H3C SecPath F5000-AI160[F5000-E] Firewalls Installation Guide-5W101

HomeSupportResource CenterSecurityH3C SecPath F5000 FirewallH3C SecPath F5000 FirewallTechnical DocumentsInstall & UpgradeInstallation GuidesH3C SecPath F5000-AI160[F5000-E] Firewalls Installation Guide-5W101
01-Text
Title Size Download
01-Text 8.65 MB

Contents

1 Preparing for installation· 1

Safety recommendations· 1

Safety symbols· 1

General safety recommendations· 1

Electrical safety· 2

Laser safety· 2

Handling safety· 2

Examining the installation site· 3

Weight support 3

Temperature and humidity· 3

Cleanliness· 3

Cooling system·· 4

ESD prevention· 4

EMI 4

Lightning protection· 5

Power supply· 5

Installation tools· 5

Installation accessories· 6

Pre-installation checklist 6

2 Installing the firewall 8

Installation flow· 8

Mounting the firewall on a workbench· 8

Installing the firewall in a standard 19-inch rack· 9

Grounding the firewall 13

Grounding the firewall with a grounding strip· 13

Grounding the firewall with the grounding terminal on the rack· 14

Installing a fan tray· 14

Installing a power supply· 15

Installing a drive· 16

Installing a USB drive· 17

Connecting Ethernet cables· 18

Connecting a fiber port 18

Connecting power cords· 20

Connecting an AC power cord· 20

Connecting a DC power cord· 21

Verifying the installation· 21

3 Accessing the firewall 3-22

Starting the firewall 3-22

Pre-start checking· 3-22

Starting the firewall and observing the initial startup conditions· 3-22

Logging in to the firewall 3-23

Logging in from the Web interface· 3-23

Logging in from the serial console port or micro USB console port 3-24

Logging in through Telnet 3-24

4 Hardware replacement 4-25

Replacing a power supply· 4-25

Replacing a drive· 4-26

Replacing a USB drive· 4-26

Replacing a transceiver module· 4-27

5 Hardware management and maintenance· 5-29

Displaying detailed information about the firewall 5-29

Displaying software and hardware version information for the firewall 5-29

Displaying electrical label information for the firewall 5-30

Displaying the CPU usage of the firewall 5-31

Displaying the memory usage of the firewall 5-32

Displaying the operational status of power supplies· 5-32

Displaying the operational status of fan trays· 5-33

Displaying temperature information for the firewall 5-34

Displaying the operational statistics about the firewall 5-34

Displaying transceiver module information· 5-35

Rebooting the firewall 5-36

6 Troubleshooting· 6-37

Power supply failure· 6-37

Configuration terminal display issue· 6-37

Password loss· 6-37

Cooling system failure· 6-38

Software loading failure· 6-38

7 Appendix A  Chassis views and technical specifications· 7-38

Chassis views· 7-39

Power supplies· 7-40

AC power supplies· 7-40

DC power supplies· 7-40

Fan trays· 7-41

Dimensions and weights· 7-41

Chassis· 7-41

Drives· 7-41

Storage media specifications· 7-42

Power consumption· 7-42

Chassis· 7-42

Drives· 7-42

Power supply specifications· 7-42

Fan tray specifications· 7-43

Port specifications· 7-43

Console port 7-43

Micro USB port 7-43

10 GE fiber port 7-44

100 GE fiber port 7-45

8 Appendix B  LEDs· 8-48

9 Appendix C  Cables· 9-50

Console cable· 9-50

RJ-45 to DB9 console cable· 9-50

Micro USB console cable· 9-50

Ethernet twisted pair cable· 9-51

Introduction· 9-51

Making an Ethernet twisted pair cable· 9-54

Optical fiber 9-54

 


1 Preparing for installation

This document is applicable to the F5000-AI160 and F5000-E firewalls.

Safety recommendations

To avoid any equipment damage or bodily injury, read the following safety recommendations before installation. Note that the recommendations do not cover every possible hazardous condition.

Safety symbols

When reading this document, note the following symbols:

WARNING WARNING means an alert that calls attention to important information that if not understood or followed can result in personal injury.

CAUTION CAUTION means an alert that calls attention to important information that if not understood or followed can result in data loss, data corruption, or damage to hardware or software.

General safety recommendations

·     Do not place the firewall on an unstable case or desk. The firewall might be severely damaged in case of a fall.

·     Make sure the ground is dry and flat and anti-slip measures are in place.

·     Keep the chassis and installation tools away from walk areas.

·     Keep the chassis clean and dust-free.

·     Do not place the firewall near water or in a damp environment. Prevent water or moisture from entering the firewall chassis.

·     Ensure good ventilation of the equipment room and keep the air inlet and outlet vents of the firewall free of obstruction.

·     Make sure the operating voltage is in the required range.

·     Use a screwdriver, rather than your fingers, to fasten screws.

·     Stack devices according to the sizes of and packing symbols on the packages.

Figure1-1 Packing symbols

Symbol

Description

Stored with a maximum stack of n units.

Transported and stored with the arrows up.

Transported and stored with care.

Transported and stored avoiding humidity, rains and wet floor.

 

Electrical safety

·     Carefully examine your work area for possible hazards such as moist floors, ungrounded power extension cables, and missing safety grounds.

·     Locate the emergency power-off switch in the room before installation. Shut the power off at once in case accident occurs.

·     Do not work alone when the firewall has power.

·     Always verify that the power has been disconnected.

Laser safety

WARNING

WARNING!

Disconnected optical fibers or transceiver modules might emit invisible laser light. Do not stare into beams or view directly with optical instruments when the firewall is operating.

 

The firewall is a Class 1 laser device.

·     Before you disconnect the fiber connector, execute the shutdown command in interface view to disable the optical source.

·     Attach dust caps to disconnected optical fiber connectors and dust plugs to ports on disconnected transceiver modules to avoid damage caused by built-up dust.

·     Insert a dust plug into empty fiber ports.

Handling safety

When you move the firewall, follow these guidelines:

·     Move and unpack the firewall carefully to avoid firewall damage.

·     Unpack the firewall at least half an hour and power on the firewall at least two hours after you move it from a place below 0°C (32°F) to the equipment room. This prevents condensation and even damage to the firewall.

·     Use a safety hand truck when you move multiple firewalls.

·     Before you move the firewall, remove all cables and mounting brackets.

·     For long-distance transportation, remove all the removable components, such as power supplies and interface modules, and package them separately, and install the filler panels supplied with the firewall. For short-distance transportation, make sure all the removable components are securely seated in the slots and the screws are fastened.

·     When you move or lift the firewall chassis, support the bottom of the chassis, rather than holding any removable component. Make sure the accessories of the firewall are not lost or damaged during firewall moving.

Examining the installation site

The firewall can only be used indoors. To make sure the firewall operates correctly and to prolong its service lifetime, the installation site must meet the following requirements.

Weight support

Make sure the floor can support the total weight of the rack, chassis, modules, and all other components. For weights of the chassis and components, see "Appendix A  Chassis views and technical specifications."

Temperature and humidity

Maintain appropriate temperature and humidity in the equipment room.

·     Lasting high relative humidity can cause poor insulation, electricity leakage, mechanical property change of materials, and metal corrosion.

·     Lasting low relative humidity can cause washer contraction and ESD and bring problems including loose captive screws and circuit failure.

·     High temperature can accelerate the aging of insulation materials and significantly lower the reliability and lifespan of the firewall.

For the temperature and humidity requirements of the firewall, see Table1-1.

Table1-1 Temperature/humidity requirements

Temperature

Relative humidity

·     Operating: 0°C to 45°C (32°F to 113°F)

·     Storage: –40°C to +70°C (–40°F to +158°F)

·     Operating: 5% to 95%, noncondensing

·     Storage: 5% to 95%, noncondensing

 

Cleanliness

Dust buildup on the chassis might result in electrostatic adsorption, which causes poor contact of metal components and contact points, especially when indoor relative humidity is low. In the worst case, electrostatic adsorption can cause communication failure.

Table1-2 Dust concentration limit in the equipment room

Substance

Concentration limit (particles/m3)

Dust particles

≤ 3 × 104 (No visible dust on desk in three days)

NOTE:

Dust particle diameter ≥ 5 µm

 

The equipment room must also meet strict limits on salts, acids, and sulfides to eliminate corrosion and premature aging of components, as shown in Table1-3.

Table1-3 Harmful gas limits in an equipment room

Gas

Max. (mg/m3)

SO2

0.2

H2S

0.006

NH3

0.05

Cl2

0.01

NO2

0.04

 

Cooling system

The firewall provides front side-intake and rear side-exhaust airflow for heat dissipation. For adequate cooling of the firewall, follow these guidelines:

·     Install the firewall at the installation site with its airflow direction meeting the ventilation requirements.

¡     Ensure a minimum clearance of 100 mm (3.94 in) around the air inlet and outlet vents of the chassis.

¡     If you install the firewall in a standard 19-inch rack, ensure a distance of 1U (44.45 mm, or 1.75 in) between the chassis and other devices.

·     Make sure the installation site has a good cooling system.

Figure1-2 Airflow through the chassis

 

ESD prevention

To prevent electrostatic discharge (ESD), follow these guidelines:

·     Make sure the firewall, the workbench, and the rack are reliably grounded.

·     Take dust-proof measures for the equipment room. For more information, see "Cleanliness."

·     Maintain the humidity and temperature at an acceptable level. For more information, see "Temperature and humidity."

·     Put the removed power supplies away on an ESD workbench, with the PCB upward, or put them in ESD bags for future use.

·     Always wear ESD clothing, ESD gloves, and an ESD wrist strap.

