [~Gateway-CE12808-2]BGP 65001 [*Gateway-CE12808-2-bgp] router-id 19.19.19.19 [*Gateway-CE12808-2-bgp] timer keepalive 10 hold 30 [*Gateway-CE12808-2-bgp] peer Spine-CE12804-1 as-number 65009 [*Gateway-CE12808-2-bgp] peer 11.254.42.161 as-number 65009 [*Gateway-CE12808-2-bgp] peer 11.254.42.161 group Spine-CE12804-1 [*Gateway-CE12808-2-bgp] group Spine-CE12804-2 external [*Gateway-CE12808-2-bgp] peer Spine-CE12804-2 as-number 65010 [*Gateway-CE12808-2-bgp] peer 11.254.43.157 as-number 65010 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 125 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network [*Gateway-CE12808-2-bgp] peer 11.254.43.157 group Spine-CE12804-2 [*Gateway-CE12808-2-bgp] ipv4-family unicast [*Gateway-CE12808-2-bgp-af-ipv4] preference 20 200 10 [*Gateway-CE12808-2-bgp-af-ipv4] network 11.11.11.16 255.255.255.255 [*Gateway-CE12808-2-bgp-af-ipv4] network 19.19.19.19 255.255.255.255 [*Gateway-CE12808-2-bgp-af-ipv4] network 11.254.45.152 255.255.255.248 [*Gateway-CE12808-2-bgp-af-ipv4] maximum load-balancing 32 [*Gateway-CE12808-2-bgp-af-ipv4] quit [*Gateway-CE12808-2-bgp] quit [*Gateway-CE12808-2] commit ----End Configuring a MAC Address Flapping Whitelist In Layer 3 architecture, when VXLAN traffic reaches a gateway through a spine device, a MAC address flapping alarm is generated because an incorrect MAC address is learned on the gateway due to product constraints. You need to configure a MAC address flapping whitelist on gateways and add MAC addresses of Layer 3 interfaces that connect spine devices to gateways to the whitelist. MAC address flapping detection will not be performed for the MAC addresses in the whitelist. The MAC addresses work as the outer source IP addresses of tunnel packets and cannot be learned. Therefore, the adjustment does not affect services. Step 1 Check the MAC addresses of Layer 3 interfaces that connect the two spine devices to gateways. [~Spine-CE12804-1] interface 40GE1/0/4 //Obtain the MAC address of the Layer 3 interface that connects Spine-CE12804-1 to a gateway. [*Spine-CE12804-1-40GE1/0/4] undo portswitch [~Spine-CE12804-1-40GE1/0/4] commit [~Spine-CE12804-1-40GE1/0/4] display this interface | include Hardware address IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 200b-c732-d202 [~Spine-CE12804-1-40GE1/0/4] quit [~Spine-CE12804-1] interface 40GE1/0/5 [*Spine-CE12804-1-40GE1/0/5] undo portswitch [~Spine-CE12804-1-40GE1/0/5] commit [~Spine-CE12804-1-40GE1/0/5] display this interface | include Hardware address IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 200b-c732-d202 [~Spine-CE12804-1-40GE1/0/5] quit [~Spine-CE12804-2] interface 40GE1/0/4 //Obtain the MAC address of the Layer 3 interface that connects Spine-CE12804-2 to a gateway. [*Spine-CE12804-2-40GE1/0/4] undo portswitch [~Spine-CE12804-2-40GE1/0/4] commit [~Spine-CE12804-2-40GE1/0/4] display this interface | include Hardware address IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 346a-c246-be01 [~Spine-CE12804-2-40GE1/0/4] quit [~Spine-CE12804-2] interface 40GE1/0/5 [*Spine-CE12804-2-40GE1/0/5] undo portswitch [~Spine-CE12804-2-40GE1/0/5] commit [~Spine-CE12804-2-40GE1/0/5] display this interface | include Hardware address IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 346a-c246-be01 [~Spine-CE12804-2-40GE1/0/5] quit Step 2 Configure a whitelist and add the MAC addresses obtained in Step 1. [~Gateway-CE12808-1] mac-address flapping detection exclude 200b-c732-d202 48 [~Gateway-CE12808-1] mac-address flapping detection exclude 346a-c246-be01 48 [~Gateway-CE12808-2] mac-address flapping detection exclude 200b-c732-d202 48 [~Gateway-CE12808-2] mac-address flapping detection exclude 346a-c246-be01 48 ----End Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 126 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Configuring Interconnection Between the Gateways and External Routers Step 1 Configure interfaces on the gateways to interconnect the gateways with external routers. # Configure an interface on Gateway-CE12808-1 to connect Gateway-CE12808-1 to Router-1. [~Gateway-CE12808-1] interface Eth-Trunk1 //Configure the interface to connect the gateway to an external PE device (Router-1). [*Gateway-CE12808-1-Eth-Trunk1] trunkport 10GE 3/0/4 [*Gateway-CE12808-1-Eth-Trunk1] trunkport 10GE 3/0/5 [*Gateway-CE12808-1-Eth-Trunk1] undo portswitch [*Gateway-CE12808-1-Eth-Trunk1] ip address 11.254.44.157 30 [*Gateway-CE12808-1-Eth-Trunk1] commit [~Gateway-CE12808-1-Eth-Trunk1] quit # Configure an interface on Gateway-CE12808-2 to connect Gateway-CE12808-2 to Router-2. [~Gateway-CE12808-2] interface Eth-Trunk1 //Configure the interface to connect the gateway to an external PE device (Router-2). [*Gateway-CE12808-2-Eth-Trunk1] trunkport 10GE 3/0/4 [*Gateway-CE12808-2-Eth-Trunk1] trunkport 10GE 3/0/5 [*Gateway-CE12808-2-Eth-Trunk1] undo portswitch [*Gateway-CE12808-2-Eth-Trunk1] ip address 11.254.44.161 30 [*Gateway-CE12808-2-Eth-Trunk1] commit [~Gateway-CE12808-2-Eth-Trunk1] quit Step 2 Configure Layer 3 interconnection interfaces on gateways to form a square-shaped ring network. # Configure an interface on Gateway-CE12808-1 to connect Gateway-CE12808-1 to Gateway-CE12808-2. [~Gateway-CE12808-1] interface 10GE3/0/6 //Configure the interface to connect the gateway to Gateway-CE12808-2. [*Gateway-CE12808-1-10GE3/0/6] undo portswitch [*Gateway-CE12808-1-10GE3/0/6] ip address 11.254.44.165 30 [*Gateway-CE12808-1-10GE3/0/6] commit [~Gateway-CE12808-1-10GE3/0/6] quit # Configure an interface on Gateway-CE12808-2 to connect Gateway-CE12808-2 to Gateway-CE12808-1. [~Gateway-CE12808-2] interface 10GE 3/0/6 //Configure the interface to connect the gateway to Gateway-CE12808-1. [*Gateway-CE12808-2-10GE3/0/6] undo portswitch [*Gateway-CE12808-2-10GE3/0/6] ip address 11.254.44.166 30 [*Gateway-CE12808-2-10GE3/0/6] commit [~Gateway-CE12808-2-10GE3/0/6 1] quit Step 3 Configure routes between the Loopback addresses of the gateways and those of external routers. Here, OSPF routes are configured. # Configure OSPF routes on Gateway-CE12808-1. [~Gateway-CE12808-1] ospf 1 router-id 18.18.18.18 [~Gateway-CE12808-1-ospf-1] area 0 [~Gateway-CE12808-1-ospf-1-area-0.0.0.0] network 11.254.44.156 0.0.0.3 [~Gateway-CE12808-1-ospf-1-area-0.0.0.0] network 22.22.22.21 0.0.0.0 [~Gateway-CE12808-1-ospf-1-area-0.0.0.0] commit [~Gateway-CE12808-1-ospf-1-area-0.0.0.0] quit # Configure OSPF routes on Gateway-CE12808-2. [~Gateway-CE12808-2] ospf 1 router-id 19.19.19.19 [~Gateway-CE12808-2-ospf-1] area 0 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 127 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network [~Gateway-CE12808-2-ospf-1-area-0.0.0.0] [~Gateway-CE12808-2-ospf-1-area-0.0.0.0] [~Gateway-CE12808-2-ospf-1-area-0.0.0.0] [~Gateway-CE12808-2-ospf-1-area-0.0.0.0] network 11.254.44.160 0.0.0.3 network 22.22.22.22 0.0.0.0 commit quit Step 4 Configure gateways to establish EBGP peer relationships with the external routers and the remote gateways. # On Gateway-CE12808-1, configure EBGP routes to Router-1 and Gateway-CE12808-2, respectively. [~Gateway-CE12808-1] BGP 65000 [*Gateway-CE12808-1-bgp] router-id 18.18.18.18 [*Gateway-CE12808-1-bgp] timer keepalive 10 hold 30 [*Gateway-CE12808-1-bgp] group Router-1 external //Configure the route to connect the gateway to Router-1. [*Gateway-CE12808-1-bgp] peer Router-1 as-number 65047 [*Gateway-CE12808-1-bgp] peer Router-1 ebgp-max-hop 10 [*Gateway-CE12808-1-bgp] peer Router-1 connect-interface LoopBack2 //Configure the local Loopback2 interface to establish a BGP peer relationship with Router-1. [*Gateway-CE12808-1-bgp] peer 21.21.21.22 as-number 65047 [*Gateway-CE12808-1-bgp] peer 21.21.21.22 group Router-1 [*Gateway-CE12808-1-bgp] group GW-2 external //Establish an EBGP peer relationship with Gateway-CE12808-2. [*Gateway-CE12808-1-bgp] peer GW-2 as-number 65001 [*Gateway-CE12808-1-bgp] peer 11.254.44.166 as-number 65001 [*Gateway-CE12808-2-bgp] peer 11.254.42.166 group GW-2 [*Gateway-CE12808-2-bgp] commit [*Gateway-CE12808-2-bgp] quit # On Gateway-CE12808-2, configure EBGP routes to Router-2 and Gateway-CE12808-1, respectively. [~Gateway-CE12808-2] BGP 65001 [*Gateway-CE12808-2-bgp] router-id 19.19.19.19 [*Gateway-CE12808-2-bgp] timer keepalive 10 hold 30 [*Gateway-CE12808-2-bgp] group Router-2 external //Configure the route to connect the gateway to Router-2. [*Gateway-CE12808-2-bgp] peer Router-2 as-number 65048 [*Gateway-CE12808-2-bgp] peer Router-2 ebgp-max-hop 10 [*Gateway-CE12808-2-bgp] peer Router-2 connect-interface LoopBack2 //Configure the local Loopback2 interface to establish a BGP peer relationship with Router-2. [*Gateway-CE12808-2-bgp] peer 22.22.22.23 as-number 65048 [*Gateway-CE12808-2-bgp] peer 22.22.22.23 group Router-2 [*Gateway-CE12808-1-bgp] group GW-1 external //Establish an EBGP peer relationship with Gateway-CE12808-1. [*Gateway-CE12808-1-bgp] peer GW-1 as-number 65000 [*Gateway-CE12808-1-bgp] peer 11.254.44.165 as-number 65000 [*Gateway-CE12808-2-bgp] peer 11.254.42.165 group GW-2 [*Gateway-CE12808-2-bgp] commit [*Gateway-CE12808-2-bgp] quit Step 5 Configure interconnections on Router-1 and Router-2 as follows: l Configure interfaces to interconnect with the gateways. l Configure interfaces to interconnect with the other external routers. l Configure OSPF routes between the loopback addresses of the external routers and those of the gateways. l Configure EBGP routes to establish EBGP peer relationships with the gateways. ----End 4.2.3.6 Configuring Firewalls Connect FW-USG9560-1 and FW-USG9560-2 to the gateways through service interfaces and configure management network segments to enable communications between the firewalls Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 128 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network and the AC-DCN. Connect the firewalls to the gateways through other service interfaces to establish service links. The two firewalls work in active/standby mirroring mode. Internal and external links can use one physical link or two independent physical links. In this chapter, one physical link is used as the internal and external links. The configuration roadmap is as follows: 1. Configure the heartbeat interfaces between two firewalls. 2. Configure two firewalls in hot standby mode. 3. Configure mirroring mode and hot standby management interfaces. 4. Run the hrp base config enable command and restart the firewalls. 5. Configure the interfaces for management and interconnection between the firewalls and gateways. 6. Configure the interfaces for service interconnection between the firewalls and gateways. 7. Add interfaces to security zones and configure a default inter-zone security policy. Figure 4-3 Interconnection between the firewalls and gateways NOTE Two firewalls in active/standby mirroring mode must use the same ports to connect to a gateway. For example, if FW-USG9560-1 connects to Gateway-CE12808-1 through GE1/0/1, FW-USG9560-2 shall connect to Gateway-CE12808-1 through GE1/0/1. Firewalls cannot connect to the AC-DCN through management Meth interfaces using NETCONF. The following configurations are automatically delivered by the AC-DCN, and no manual configuration is required: VLANs and addresses for interconnection between service links and gateways, routes and traffic diversion between the root firewall (public system) and virtual firewalls, and security zones, elastic IP addresses (EIPs), Source Network Address Translation (SNAT), and security policies for virtual firewalls. A default route cannot be configured on the root firewall (public system); otherwise, the configured default route will conflict with the default route delivered by the AC-DCN. Procedure Step 1 Configure the management interfaces that connect to the CE12808 series switches. <FW-USG9560-1> system-view [FW-USG9560-1] interface Eth-Trunk11 [FW-USG9560-1-Eth-Trunk11] description To-GW-CE12808 [FW-USG9560-1-Eth-Trunk11] ip address 11.254.45.156 29 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 129 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network [FW-USG9560-1-Eth-Trunk11] trunkport GigabitEthernet 1/0/1 to 1/0/2 [FW-USG9560-1-Eth-Trunk11] undo service-manage enable [FW-USG9560-1-Eth-Trunk11] quit <FW-USG9560-2> system-view [FW-USG9560-2] interface Eth-Trunk11 [FW-USG9560-2-Eth-Trunk11] description To-GW-CE12808 [FW-USG9560-2-Eth-Trunk11] ip address 11.254.45.157 29 [FW-USG9560-2-Eth-Trunk11] trunkport GigabitEthernet 1/0/1 to 1/0/2 [FW-USG9560-2-Eth-Trunk11] undo service-manage enable [FW-USG9560-2-Eth-Trunk11] quit Step 2 Configure the service interfaces that connect to the CE12808 series switches. <FW-USG9560-1> system-view [FW-USG9560-1] interface Eth-Trunk1 [FW-USG9560-1-Eth-Trunk1] description To-CE12808 [FW-USG9560-1-Eth-Trunk1] portswitch [FW-USG9560-1-Eth-Trunk1] trunkport GigabitEthernet 1/0/3 to 1/0/4 [FW-USG9560-1-Eth-Trunk1] undo service-manage enable [FW-USG9560-1-Eth-Trunk1] quit <FW-USG9560-2> system-view [FW-USG9560-2] interface Eth-Trunk1 [FW-USG9560-2-Eth-Trunk1] description To-CE12808 [FW-USG9560-1-Eth-Trunk1] portswitch [FW-USG9560-2-Eth-Trunk1] trunkport GigabitEthernet 1/0/3 to 1/0/4 [FW-USG9560-2-Eth-Trunk1] undo service-manage enable [FW-USG9560-2-Eth-Trunk1] quit Step 3 Configure heartbeat interfaces on the firewalls to implement dual-node hot-standby. # Configure heartbeat interfaces on FW-USG9560-1. <FW-USG9560-1> system-view [FW-USG9560-1] interface Eth-Trunk0 [FW-USG9560-1-Eth-Trunk0] ip address 1.1.1.1 255.255.255.252 [FW-USG9560-1-Eth-Trunk0] quit [FW-USG9560-1] interface GigabitEthernet7/1/0 [FW-USG9560-1-GigabitEthernet7/1/0] description FW-HRP [FW-USG9560-1-GigabitEthernet7/1/0] undo shutdown [FW-USG9560-1-GigabitEthernet7/1/0] eth-trunk 0 [FW-USG9560-1-GigabitEthernet7/1/0] quit [FW-USG9560-1] interface GigabitEthernet7/1/1 [FW-USG9560-1-GigabitEthernet7/1/1] description FW-HRP [FW-USG9560-1-GigabitEthernet7/1/1] undo shutdown [FW-USG9560-1-GigabitEthernet7/1/1] eth-trunk 0 [FW-USG9560-1-GigabitEthernet7/1/1] quit # Configure heartbeat interfaces on FW-USG9560-2. <FW-USG9560-2> system-view [FW-USG9560-2] interface Eth-Trunk0 [FW-USG9560-2-Eth-Trunk0] ip address 1.1.1.2 255.255.255.252 [FW-USG9560-2-Eth-Trunk0] quit [FW-USG9560-2] interface GigabitEthernet7/1/0 [FW-USG9560-2-GigabitEthernet7/1/0] description FW-HRP [FW-USG9560-2-GigabitEthernet7/1/0] undo shutdown [FW-USG9560-2-GigabitEthernet7/1/0] eth-trunk 0 [FW-USG9560-2-GigabitEthernet7/1/0] quit [FW-USG9560-2] interface GigabitEthernet7/1/1 [FW-USG9560-2-GigabitEthernet7/1/1] description FW-HRP [FW-USG9560-2-GigabitEthernet7/1/1] undo shutdown [FW-USG9560-2-GigabitEthernet7/1/1] eth-trunk 0 [FW-USG9560-2-GigabitEthernet7/1/1] quit Step 4 Enable dual-node hot-standby on the firewalls. # Enable dual-node hot-standby on FW-USG9560-1. