3.
(Optional) Run the
security anti-macspoofing max-mac-count
command to set
the maximum number of MAC addresses that can be bound to a service flow.
4.
(Optional) Run the
security anti-macspoofing exclude
command to configure
the types of packets for which MAC address anti-spoofing does not take effect,
such as Internet Group Management Protocol (IGMP) packets.
–
Enable IP address anti-spoofing on ONUs.
IP address anti-spoofing can be enabled or disabled at three levels: global, VLAN,
and service port levels. This function takes effect only after it is enabled at the three
levels. Among the three levels, IP address anti-spoofing is disabled only at the global
level by default.
1.
In global config mode, run the
security anti-ipspoofing enable
command to
enable IP address anti-spoofing at the global level.
2.
In VLAN service profile mode, run the
security anti-ipspoofing enable
command to enable IP address anti-spoofing at the VLAN level.
3.
Run the
security anti-ipspoofing service-port serviceport-id
enable
command
to enable IP address anti-spoofing at the service port level.
----End
14.4.4.7 Configuring E2E Reliability
This topic describes how to configure end-to-end (E2E) protection schemes for the enterprise
private line service which has a high requirement on service reliability.
Context
Reliability covers equipment reliability, upstream networking protection, and downstream
networking protection. For details on reliability data planning, see
.
l
Upstream networking protection includes link aggregation group and protection group.
Usually, link aggregation group is configured when the GIU board is used to transmit traffic
upstream; protection group is configured when the main control board is used to transmit
traffic upstream. The two protection schemes are not configured at the same time.
l
Downstream networking protection includes Type B, Type C single homing, and Type C
dual homing, which are used to protect service ports. Ports on the same ONU can be
configured only with the same protection scheme.
NOTE
This topic describes how to configure five mainstream protection schemes. Select required protection schemes
based on the carrier's requirement and actual networking scenario.
Procedure
l
Configure a link aggregation group.
Bind upstream ports 0/19/0 and 0/19/1 together as an aggregation link group. Each member
port in the group transmits packets based on source MAC addresses. The working mode is
LACP static aggregation.
huawei(config)#
link-aggregation 0/19 0-1 ingress workmode lacp-static
l
Configure a protection group.
SmartAX MA5600T/MA5603T/MA5608T Multi-service
Access Module
Commissioning and Configuration Guide
14 FTTM Configuration (Base Station Access)
Issue 01 (2014-04-30)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
1460