EMI

All electromagnetic interference (EMI) sources, from outside or inside of the firewall and application system, adversely affect the firewall in the following ways:

·     A conduction pattern of capacitance coupling.

·     Inductance coupling.

·     Electromagnetic wave radiation.

·     Common impedance (including the grounding system) coupling.

To prevent EMI, use the following guidelines:

·     If AC power is used, use a single-phase three-wire power receptacle with protection earth (PE) to filter interference from the power grid.

·     Keep the firewall far away from radio transmitting stations, radar stations, and high-frequency devices.

·     Use electromagnetic shielding, for example, shielded interface cables, when necessary.

·     To prevent signal ports from getting damaged by overvoltage or overcurrent caused by lightning strikes, route interface cables only indoors. If part of the network cable of an Ethernet port must be routed outdoors, connect a lightning arrester to the cable before you plug the cable into the port.

Lightning protection

To protect the firewall from lightning better, follow these guidelines:

·     Make sure the grounding cable of the chassis is reliably grounded.

·     Make sure the grounding terminal of the AC power receptacle is reliably grounded.

·     Install a lightning arrester at the input end of the power supply to enhance the lightning protection capability of the power supply.

 

IMPORTANT

IMPORTANT:

No network port lightning arrester or AC power lightning arrester is provided with the firewall. Prepare them as required. For the technical specifications and installation instructions for the lightning protectors, see the documents shipped with them.

 

Power supply

Verify that the power system at the installation site meets the requirements of the power supplies, including the input method and rated input voltage. For more information, see "Appendix A  Chassis views and technical specifications."

Installation tools

All installation tools are user supplied.

Table1-4 Installation tools

Flat-head screwdriver

Phillips screwdriver

Needle-nose pliers

Marker

 

 

Diagonal pliers

ESD wrist strap

 

 

 

Installation accessories

Table1-5  Installation accessories

M6 screw

Cage nut

Front mounting bracket and M4 mounting screw

Rear mounting bracket and M4 shoulder screw

 

Rubber feet

Console cable

Grounding cable

 

 

Pre-installation checklist

Table1-6 Checklist before installation

Item

Requirements

Result

Installation site

Ventilation

·     Ensure a minimum clearance of 100 mm (3.94 in) around the air inlet and outlet vents of the chassis.

·     If you install the firewall in a standard 19-inch rack, ensure a distance of 1U (44.45 mm, or 1.75 in) between the chassis and other devices.

·     A good ventilation system is available at the installation site.

 

Temperature

·     Operating: 0°C to 45°C (32°F to 113°F)

·     Storage: –40°C to +70°C (–40°F to +158°F)

 

Relative humidity

·     Operating: 5% RH to 95% RH, noncondensing

·     Storage: 5% RH to 95% RH, noncondensing

 

Cleanness

·     Dust concentration ≤ 3 × 104 particles/m3

·     No dust on desk within three days

 

ESD prevention

·     The equipment, workbench, and rack are reliably grounded.

·     The equipment room is dust-proof.

·     The humidity and temperature are at an acceptable level.

·     Wear an ESD wrist strap and make sure it makes good skin contact and is reliably grounded when installing removable components.

·     Put the removed interface modules away on an ESD workbench, with the PCB upward, or put them in ESD bags for future use.

·     Touch only the edges, instead of electronic components when observing or moving a removed interface module.

 

EMI prevention

·     Take effective measures to protect the power system from the power grid system.

·     Separate the protection ground of the firewall from the grounding device or lightning protection grounding device as far as possible.

·     Keep the firewall far away from radio stations, radar and high-frequency devices working in high current.

·     Use electromagnetic shielding when necessary.

 

Lightning protection

·     The grounding cable of the chassis is reliably grounded.

·     The grounding terminal of the AC power receptacle is reliably grounded.

·     (Optional.) A power lightning arrester is installed.

 

Electricity safety

·     Equip a UPS.

·     Locate the power switch in the equipment room. In case of emergency during operation, switch off the power switch.

 

Rack-mounting requirements

·     Make sure the rack is equipped with a good ventilation system.

·     The rack is sturdy enough to support the weight of the firewall and installation accessories.

·     The size of the rack is appropriate for the firewall.

·     The front and rear of the rack are a minimum of 0.8 m (31.50 in) away from walls or other devices.

 

Safety precautions

·     The firewall is far away from any moist area and heat source.

·     The emergency power switch in the equipment room is located.

 

Tools and accessories

·     Installation accessories supplied with the firewall

·     User-supplied tools

 

Reference

·     Documents shipped with the firewall

·     Online documents

 

 


2 Installing the firewall

WARNING

WARNING!

Keep the tamper-proof seal on a mounting screw on the chassis cover intact, and if you want to open the chassis, contact H3C for permission. Otherwise, H3C shall not be liable for any consequence.

 

The installation procedure is the same for the F5000-AI160 and F5000-E firewalls. This document installs an F5000-AI160 firewall.

Installation flow

Table2-1 Installation flow for the F5000-AI160/F5000-E firewall

Step

Description

1.     Start

Before installation, make sure all requirements on the checklist are met and the firewall is powered off.

2.     Mounting the firewall on a workbench

Verify that the workbench is sturdy and reliably grounded. Ensure a minimum clearance of 100 mm (3.94 in) around the air inlet and outlet vents of the chassis.

3.     Installing the firewall in a standard 19-inch rack

The firewall is heavy. Both mounting brackets and slide rails are required to support the weight of the chassis.

4.     Grounding the firewall

Before installation, make sure the firewall and rack are grounded correctly and you wear an ESD wrist strap.

5.     Installing a fan tray

Install compatible fan trays on the firewall.

6.     Installing a power supply

Before you install a power supply, make sure the power supply is not connected to any power source and the grounding cable of the firewall is connected reliably.

7.     Installing a drive

Install compatible drives on the firewall.

8.     Installing a USB drive

Install compatible USB drives on the firewall.

9.     Connecting Ethernet cables

The firewall provides various ports. Choose compatible transceiver modules and cables as required. To avoid bodily injury or device damage, read the restrictions and guidelines carefully before connection.

10.     Connecting power cords

Connect compatible power cords to the power supplies.

11.     Verifying the installation

Verify that the firewall is installed securely and reliably grounded, and that the power supplies are as required.

 

Mounting the firewall on a workbench

IMPORTANT

IMPORTANT:

Avoid placing heavy objects on the firewall.

 

If a standard 19-inch rack is not available, you can place the firewall on a workbench.

To mount the firewall on a workbench:

1.     Verify that the workbench is sturdy and reliably grounded.

2.     Place the firewall upside down on the workbench and clean the four round holes in the chassis bottom with a dry cloth.

3.     Attach the four rubber feet to the round holes in the chassis bottom.

4.     Place the firewall with upside up on the workbench.

Figure2-1 Mounting the firewall on a workbench

 

Installing the firewall in a standard 19-inch rack

WARNING

WARNING!

To avoid bodily injury and device damage, use a minimum of two persons to rack-mount the firewall.

 

CAUTION

CAUTION:

As a best practice, use slide rails together with the mounting brackets to support the weight of the chassis.

 

To install the firewall in a standard 19-inch rack:

1.     Unpack the firewall and accessories.

2.     Mark the cage nut installation positions on the rack posts by using the mounting brackets.

Use a front mounting bracket to mark the installation positions on the front rack posts and use a rear mounting bracket to mark the installation positions on the rear rack posts. Install cage nuts.

Figure2-2 Installing cage nuts

 

3.     Attach the front mounting brackets and shoulder screws to both sides of the firewall with M4 screws provided with the firewall.

Figure2-3 Attaching mounting brackets and shoulder screws to the firewall

 

4.     Attach the rear mounting brackets to the rear rack posts. The rear mounting brackets can be attached to the rear rack posts with the wide flange inside or outside the rack.

Table2-2 Installation methods of rear mounting brackets

Distance between the front and rear rack posts

Rear mounting bracket installation method

421 to 556 mm (16.57 to 21.89 in)

With the wide flange inside the rack.

264 to 399 mm (10.39 to 15.71 in)

With the wide flange outside the rack.

Caution:

To prevent the rear mounting brackets from obstructing the closing of the rack door, ensure a distance greater than 153 mm (6.02 in) between the rear rack posts and the interior side of the rack door.

 

Figure2-4 Attaching the rear mounting brackets to the rear rack posts (with the wide flange inside the rack)

 

Figure2-5 Attaching the rear mounting brackets  to the rear rack posts (with the wide flange outside the rack)

 

5.     Mount the firewall in the rack. Use M6 screws to secure the mounting brackets to the front rack posts and make sure the shoulder screws rest firmly on the upper edge of the rear mounting brackets.

Figure2-6 Mounting the firewall in the rack (with the wide flange of the rear mounting brackets inside the rack)

 

Figure2-7 Mounting the firewall in the rack (with the wide flange of the rear mounting brackets outside the rack)

 

Grounding the firewall

WARNING

WARNING!

·     Correctly connecting the firewall grounding cable is crucial to lightning protection and EMI protection.

·     Do not connect the firewall grounding cable to a fire main or lightning rod.

·     The firewall has three grounding points. Use the grounding point at the power supply side to ground the firewall. The other two grounding points at the side panels are reserved.

 

You can ground the firewall in one of the following ways, depending on the grounding conditions available at the installation site.

Grounding the firewall with a grounding strip

If a grounding strip is available at the installation site, connect the grounding cable through the grounding strip.

To connect the grounding cable:

1.     Remove the grounding screw from the firewall chassis.

2.     Attach the grounding screw to the ring terminal of the grounding cable.

3.     Use a screwdriver to fasten the grounding screw into the grounding hole on the firewall.

4.     Remove the hex nut from the grounding strip.

5.     Use a pair of needle-nose pliers to bend a hook at the other end of the grounding cable. Attach the hook to the grounding point, and secure the hook with a screw.