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 130 Configuration Examples for the Financial Industry <FW-USG9560-1> [FW-USG9560-1] [FW-USG9560-1] [FW-USG9560-1] 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network system-view hrp interface Eth-Trunk0 remote 1.1.1.2 hrp mirror config enable hrp enable # Enable dual-node hot-standby on FW-USG9560-2. <FW-USG9560-2> [FW-USG9560-2] [FW-USG9560-2] [FW-USG9560-2] system-view hrp interface Eth-Trunk0 remote 1.1.1.1 hrp mirror config enable hrp enable Step 5 Configure function items for dual-node hot-standby. # Perform the following configurations on FW-USG9560-1: HRP_M[FW-USG9560-1] hrp track interface Eth-Trunk1 //Configure the monitoring interface of the VRRP Group Management Protocol (VGMP) group as the service interface. This configuration will be synchronized to the standby Huawei Redundancy Protocol (HRP) firewall. HRP_M[FW-USG9560-1] hrp mgt-interface Eth-Trunk11 //Configure the management interface for dual-node hot-standby. This configuration will be synchronized to the standby HRP firewall. HRP_M[FW-USG9560-1] hrp mirror session enable //Enable session fast backup. This configuration will be synchronized to the standby HRP firewall. HRP_M[FW-USG9560-1] hrp standby config enable //Enable execution of some commands on the standby firewall. Step 6 Configure the firewalls to restart with the basic configuration for dual-node hot-standby and synchronize correct service configurations from the other firewalls. # Run the hrp base config enable command. HRP_M[FW-USG9560-1] hrp base config enable # Restart the firewall to make the configuration take effect. HRP_M<FW-USG9560-1> reboot System will reboot! Do you want to save the running configuration? [Y/N]: y System will reboot! Continue? [Y/N]: y HRP_S<FW-USG9560-2> reboot System will reboot! Do you want to save the running configuration? [Y/N]: y System will reboot! Continue? [Y/N]: y Step 7 Add interfaces to security zones and configure a default action for security policies. # Add a Virtual-if0 interface to a security zone to enable traffic diversion between the root firewall (public system) and virtual firewalls. HRP_M[FW-USG9560-1] firewall zone untrust HRP_M[FW-USG9560-1-zone-untrust] add interface Virtual-if0 HRP_M[FW-USG9560-1-zone-untrust] quit # Add the management network interface and heartbeat interface to a demilitarized zone (DMZ). HRP_M[FW-USG9560-1] firewall HRP_M[FW-USG9560-1-zone-dmz] network interface to the DMZ HRP_M[FW-USG9560-1-zone-dmz] interface to the DMZ zone. HRP_M[FW-USG9560-1-zone-dmz] zone dmz add interface eth-trunk11 zone. add interface eth-trunk0 //Add the management //Add the heartbeat quit # Set the default action of security policies to permit. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 131 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Configuration Examples for the Financial Industry HRP_M[FW-USG9560-1] security-policy HRP_M[FW-USG9560-1-security-policy] default action permit ----End 4.2.3.7 Configuring SNMP You need to configure SNMP parameters on devices so that the devices can be added to and discovered by the AC-DCN using SNMP. The SNMP parameters must be configured the same as those configured on the AC-DCN. Configurations of the SNMP parameters on CE series switches and firewalls are different. NOTE The port configuration is different from the configuration of other SNMP protocol parameters. On a device, the number of the port connecting to the AC-DCN is set to 161 by default. On the AC-DCN, the number of the port connecting to the device is set to 1666 by default. The AC-DCN supports SNMP v3 that boasts higher security to implement SNMP connection with devices. The ISO-level MIB trees supported by the AC-DCN include nt iso, rd iso, wt iso, and iso-view iso. Before configuring SNMP parameters on a device, ensure that info-center is enabled. If infocenter is disabled, the device cannot report trap messages to the AC-DCN. Run the display info-center command to check whether info-center is enabled. l If Information Center : enable is displayed, info-center is enabled. You can configure SNMP parameters. l If Information Center : disable is displayed, info-center is not enabled. Run the infocenter enable command to enable info-center. Configuring CE Switches Configure the following SNMP v3 parameters on CE series switches for interconnection with the AC-DCN. Issue 03 (2017-05-08) Parameter Value (Example) Description snmp-agent udp-port 161 Indicates the UDP port number used for interconnection between the SNMP agent (a CE series switch) and the AC-DCN. The default value is 161. snmp-agent group dc-admin Indicates the SNMP v3 user group name. snmp-agent usm-user admin Indicates the SNMP v3 user name. snmp-agent usm-user authentication-mode SHA Indicates the user authentication mode. authentication password Huawei@123 Indicates the user authentication password. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 132 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Configuration Examples for the Financial Industry Parameter Value (Example) Description privacy-mode AES128 Indicates the encryption algorithm that is used during authentication. privacy password Huawei@123 Indicates the encryption password. Configure Gateway-CE12808-1 as follows. Configurations on other CE series switches are similar. Step 1 Run the system-view command to enter the system view. Step 2 Change the number of the port that connects the SNMP agent to the AC-DCN. By default, the SNMP agent and the AC-DCN are connected over port 161. [~Gateway-CE12808-1] snmp-agent udp-port 161 Step 3 Configure an SNMP v3 user and a user group, and set the authentication mode and encryption algorithm. For example, set the user group name to dc-admin, user name to admin, authentication mode to SHA, and encryption algorithm to AES128. [*Gateway-CE12808-1] [*Gateway-CE12808-1] Please configure the Enter Password: Huawei@123. Confirm Password: Huawei@123. [*Gateway-CE12808-1] Please configure the Enter Password: Huawei@1234. Confirm Password: Huawei@1234. snmp-agent usm-user v3 admin group dc-admin snmp-agent usm-user v3 admin authentication-mode sha authentication password (8-255) //Enter the authentication password, for example, //Confirm the authentication password, for example, snmp-agent usm-user v3 admin privacy-mode aes128 privacy password (8-255) //Enter the encryption password, for example, //Confirm the encryption password, for example, Step 4 Configure the gateway to report alarm trap packets to the AC-DCN using SNMP v3. [*Gateway-CE12808-1] snmp-agent trap enable feature-name trunk [*Gateway-CE12808-1] snmp-agent trap enable //Enable the trap packet sending function on the gateway. [*Gateway-CE12808-1] snmp-agent trap source loopback0 //The interface name is the name of the gateway interface connecting to the AC-DCN. Configure an IP address for the interface. [*Gateway-CE12808-1] commit Step 5 Configure a MIB view and add the MIB view to the attributes of a user group so that the user group obtains the read, write, and alarm reporting rights. NOTE The AC-DCN obtains LLDP link information from an MIB view specified by SNMP. In this case, the SNMP-specified MIB view must be iso-view, and the OID MIB sub-tree of the specified MIB object must be iso. [*Gateway-CE12808-1] [*Gateway-CE12808-1] [*Gateway-CE12808-1] [*Gateway-CE12808-1] [*Gateway-CE12808-1] Issue 03 (2017-05-08) snmp-agent snmp-agent snmp-agent snmp-agent snmp-agent mib-view mib-view mib-view mib-view group v3 included included included included dc-admin iso-view iso nt iso rd iso wt iso privacy read-view rd write-view Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 133 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Configuration Examples for the Financial Industry wt notify-view nt [*Gateway-CE12808-1] commit ----End Configuring Firewalls Configure the following SNMP v3 parameters on firewalls for interconnection with the ACDCN. Issue 03 (2017-05-08) Parameter Value (Example) Description snmp-agent udp-port 161 Indicates the UDP port number used for interconnection between the SNMP agent (a CE series switch) and the AC-DCN. The default value is 161. snmp-agent group dc-admin Indicates the SNMP v3 user group name. snmp-agent usm-user admin Indicates the SNMP v3 user name. snmp-agent usm-user authentication-mode SHA Indicates the user authentication mode. authentication password Huawei@123 Indicates the user authentication password. privacy-mode AES128 Indicates the encryption algorithm that is used during authentication. privacy password Huawei@123 Indicates the encryption password. snmp-agent group ACTRAP Indicates the trap user group name. snmp-agent usm-user ACTrapUser Indicates the trap user name. snmp-agent usm-user authentication-mode SHA Indicates the user authentication mode. authentication password Public@1234 Indicates the user authentication password. privacy-mode AES128 Indicates the encryption algorithm that is used during authentication. privacy password Admin@5678 Indicates the encryption password. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 134 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Parameter Value (Example) Description snmp-agent trap source Eth-Trunk6 Indicates the name of the device interface connecting to the ACDCN. snmp-agent target-host trap addr 100.125.100.10/24 Indicates IP addresses of nodes in the AC-DCN cluster. 100.125.100.11/24 100.125.100.12/24 Configure FW-USG9650-1 as follows. The configuration on FW-USG9650-2 is similar. Step 1 Change the number of the port that connects the SNMP agent to the AC-DCN. By default, the SNMP agent and the AC-DCN are connected over port 161. HRP_M[FW-USG9650-1] snmp-agent udp-port 161 Step 2 Configure an SNMP user group. HRP_M[FW-USG9650-1] snmp-agent group v3 ACTRAP privacy read-view rd write-view wt notify-view nt Step 3 Configure an SNMP v3 user and a user group, and set the authentication mode and encryption algorithm. For example, set the user group name to dc-admin, user name to admin, authentication mode to SHA, and encryption algorithm to AES128. HRP_M[FW-USG9650-1] snmp-agent usm-user v3 admin group dc-admin HRP_M[FW-USG9650-1] snmp-agent usm-user v3 admin authentication-mode sha Please configure the authentication password (8-255) Enter Password: //Enter the authentication password, for example, Huawei@123. Confirm Password: //Confirm the authentication password, for example, Huawei@123. HRP_M[FW1] snmp-agent usm-user v3 admin privacy-mode aes128 Please configure the privacy password (8-255) Enter Password: //Enter the authentication password, for example, Priva@1234. Confirm Password: //Confirm the encryption password, for example, Priva@1234. Step 4 Configure SNMP parameters. For example, set the user name to ACTrapUser, the authentication mode and password to SHA and Public@1234, respectively, and the encryption algorithm and password to AES128 and Admin@5678, respectively. After the configuration, the AC-DCN can obtain the firewall system start time using SNMP. HRP_M[FW-USG9650-1] snmp-agent usm-user v3 ACTrapUser HRP_M[FW-USG9650-1] snmp-agent usm-user v3 ACTrapUser group ACTRAP HRP_M[FW-USG9650-1] snmp-agent usm-user v3 ACTrapUser authentication-mode sha cipher Public@1234 //In this example, the authentication password is Public@1234. HRP_M[FW-USG9650-1] snmp-agent usm-user v3 ACTrapUser privacy-mode aes128 cipher Admin@5678 //In this example, the encryption password is Admin@5678. Step 5 Configure the firewall to report alarm trap packets to the AC-DCN using SNMP v3. HRP_M[FW-USG9650-1] snmp-agent trap enable feature-name trunk HRP_M[FW-USG9650-1] snmp-agent trap enable//Enable the trap packet sending function on the firewall. HRP_M[FW-USG9650-1] snmp-agent trap source Eth-trunk 6 //interface-type interfacenumber indicates the name of the interface to which the IP address belongs. HRP_M[FW-USG9650-1]snmp-agent target-host trap address udp-domain 100.125.100.10 udp-port 1666 params securityname ACTrapUser v3 privacy //The IP address is an IP address of the AC-DCN. HRP_M[FW-USG9650-1]snmp-agent target-host trap address udp-domain 100.125.100.11 Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 135 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Configuration Examples for the Financial Industry udp-port 1666 params securityname ACTrapUser v3 privacy HRP_M[FW-USG9650-1] snmp-agent target-host trap address udp-domain 100.125.100.12 udp-port 1666 params securityname ACTrapUser v3 privacy Step 6 Configure a MIB view and add the MIB view to the attributes of a user group so that the user group obtains the read, write, and alarm reporting rights. HRP_M[FW-USG9650-1] HRP_M[FW-USG9650-1] wt notify-view nt HRP_M[FW-USG9650-1] HRP_M[FW-USG9650-1] HRP_M[FW-USG9650-1] snmp-agent mib-view included iso-view iso snmp-agent group v3 dc-admin privacy read-view rd write-view snmp-agent mib-view included nt iso snmp-agent mib-view included rd iso snmp-agent mib-view included wt iso ----End 4.2.3.8 Configuring NETCONF You need to configure NETCONF parameters on devices so that the AC-DCN can deliver service configurations to the devices and obtain information about the devices using NETCONF. NETCONF parameters must be configured the same as those configured on the AC-DCN. Configurations of NETCONF parameters on CE series switches and firewalls are different. Configuring CE Switches Configure the following NETCONF parameters on CE series switches for interconnection with the AC-DCN. Parameter Value (Example) Description local-user client@huawei.com Indicates the SSH user name. local-user password irreversible-cipher Huawei@123 Indicates the SSH user authentication password. Configure Gateway-CE12808-1 as follows. Configurations on other CE series switches are similar. Step 1 Configure SSH on the VTY CLI. <Gateway-CE12808-1> system-view [~Gateway-CE12808-1] user-interface vty 0 4 [~Gateway-CE12808-1-ui-vty0-4] authentication-mode aaa [~Gateway-CE12808-1-ui-vty0-4] protocol inbound ssh [~Gateway-CE12808-1-ui-vty0-4] commit [~Gateway-CE12808-1-ui-vty0-4] quit NOTE After SSH is configured on a device, the device automatically disables the Telnet function. Telnet poses security risks. You are not advised to run the protocol inbound all command to enable SSH and Telnet simultaneously. Step 2 Deploy SSH. 1. Issue 03 (2017-05-08) Create an SSH user. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 136 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Configuration Examples for the Financial Industry # Create a local user, and set the user name to Client, domain name to huawei.com, and password to Huawei@123. [~Gateway-CE12808-1] aaa [~Gateway-CE12808-1-aaa] cipher Huawei@123 [~Gateway-CE12808-1-aaa] [~Gateway-CE12808-1-aaa] [~Gateway-CE12808-1-aaa] [~Gateway-CE12808-1-aaa] 2. local-user client@huawei.com password irreversiblelocal-user client@huawei.com service-type ssh local-user client@huawei.com level 3 commit quit Generate a local RSA key pair. [~Gateway-CE12808-1] rsa local-key-pair create The key name will be: netconf-agent_Host The range of public key size is (512 ~ 2048). NOTE: If the key modulus is greater than 512, it will take a few minutes. Input the bits in the modulus [default = 512] : [~Gateway-CE12808-1] commit After the key pair is generated, run the display rsa local-key-pair public command to query the public key information about the key pair. NOTE The generated key pair is stored on the device and will not be lost after the device restarts. The rsa local-key-pair create command is not stored in the configuration file. 3. Set the SSH user authentication mode to password. [~Gateway-CE12808-1] ssh user client@huawei.com authentication-type password [~Gateway-CE12808-1] commit 4. Set the SSH user service type to SNETCONF. [~Gateway-CE12808-1] ssh user client@huawei.com service-type snetconf [~Gateway-CE12808-1] commit Step 3 Enable the NETCONF function and SNETCONF service. The NETCONF service on the SSH server will be enabled on a port. [~Gateway-CE12808-1] snetconf server enable [~Gateway-CE12808-1] commit ----End Configuring Firewalls Configure the following NETCONF parameters on firewalls for interconnection with the ACDCN. Parameter Value (Example) Description local-user netconf-admin Indicates the SSH user name. local-user password irreversible-cipher Huawei@123 Indicates the SSH user authentication password. Configure FW-USG9650-1 as follows. The configuration on FW-USG9650-2 is similar. Step 1 Configure access management for the management interface and enable NETCONF. HRP_M<FW-USG9650-1> system-view HRP_M[FW-USG9650-1] interface eth-trunk6 //Connect this interface to an interface Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 137 Configuration Examples for the Financial Industry on a management network, which HRP_M[FW-USG9650-1-Eth-Trunk6] HRP_M[FW-USG9650-1-Eth-Trunk6] HRP_M[FW-USG9650-1-Eth-Trunk6] 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network can be an Eth-Trunk interface or a port. service-manage enable service-manage all permit quit Step 2 Configure the administrator, service type, level, and authentication mode. HRP_M[FW-USG9650-1] aaa HRP_M[FW-USG9650-1-aaa] manager-user netconf-admin HRP_M[FW-USG9650-1-aaa-manager-user-netconf-admin] Enter Password: Confirm Password: HRP_M[FW-USG9650-1-aaa-manager-user-netconf-admin] HRP_M[FW-USG9650-1-aaa-manager-user-netconf-admin] HRP_M[FW-USG9650-1-aaa-manager-user-netconf-admin] admin_local HRP_M[FW-USG9650-1-aaa-manager-user-netconf-admin] password service-type api level 15 authentication-scheme quit Step 3 Configure the NETCONF interface and enable NETCONF. HRP_M[FW-USG9650-1] api HRP_M[FW-USG9650-1-api] api netconf enable HRP_M[FW-USG9650-1-api] quit ----End 4.2.3.9 Configuring LLDP Enable Link Layer Discovery Protocol (LLDP) globally on the CE series switches, so that the AC-DCN can discover links using LLDP. Configure LLDP on Gateway-CE12808-1 as follows. LLDP configurations on other CE series switches are similar. Step 1 Enable LLDP and MAC Address Discovery Neighbor (MDN). [~Gateway-CE12808-1] lldp enable [*Gateway-CE12808-1] lldp mdn enable [*Gateway-CE12808-1] commit Step 2 Enable LLDP on the servers that connect to TOR switches. NOTE Some servers do not support link discovery. Links between these servers and neighbor nodes shall be manually added to the AC-DCN. ----End 4.2.3.10 Configuring VXLAN By default, the NVO3 extension function is disabled on CE12800 series switches. If you configure other ACL-consuming services (such as MQC, simplified ACL, traffic policing, BD traffic statistics collection, and DHCP) on a device that has been configured with NVO3 services, the other ACL-consuming services may fail to be configured. You can use one of the following methods to configure an NVO3-enabled device to reduce service deployment failure risks. l Issue 03 (2017-05-08) In the system view of a gateway, run the assign forward nvo3 service extend enable command to enable the NVO3 extension function. This command can reduce service deployment failure risks on a gateway if the gateway is not configured with the following cards: CE-L48GT-EA, CE-L48GT-EC, CE-L48GS-EA, CE-L48GS-EC, CEL24XS-BA, CE-L24XS-EA, CE-L48XS-BA, CE-L48XS-EA, and CE-L24LQ-EA. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 138 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network NOTE The assign forward nvo3 service extend enable command is ineffective when the following cards are configured: CE-L48GT-EA, CE-L48GT-EC, CE-L48GS-EA, CE-L48GS-EC, CEL24XS-BA, CE-L24XS-EA, CE-L48XS-BA, CE-L48XS-EA, and CE-L24LQ-EA. When this command is executed, packets of 230 bytes to 294 bytes transmitted over NVO3 tunnels from other cards cannot be sent to these cards. The path detection function takes effect on cards except the following: CE-L48GT-EA, CE-L48GT-EC, CE-L48GS-EA, CE-L48GS-EC, CEL24XS-BA, CE-L24XS-EA, CE-L48XS-BA, CE-L48XS-EA, and CE-L24LQ-EA. l In the system view of a gateway, run the assign forward nvo3 acl extend enable command to enable the NVO3 ACL extension function. NOTE You can run the assign forward nvo3 acl extend enable command on the admin-VS only. After execution, the configuration takes effect for all the VSs. After running this command on a device, restart the device to make the configuration take effect. l By default, the enhanced mode of the NVO3 gateway is not configured on a CE12800 series switch and the switch works in loopback mode. That is, the switch first loops back packets that are encapsulated with the NVO3 header, and then forwards the packets. When the line card of a gateway forwards packets encapsulated or decapsulated using VXLAN at Layer 3 at a rate that exceeds 50% of its forwarding performance, packet loss may occur. To solve this problem, configure the enhanced mode for the NVO3 gateway. In the system view of an NVO3 gateway, run the assign forward nvo3-gateway enhanced command to configure the Layer 3 enhanced mode. NOTE Before running the assign forward nvo3-gateway enhanced command on a device, run the assign forward nvo3 service extend enable command to enable the NVO3 extension function. Ensure that the device is not configured with the following cards: CE-L48GT-EA, CE-L48GT-EC, CE-L48GS-EA, CE-L48GS-EC, CE-L24XS-BA, CE-L24XS-EA, CE-L48XS-BA, CE-L48XSEA, and CE-L24LQ-EA. If the device is configured with any of the preceding cards, ensure that the card does not carry VXLAN services. If VXLAN services are carried on the CE-L24XS-EC, CE-L48XS-EC, CE-L24LQ-EC, CEL48XT-EC, CE-L24LQ-EC1, CE-L08CC-EC, CE-L02LQ-EC, or CE-L06LQ-EC card, the device encapsulates packets in a VXLAN tunnel only based on the host ARP table, and cannot encapsulate packets in a VXLAN tunnel based on longest-match routes. Servers are dual homed to access switches using active/standby NICs. A stack needs to be set up with two access switches. If a server is dual homed to an access switch of an M-LAG, the interface that connects to the server cannot be an M-LAG member interface. l The assign forward nvo3 service extend enable command is optional for CE8800/CE7800/ CE6800 series switches. Theassign forward nvo3 service extend enable command is optional for FD/FDA cards. l Other VXLAN functions are automatically delivered by the AC-DCN, but not manually configured. NOTICE When VMs on a device are online, do not run the commands on the device to modify configurations delivered by the AC-DCN; otherwise, the VXLAN services cannot run properly. For example, do not run a command to delete a BD, cancel the mapping between a VNI and BD, modify a VTEP IP address, or delete a VBDIF interface on a Layer 3 gateway. Do not change the IP address of a VBDIF interface when the VMs are online. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 139 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network 4.2.3.11 (Optional) Configuring Load Balancers Load balancer (LB) vendors complete configurations on the user interfaces of LBs. After the configuration of an LB is completed, a floating IP address will be generated as planned to function as the service IP address for external systems. The floating IP address is on the same subnet as the IP addresses of the member servers that process services. LBs connect to the stack or M-LAG comprised of the leaf switches through Eth-Trunk interfaces. The LB floating IP address and IP addresses of member servers that process services are on the same subnet. The LBs and the member servers use the same VBDIF interface as the gateway. LB Connects to Downstream Leaf Devices The LB connects to the stack system or Multichassis Link Aggregation Group (M-LAG) comprised of the leaf devices through Eth-trunk interfaces. The LB floating IP address is on the same subnet as the member server that processes services. The LB and this member server use the same VBDIF interface as the gateway. NOTE When a CE12800 gateway uses an EC/ED/EF/EG card to process VXLAN gateway services, LBs cannot connect to the gateway through a VXLAN Layer 2 sub-interface. The roadmap of connecting LBs to the M-LAG comprised of Leaf-CE6851HI-3 and LeafCE6851HI-4 is as follows: 1. Configure the M-LAG on Leaf-CE6851HI-3 and Leaf-CE6851HI-4 for connection to LB-F5-1 and LB-F5-2. 