Figure2-8 Grounding the firewall with a grounding strip

 

Grounding the firewall with the grounding terminal on the rack

1.     Remove the grounding screw from the firewall chassis.

2.     Attach the grounding screw to the ring terminal of the grounding cable.

3.     Use a screwdriver to fasten the grounding screw into the grounding hole on the firewall.

4.     Remove the grounding screw from the grounding point on the rack.

5.     Attach the ring terminal at the other end of the grounding cable to the grounding point on the rack.

Figure2-9 Grounding the firewall with the grounding terminal on the rack

 

Installing a fan tray

CAUTION

CAUTION:

·     The firewall comes with the six fan tray slots empty. To ensure good ventilation, make sure the firewall is fully configured with fan trays.

·     If a fan tray fails during operation, replace the fan tray as soon as possible and keep the failed fan tray in place before you replace it. Do not remove multiple failed fan trays at the same time. Replace the fan trays one after another.

·     Before installation, make sure the fan tray airflow direction meets the requirements for installation ventilation.

·     Before installation, orient the fan tray with the "TOP" mark on the top.

 

No fan trays are provided with the firewall. Purchase them as needed.

To install a fan tray:

1.     Face the rear panel of the firewall.

2.     Orient the fan tray with the "TOP" mark on the top. Grasp the handle of the fan tray with one hand and support the fan tray bottom with the other. Slide the fan tray along the guide rails into the slot until the fan tray is fully seated in the slot.

Figure2-10 Installing a fan tray

 

Installing a power supply

CAUTION

CAUTION:

·     Do not install AC and DC power supplies on the same firewall.

·     Before installing a power supply, make sure the power supply is powered off and the grounding cable is correctly connected.

 

No power supplies are provided with the firewall. Purchase them as needed. The installation procedure is similar for power supplies of different models.

To install a power supply:

1.     Remove the filler panel from the target slot.

Figure2-11 Removing the filler panel from a firewall

 

2.     Orient the power supply with its power receptacle to the right of the handle. Holding the handle of the module with one hand and supporting the module bottom with the other, slide the power supply slowly into the slot along the guide rails.

Figure2-12 Installing an AC power supply

 

Figure2-13 Installing a DC power supply

 

Installing a drive

CAUTION

CAUTION:

·     To avoid damage to drives, always hold a drive by its sides. Do not touch any components and do not squeeze, vibrate, or strike a drive.

·     Drives are hot swappable.

·     Install a filler panel in empty drive slots to prevent dust and ESD damage.

 

IMPORTANT

IMPORTANT:

·     The firewall does not come with any drives and cannot recognize drives from other vendors. Purchase drives from H3C as needed.

·     Before using the drive, execute the fdisk and format commands from the CLI to partition and format the drive.

 

To install a drive, push the drive into the slot slowly along the guide rails until the drive seats in the slot.

Figure2-14 Installing a drive

 

Installing a USB drive

IMPORTANT

IMPORTANT:

·     The firewall does not come with any USB drives. Purchase USB drives yourself as needed.

·     The firewall supports only USB drives with USB2.0 connectors.

·     USB drives are plug and play. To use a USB drive, connect it to a USB port on the firewall.

 

To install a USB drive:

1.     Face the front panel of the firewall.

2.     Correctly orient the USB drive, and then push the USB drive slowly into the slot until the USB drive seats in the slot.

To avoid slot damage, do not use excessive force when you install the USB drive.

Figure2-15 Installing a USB drive

 

Connecting Ethernet cables

Connecting a fiber port

WARNING

WARNING!

Disconnected optical fibers or transceiver modules might emit invisible laser light. Do not stare into beams or view directly with optical instruments when the firewall is operating.

 

CAUTION

CAUTION:

·     Never bend or curve a fiber excessively. The bend radius of a fiber must be not less than 100 mm (3.94 in).

·     Keep the fiber end clean.

·     Make sure the fiber connector matches the transceiver module.

·     Before connecting a fiber, make sure the optical power at the receiving end does not exceed the transceiver module's upper threshold of the optical receive power. If the optical power at the receiving end exceeds the threshold, the transceiver module might be damaged.

 

The firewall supports the following transceiver modules:

·     GE SFP copper transceiver modules.

·     GE SFP transceiver modules.

·     10GE SFP+ transceiver modules.

·     40G QSFP+ transceiver modules.

·     100G QSFP+ transceiver modules.

For the transceiver module specifications, see port specifications in "Appendix A  Chassis views and technical specifications."

No transceiver module is provided with the firewall. As a best practice, use H3C transceiver modules.

Figure2-16 GE SFP copper transceiver module

SFP-GE-T_FL_1406.png

 

Figure2-17 GE SFP transceiver module

图-1副本

 

Figure2-18 10GE SFP+ transceiver module

 

Figure2-19 QSFP+ transceiver module with an MPO port

 

Figure2-20 QSFP+ transceiver module with an LC port

QSFP-40G-LR4-WDM1300_FL_1403.png

 

To connect the firewall to the network through an optical fiber:

1.     Remove the dust plug from the fiber port.

2.     Pull the bail latch on the transceiver module upwards. Skip this step if the bail latch is plastic. Then correctly orient the transceiver module.

3.     Taking the transceiver module by its two sides, push the transceiver module gently into the port until you feel it snap into place.

4.     Remove the dust plug and dust cap from the transceiver module and fiber connector, respectively. Then clean the end face of the fiber connector.

5.     Connect the optical fiber to the transceiver module.

¡     LC connector—Align the connector with the transceiver module and push the connector into the transceiver module slightly until it clicks into place.

¡     MPO connector—Orient the connector with the white dot on it facing right. Insert the connector horizontally into the transceiver module. Push the connector into the transceiver module slightly until it clicks into place.

6.     Use cable ties to bind the optical fiber every 150 mm (5.91 in).

7.     Affix cable labels to the optical fiber as required.

Figure2-21 Installing a transceiver module and optical fiber (LC connector)

 

Figure2-22 Installing a transceiver module and optical fiber (MPO connector)

 

Connecting power cords

CAUTION

CAUTION:

Make sure the grounding cable of the firewall is correctly connected and the power source is powered off before connecting the power cord.

 

Connecting an AC power cord

1.     Connect the female connector of the AC power cord to the AC-input power receptacle on the power supply.

2.     Use a cable tie to secure the AC power cord to the power supply handle.

3.     Connect the other end of the power cord to an AC power source.

Figure2-23 Connecting an AC power cord

 

Connecting a DC power cord

1.     Use a screwdriver to loosen the screws on the protection cover over the power receptacle and then remove the cover.

2.     Correctly orient the DC power cord connector with the power receptacle on the power supply, and insert the connector into the receptacle.

The receptacle is foolproof. If you cannot insert the connector into the receptacle, re-orient the connector rather than use excessive force to push it in.

3.     Fasten the captive screws on the power cord connector with a screwdriver to secure the power cord connector.

4.     Use a cable tie to secure the power cord to the handle.

5.     Connect the other end of the power cord to a DC power source.

Figure2-24 Connecting a DC power cord

 

Verifying the installation

Verify the following items to ensure correct installation:

·     There is enough space for heat dissipation around the firewall.

·     The firewall and its components are installed securely. The screws are fastened tightly.

·     The power source specifications are as required by the firewall.

·     The grounding cable and power cords are connected correctly.

 


3 Accessing the firewall

Starting the firewall

Pre-start checking

WARNING

WARNING!

Locate the emergency power-off switch in the room before powering on the firewall so you can quickly shut power off when an electrical accident occurs.

 

Before powering on the firewall, verify that the following conditions are met:

·     The power cord and grounding cable are connected correctly.

·     The power source specifications meet the firewall requirements.

·     The firewall is connected correctly to a configuration terminal (a PC for example). The configuration terminal has been started and the parameters have been set correctly. For more information, see "Logging in from the serial console port or micro USB console port."

·     The interface modules (if any) are installed correctly.

Starting the firewall and observing the initial startup conditions

1.     Turn on the circuit breakers to power on the firewall.

2.     Observe the initial startup conditions to verify that the firewall starts up correctly.

¡     The LEDs on the front panel indicate that the firewall is operating correctly. For more information about LEDs, see "Appendix B  LEDs."

¡     The fan blades are rotating and air is exhausted from the air outlet vents.

¡     The configuration terminal displays the following information:

The output on the configuration terminal varies by firewall software version.

System is starting...

Press Ctrl+D to access BASIC-BOOTWARE MENU...

Press Ctrl+T to access BOOTWARE DIAG-TEST MENU

Booting Normal Extended Bootwaredone

In:   serial

Out:   serial

Err:   serial

****************************************************************************

*                                                                          *

*                   H3C F5000-AI160 BootWare, Version 1.03                 *

*                                                                          *

****************************************************************************

Copyright (c) 2004-2021 New H3C Technologies Co.,Ltd.

Compiled Date       : Dec 1 2021 15:53:04

Memory Type         : DDR4 SDRAM

Memory Size         : 32768MB

SPI Flash Size      :32MB

EMMC Flash Size     :7296MB

usba0 Size          :253MB

CPLD Version        :2.0

PCB Version         :Ver.A

 

 

BootWare Validating...

Press Ctrl+B to access EXTENDED-BOOTWARE MENU...

Loading the main image files...

Loading file flash:/F5000AIFW-CMW710-SYSTEM-E8371P07.bin...................................................Done.

flash:/F5000AIFW-CMW710-SYSTEM-E8371P07.bin..... Done.

Image file flash:/F5000AIFW-CMW710-BOOT-E8371P07.bin is self-decompressing....Done...

System image is starting...

System is starting

 

Cryptographic algorithms tests passed.

Line con0 is available.

 

 

Press ENTER to get started.

Press Enter to access user view of the firewall.

 

 

NOTE:

To access the EXTENDED-BOOTWARE menu, press Ctrl + B within four seconds at the prompt "Press Ctrl+B to access EXTENDED-BOOTWARE MENU." If you do not press Ctrl+B at the prompt, the system starts to read and decompress program files. To enter the EXTENDED-BOOT menu afterwards, you need to reboot the firewall.

 

Logging in to the firewall

You can use the following methods to access and manage the firewall. For more information about logging in to the firewall, see the configuration guides and command references for the firewall.

·     Logging in from the Web interface

·     Logging in from the serial console port or micro USB console port

·     Logging in through Telnet

Logging in from the Web interface

The default Web interface login information is as follows:

·     Username—admin

·     Password—admin

·     IP address of the management Ethernet port (MGMT)—192.168.0.1/24

To log in to the firewall from the Web interface by using the default account:

1.     Use an Ethernet cable to connect a PC to the management Ethernet port on the firewall.

2.     Configure an IP address in subnet 192.168.0.0/24 for the PC. Make sure the PC and the firewall are reachable to each other.

The PC must use a different IP address than the management Ethernet port.

3.     Start a browser, enter 192.168.0.1 in the address bar, and press Enter.

4.     Enter the default username admin and password admin and then click Login.

5.     Modify the login information.

At the first login from the Web interface, change the password as required in the pop-up window, and then click OK.

Keep the new password secure.

Logging in from the serial console port or micro USB console port

By default, the firewall uses the scheme access authentication mode. The username and password are both admin.

To access and manage the firewall locally, connect the serial console port or the micro USB console port on the firewall to a configuration terminal (a PC for example). Only the micro USB console port is available if you connect both the serial console port and micro USB console port.

To configure and manage the firewall from the serial console port or micro USB console port, you must run a terminal emulator program, TeraTermPro or PuTTY, on your configuration terminal and configure the following settings for the terminal. For more information about the terminal emulator programs, see the user guides for these programs.

·     Bits per second115200.

·     Data bits—8.

·     Stop bits—1.

·     Parity—None.

·     Flow control—None.

Logging in through Telnet

1.     Connect your PC to the serial console port or micro USB console port on the firewall, and enable the Telnet function in system view by using the telnet server enable command.

2.     Enter VTY user line view, and configure the authentication mode, user role, and common properties in VTY user line view.

By default, the authentication mode is scheme, and the username and password are admin.

3.     Specify an IP address for the network port of the PC and make sure the PC and the firewall are reachable to each other.

The IP address of management Ethernet port MGMT is 192.168.0.1/24.

4.     Run the Telnet client on the PC and enter the default login information. 


4 Hardware replacement

CAUTION

CAUTION:

Wear an ESD wrist strap or ESD gloves for hardware maintenance. They are not provided with the firewall. Prepare them yourself.

 

Replacing a power supply

CAUTION

CAUTION:

Before you replace a power supply, power off the firewall and remove the power cord.

 

The replacement procedure is the same for an AC power supply and a DC power supply. This section takes an AC power supply as an example.

To replace a power supply:

1.     Remove the releasable cable tie from the power cord and then remove the power cord connector from the power supply.

2.     Hold the power supply handle with one hand, press the latch towards the handle, and then pull the power supply part way out of the slot. Supporting the power supply bottom with one hand, slowly pull the power supply out of the slot along the guide rails with the other.

3.     Put the removed power supply in an antistatic bag or on the workbench.

4.     Install a new power supply. For the installation procedure, see "Installing a power supply."

If you are not to install a new power supply, install a filler panel in the slot to ensure good ventilation in the firewall.

Figure4-1 Removing a power supply

 

Replacing a drive

CAUTION

CAUTION:

·     To avoid storage medium damage, execute the umount command from the CLI to unmount all the file systems before removing a drive.

·     Drives are hot swappable.

·     To avoid damage to drives, always hold a drive by its sides. Do not touch any components and do not squeeze, vibrate, or strike a drive.

·     If you are not to install a new drive in the slot, install a filler panel in the slot to avoid ESD damage caused by dust or foreign objects.

 

To replace a drive:

1.     Log in to the Web interface. Click the Unmount button on the Storage settings page.

2.     Execute the umount command from the CLI to unmount all the file systems.

3.     Pull the drive slowly out of the slot along the guide rails.

4.     Wait for 30 seconds and insert the new drive slowly into the slot along the guide rails.

Figure4-2 Replacing a drive

 

Replacing a USB drive

1.     Log in to the Web interface. Click the Unmount button on the Storage settings page.

2.     Execute the umount command from the CLI to unmount all the file systems.

3.     Holding the front of the USB drive, pull the USB drive slowly out of the slot.

Figure4-3 Replacing a USB drive

 

4.     Install a new USB drive. For the installation procedure, see "Installing a USB drive."

Replacing a transceiver module

WARNING

WARNING!

Disconnected optical fibers or transceiver modules might emit invisible laser light. Do not stare into beams or view directly with optical instruments when the firewall is operating.

 

When you replace a transceiver module, make sure the two transceiver modules connected by the same optical fiber are the same type. Do not touch the golden plating of the transceiver module.

Figure4-4 Transceiver module golden plating

 

To replace a transceiver module:

1.     Use the shutdown command in interface view at the CLI to shut down the optical source before you remove the fiber connector.

2.     Remove the optical fibers from the transceiver module.

¡     To remove an optical fiber with an LC connector, press the clip on the connector to pull the LC connector out of the port, as shown in Figure4-5.

¡     To remove an optical fiber with an MPO connector, hold the front end of the MPO connector and then pull it out of the port, as shown in Figure4-6.

3.     Pull down the bail latch on the transceiver module to the horizontal position. Skip this step if the bail latch is plastic.

4.     Hold the bail latch to pull the transceiver module slowly out of the port.

As a best practice, use tweezers to remove a transceiver module in case of limited space.

5.     Attach dust plugs to the removed transceiver module, and put it into the package.

6.     Install a new transceiver module. If you do not install a new transceiver module in the slot, install a dust plug. For information about installing a transceiver module, see "Connecting a fiber port."

Figure4-5 Removing a transceiver module (LC connector)

 

Figure4-6 Removing a transceiver module (MPO connector)

 


5 Hardware management and maintenance

 

NOTE:

The output depends on your firewall model. For more information about the commands used in this chapter, see the configuration guides and command references for the firewall.

 

Displaying detailed information about the firewall

Use the display device verbose command to display detailed information, including the running status and hardware version, about the firewall and its interface modules.

<Sysname> display device verbose

Slot 1 SubSlot 0 info:

Status           :   Normal

Type             :   F5000-AI160

PCB 1 Ver        :   VER.A

Software Ver     :   8371P07

CPU Ver          :   1.0

CPLD_A           :   2.0

CPLD_B           :   2.0

CFCard Num       :   0

Displaying software and hardware version information for the firewall

Use the display version command to display software and hardware version information for the firewall.

<Sysname> display version

H3C Comware Software, Version 7.1.064, Ess 8371P07

Copyright (c) 2004-2021 New H3C Technologies Co., Ltd. All rights reserved.

H3C SecPath F5000-AI160 uptime is 0 weeks, 0 days, 15 hours, 42 minutes

Last reboot reason: User reboot

 

Boot image: flash:/F5000AIFW-CMW710-BOOT-E8371P07.bin

Boot image version: 7.1.064, Ess 8371P07

  Compiled Dec 01 2021 15:00:00

System image: flash:/F5000AIFW-CMW710-SYSTEM-E8371P07.bin

System image version: 7.1.064, Ess 8371P07

  Compiled Dec 01 2021 15:00:00

 

SLOT 1 CPU 0

CPU type           : Multi-core CPU

DDR4 SDRAM Memory  : 32768M bytes

FLASH              : 7122M bytes

Board PCB Version  : Ver.A

FPGA PCB Version   : Ver.A

Hdd PCB Version    : Ver.A

Led PCB Version    : Ver.A

CPLD_0 Version     : 2.0

CPLD_1 Version     : 2.0

CPLD_2 Version     : 3.0

Release Version    : SecPath F5000-AI160-8371P07

Adm Version        : 1.0

FPGA Version       : B6001

FPGA Date          : 2021.11.15

Basic  BootWare Version:  1.03

Extend BootWare Version:  1.03

[SUBCARD 0] Fixed Subcard(Hardware)Ver.A, (Driver)1.0, (Cpld)2.0

Displaying electrical label information for the firewall

Use the display device manuinfo command to display the electrical label information for the firewall.