2. On the Layer 2 sub-interfaces on Leaf-CE6851HI-3 and Leaf-CE6851HI-4, set the access mode to untag, and determine the BD number. Step 1 Configure the M-LAG interfaces. The DFS group and peer-link configurations of the M-LAG are globally used, and they have been configured on Leaf-CE6851HI-3 and LeafCE6851HI-4. [~LEAF-CE6851HI-3] interface eth-trunk 20 //Connect this interface to LB-F5-1. [*LEAF-CE6851HI-3-Eth-Trunk20] mode lacp-static [*LEAF-CE6851HI-3-Eth-Trunk20] trunkport 10ge 1/0/47 [*LEAF-CE6851HI-3-Eth-Trunk20] dfs-group 1 m-lag 50 [*LEAF-CE6851HI-3-Eth-Trunk20] quit [*LEAF-CE6851HI-3] interface eth-trunk 30 //Connect this interface to LB-F5-2. [*LEAF-CE6851HI-3-Eth-Trunk30] mode lacp-static [*LEAF-CE6851HI-3-Eth-Trunk30] trunkport 10ge 1/0/48 [*LEAF-CE6851HI-3-Eth-Trunk30] dfs-group 1 m-lag 51 [*LEAF-CE6851HI-3-Eth-Trunk30] quit [*LEAF-CE6851HI-3] commit [~LEAF-CE6851HI-4] interface eth-trunk 20 //Connect this interface to LB-F5-1. [*LEAF-CE6851HI-4-Eth-Trunk20] mode lacp-static [*LEAF-CE6851HI-4-Eth-Trunk20] port link-type trunk [*LEAF-CE6851HI-4-Eth-Trunk20] trunkport 10ge 1/0/47 [*LEAF-CE6851HI-4-Eth-Trunk20] dfs-group 1 m-lag 50 [*LEAF-CE6851HI-4-Eth-Trunk20] quit [*LEAF-CE6851HI-4] interface eth-trunk 30 //Connect this interface to LB-F5-2. [*LEAF-CE6851HI-4-Eth-Trunk30] mode lacp-static [*LEAF-CE6851HI-4-Eth-Trunk30] port link-type trunk [*LEAF-CE6851HI-4-Eth-Trunk30] trunkport 10ge 1/0/48 [*LEAF-CE6851HI-4-Eth-Trunk30] dfs-group 1 m-lag 51 [*LEAF-CE6851HI-4-Eth-Trunk30] quit [*LEAF-CE6851HI-4] commit Step 2 Configure access interfaces. After the AC-DCN delivers services to Leaf-CE6851HI-3 and Leaf-CE6851HI-4, the BD that the AC-DCN assigns to member servers that process services Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 140 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network can be determined. Configure access interfaces only after the BD is determined (for example, BD 2000). [~LEAF-CE6851HI-3] interface Eth-Trunk20.1 mode l2 [~LEAF-CE6851HI-3-Eth-Trunk20.1] encapsulation untag [~LEAF-CE6851HI-3-Eth-Trunk20.1] bridge-domain 2000 [~LEAF-CE6851HI-3-Eth-Trunk20.1] commit [~LEAF-CE6851HI-3] interface Eth-Trunk30.1 mode l2 [~LEAF-CE6851HI-3-Eth-Trunk30.1] encapsulation untag [~LEAF-CE6851HI-3-Eth-Trunk30.1] bridge-domain 2000 [~LEAF-CE6851HI-3-Eth-Trunk30.1] commit [~LEAF-CE6851HI-4] interface Eth-Trunk20.1 mode l2 [~LEAF-CE6851HI-4-Eth-Trunk20.1] encapsulation untag [~LEAF-CE6851HI-4-Eth-Trunk20.1] bridge-domain 2000 [~LEAF-CE6851HI-4-Eth-Trunk20.1] commit [~LEAF-CE6851HI-4] interface Eth-Trunk30.1 mode l2 [~LEAF-CE6851HI-4-Eth-Trunk30.1] encapsulation untag [~LEAF-CE6851HI-4-Eth-Trunk30.1] bridge-domain 2000 [~LEAF-CE6851HI-4-Eth-Trunk30.1] commit NOTE LBs and member servers that process services use the same VBDIF interface as the gateway. The ACDCN automatically delivers configurations of the gateway. ----End 4.2.4 Installing the AC-DCN Perform the following operations to install the AC-DCN. Step 1 Configure a RAID. RAID configurations must be completed before the operating system is installed. A RAID is configured to ensure hard disk reliability. For details on how to configure a RAID, access Agile Controller-DCN Product Documentation and choose Installation and Underlay Network Configuration > Software Installation > Configuring a RAID. Step 2 Install the operating system. You are advised to use the system image provided by the ACDCN to install the operating system. For details on how to install the operating system, accessAgile Controller-DCN Product Documentation and choose Installation and Underlay Network Configuration > Software Installation > Installing the Operating System(Using the ISO Images Provided by the AC-DCN). Step 3 Configure NICs. Based on the planned NIC working mode, bind NICs, specify IP addresses, subnet masks, and gateways for the bounded NICs, and configure the working mode of the physical NICs. After the configuration takes effect, the AC-DCN can connect to the network. For details on how to configure the server NICs, access Agile Controller-DCN Product Documentation and choose FAQ > AC-DCN Installation > Server > How Do I Configure NIC Binding and Networks on a Page for SUSE11 SP3. Step 4 Install the AC-DCN. Use iDeploy to install the AC-DCN installation and configuration packages. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 141 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network For details on how to install the AC-DCN, access Agile Controller-DCN Product Documentation and choose Installation and Underlay Network Configuration > Software Installation > Installing the AC-DCN. ----End 4.2.5 Pre-configuring the AC-DCN 4.2.5.1 Logging In to the AC-DCN Start a web browser on a client, log in to the AC-DCN, and perform configurations. Ensure that at least one of the following browsers is installed on the client. l Internet Explorer 11 l Google Chrome 29 l Mozilla Firefox 22 Step 1 Start a web browser, enter https://x.x.x.x:18002 in the address box, and press Enter. If a security warning page is displayed, select trust and continue. x.x.x.x indicates the IP address of the northbound proxy (Nginx server) or the floating IP address of the northbound proxy in a cluster. Step 2 On the login page, enter the default administrator name admin and default password Changeme123, and click GO. Step 3 After logging in to the system, change the password as prompted. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 142 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Step 4 After the password is changed, the login page will be displayed in 5 seconds. Use the new password to re-log in to the AC-DCN. ----End 4.2.5.2 Applying For and Loading a License File Step 1 Choose System > License Management > License Information, click Get ESN, and copy the ESN in the Get ESN dialog box. Step 2 Click Confirm. Step 3 Apply for and download a license file using the ESN. Apply for a license file on Huawei Electronic Software Delivery Platform (ESDP). The platform address is http://app.huawei.com/isdp/. For details on how to apply for a license file, click Help on the webpage. (You need to obtain the project contract number in advance.) Step 4 Choose System > License Management > License Information and click Upload. Step 5 Click Browse to upload the license file to the client. Step 6 Click Confirm. After the license file is successfully uploaded, the license status and license resource control information are displayed. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 143 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network ----End 4.2.5.3 Discovering Network Devices The AC-DCN discovers network devices and then manages the devices. The prerequisites of configuring the AC-DCN to discover network devices are as follows: l The AC-DCN can properly communicate with network devices. l SNMP parameters have been configured on network devices. For details, see section Configuring SNMP. Step 1 Choose Network > Physical Resource > Network Device. Step 2 Click Automatic Discovery, enter the device management IP address range, and configure SNMP v3 parameters the same as those configured on the network devices. Step 3 Click Start. When the AC-DCN successfully discovers a device, it displays a discovery success message, and information about the discovered device is displayed in the device list. Step 4 Click Finish. Step 5 Configure the AC-DCN to discover devices on other network segments in the same manner. ----End 4.2.5.4 Creating and Configuring a POD A POD is the basic physical network unit of a data center. A physical device cannot be added to different PODs. A data center can consist of multiple PODs. The computing and storage resources of each POD can be allocated to tenants or projects. The prerequisites of performing the operations are as follows: l Issue 03 (2017-05-08) NETCONF parameters have been pre-configured on network devices. For details, see section Configuring NETCONF. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 144 Configuration Examples for the Financial Industry l 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network The AC-DCN has discovered related network devices. Step 1 Choose Network > POD Management > POD. The POD management page is displayed. Step 2 Click (the icon indicates to create.) in the navigation tree on the left, and configure a POD name and attributes. NOTE To check the description of a parameter on the Create POD page, move the cursor to the question mark (?) on the right of the parameter or over the parameter button. You are advised to set ARP broadcast suppression to No. Step 3 Click Create to add network devices. Step 4 Click Add Device, enter IP addresses in Start IP address and End IP address, and click Search. Select the network devices to be added to the POD, and click Add to POD. Step 5 Click Next. The devices are added to the POD. NOTE l A device can be added to one POD only. l Before transferring a device from a POD to another POD, delete the device from the POD to which it currently belongs. Step 6 Configure NETCONF parameters to enable the AC-DCN to deliver network service configurations to devices using NETCONF. 1. Choose Connection Parameters > NETCONF, configure the parameters the same as the NETCONF parameters configured on the devices. 2. Click Check Connection to check NETCONF connections between the AC-DCN and the devices. 3. Click Next and then click Confirm. NOTE The default NETCONF port number of CE series switches is 22, and that of firewalls is 830. Therefore, CE series switches and firewalls cannot be discovered simultaneously. To establish NETCONF connections between the AC-DCN and the firewalls, perform the following operations. 4. Access the POD page, click the Device tab, and click Firewall. Click Netconf under Operation of the firewall of which NETCONF parameters need to be configured. 5. In the Netconf Configure dialog box that is displayed, enter the pre-configured authentication mode, user name, and password, set Port to 830, and click Check Connection. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 145 Configuration Examples for the Financial Industry 6. 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Click Confirm Update. ----End 4.2.5.5 Discovering and Adding Links After links are discovered and added, the AC-DCN displays a topology of links between devices. Link status and details about the links can be checked. Links can be automatically discovered and manually created. l l Automatic discovery: The AC-DCN automatically discovers links between CE series switches. Manual creating: The AC-DCN cannot automatically discover links between gateways and firewalls using LLDP. You need to create the links manually. Step 1 The AC-DCN automatically discovers links. 1. 2. Choose Network > Link Management > Link List. Click Link Discover, select devices, set LLDP Enable to ON, and click Find. The AC-DCN automatically discovers links between the devices and displays each link it discovers. Step 2 Create links manually. 1. 2. Issue 03 (2017-05-08) Choose Network > Link Management > Link List. Click Create, set Type to Layer 2 Link, and configure other parameters. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 146 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network NOTE To add a link, add the physical link. When the AC-DCN automatically discovers links, it detects the relationship between an Eth-Trunk and the corresponding physical link. After a physical link is added, the AC-DCN automatically associates the port of the physical link with the correct EthTrunk and directly delivers configurations through the Eth-Trunk. ----End 4.2.5.6 Defining Network Device Roles Define roles of network devices on the AC-DCN, such as access switch, aggregation switch, and gateway, so that the AC-DCN can identify the devices. You can specify a role for a device in a POD using either of the following methods: l (Recommended) On the TOPO page of the POD, right-click the device to be configured and specify a role for the device. For example, right-click Spine-CE12804-1 and click Set as AGG. l On the Device page of the POD, select Physical Network Device and define roles of devices in the physical network device list. For example, select Spine-CE12804-1, click Set as AGG, and then click Save the Configuration. 4.2.5.7 Configuring an Access Switch Group, Gateway Group, and Firewall Group On an underlay network, if gateways and access switches work in dual-active mode (for example, M-LAG), configure a gateway group and access switch group. If the devices work in stacking mode, the groups are not required. If firewalls work in active/standby mode, configure a firewall group. Step 1 Configure an access switch group. 