<Sysname> display device manuinfo

Slot 1 CPU 0:

 DEVICE_NAME          : F5000-AI160

 DEVICE_SERIAL_NUMBER : 210235A2QA000010077

 MAC_ADDRESS          : 00ff-fbb9-9200

 MANUFACTURING_DATE   : 2021-03-17

 VENDOR_NAME          : H3C

Fan 0:

 DEVICE_NAME          : LSPM1FANSB

 DEVICE_SERIAL_NUMBER : 210231ACJLP2080002DF

 MAC_ADDRESS          : NONE

 MANUFACTURING_DATE   : 2020-08-11

 VENDOR_NAME          : H3C

Fan 1:

 DEVICE_NAME          : LSPM1FANSB

 DEVICE_SERIAL_NUMBER : 210231ACJLP2080002D1

 MAC_ADDRESS          : NONE

 MANUFACTURING_DATE   : 2020-08-11

 VENDOR_NAME          : H3C

Fan 2:

 DEVICE_NAME          : LSPM1FANSB

 DEVICE_SERIAL_NUMBER : 210231ACJLP2080002GZ

 MAC_ADDRESS          : NONE

 MANUFACTURING_DATE   : 2020-08-11

 VENDOR_NAME          : H3C

Fan 3:

 DEVICE_NAME          : LSPM1FANSB

 DEVICE_SERIAL_NUMBER : 210231ACJLP2080002BX

 MAC_ADDRESS          : NONE

 MANUFACTURING_DATE   : 2020-08-11

 VENDOR_NAME          : H3C

Fan 4:

 DEVICE_NAME          : LSPM1FANSB

 DEVICE_SERIAL_NUMBER : 210231ACJLP2080002FG

 MAC_ADDRESS          : NONE

 MANUFACTURING_DATE   : 2020-08-11

 VENDOR_NAME          : H3C

Fan 5:

 DEVICE_NAME          : LSPM1FANSB

 DEVICE_SERIAL_NUMBER : 210231ACJLP2080002DY

 MAC_ADDRESS          : NONE

 MANUFACTURING_DATE   : 2020-08-11

 VENDOR_NAME          : H3C

Power 0:

 DEVICE_NAME          : UNKNOWN

 DEVICE_SERIAL_NUMBER : UNKNOWN

 MAC_ADDRESS          : NONE

 MANUFACTURING_DATE   :

 VENDOR_NAME          : UNKNOWN

Table5-1 Output description

Field

Description

DEVICE_NAME

Firewall name.

DEVICE_SERIAL_NUMBER

Firewall serial number.

MAC_ADDRESS

MAC address of the firewall.

MANUFACTURING_DATE

Manufacturing date of the firewall.

VENDOR_NAME

Vendor name.

 

Displaying the CPU usage of the firewall

Use the display cpu-usage command to display the CPU usage of the firewall.

<Sysname> display cpu-usage

Slot 1 CPU 0 CPU usage:

       0% in last 5 seconds

       0% in last 1 minute

       0% in last 5 minutes

Table5-2 Output description

Field

Description

Slot 1 CPU 0 CPU usage

CPU 0 usage information for the interface module in slot 1.

3% in last 5 seconds

Average CPU usage in the last 5 seconds. (After the firewall boots, the firewall calculates and records the average CPU usage at the interval of 5 seconds.)

3% in last 1 minute

Average CPU usage in the last minute. (After the firewall boots, the firewall calculates and records the average CPU usage at the interval of 1 minute.)

3% in last 5 minutes

Average CPU usage in the last 5 minutes. (After the firewall boots, the firewall calculates and records the average CPU usage at the interval of 5 minutes.)

 

Displaying the memory usage of the firewall

Use the display memory command to display the memory information of the firewall.

<Sysname> display memory

Memory statistics are measured in KB:

Slot 1:

             Total      Used      Free    Shared   Buffers    Cached   FreeRatio

Mem:      29842952  12762364  17080588         0     12884    558972       57.4%

-/+ Buffers/Cache:  12190508  17652444

Swap:           0         0         0

Table5-3 Output description

Field

Description

Slot

Slot number of the interface module

Mem

Memory usage information.

Total

Total size of the physical memory space that can be allocated.

The memory space is virtually divided into two parts. Part 1 is used for kernel codes, kernel management, and ISSU functions. Part 2 can be allocated and used for such tasks as running service modules and storing files. The size of part 2 equals the total size minus the size of part 1.

Used

Used physical memory.

Free

Free physical memory.

Shared

Physical memory shared by processes.

Buffers

Physical memory used for buffers.

Cached

Physical memory used for caches.

FreeRatio

Free memory ratio.

-/+ Buffers/Cache

-/+ Buffers/Cache:used = Mem:Used – Mem:Buffers – Mem:Cached, which indicates the physical memory used by applications.

-/+ Buffers/Cache:free = Mem:Free + Mem:Buffers + Mem:Cached, which indicates the physical memory available for applications.

Swap

Swap memory.

 

Displaying the operational status of power supplies

Use the display power command to display the operational status of power supplies.

<Sysname> display power

Slot    PowerID   State     Mode    Current(A)   Voltage(V)   Power(W)

 1       0         Normal    --        --           --          --

 1       1         Absent    --        --           --          --

Table5-4 Output description

Field

Description

Slot

Slot number of the power supply.

PowerID

Number of the power supply.

State

Power supply state:

·     Normal—The power supply is operating correctly.

·     Absent—The power supply is not in position.

·     Fault—The power supply has failed.

Mode

Type of the power supply:

·     AC—AC power supply.

·     DC—DC power supply.

Current(A)

Output current of the power supply. This field displays two hyphens (--) if it is not supported in the current software version.

Voltage(V)

Output voltage of the power supply. This field displays two hyphens (--) if it is not supported in the current software version.

Power(W)

Output power of the power supply. This field displays two hyphens (--) if it is not supported in the current software version.

 

Displaying the operational status of fan trays

Use the display fan command to display the operational status of fan trays.

<Sysname>display fan

SLOT 1 Fan 0      Status: Normal  Speed:6666

SLOT 1 Fan 1      Status: Normal  Speed:6666

SLOT 1 Fan 2      Status: Normal  Speed:6666

SLOT 1 Fan 3      Status: Normal  Speed:6666

SLOT 1 Fan 4      Status: Normal  Speed:6666

SLOT 1 Fan 5      Status: Normal  Speed:6666

Table5-5 Output description

Field

Description

SLOT 1

Member ID of the device.

Fan 0 to Fan 5

Number of the fan tray.

Status

Fan tray status:

·     Absent—No fan tray is present.

·     Normal—The fan tray is operating correctly.

·     Faulty—The fan tray is faulty.

·     NoSupport—The fan tray is not supported.

·     FanDirectionFault—The fan tray airflow direction is inconsistent with the expected fan tray direction.

Speed

Fan tray speed.

The fan tray adjusts its speed automatically to adapt to the device temperature. The hotspot temperature sensor monitors the device temperature. To view device temperature information, execute the display environment command.

 

Displaying temperature information for the firewall

Use the display environment command to display the temperature information of the firewall.

<Sysname> display environment

System Temperature information (degree centigrade):

--------------------------------------------------------------------------------

Slot     Sensor   Temperature LowerLimit Warning-UpperLimit  Alarm-UpperLimit

Shutdown-UpperLimit

1      hotspot 1      37          0              58                63

     NA

1      hotspot 2      44          0              68                73

     NA

1      hotspot 3      56          0              90                93

     NA

1      hotspot 4      40          0              80                85

     NA

1      hotspot 5      70          0              90                102

     107

1      hotspot 6      74          0              88                92

     97

Table5-6 Output description

Field

Description

Sensor

Hotspot temperature sensor.

Temperature

Current temperature.

LowerLimit

Low temperature alarm threshold.

Warning-UpperLimit

Warning-level high temperature alarm threshold.

Alarm-UpperLimit

Alarm-level high temperature alarm threshold.

Shutdown-UpperLimit

Shutdown-level high temperature alarm threshold. The firewall automatically powers off when the temperature exceeds this threshold.

 

Displaying the operational statistics about the firewall

When you perform routine maintenance or the system fails, you might need to view the operational information of each functional module for locating failures. Typically you need to run display commands one by one. To collect more information one time, you can execute the display diagnostic-information command in any view to display or save the operational statistics of multiple functional modules of the firewall.

·     Save the operational statistics of each functional module of the firewall:

<Sysname> display diagnostic-information

Save or display diagnostic information (Y=save, N=display)? [Y/N]:y

Please input the file name(*.tar.gz)[flash:/diag_H3C_20160126-170935.tar.gz]:

Diagnostic information is outputting to flash:/diag_H3C_20160126-170935.tar.gz.

Please wait...

Save successfully.

To view the diag.gz file:

a.     Execute the tar extract archive-file diag.tar.gz command in user view to decompress the file.

b.     Execute the gunzip diag.gz command.

c.     Execute the more diag command.

d.     Press Pg Up and Pg Down.

·     Display the operational statistics for each functional module of the firewall:

<Sysname> display diagnostic-information

<Sysname>display diagnostic-information

Save or display diagnostic information (Y=save, N=display)? [Y/N]:n

===============================================

  ===============display cpu===============

Slot 1 CPU 0 CPU usage:

      13% in last 5 seconds

      13% in last 1 minute

      13% in last 5 minutes

...

Displaying transceiver module information

Identifying transceiver modules

To identify transceiver modules, you can use the following command to view the key parameters of the transceiver modules, including transceiver module type, connector type, central wavelength of the laser sent, transmission distance, and vendor name or name of the vendor who customizes the transceiver modules.

To display transceiver module information:

 

Task

Command

Remarks

Display key parameters of the transceiver module in a specific interface.

display transceiver interface [ interface-type interface-number ]

Available for all transceiver modules.

 

Troubleshooting transceiver modules

The system outputs alarm information for you to locate and troubleshoot faults of transceiver modules.

To display the alarming information or fault detection parameters of a transceiver module:

 

Task

Command

Remarks

Display the current alarm information of the transceiver module in a specific interface.

display transceiver alarm interface [ interface-type interface-number ]

Available for all transceiver modules.

 

Rebooting the firewall

CAUTION

CAUTION:

·     If the main system software image file does not exist, do not use the reboot command to reboot the firewall. Specify the main system software image file first, and then reboot the firewall.

·     The precision of the rebooting timer is 1 minute. 1 minute before the rebooting time, the firewall prompts "REBOOT IN ONE MINUTE" and reboots in one minute.

·     If you are performing file operations when the firewall is to be rebooted, the system does not execute the reboot command for security.

 

To reboot a firewall, use one of the following methods:

·     Use the reboot command to reboot the firewall immediately.

·     Enable the scheduled reboot function at the CLI. You can set a time at which the firewall can automatically reboot, or set a delay so that the firewall can automatically reboot within the delay.

·     Power on the firewall after powering it off, which is also called hard reboot or cold start. H3C does not recommend that you use this method because it might cause data loss and hardware damages.

To reboot the firewall immediately:

 

Task

Command

Remarks

Reboot the firewall immediately.

reboot

Available in user view.

 

To enable the scheduled reboot function:

 

Task

Command

Remarks

Enable the scheduled reboot function.

·     Enable the scheduled reboot function and specify a specific reboot time and date:
scheduler reboot at

·     Enable the scheduled reboot function and specify a reboot waiting time:
scheduler reboot delay

Use either approach.

The scheduled reboot function is disabled by default.

Available in user view.

 

 


6 Troubleshooting

Power supply failure

Symptom

The firewall cannot be powered on, and the power LED (PWR0/PWR1) on the front panel is off.

Solution

To solve the issue:

1.     Power off the firewall.

2.     Verify that the power supply is as required by the firewall.

3.     Verify that the power cords of the firewall are firmly connected.

4.     Verify that the power cords are not damaged.

5.     If the issue persists, contact your local sales agent.

Configuration terminal display issue

Symptom

The configuration terminal displays nothing or garbled text when the firewall is powered on.

Solution

To solve the issue:

1.     Verify that the power supply system is operating correctly.

2.     Verify that the serial console cable or micro USB console cable is correctly connected.

3.     Verify that the serial console cable or micro USB console cable is connected to the serial port configured on the configuration terminal.

4.     Verify that the configuration terminal parameters are configured as follows:

¡     Baud rate115200.

¡     Data bits—8.

¡     Parity—None.

¡     Stop bits—1.

¡     Flow control—None.

¡     Terminal emulation—VT100.

5.     Verify that the serial console cable or micro USB console cable is in good condition.

6.     If the issue persists, contact your local sales agent.

Password loss

To deal with loss of the password used for accessing the firewall through the serial console port or micro USB console port, see the release notes for the firewall.

Cooling system failure

Symptom

The temperature of the firewall is higher than the normal operating temperature (45°C or 113°F).

Solution

To solve the issue:

1.     Verify that the fans are operating correctly.

2.     Verify that the operating environment of the firewall has good ventilation.

3.     If the temperature of the firewall exceeds the warning-level high temperature alarm threshold, the following alarm information appears on the configuration terminal:

%Dec 14 17:20:40:925 2021 H3C DEV/4/TEMPERATURE_WARNING: -Context=1; Temperature is greater than the high-temperature warning threshold on slot 1 sensor hotspot 1. Current temperature is 58 degrees centigrade.

4.     Use the display environment command to examine whether the temperature of the firewall keeps rising. If the temperature exceeds the alarm-level high temperature alarm threshold, power off the firewall immediately and contact your local sales agent.

5.     If the issue persists, contact your local sales agent.

Software loading failure

Symptom

Software loading fails and the system runs the software of the previous version.

Solution

To solve the issue:

1.     Verify that the physical ports are correctly connected.

2.     Verify that no parameter is configured incorrectly during the loading process. You can examine the software loading process displayed on the HyperTerminal for configuration errors. The following errors can lead to software loading failure.

¡     When XMODEM is used to load software, a baud rate other than 9600 bps is selected, but the baud rate for the HyperTerminal is not reset.

¡     When TFTP is used to load software, an incorrect IP address, software name, or TFTP serve path is configured.

¡     When FTP is used to load software, an incorrect IP address, software name, username, or password is entered.

3.     If the issue persists, contact your local sales agent.

7 Appendix A  Chassis views and technical specifications

This document is applicable to the F5000-AI160 and F5000-E firewalls.

Chassis views

The firewall provides the following ports on the front panel:

·     Six 100GBASE-R fiber ports.

·     Twenty-eight 10GBASE-R fiber ports.

·     Two USB ports.

·     Two HA ports.

·     One management Ethernet port.

·     One BMC network port.

·     One console port.

·     One micro USB port.

·     One reset button.

·     Two drive slots.

Figure7-1 Front panel

(1) 100GBASE-R fiber ports

(2) 10GBASE-R fiber ports

(3) Drive slots

(4) Management Ethernet port (MGMT)

(5) LEDs

(6) Micro USB port

(7) Reset button

(8) USB port

(9) Console port (CONSOLE)

(10) BMC network port (reserved)

(11) System power button

(12) HA ports

 

The reset button resets the firewall but does not restore the firewall to factory defaults.

To power off the firewall, press and hold the system power button until the system power LED turns amber, and then disconnect the power supply from the power source.

An HA port transmits heartbeat traffic between the two devices in a stateful failover system.

Figure7-2 Rear panel

(1) Power supply slot (PWR0)

(2) Fan tray slots

(3) Power supply slot (PWR1)

 

Power supplies

The firewall came with power supply slot PWR1 installed with a filler panel and power supply slot PWR0 empty. It supports both AC and DC power supplies. No power supplies are provided with the firewall. Prepare power supplies for the firewall yourself as required.

To install two power supplies for the firewall, make sure they are the same model.

For the power supply specifications, see "Power supply specifications."

AC power supplies

The PSR650B-12A1 power supply with a product code of PSR650B-12A1 provides a maximum output power of 650 W.

Figure7-3 PSR650B-12A1 power supply

(1) Retaining latch

(2) Handle

(3) Power receptacle

 

DC power supplies

The PSR650B-12D1 power supply with a product code of PSR650B-12D1 provides a maximum output power of 650 W.

Figure7-4 PSR650B-12D1 power supply

(1) Retaining latch

(2) Handle

(3) Power receptacle

 

Fan trays

The firewall provides six fan tray slots FAN0 to FAN5. No fan trays are provided with the firewall. Purchase fan trays as required.

The LSPM1FANSB fan tray is available for the firewall. The LSPM1FANSB fan tray provides port-side intake and power supply-side exhaust airflow. For the fan tray specifications, see "Fan tray specifications."

To ensure adequate heat dissipation, make sure the firewall is fully configured with fan trays.

Figure7-5 LSPM1FANSB fan tray

(1) Handle

(2) Alarm LED

 

Dimensions and weights

The weight of the firewall includes the chassis and its removable components.

Chassis

Table7-1 Chassis dimensions and weights

Firewall model

Dimensions (H × W × D), excluding rubber feet and mounting brackets

Weight (fully configured)

Net weight

F5000-AI160/F5000-E

44 × 440 × 435 mm (1.73 × 17.32 × 17.13 in)

10.3 kg (22.71 lb)

7.4 kg (16.31)

 

Drives

Table7-2 Drive dimensions and weights

Drive model

Dimensions (H × W × D)

Weight

NS-SSD-480G-SATA-M.2

12.1 × 27.1 × 99.4 mm (0.48 × 1.07 × 3.91 in)

0.05 kg (0.11 lb)

 

Storage media specifications

Table7-3 Memory specifications

Firewall model

Memory

F5000-AI160

64 GB

F5000-E

32 GB

 

Table7-4 Drive specifications

Drive model

Capacity

NS-SSD-480G-SATA-M.2

480 GB

 

Power consumption

Chassis

Table7-5 Chassis power consumption

Item

Description

Minimum power consumption

208 W

Maximum power consumption

390 W

 

Drives

Table7-6 Drive power consumption

Drive model

Power consumption

NS-SSD-480G-SATA-M.2

4.5 W

 

Power supply specifications

Table7-7 AC power supply specifications

Model

Rated input voltage range

Maximum input current

Maximum power

PSR650B-12A1

100 VAC to 240 VAC @ 50 Hz or 60 Hz

10 A to 5 A

650 W

 

Table7-8 DC power supply specifications

Model

Rated input voltage range

Maximum input current

Maximum power

PSR650B-12D1

–40 VDC to –60 VDC

22 A to 12 A

650 W

 

Fan tray specifications

Table7-9 Fan tray specifications

Item

Description

Dimensions (H × W × D), excluding the handle

40.6 × 40.0 × 88.7 mm (1.60 × 1.57 × 3.49 in)

Airflow direction

LSPM1FANSB, from the port side to the power supply side

Hot swapping

Supported

Max airflow volume

20 CFM (0.57 m3/min)

Max power consumption

9.8 W

Operating voltage

12 V

 

Port specifications

Console port

Table7-10 Console port specifications

Item

Specification

Connector

RJ-45

Standard compliant

RS-232

Baud rate

9600 bps to 115200 bps (default)

Cable type

Common asynchronous serial port cable

Transmission distance

≤ 15 m (49.21 ft)

Services

·     Connection to an ASCII terminal

·     Connection to the serial port of a local PC running the terminal emulation program

·     CLI

 

Micro USB port

Table7-11 Micro USB port specifications

Item

Specification

Connector

Micro USB

Standard compliant

Micro USB

Baud rate

9600 bps to 115200 bps (default)

Cable type

USB-AB console cable

Transmission distance

≤ 10 m (32.81 ft)

Services

·     Connection to an ASCII terminal

·     Connection to the serial port of a local PC running the terminal emulation program

·     CLI

 

10 GE fiber port

Table7-12 10 GE fiber port specifications

Item

Specification

Connector type

LC

Transceiver module type

SFP+

Standard compliance

10GBASE-R

Interface speed

LAN PHY: 10 Gbps

 

Table7-13 10 Gbps SFP+ transceiver module specifications (1)

Transceiver module

Central wavelength (nm)

Fiber mode

Fiber diameter (µm)

Mode bandwidth (MHz*km)

Transmission distance

SFP-XG-SX-MM850-E

850

MMF

50/125

2000

300 m (984.25 ft)

500

82 m (269.03 ft)

400

66 m (216.54 ft)

62.5/125

200

33 m (108.27 ft)