1. Choose Network > POD Management > POD and click the Device tab. 2. Click Switch and click the TOR tab. 3. Select the switches to be added to an all-active access switch group, click Add To Group, and enter information about the group. Set IP to the NVE IP address of the group. After the configuration, the two switches have the same NVE IP address. Step 2 Configure a gateway group. 1. Choose Network > POD Management > POD and click the Device tab. 2. On the Device tab page, click Gateway. 3. Select the switches to be added to an all-active gateway group, click Add To Group, and enter the group name, VTEP IP address, and virtual MAC address. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 147 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network NOTE The virtual MAC address of a gateway group cannot be the same as that of a firewall group. In this document, the VRRP VRID of firewalls is set to 1, so that the virtual MAC address of the firewalls is 0000-5e00-0101. The MAC address of centralized all-active gateways can be set to 0000-5e00-0100 (MAC addresses of CE series switches range from 0000-5e00-0100 to 0000-5e00-01ff). Step 3 Configure a firewall group. 1. Choose Network > POD Management > POD and click the Device tab. 2. On the Device tab page, click Firewall. 3. Select two firewalls, click Add To Group, and enter the group name. 4. Click Confirm. ----End 4.2.5.8 Adding LBs and Links After adding LBs and links to the AC-DCN, you can check status and links of the LBs on the TOPO page of the AC-DCN. The AC-DCN does not manage LBs, and does not deliver configurations to LBs. Step 1 Add LBs. 1. Choose Network > POD Management > POD and click the Device tab. 2. Click the LB icon and then click Add. 3. In the Add window that is displayed, configure the name and IP address of the LB to be added. 4. – Device Name: Use the value of self.agent_host of an F5 agent, but not the actual device name. By default, this parameter is set to F5LBAAS. – Device IP: Set the value to the IP address of F5 for connecting to the cloud platform. After the LB is successfully added to the AC-DCN, the number 2 is displayed next to the LB icon. Step 2 Add links for the LB. 1. Issue 03 (2017-05-08) Choose Network > Link Management > Link List and click Create. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 148 Configuration Examples for the Financial Industry 2. 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Create links between the LB and gateways manually. After the links are successfully created, choose Network > POD Management > POD and check the LBs and links displayed on the TOPO tab page. ----End 4.2.5.9 Configuring NVE Nodes Checking NVE Node Information If NVE information has been configured on the VTEP devices using basic underlay network configuration commands, you do not need to configure the NVE information on the AC-DCN again. You only need to check whether the VTEP IP address on the AC-DCN is the same as the manually configured address. Step 1 Choose Network > POD Management > POD. Step 2 On the Device tab page, select NVE. Step 3 Select a device, click Read Device VTEP IP, and check whether the obtained VTEP IP address is the same as the existing VTEP IP address on the AC-DCN. l If so, the information is correct. l If not, click Set, enter the obtained VTEP IP address, and click Confirm. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 149 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network ----End Configuring NVE Node Information If NVE information is not configured on the VTEP devices, configure the NVE nodes using the following method. If NVE information has been configured, skip steps in this section. Step 1 Choose Network > POD Management > POD. Step 2 On the Device tab page, select NVE. Step 3 Add or import NVE nodes using either of the following methods. l Manually add nodes. 1. Select an NVE node to be added, and click Add NVE. For example, select Leaf-CE6851HI-1, and set Management IP to 11.1.1.100 and VTEP IP to 11.1.1.1. 2. Click Confirm. 3. Click Set Device VTEP IP. 4. Configure NVE information for other NVE nodes in the POD in the same manner. 5. After the configuration is completed, click Read Device VTEP IP and check whether the current configuration is the same as the planned configuration. l Import NVE nodes in batches. 1. Click Export to download an NVE template table. 2. Set parameters in the table. The following table is used as an example. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 150 Configuration Examples for the Financial Industry 3. 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Device Name Node Type (TOR, GW or VSWITC H) IP Address VTEP IP Address (AC) VTEP IP Address (Device ) Gateway IP Address (Necessar y Only When Node Type Is VSWITC H) Mask (Necessar y Only When Node Type Is VSWITC H) (1-31) LeafCE6851 HI-1 and LeafCE6851 HI-2 TOR 100.125.9 4.2 11.11.11. 11 11.11.11. 11 - - Click Import to upload the configured NVE template table to the AC-DCN. ----End 4.2.5.10 Configuring Internal and External Links Between Firewalls and Gateways When firewalls are connected to gateways in bypass mode, specify internal and external links between the firewalls and gateways. l Internal link: carries traffic from a tenant VRF (on a gateway) to a tenant virtual firewall (VSYS). l External link: carries traffic from the root firewall to the root VRF (on a gateway). Physical Link Used as Internal and External Links When one physical link is used as the internal and external links between the firewalls and gateways, configure the AC-DCN to automatically deliver configurations of the internal and external links. Step 1 Choose Network > POD Management > POD. Step 2 In the POD list, select a specified POD to access the TOPO tab page of the POD. Step 3 Set Auto to ON under GW and FW link configuration in the lower right corner. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 151 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network ----End Independent Physical Links Used as Internal and External Links When independent physical links are used as internal and external links between the firewalls and gateways, specify the internal and external links on the AC-DCN. Step 1 Choose Network > POD Management > POD. Step 2 In the POD list, select a specified POD to access the TOPO tab page of the POD. Step 3 Set Auto to OFF under GW and FW link configuration in the lower right corner. Step 4 On the topology, right-click a link between a firewall and gateway and set the link to internal link or external link as required. NOTE If firewalls are connected to gateways in in-line mode, configure all links between the firewalls and gateways (excluding the management link) as internal links. ----End 4.2.5.11 Configuring Resources for Interface Interconnection The AC-DCN delivers configurations of interface interconnections and routing between firewalls and gateways as well as LBs and gateways. This section describes how to configure ranges of the VLANs and network segments that are used for the interconnections. Step 1 Choose Network > POD Management > POD. Step 2 In the POD list, select a specified POD to access the POD management page. Step 3 Choose Global Configuration > Port Interconnection Resources. Reserve VLANs and IP addresses for the interfaces on the gateways, firewalls, and LBs. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 152 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network 1. Enter the range of VLANs that are used for interconnections in VLAN, and click 2. Enter the range of IP addresses that are used for interconnections in IP address section, . and click 3. . Click Apply. ----End 4.2.5.12 Configuring Available VNI, VLAN, and BD Ranges VMs or physical servers connect to a VXLAN network through VTEP interfaces. When packets from a server reach a VTEP interface, the VLAN tagged or untagged packets are mapped to a VNI through a BD, so that the VTEP can encapsulate correct VXLAN frames. The mapping configurations on VTEP interfaces are delivered by the AC-DCN. This section describes how to configure available VNI, VLAN, and BD ranges for the AC-DCN to deliver mapping configurations. Step 1 Choose Network > POD Management > POD. Step 2 In the POD list, select a specified POD to access the POD management page. Step 3 Choose Global Configuration > Configure VNI/VLAN/BD. l Issue 03 (2017-05-08) If the AC-DCN interconnects with FusionSphere OpenStack, only VLAN and BD ranges need to be configured. Select Deliver VNI. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 153 Configuration Examples for the Financial Industry l 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network If the AC-DCN interconnects with an open-source OpenStack, only VNI and BD ranges need to be configured. Select Deliver VLAN. ----End 4.2.5.13 Configuring a PXE Network When bare metal servers are planned for the network, you need to configure a Preboot Execution Environment (PXE) network to connect the bare metal servers to the DCN. Step 1 Choose Network > POD Management > POD. In the POD list that is displayed, select a specified POD to access the POD management page. Step 2 On the Global Configuration tab page, select PXE Network and configure the VLAN and VNI of the PXE network. The configuration of the VNI must be consistent with that of the PXE network on the PXE server. Step 3 Enter the VNI and click Create. Select interfaces on the access switches to connect to the bare metal servers and click OK. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 154 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Configuration Examples for the Financial Industry ----End 4.2.6 Interconnecting the AC-DCN with FusionSphere OpenStack When the AC-DCN is interconnected with FusionSphere OpenStack, the AC-DCN delivers Layer 2 Bridge (L2BR) port group configurations to create a VXLAN management network. Install interconnection plug-ins on the AC-DCN and FusionSphere OpenStack, and create a northbound interface operator to connect the two platforms. 4.2.6.1 Creating a Management Network for FusionSphere Generally, the interconnection between the AC-DCN and FusionSphere OpenStack uses the in-band management mode. That is, the AC-DCN delivers L2BR port group configurations to create a management network for FusionSphere OpenStack. The AC-DCN accesses the network through VLANs, and creates Layer 3 VLANIF interfaces on TOR switches or gateways to add the management network segments of the AC-DCN and FusionSphere OpenStack to routing domains, so that the routes between the management planes of the AC-DCN and FusionSphere OpenStack can be enabled. Further, the AC-DCN delivers L2BR port group configurations to connect to the management networks of all nodes on FusionSphere OpenStack. The following table lists an example of network plane planning (IT product line planning) for FusionSphere OpenStack. Issue 03 (2017-05-08) L2BR Port Group Name Type and Name Access Type VNI VLAN Gateway Type Gateway Address Fsp External_OM dot1q 29901 1998 Single-node 10.100.2.2 54/24 External_API dot1q 29900 1999 Single-node 10.100.1.2 54/24 Internal_base Untag 29902 NA NA NA Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 155 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Step 1 Choose Network > POD Management > POD. In the POD list, select a specified POD to access the POD management page. Step 2 On the Service Configuration tab page, select L2BR Port Group, and click Create to create an L2BR port group. Step 3 On the Set Basic Information page, enter the L2BR port group name and description, and click Next. Step 4 On the Select Port page, select the interfaces for connecting FusionSphere nodes to TOR switches, and click Next. Step 5 On the VXLAN page, click Create. Configure VXLAN information, and click Next. NOTE The VLAN ID must be within the range specified in section 4.2.5.12 Configuring Available VNI, VLAN, and BD Ranges"4.2.5.12 Configuring Available VNI, VLAN, and BD Ranges." Step 6 Click Finish. Step 7 On the gateways, advertise the management network segments of FusionSphere OpenStack in the routing protocol. [~Gateway-CE12808-1] BGP 65000 [*Gateway-CE12808-1-bgp] ipv4-family unicast [*Gateway-CE12808-1-bgp-af-ipv4] network 10.100.1.0 255.255.255.0 [*Gateway-CE12808-1-bgp-af-ipv4] network 10.100.2.0 255.255.255.0 [*Gateway-CE12808-1-bgp-af-ipv4] quit [*Gateway-CE12808-1-bgp] quit [*Gateway-CE12808-1] commit [~Gateway-CE12808-2] BGP 65001 [*Gateway-CE12808-2-bgp] ipv4-family unicast [*Gateway-CE12808-2-bgp-af-ipv4] network 10.100.1.0 255.255.255.0 [*Gateway-CE12808-2-bgp-af-ipv4] network 10.100.2.0 255.255.255.0 [*Gateway-CE12808-2-bgp-af-ipv4] quit [*Gateway-CE12808-2-bgp] quit [*Gateway-CE12808-2] commit ----End 4.2.6.2 Installing and Configuring FusionSphere OpenStack Huawei IT engineers install and configure FusionSphere OpenStack. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 156 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network For details on how to install and configure FusionSphere OpenStack, see "Installation and Configuration" in FusionSphere Product Documentation (Cloud Data Center). 4.2.6.3 Installing Interconnection Plug-ins Install plug-ins on the AC-DCN and FusionSphere OpenStack for interconnection. Information about the plug-ins is as follows: Installation End Plug-in Category Plug-in Name (Example) Plug-in Release Source AC-DCN eSDK plug-in for interconnection with FusionSphere hw_plugin_ac.zip AC-DCN FusionSphere OpenStack Layer 2 service package ACMECHANISMD RIVERV100R006C 00RC3.tar.gz FusionSphere Layer 3 service package ACROUTERAGEN TV100R006C00RC 3.tar.gz FusionSphere Layer 4 to Layer 7 service package NEUTRONACPLU GINV100R001C00 B752.tar.gz AC-DCN Step 1 Install the plug-in on the AC-DCN. For details, access Agile Controller-DCN Product Documentation and choose Installation and Underlay Network Configuration > Software Installation > Installing Plug-ins > Network Service Provisioning Collaborating with the FusionSphere > Installing Plug-ins on the AC-DCN. Step 2 Install plug-ins on FusionSphere. For details, access FusionSphere Product Documentation (Cloud Data Center) and choose Software Installation Guide > Installation and Configuration > (Optional) Configuring Connection Between FusionSphere OpenStack and an Agile Controller. Step 3 Verify the connection. On the FusionSphere OpenStack host, run the neutron net-create XXX command to create a network. XXX indicates a user-defined network name. If the following command output is displayed, the network is successfully created. The ACDCN and FusionSphere are connected. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 157 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network ----End 4.2.6.4 Creating a Northbound Interface Operator A northbound interface operator configures the interconnection between the AC-DCN and FusionSphere OpenStack. The user name and password of the northbound interface operator must be configured the same on the AC-DCN and FusionSphere OpenStack. Step 1 Log in to the AC-DCN using the admin account, and choose System > Administrator > Administrator. Step 2 Click Create and configure basic information about the northbound interface operator. Step 3 Enter a user name (fsp@huawei.com is recommended) and password. NOTE The user name of the northbound interface operator must be same as the value of ac_username that is configured on FusionSphere for interconnection with the AC-DCN. The password cannot be the same as the planned final password. The system will ask you to change the password, as described in Step 8. Step 4 Select Northbound Interface Operator from the Role drop-down list box. Step 5 Click Confirm. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 158 Configuration Examples for the Financial Industry Step 6 Click 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network in the upper right corner of the page to log out the current account. Step 7 Re-log in to the AC-DCN as the northbound interface operator. Step 8 Change the password to a new value (for example, Huawei@123) as prompted. NOTE The new password must be same as the value of ac_password that is configured on FusionSphere for interconnection with the AC-DCN. Step 9 After the password is changed, the login page will be displayed in 5 seconds. Use the new password to re-log in to the AC-DCN as the northbound interface operator to check whether the password is correct. If the following dialog box is displayed, the northbound interface operator is successfully created, and the password is changed. ----End 4.2.6.5 Configuring a Cloud Platform Create a cloud platform on the AC-DCN and configure information about the cloud platform to be connected. Step 1 Choose System > System Settings > Cloud Platform and click Create. Step 2 Configure parameters for connecting to the cloud platform. l Agent Name: Name of the physical network of FusionSphere. By default, the parameter is set to physnet1. Set the parameter to the value of ac_service_name that is configured on the cloud platform. To check this value, log in to FusionSphere OpenStack web client, and choose Configuration > Network > Configure Physical Network. l Account: User name of the northbound interface operator, for example, fsp@huawei.com. l Driver Plug-in IP and Cloud Platform IP: These two parameters can be set to the reverse proxy IP address of the cloud platform. ----End Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 159 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network 4.2.6.6 Binding the Cloud Platform to a POD Step 1 Choose Network > POD Management > POD. Step 2 In the POD list, select a specified POD to access the POD management page. Step 3 Access the Global Configuration tab page. Under Connect to Cloud Platform, select the agent name of the cloud platform and click Apply. ----End 4.2.6.7 Adding Servers to the POD After installing and deploying FusionSphere and FusionCompute, enable LLDP on all FusionSphere nodes, CAN nodes, and virtualization platform servers. The AC-DCN rediscovers links between access switches and servers, and adds discovered servers to the POD. l After installing FusionSphere, enable LLDP for all FusionSphere nodes, so that the ACDCN can automatically re-discover links. l For physical servers and other servers on which LLDP is disabled, associate them with corresponding TOR switches manually. The AC-DCN Automatically Discovering and Adding Nodes Step 1 Choose Network > Link Management > Link List. Step 2 Click Link Discover and select all devices. Set LLDP Enable to ON. Then click Find. Step 3 When the progress bar reaches 100%, click Finish. The AC-DCN discovers all links between the switches and servers. Step 4 Choose Network > Physical Resource > Server. On the page that is displayed, select the servers to be added to the POD. Then click Add to POD. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 160 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network NOTE All cloud platform servers and virtualization platform servers shall be added to the POD. ----End Adding Servers Manually If LLDP is disabled or not supported on servers (for example, physical servers), configure the mappings between TOR switches and servers on the AC-DCN manually. Step 1 Choose Network > POD Management > POD. Step 2 In the POD list, select a specified POD to access the POD management page. Step 3 Click Switch, and click the TOR-Host tab. Then click Add. Step 4 In the Add dialog box that is displayed, configure the corresponding TOR switch, port, and server name, then click Confirm. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 161 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Step 5 After adding a server, click next to the name of the corresponding TOR switch, and check whether the link between the TOR switch and the server is configured correctly. ----End Adding Bare Metal Servers When bare metal servers are planned on the network, pre-configure PXE network parameters on the interfaces that connect the bare metal servers and access switches. The PXE network is the initial network for provisioning services of the bare metal servers. Prerequisites: l The bare metal services have been deployed on FusionSphere CPS and connected to FusionSphere OpenStack. l The bare metal servers have connected to the PXE network. Information about BMC Base and Provision networks has been configured. Configure the PXE network on the AC-DCN as follows: Step 1 Choose Network > POD Management > POD. In the POD list that is displayed, select a specified POD to access the POD management page. Step 2 On the Global Configuration tab page, select PXE Network and configure the VLAN and VNI of the PXE network. The configuration of the VNI must be consistent with that of the PXE network on the PXE server. Step 3 Enter the VNI and click Create. Select interfaces on the access switches to connect to the bare metal servers and click OK. ----End 4.2.6.8 Configuring External Networks There are two types of external networks: Internet and private network. In the cloud-network integration scenario, only the Internet can be added. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 162 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Adding the Internet Step 1 Choose Network > POD Management > POD. Step 2 In the POD list, select a specified POD to access the POD management page. Step 3 Accessthe Service Configuration tab page. Under External Network, click Create. Step 4 Configure basic information about an external network. Click Next. Step 5 Configure gateway information. Click Next. l Set Gateway type to Gateway Group. l Set Group name to the gateway group name. l Select gateway IP addresses. Step 6 Check the configuration. Step 7 Multiple external networks can be added to one cloud platform. For an external network, the name defined on the AC-DCN must be used as the prefix of the name defined on the cloud Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 163 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network platform. For example, when the name of an external network is ext on the AC-DCN, you can set the name of this external network to ext01 or ext02 on the cloud platform. ----End 4.2.6.9 Interconnecting FusionSphere with a VMM The vCenter provider uses the vCenter as a virtual resource pool and connects it to FusionSphere OpenStack, so that FusionSphere OpenStack can uniformly manage virtual resources. Step 1 Install a VMM. For example, install the vCenter. The installation process involves ESXi host installation and configuration, vCenter installation and configuration, vSphere distributed switch (vDS) creating, and shared storage configuration. For details, visit VMware official website and choose SUPPORT > Support Resources > Technical Papers. NOTE When installing the ESXi host, remember the configured ESXi host login password. You will use this password to log in to the vCenter as the root user. If you forget the password, you cannot reset it. You can only reinstall the ESXi host and re-configure a password. Step 2 Interconnect FusionSphere with the vCenter. For details, access FusionSphere Product Documentation (Cloud Data Center) and choose Software Installation Guide > Installation and Configuration > (Optional) Connecting vCenter to FusionSphere OpenStack. ----End 4.2.7 Interconnecting the AC-DCN with Open-Source OpenStack 4.2.7.1 Creating a Management Network for OpenStack Generally, the interconnection between the AC-DCN and OpenStack uses the in-band management mode. That is, the AC-DCN delivers L2BR port group configurations to create a management network for OpenStack. The AC-DCN accesses the network through VLANs, and creates Layer 3 VLANIF interfaces on TOR switches or gateways to add the management network segments of the AC-DCN and OpenStack to routing domains, so that the routes between the management planes of the ACDCN and OpenStack can be enabled. Further, the AC-DCN delivers L2BR port group configurations to connect to the management networks of all nodes on OpenStack. The following table lists an example of network plane planning for OpenStack. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 164 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Configuration Examples for the Financial Industry L2BR Port Group Name Type and Name Access Type VNI VLAN Gateway Type Gateway Address Ops External_ OM untag 29901 1998 All-active 10.100.2.2 54/24 Step 1 Choose Network > POD Management > POD. In the POD list, select a specified POD to access the POD management page. Step 2 On the Service Configuration tab page, select L2BR Port Group, and click Create to create an L2BR port group. Step 3 On the Set Basic Information page, enter the L2BR port group name and description, and click Next. Step 4 On the Select Port page, select the interfaces for connecting OpenStack nodes to TOR switches. Click Next. Step 5 On the VXLAN page, click Create. Configure VXLAN information, and click Next. NOTE If the access type is tag, the VLAN ID must be within the range specified in section Configuring Available VNI, VLAN, and BD Ranges. Step 6 Click Finish. Step 7 On the gateways, advertise the management network segments of OpenStack in the routing protocol. [~Gateway-CE12808-1] BGP 65000 [*Gateway-CE12808-1-bgp] ipv4-family unicast [*Gateway-CE12808-1-bgp-af-ipv4] network 10.100.2.0 255.255.255.0 [*Gateway-CE12808-1-bgp-af-ipv4] quit [*Gateway-CE12808-1-bgp] quit [*Gateway-CE12808-1] commit [~Gateway-CE12808-2]BGP 65001 [*Gateway-CE12808-2-bgp] ipv4-family unicast [*Gateway-CE12808-2-bgp-af-ipv4] network 10.100.2.0 255.255.255.0 [*Gateway-CE12808-2-bgp-af-ipv4] quit Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 165 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network [*Gateway-CE12808-2-bgp] quit [*Gateway-CE12808-2] commit ----End 4.2.7.2 Installing and Configuring OpenStack NOTE In most cases, the open-source OpenStack cloud platform is installed and operated by a customer or third-party cloud platform provider. Step 1 Install an operating system on the server. Step 2 Modify network configurations of the server. 