160

26 m (85.30 ft)

SFP-XG-LX-SM1310-E

1310

SMF

9/125

N/A

10 km (6.21 miles)

SFP-XG-LX-SM1310-D

1310

SMF

9/125

N/A

10 km (6.21 miles)

SFP-XG-LH40-SM1550

1550

SMF

9/125

N/A

40 km (24.86 miles)

SFP-XG-SX-MM850-D

850

MMF

50/125

2000

300 m (984.25 ft)

500

82 m (269.03 ft)

400

66 m (216.54 ft)

62.5/125

200

33 m (108.27 ft)

160

26 m (85.30 ft)

 

Table7-14 10 Gbps SFP+ transceiver module specifications (2)

Transceiver module

Transmission speed

Transmitted optical power (dBm)

Received optical power (dBm)

SFP-XG-SX-MM850-E

10.31 Gbps

–7.3 to –1

–9.9 to +0.5

SFP-XG-LX-SM1310-E

10.31 Gbps

–8.2 to +0.5

–14.4 to +0.5

SFP-XG-LX-SM1310-D

10.31 Gbps

–8.2 to +0.5

–14.4 to +0.5

SFP-XG-LH40-SM1550

10.31 Gbps

–4.7 to +4

–15.8 to –1

SFP-XG-SX-MM850-D

10.31 Gbps

–7.3 to –1

–9.9 to +0.5

 

Table7-15 SFP transceiver module specifications (1)

Transceiver module

Central wavelength (nm)

Fiber mode

Fiber diameter (µm)

Mode bandwidth (MHz*km)

Transmission distance

SFP-GE-SX-MM850-A

850

MMF

50/125

500

550 m (1804.46 ft)

400

500 m (1640.42 ft)

62.5/125

200

275 m (902.23 ft)

160

220 m (721.78 ft)

SFP-GE-LX-SM1310-A

1310

SMF

9/125

N/A

10 km (6.21 miles)

MMF

50/125

500/400

550 m (1804.46 ft)

SFP-GE-LH40-SM1310

1310

SMF

9/125

N/A

40 km (24.86 miles)

SFP-GE-LH40-SM1550

1550

SMF

9/125

N/A

40 km (24.86 miles)

SFP-GE-LH80-SM1550

1550

SMF

9/125

N/A

80 km (49.71 miles)

SFP-GE-LH100-SM1550

1550

SMF

9/125

N/A

100 km (62.14 miles)

 

Table7-16 1000BASE-X SFP transceiver module specifications (2)

Transceiver module

Transmitted optical power (dBm)

Received optical power (dBm)

SFP-GE-SX-MM850-A

–9.5 to 0

–17 to –3

SFP-GE-LX-SM1310-A

–9.5 to –3

–20 to –3

SFP-GE-LH40-SM1310

–5 to +5

–22 to –3

SFP-GE-LH40-SM1550

–4 to +1

–21 to –3

SFP-GE-LH80-SM1550

–4 to +5

–22 to –3

SFP-GE-LH100-SM1550

0 to 5

–30 to –9

 

100 GE fiber port

The 100 GE fiber ports support 40G transceiver modules.

QSFP28 transceiver modules with MPO connectors

Table7-17 100 GE fiber port specifications

Item

Specification

Connector type

MPO

Transceiver module type

QSFP28

Standard compliance

100GBASE-R

Interface speed

LAN PHY: 100 Gbps

 

Table7-18 Specifications of QSFP28 transceiver modules with MPO connectors (1)

Transceiver module

Central wavelength (nm)

Fiber mode

Fiber diameter (µm)

Mode bandwidth (MHz*km)

Transmission distance

QSFP-100G-SR4-MM850

850

MMF

50/125

2000

70 m (229.66 ft)

4700

100 m (328.08 ft)

QSFP-40G-SR4-MM850

850

MMF

50/125

2000

100 m (328.08 ft)

4700

150 m (492.13 ft)

QSFP-40G-CSR4-MM850

850

MMF

50/125

2000

300 m (984.25 ft)

 

Table7-19 Specifications of QSFP28 transceiver modules with MPO ports (2)

Transceiver module

Transmission speed

Transmitted optical power (dBm)

Received optical power (dBm)

QSFP-100G-SR4-MM850

100 Gbps

–8.4 to +2.4

–10.3 to +2.4

QSFP-40G-SR4-MM850

40 Gbps

–7.6 to 0

–9.5 to +2.4

QSFP-40G-CSR4-MM850

40 Gbps

–7.6 to 0

–9.9 to +2.4

 

QSFP28 transceiver modules with LC connectors

Table7-20 100 GE fiber port specifications

Item

Specification

Connector type

LC

Transceiver module type

QSFP28

Standard compliance

100GBASE-R

Interface speed

LAN PHY: 100 Gbps

 

Table7-21 Specifications of QSFP28 transceiver modules with LC connectors (1)

Transceiver module

Central wavelength (nm)

Fiber mode

Fiber diameter (µm)

Mode bandwidth (MHz*km)

Transmission distance

QSFP-100G-SWDM4-MM850

Four lanes:

·     850

·     880

·     910

·     940

MMF

50/125

2000

75 m (246.06 ft)

4700

100 m (328.08 ft)

QSFP-100G-LR4L-WDM1300

Four lanes:

·     1271

·     1291

·     1311

·     1331

SMF

9/125

N/A

2 km (1.24 miles)

QSFP-100G-LR4-WDM1300

Four lanes:

·     1295.56

·     1300.05

·     1304.58

·     1309.14

SMF

9/125

N/A

10 km (6.21 miles)

QSFP-100G-ER4L-WDM1300

Four lanes:

·     1295.56

·     1300.05

·     1304.58

·     1309.14

SMF

9/125

N/A

40 km (24.86 miles)

QSFP-40G-BIDI-SR-MM850

Two lanes:

·     850

·     900

MMF

50/125

2000

100 m (328.08 ft)

4700

150 m (492.13 ft)

QSFP-40G-LR4L-WDM1300

Four lanes:

·     1271

·     1291

·     1311

·     1331

SMF

9/125

N/A

2 km (1.24 miles)

QSFP-40G-ER4-WDM1300

Four lanes:

·     1271

·     1291

·     1311

·     1331

SMF

9/125

N/A

40 km (24.86 miles)

QSFP-40G-LR4-WDM1300

Four lanes:

·     1271

·     1291

·     1311

·     1331

SMF

9/125

N/A

10 km (6.21 miles)

QSFP-40G-BIDI-WDM850

Four lanes:

·     850

·     880

·     910

·     940

MMF

50/125

2000

240 m (787.40 ft)

 

Table7-22 Specifications of QSFP28 transceiver modules with LC connectors (2)

Transceiver module

Transmitted optical power (dBm)

Received optical power (dBm)

QSFP-100G-SWDM4-MM850

–7.5 to +2.4

–9.5 to +3.4

QSFP-100G-LR4L-WDM1300

–6.5 to +2.5

–11.5 to +2.5

QSFP-100G-LR4-WDM1300

–4.3 to +4.5

–10.6 to +4.5

QSFP-100G-ER4L-WDM1300

0.5 to 4.5

–20.5 to –1.9

QSFP-40G-BIDI-SR-MM850

–4 to +5

–6 to +5

QSFP-40G-LR4L-WDM1300

–10 to +2.3

–11.5 to +2.3

QSFP-40G-ER4-WDM1300

–2.7 to +4.5

–21.2 to –4.5

QSFP-40G-LR4-WDM1300

–7 to +2.3

–13.7 to +2.3

QSFP-40G-BIDI-WDM850

–7.6 to +3

–9 to +3

 

8 Appendix B  LEDs

This section uses the LEDs on the F5000-AI160 firewall as an example.

Figure8-1 LEDs

(1) Ethernet fiber port LED

(2) Device status LED

(3) Power supply status LEDs

(4) HA LED

(5) Cloud LED

(6) Fan tray status LED

(7) System operating status LED

(8) Management Ethernet copper port LED

(9) System power LED

 

Table8-2 LED description

LED

Mark

Status

Description

Ethernet fiber port LED

100GBASE-R

Off

No link is present.

Steady green

A 100 Gbps link is present.

Flashing green

The port is receiving and sending data at 100 Gbps.

10GBASE-R

Off

No link is present.

Steady green

A 10 Gbps link is present.

Flashing green

The port is receiving and sending data at 10 Gbps.

Device status LED

SYS

Off

The system has failed (excluding the resetting period).

Flashing at 0.5 Hz

The system is operating correctly.

Flashing at 4 Hz

The system is starting or loading software.

On

The system has failed.

Power supply status LEDs

PWR0, PWR1

Steady red

The power supply has failed,

Steady green

The power supply is operating correctly.

Off

No power supply is present or the firewall is not powered on.

HA LED

HA

Steady green

The firewall is the primary device in a stateful failover system or cluster.

Steady red

The stateful failover system or cluster has failed.

Flashing at 0.5 Hz

The firewall is the secondary device in a stateful failover system or cluster.

Off

The firewall is not in a stateful failover system or cluster.

Cloud LED

CLOUD

Steady green

The firewall has been connected to the cloud management platform.

Off

The firewall has not been connected to the cloud management platform.

Flashing at 4 Hz

The firewall is connecting to the cloud management platform and data is being received and sent.

Fan tray status LED

FAN

Steady green

All fan trays are operating correctly.

Steady red

A fan tray has failed or less than six fan trays are present.

Off

The firewall is not powered on.

System operating status LED

Steady green

The system is operating correctly.

Fast flashing green

BMC is initializing.

Slow flashing yellow and green

A general alarm has occurred.

Slow flashing yellow

A severe alarm has occurred.

Management Ethernet copper port LED

MGMT

Off

No link is present.

Steady orange

A 10/100 Mbps link is present.

Steady green

A 1000 Mbps link is present.

Flashing amber

The port is receiving and sending data at 10/100 Mbps.

Flashing green

The port is receiving and sending data at 1000 Mbps.

System power LED

Steady green

The system has started.

Slowing flashing green

The system is starting.

Steady amber

The system is in standby state.

Off

No power input.

 

9 Appendix C  Cables

Console cable

RJ-45 to DB9 console cable

An RJ-45 to DB9 console cable is used to connect the console port on the firewall to the serial port on a configuration terminal (a PC for example):

·     Connect the DB9 female connector of the cable to the 8-core serial port on the configuration terminal.

·     Connect the RJ-45 connector of the cable to the console port on the firewall.

Figure9-1 RJ-45 to DB9 console cable

 

Table9-1 RJ-45 to DB9 console cable pinouts

RJ-45

Signal

Direction

DB-9

1

RTS

7

2

DTR

4

3

TXD

3

4

CD

1

5

GND

-

5

6

RXD

2

7

DSR

6

8

CTS

8

 

Micro USB console cable

A micro USB console cable is used to connect the micro USB console port on the firewall to the USB port on a configuration terminal (a PC for example):

·     Connect the USB Type A connector of the cable to the USB port on the configuration terminal.

·     Connect the USB Type mini-A/B connector to the micro USB console port on the firewall.

Figure9-2 Micro USB console cable

 

Table9-2 Micro USB console cable pinouts

USB Type A connector

Signal

USB Type mini-A/B connector

Signal

1

VBUS

1

VBUS

2

D-

2

D-

3

D+

3

D+

 

 

4

ID(NC)

4

GND

5

GND

 

Ethernet twisted pair cable

Introduction

An Ethernet twisted pair cable consists of four pairs of insulated copper wires twisted together. Every wire uses a different color, and has a diameter of about 1 mm (0.04 in). A pair of twisted copper cables can cancel the electromagnetic radiation of each other, and reduce interference of external sources. An Ethernet twisted pair cable mainly transmits analog signals and is advantageous in transmitting data over shorter distances. It is the commonly used transmission media of the Ethernet. The maximum transmission distance of the Ethernet twisted pair cable is 100 m (328.08 ft). To extend the transmission distance, you can connect two twisted pair cable segments with a repeater. At most four repeaters can be added, which means five segments can be joined together to provide a transmission distance of 500 m (1640.42 ft).

Ethernet twisted pair cables can be classified into category 3, category 4, category 5, category 5e, category 6, and category 7 cables based on performance. In LANs, category 5, category 5e, and category 6 are commonly used.

Table9-3 Description for commonly used Ethernet twisted pair cables

Type

Description

Category 5

Suitable for data transmission at a maximum speed of 100 Mbps

Category 5e

Suitable for data transmission at a maximum speed of 1000 Mbps

Category 6

Suitable for data transmission at a speed higher than 1 Gbps

 

Based on whether a metal shielding is used, Ethernet twisted pair cables can be classified into shielded twisted pair (STP) and unshielded twisted pair (UTP). An STP cable provides a metallic braid between the twisted pairs and the outer jacket. This metallic braid helps reduce radiation, prevent information from being listened, and eliminate external electromagnetic interference (EMI) of external sources. STPs have strict application requirements and are expensive although they provide better EMI prevention performance than UTPs, so in most LANs, UTPs are commonly used.

An Ethernet twisted pair cable connects network devices through the RJ-45 connectors at the two ends. Figure9-3 shows the pinouts of an RJ-45 connector.

Figure9-3 RJ-45 connector pinout

 

 

NOTE:

The RJ-45 Ethernet ports of the firewall use category 5 or higher Ethernet twisted pair cables for connection.

 

EIA/TIA cabling specifications define two standards, 568A and 568B, for cable pinouts.

·     Standard 568A—pin 1: white/green stripe, pin 2: green solid, pin 3: white/orange stripe, pin 4: blue solid, pin 5: white/blue stripe, pin 6: orange solid, pin 7: white/brown stripe, pin 8: brown solid.

·     Standard 568B—pin 1: white/orange stripe, pin 2: orange solid, pin 3: white/green stripe, pin 4: blue solid, pin 5: white/blue stripe, pin 6: green solid, pin 7: white/brown stripe, pin 8: brown solid.

Ethernet twisted pair cables can be classified into straight-through and crossover cables based on their pinouts.

·     Straight-throughThe pinouts at both ends are T568B compliant, as shown in Figure9-4.

·     CrossoverThe pinouts are T568B compliant at one end and T568A compliant at the other end, as shown in Figure9-5.

Figure9-4 Straight-through cable

 

Figure9-5 Crossover cable

 

Select an Ethernet twisted pair cable according to the RJ-45 Ethernet port type on your device. An RJ-45 Ethernet port can be MDI (for routers and PCs) or MDIX (for switches). Table9-4 and Table9-5 show their pinouts.

Table9-4 RJ-45 MDI port pinouts

Pin

10BASE-T/100BASE-TX

1000BASE-T

Signal

Function

Signal

Function

1

Tx+

Sends data

BIDA+

Bi-directional data cable A+

2

Tx-

Sends data

BIDA-

Bi-directional data cable A-

3

Rx+

Receives data

BIDB+

Bi-directional data cable B+

4

Reserved

N/A

BIDC+

Bi-directional data cable C+

5

Reserved

N/A

BIDC-

Bi-directional data cable C-

6

Rx-

Receives data

BIDB-

Bi-directional data cable B-

7

Reserved

N/A

BIDD+

Bi-directional data cable D+

8

Reserved

N/A

BIDD-

Bi-directional data cable D-

 

Table9-5 RJ-45 MDIX port pinouts

Pin

10BASE-T/100BASE-TX

1000BASE-T

Signal

Function

Signal

Function

1

Rx+

Receives data

BIDB+

Bi-directional data cable B+

2

Rx-

Receives data

BIDB-

Bi-directional data cable B-

3

Tx+

Sends data

BIDA+

Bi-directional data cable A+

4

Reserved

N/A

BIDD+

Bi-directional data cable D+

5

Reserved

N/A

BIDD-

Bi-directional data cable D-

6

Tx-

Sends data

BIDA-

Bi-directional data cable A-

7

Reserved

N/A

BIDC+

Bi-directional data cable C+

8

Reserved

N/A

BIDC-

Bi-directional data cable C-

 

To ensure normal communication, the pins for sending data on one port must correspond to the pins for receiving data on the peer port. When both of the ports on the two devices are MDI or MDIX, use a crossover Ethernet cable; when one port is MDI and the other is MDIX, use a straight-through Ethernet cable. To summarize, straight-through and crossover cables connect the following devices:

·     Straight-through cables connect devices of different types—for example, router to PC and router to switch.

·     Crossover cables connect devices of the same type—for example, switch to switch, router to router, and PC to PC.

If an RJ-45 Ethernet port is enabled with MDI/MDIX autosensing, it can automatically negotiate pin roles.

 

 

NOTE:

The RJ-45 Ethernet ports on the firewall support MDI/MDIX autosensing.

 

Making an Ethernet twisted pair cable

1.     Cut the cable to a required length with the crimping tool.

2.     Strip off an appropriate length of the cable sheath. The length is typically that of the RJ-45 connector.

3.     Untwist the pairs so that they can lay flat, and arrange the colored wires based on the wiring specifications.

4.     Cut the top of the wires even with one another. Insert the wires into the RJ-45 connector and make sure the wires extend to the front of the RJ-45 connector and make good contact with the metal contacts in the RJ-45 connector and in the correct order.

5.     Crimp the RJ-45 connector with the crimping tool until you hear a click.

6.     Use a cable tester to verify the connectivity of the cable.

Optical fiber

Optical fibers feature low loss and long transmission distance.

Optical fibers can be classified into single mode fibers and multi-mode fibers. A single mode fiber (with yellow jacket) carries only a single ray of light; a multi-mode fiber (with orange jacket) carries multiple modes of lights.

Table9-6 Characteristics of single mode and multi-mode optical fibers

Item

Single mode fiber

Multi-mode fiber

Core

Small core (10 micrometers or less)

Larger core than single mode fiber (50 micrometers, 62.5 micrometers or greater)

Dispersion

Less dispersion

Allows greater dispersion and therefore, signal loss exists.

Light source and transmission distance

Uses lasers as the light source often within campus backbones for distance of several thousand meters

Uses LEDs as the light source often within LANs or distances of a couple hundred meters within a campus network

 

Table9-7 Allowed maximum tensile force and crush load

Period of force

Tensile load (N)

Crush load (N/mm)

Short period

150

500

Long term

80

100

 

Fiber connectors are indispensable passive components in an optical fiber communication system. They allow the removable connection between optical channels, which makes the optical system debugging and maintenance more convenient. There are multiple types of fiber connectors. Figure9-6 shows an LC connector.

Figure9-6 Appearance of an LC connector

 

Follow these guidelines when you connect an optical fiber:

·     Before connecting an optical fiber, make sure the connector and cable type match the interface module.

·     The fiber Ethernet port of the firewall supports only the LC connector.

·     Fiber connectors are fitted with dust caps. Keep the dust caps secure when the fiber connectors are in use. Install dust caps when the fiber connectors are not in use to avoid damage to their end face. Replace the dust cap if it is loose or polluted.

·     Before connecting an optical fiber, use dust free paper and absolute alcohol to clean the end face of the two fiber connectors. You can brush the end faces only in one direction.

·     Never bend or curve a fiber when connecting it.

·     If the fiber has to pass through a metallic board hole, when passing through a metallic board hole or bending along the acute side of mechanical parts, the fiber must wear jackets or cushions.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网