1. Log in to the system as the root user. 2. Run the following command to compile the network configuration file. vi /etc/sysconfig/network-scripts/ifcfg-ens33 //ens33 is the physical NIC name. 3. Press A to enter the editing mode. Press left and right arrows to move the cursor, and modify the file as follows: – Change the value of BOOTPROTO to static. – Change the value of ONBOOT to yes. – Configure the values of IPADDR, NETMASK, and GATEWAY. 4. Press Esc to exit the editing mode. 5. Run the :wq! command to save the file. 6. Run the reboot command to restart the system. Step 3 Configure the host. 1. Log in to the operating system as the root user. Use the Secure File Transfer Protocol (SFTP) tool (such as XSHELL) to copy the openstack-centos-kilo package to the root directory. 2. Run the bash /root/openstack-centos-kilo/host_config.sh script to configure the host. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 166 Configuration Examples for the Financial Industry 3. Select a role for the server. – 4. 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network If you enter 2 or 3, enter the IP address of the control node. After the configuration is complete, run the reboot command to restart the server. Step 4 Run the bash /root/openstack-centos-kilo/openstack_setup.sh script to install OpenStack. Step 5 Select a role for the server. The value should be the same as that set in Step 3. For details about the installation, access the logs in the /var/log/opsinstall directory. ----End 4.2.7.3 Installing Interconnection Plug-ins Step 1 Install the interconnection plug-in on the AC-DCN. For details, access Agile Controller-DCN Product Documentation and choose Installation and Underlay Network Configuration > Software Installation > Installing Plug-ins > Network Service Provisioning Collaborating with the OpenStack > Installing Plug-ins on the AC-DCN. Step 2 Install the interconnection plug-ins on OpenStack. For details, access the path described in Step 1. ----End 4.2.7.4 Configuring the Interconnection on OpenStack Step 1 Use Open vSwitch (OVS) to create a bond NIC interface. (Perform this step on all computing and network nodes, and connect the server to the TOR switch through dual NICs). 1. Set the NIC interface to be bound to the active status. The configuration commands may vary in different systems and system versions. The following uses Ubuntu 14.04.1 as an example. (If there is no NIC configuration file, skip this step and go to Step 2.) 2. Run the vi /etc/network/interfaces command to compile the NIC configuration file. 3. Modify the configurations of eth1 and eth2. auto eth1 iface eth1 inet manual auto eth2 iface eth2 inet manual Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 167 Configuration Examples for the Financial Industry 4. 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Save the configurations and run the sudo /etc/init.d/networking restart command to restart the network service. – If the configurations do not take effect, run the following command to restart the NICs one by one. ifdown eth1 ifup eth1 – If the configurations still fail to take effect, restart the system. Step 2 Run the following commands on the OVS to bind bond NICs to ports. 1. Run the ovs-vsctl del-br br-eth1 command to delete the default bridge br-eth1. 2. Run the ovs-vsctl add-br br-bond1 command to create a bridge br-bond1. 3. Run the ovs-vsctl add-bond br-bond1 bond1 eth1 eth2 command to bind the created bridge to the ports. (If the active/standby mode is used, go to Step 3) 4. (Optional) If the load balancing mode is used, run the vs-vsctl set Port bond1 bond_mode=balance-slb lacp=active command. 5. Run the ovs-vsctl show command to check the OVS configurations. Step 3 Set the bridge of OpenStack services to br-bond1. 1. Back up the Modular Layer 2 (ML2) configuration file. 2. Run the vi /etc/neutron/plugins/ml2/ml2_conf.ini command, and modify the ML2 configuration file as follows: 3. Locate the bridge_mappings configuration. bridge_mappings = physnet1:br-eth1 Set physnet1 to br-bond1. bridge_mappings = physnet1:br-bond1 If the preceding statement does not exist, add the following statement: bridge_mappings = physnet1:br-bond1 Set local_ip to the local IP address. Ensure that the statement is under [ovs], as shown in the following figure. 4. Run the service neutron -openvswitch-agent restart command to restart the neutronopenvswitch-agent service. 5. Run the ovs-appctl bond/show command. If the following information is displayed, the service is successfully configured. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 168 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Step 4 Configure br-int on one NIC for all network and computing nodes. 1. Run the ovs-vsctl list-br command to check whether br-eth1 exists. – If br-eth1 does not exist, run the ovs-vsctl add-br br-eth1 command to add the bridge. Then run the ovs-vsctl list-br command to check the result. 2. Run the ovs-vsctl del-br br-tun command to delete the bridge interface br-tun. 3. Run the vi /etc/neutron/plugins/ml2/ml2_conf.ini command, and modify the ML2 configuration file. 4. Locate the bridge_mappings configuration, and set physnet1 to br-eth1. If the statement does not exist, add the following statement: 5. Set local_ip to the local IP address. 6. Run the service neutron -openvswitch-agent restart command to restart the neutronopenvswitch-agent service. Step 5 Enable LLDP on computing and network nodes. 1. Upload the .rpm packages of LLDP to the computing and network nodes. 2. Access the directory where the packages are saved, and run the following commands in sequence to install the packages. rpm -ivh libconfig-1.4.9-5.el7.x86_64.rpmrpm -ivh libconfigdevel-1.4.9-5.el7.x86_64.rpmrpm -ivh lldpad-0.9.46-10.el7.x86_64.rpmrpm -ivh lldpad-devel-0.9.46-10.el7.x86_64.rpm 3. After executing the preceding commands, run the following command to enable LLDP on corresponding network interfaces. enp2s0f2 is the NIC name. lldpad -dlldptool set-lldp -i enp2s0f2 adminStatus=rxtxlldptool -T -i enp2s0f2 -V sysName enableTx=yeslldptool -T -i enp2s0f2 -V portDesc enableTx=yeslldptool -T -i enp2s0f2 -V sysDesc enableTx=yes Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 169 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network If dual NICs are used for connecting to a TOR switch, run the preceding command on both NICs. Change enp2s0f2 to the name of the NIC connected to the switch. Step 6 Change the network type to deliver VXLAN configurations. 1. Run the vim /etc/neutron/plugins/ml2/ml2_conf.ini command on a control node, and modify the configuration file as follows: 2. Run the systemctl restart neutron-server.service command to restart the service. 3. Run the vim /etc/neutron/plugins/ml2/ml2_conf.ini command on a network node, and modify the configuration file as follows (set local_ip to the local IP address): 4. Run the systemctl restart neutron-openvswitch-agent.service command to restart the service. 5. Run the vim /etc/neutron/plugins/ml2/ml2_conf.ini command on a computing node, and modify the configuration file as follows (set local_ip to the local IP address): Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 170 Configuration Examples for the Financial Industry 6. 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Run the systemctl restart neutron-openvswitch-agent.service command to restart the service. Step 7 Change the network type to deliver VLAN configurations. 1. Run the vim /etc/neutron/plugins/ml2/ml2_conf.ini command on a control node, and modify the configuration file as follows: 2. Run the vim /etc/neutron/plugins/ml2/ml2_conf.ini command on a network node, and modify the configuration file as follows (set local_ip to the local IP address): Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 171 Configuration Examples for the Financial Industry 3. 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Run the vim /etc/neutron/plugins/ml2/ml2_conf.ini command on a computing node, and modify the configuration file as follows (set local_ip to the local IP address): ----End 4.2.7.5 Creating a Northbound Interface Operator When open-source OpenStack is used as the cloud platform, the user name and password of the northbound interface operator are saved in the configuration file of the cloud platform plug-in. Therefore, the two parameters must be set to esdk@huawei.com and Huawei@123, respectively. Step 1 Log in to the AC-DCN using the admin account. Step 2 Choose System > Administrator > Administrator. Step 3 Create a northbound interface operator. Click Create and configure basic information about the user. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 172 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network l Set Account to esdk@huawei.com. l Set Password to Admin@1234. NOTE If the northbound interface operator is created for the first time, the initial password can be any value, except the value of the planned final password Huawei@123. The AC-DCN requires that the password be changed upon first login. l Set Confirm Password to Admin@1234. l Set Role to Northbound Interface Operator. l Click Confirm. Step 4 Click in the upper right corner of the page to log out the current account. Step 5 Re-log in to the AC-DCN as the northbound interface operator. Step 6 Change the password to a new value (for example, Huawei@123) as prompted. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 173 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Step 7 After the password is changed, the login page will be displayed in 5 seconds. Use the new password to re-log in to the AC-DCN as the northbound interface operator to check whether the password is correct. If the following dialog box is displayed, the northbound interface operator is successfully created, and the password is changed. ----End 4.2.7.6 Configuring a Cloud Platform Bind the cloud platform to a POD of the AC-DCN, so that network services of the cloud platform can be automatically deployed through the AC-DCN. Step 1 Choose System > System Settings > Cloud Platform and click Create. Step 2 Configure parameters for connecting to the cloud platform. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 174 Configuration Examples for the Financial Industry l 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Agent Name: Agent name of OpenStack (Kilo). The value should be the same as that in the config.ini configuration file in the root directory of the control node of OpenStack (Kilo). Run the following command to check the agent name in the file. [root@controller neutron] # more /etc/neutron/config.ini [opensdk] service_name=physnet1 By default, the agent name in the OpenStack (Kilo) configuration file is physnet1. If you need to use another name, the value in the configuration file shall be changed simultaneously. To change the agent name in the root directory of the control node of OpenStack (Kilo), perform the following operations: 1. Run the # vim /etc/neutron/config.ini command to enter the root directory of the control node. 2. Press I to enter the editing mode. Change the value of service_name to the actual agent name. 3. Press Esc to exit the editing mode. 4. Run the :wq! command to save the configuration. – Account: User name of the northbound interface operator. Set the value to esdk@huawei.com. – Driver Plug-in IP: If the AC-DCN interconnects with the cloud platform through a plug-in, set the parameter to the IP address of the server where the plug-in is installed. If no plug-in is used, you can set the value to the IP address of the cloud platform. – Cloud Platform IP: IP address of the cloud platform. ----End 4.2.7.7 Binding the Cloud Platform to a POD Step 1 Choose Network > POD Management > POD. Step 2 In the POD list, select a specified POD to access the POD management page. Step 3 Access the Global Configuration tab page. Under Connect to Cloud Platform, select the agent name of the cloud platform and click Apply. ----End 4.2.7.8 Adding Servers to the POD After installing and deploying the cloud platform, enable LLDP on all physical servers and virtualization platform servers. The AC-DCN re-discovers links between access switches and servers, and adds discovered servers to the POD. l After installing OpenStack, enable LLDP for all OpenStack nodes to allow the AC-DCN to automatically re-discover links. l For physical servers and other servers on which LLDP is disabled, associate them with corresponding TOR switches manually. The AC-DCN Automatically Discovering and Adding Nodes Step 1 Choose Network > Link Management > Link List. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 175 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Step 2 Click Link Discover and select all devices. Set LLDP Enable to ON. Then click Find. Step 3 When the progress bar reaches 100%, click Finish. The AC-DCN discovers all links between the switches and servers. Step 4 Choose Network > Physical Resource > Server. On the page that is displayed, select the servers to be added to the POD. Then click Add to POD. NOTE All cloud platform servers and virtualization platform servers shall be added to the POD. ----End Adding Servers Manually If LLDP is disabled or not supported on servers (for example, physical servers), configure the mappings between TOR switches and servers on the AC-DCN manually. Step 1 Choose Network > POD Management > POD. Step 2 In the POD list, select a specified POD to access the POD management page. Step 3 Click Switch, and click the TOR-Host tab. Then click Add. Step 4 In the Add dialog box that is displayed, configure the corresponding TOR switch, port, and server name, then click Confirm. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 176 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Step 5 After adding a server, click next to the name of the corresponding TOR switch, and check whether the link between the TOR switch and the server is configured correctly. ----End 4.2.7.9 Configuring External Networks There are two types of external networks: Internet and private network. For details, see the following figure. In the cloud-network integration scenario, only the Internet can be added. Adding the Internet Step 1 Choose Network > POD Management > POD. Step 2 In the POD list, select a specified POD to access the POD management page. Step 3 Access the Service Configuration tab page. Under External Network, click Create. Step 4 Enter an external network name, and set the external network type to Internet. Click Next. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 177 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Step 5 Configure gateway information. Select the all-active gateway group and click Next. Step 6 Check the configurations. Step 7 Multiple external networks can be added to one cloud platform. For an external network, the name defined on the AC-DCN must be used as the prefix of the name defined on the cloud platform. For example, when the name of an external network is ext on the AC-DCN, you can set the name of this external network to ext01 or ext02 on the cloud platform. ----End 4.2.7.10 Interconnecting OpenStack with a VMM This operation is performed by a customer or a third-party cloud platform provider. Visit OpenStack official website to obtain related documents. 4.2.8 Deploying the Overlay Network Create and deliver networks and services on the cloud platform portal as required. l If Huawei FusionSphere OpenStack is used, IT personnel perform web page operations on the ManageOne. For details, see ManageOne 3.0 Operation Guide 01 of ManageOne 3.0 Product Documentation 01. l If open-source OpenStack is used to deliver services, a customer or a third-party cloud platform provider deploys the overlay network. To obtain related documents, visit OpenStack official website. 4.2.9 Common Operation Guide Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 178 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network 4.2.9.1 Adding a TOR Node Step 1 Log in to the AC-DCN, choose Network > Physical Resource > Network Device, and click Automatic Discovery. Step 2 Enter network segment where the device to be added is located, set parameters under SNMP V3 Protocol, and click Start. The AC-DCN automatically discovers devices. Step 3 Choose Network > Physical Resource > Network Device, select the discovered TOR node, and click Add to POD. Step 4 In the Add to POD dialog box, enter the name of the POD to which the node will be added and click Add. Step 5 Choose Network > Link Management > Link List, click Link Discover, select all devices, and click Find. The AC-DCN rediscovers the device links. Step 6 Access the created POD, click the Device tab, and click Switch. Click Netconf after the added TOR node, and set NETCONF parameters (set the port number to 22). Step 7 Specify a role for the TOR node in the POD. You can specify a role for a device in a POD using either of the following methods: l (Recommended) On the TOPO page of the POD, right-click the device to be configured and specify a role for the device. For example, right-click the added TOR node and click Set as AGG. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 179 Configuration Examples for the Financial Industry l 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network On the Device page of the POD, select Physical Network Device and define roles of devices in the physical network device list. For example, select the added TOR node, click Set as AGG, and then click Save the Configuration. Step 8 Choose Network > POD Management > POD. On the Device tab page, select NVE, then select the added device, and click Read Device VTEP IP. ----End 4.2.9.2 Replacing a Device The prerequisites for replacing a device are as follows: l Hardware information such as device model and ports about the new device is the same as that of the old device. l The software version of the new device is the same as or later than that of the old device. l A license has been installed on the new device and the license specifications are the same as or higher than those on the old device. l The new device is not connected to the AC-DCN and not managed by the AC-DCN. l The new device has sufficient memory to store latest configuration files. Device replacement consists of the old device going offline and the new device going online. For the AC-DCN, the process is the same as the restart process of a device. Step 1 Log in to the AC-DCN, choose Network > Physical Resource > Network Device, select the device to be replaced, and click Replace. The Device replace page is displayed. Step 2 Check the new device based on the preceding prerequisites, and click Next. Step 3 Log in to the old device, display the CLI window, and backup the device configuration files. Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 180 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network CAUTION After the configuration files are saved, power off and remove the old device immediately. Do not deliver a service to the old device; otherwise, the service that is not saved in the configuration files cannot be restored. Do not modify the configuration files. If VSs are created, back up and restore the configuration files of the VSs except VS0. Step 4 Power off the old device and remove it from the network. Step 5 On the Device replace page, click Clear Public Key. Step 6 Connect the new device to the network. Ensure that all physical cable connections are the same as those of the old device. Step 7 Power on the new device, import the backed-up configuration files, and specify the configuration files for the next startup. Step 8 Restart the new device without saving the current configuration. After the new device restarts, it automatically goes online on the AC-DCN. NOTE After you restart a device, the device automatically restores configurations, which takes a period of time. Wait for 5 minutes to 10 minutes. Step 9 After configurations restore on the new device, run the rsalocal-key-pair create command to generate a local RSA key pair for the NETCONF connection between the AC-DCN and the device. The RSA key pair will not be lost after the device restarts. Run the display rsa local-key-pair public command to view the public key information. Step 10 On the Device replace page, click Clear Public Key. Step 11 On the Device replace page, click Check Connection, check whether the NETCONF connection between the AC-DCN and the device is normal, and click Next. NOTE If the NETCONF connection between the AC-DCN and the device fails to be established, perform the following operations: l Set NETCONF parameters on the device. l Log in to the AC-DCN, choose Network > POD Management > POD and click the Device tab. l Click the Switch or TOR tab based on the role of the device, find the target device, and click Netconf. l On the Netconf Configure page, set connection parameters to the same as those configured on the device. Step 12 Click Device Audit to check the audit result. Ensure that the services are restored. l If the audit result is normal, the services are successfully restored on the new device. l If the audit result is abnormal, check configurations on the device in sequence and determine whether to modify the configurations. ----End 4.2.9.3 Deleting a Device If a physical device on a user network is no longer used, delete the device from the POD. Before deleting the device from the POD, delete corresponding upper-layer services to release Issue 03 (2017-05-08) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 181 Configuration Examples for the Financial Industry 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network device resources that are occupied by the upper-layer services. When you delete a network device from a POD, the system will display resources of the device that are occupied by services. Delete resources based on Table 4-3. Table 4-3 Resource release guide Resource Service Operations to Release Resources VLAN DHCP Neutron port service 1. Log in to the AC-DCN and choose Tenant > Tenant Management > Tenant. 2. Click the tenant name and select Port. 3. Check the access device information in port details. If the access device is the device to be deleted, record the port name. 4. Log in to the cloud platform and delete the recorded port. Bare metal server Neutron port service Release the bare metal server on the cloud platform. VM Neutron port service Choose Network > POD Management > POD > Device > vSwitch and check the switches to which VMs are connected. Delete the VMs that are connected to the switch to be deleted. LB Neutron port service Log in to the AC-DCN and choose Tenant > Tenant Management > Tenant. Click the tenant name and select Port. Check the access device information in port details. If the access device is the device to be deleted, record the port name. Log in to the cloud platform and delete the recorded port. BD L2BR port service Delete the L2BR port that is associated with the device to be deleted. PXE pre-configuration port service Delete the PXE port that is associated with the device to be deleted. DHCP Neutron port service 1. Log in to the AC-DCN and choose Tenant > Tenant Management > Tenant. 2. Click the tenant name and select Port. 3. Check the access device information in port details. If the access device is the device to be deleted, record the port name. 4. Log in to the cloud platform and delete the recorded port. Bare metal server Neutron port service Issue 03 (2017-05-08) Release the bare metal server on the cloud platform. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 182 Configuration Examples for the Financial Industry Resource 4 DCN Deployment Solution Based on the Agile Controller and Integrated Hardware Overlay Network Service Operations to Release Resources VM Neutron port service 1. Choose Network > POD Management > POD > Device > vSwitch and check the switches to which VMs are connected. 2. Delete the VMs that are connected to the switch to be deleted. LB Neutron port service 1. Log in to the AC-DCN and choose Tenant > Tenant Management > Tenant. 2. Click the tenant name and select Port. 3. Check the access device information in port details. If the access device is the device to be deleted, record the port name. 4. Log in to the cloud platform and delete the recorded port. vFM L2BR port service Delete the L2BR port that is associated with the device to be deleted. PXE pre-configuration port service Delete the PXE port that is associated with the device to be deleted. Internal interfaces associated with the vRouter Delete the internal interfaces associated with the vRouter. External gateways associated with the vRouter 1. Delete the vFM services, including EIP, SNAT, VPN, and security policies. vFM services (including EIP, SNAT, VPN, and security policies) Interface interconnec tion External gateways associated with the vRouter vFM services (including EIP, SNAT, VPN, and security policies) VPN Creating VPC External gateways associated with the vRouter Internal interfaces associated with the vRouter Issue 03 (2017-05-08) 2. Cancel associations between external gateways and the vRouter. 1. Delete the vFM services, including EIP, SNAT, VPN, and security policies. 2. Cancel associations between external gateways and the vRouter. 1. Delete the vFM services, including EIP, SNAT, VPN, and security policies. 2. Cancel associations between external gateways and the vRouter. 3. Cancel associations of internal interfaces and the vRouter. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 183