HP 6125G Command Reference Manual

HP 6125G Command Reference Manual

Network management and monitoring
Hide thumbs Also See for 6125G:
Table of Contents

Advertisement

HP 6125 Blade Switch Series
Network Management and Monitoring

Command Reference

Part number: 5998-3173
Software version: Release 2103
Document version: 6W100-20120907

Advertisement

Table of Contents
loading

Summary of Contents for HP 6125G

  • Page 1: Command Reference

    HP 6125 Blade Switch Series Network Management and Monitoring Command Reference Part number: 5998-3173 Software version: Release 2103 Document version: 6W100-20120907...
  • Page 2 HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
  • Page 3: Table Of Contents

    Contents Ping, tracert, and system debugging commands ······································································································· 1   Ping and tracert commands ············································································································································· 1   ping ············································································································································································ 1   ping ipv6 ··································································································································································· 5   tracert ········································································································································································· 7   tracert ipv6 ································································································································································ 9   System debugging commands ······································································································································ 10  ...
  • Page 4 info-center trapbuffer ············································································································································· 49   reset logbuffer ························································································································································ 49   reset trapbuffer······················································································································································· 50   terminal debugging ··············································································································································· 50   terminal logging ···················································································································································· 51   terminal monitor ····················································································································································· 51   terminal trapping ··················································································································································· 52   SNMP configuration commands ······························································································································· 54   display snmp-agent community ····························································································································...
  • Page 5 mirroring-group monitor-egress ·························································································································· 106   mirroring-group monitor-port ······························································································································ 107   mirroring-group remote-probe vlan ···················································································································· 108   mirroring-port ······················································································································································· 109   monitor-port ·························································································································································· 110   Traffic mirroring configuration commands ············································································································ 111   mirror-to ································································································································································ 111   NQA configuration commands ······························································································································ 112  ...
  • Page 6 source interface ··················································································································································· 156   source ip ······························································································································································· 157   source port ··························································································································································· 157   statistics hold-time ················································································································································ 158   statistics max-group ············································································································································· 158   statistics interval ··················································································································································· 159   tos ·········································································································································································· 160   ttl ············································································································································································ 160   type ······································································································································································· 161  ...
  • Page 7: Ping, Tracert, And System Debugging Commands

    Ping, tracert, and system debugging commands Ping and tracert commands ping Syntax ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i interface-type interface-number | -m interval | -n | -p pad | -q | -r | -s packet-size | -t timeout | -tos tos | -v ] * host View Any view Default level...
  • Page 8 -p pad: Specifies the value of the pad field in an ICMP echo request, in hexadecimal format, 1 to 8 bits, in the range of 0 to ffffffff. If the specified value is less than 8 bits, 0s are added in front of the value to extend it to 8 bits.
  • Page 9 --- 1.1.2.2 ping statistics --- 5 packet(s) transmitted 5 packet(s) received 0.00% packet loss round-trip min/avg/max = 1/41/205 ms The output shows the following: The destination is reachable. • All ICMP echo requests sent by the source have got responses. •...
  • Page 10 1.1.1.2 1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms Record Route: 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms Record Route: 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms Record Route: 1.1.2.1 1.1.2.2 1.1.1.2...
  • Page 11: Ping Ipv6

    Field Description Received the ICMP reply from the device whose IP address is 1.1.2.2. If no reply is received during the timeout period, "Request time out" is displayed. • bytes—Indicates the number of data bytes in the ICMP reply. Reply from 1.1.2.2 : bytes=56 •...
  • Page 12 -s packet-size: Specifies the length (in bytes) of an ICMPv6 echo request, which is in the range of 20 to 8100 and defaults to 56. -t timeout: Specifies the timeout value (in milliseconds) of an ICMPv6 echo reply, which is in the range of 0 to 65535 and defaults to 2000.
  • Page 13: Tracert

    Reply from 2001::1 bytes=56 Sequence=1 hop limit=64 time = 62 ms Reply from 2001::1 bytes=56 Sequence=2 hop limit=64 time = 26 ms Reply from 2001::1 bytes=56 Sequence=3 hop limit=64 time = 20 ms Reply from 2001::1 bytes=56 Sequence=4 hop limit=64 time = 4 ms Reply from 2001::1 bytes=56 Sequence=5 hop limit=64...
  • Page 14 -vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the destination belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option. -w timeout: Specifies the timeout time of the reply packet of a probe packet, which is in the range of 1 to 65535 milliseconds and defaults to 5000 milliseconds.
  • Page 15: Tracert Ipv6

    Field Description Probe result of the probe packets whose TTL is 1, including the IP address of the first hop and the roundtrip time of three probe packets. 1 1.1.1.2 673 ms 425 ms 30 ms The number of packets that can be sent in each probe can be set through the -q keyword.
  • Page 16: System Debugging Commands

    In the event of network failure, you can use this command to determine the failed nodes. Output from the tracert ipv6 command includes IPv6 addresses of all the Layer 3 devices the packets traverse from source to destination. Asterisks (* * *) are displayed if the device cannot reply with an ICMP error message (probably because the destination is unreachable or sending ICMP timeout/destination unreachable packets is disabled).
  • Page 17: Display Debugging

    By default, debugging functions of all modules are disabled. Output of the debugging information may degrade system efficiency, so you should enable the debugging of the corresponding module for diagnosing network failure, and not to enable debugging of multiple modules at the same time. Default level describes the default level of the debugging all command.
  • Page 18: Ntp Configuration Commands

    NTP configuration commands display ntp-service sessions Syntax display ntp-service sessions [ verbose ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters verbose: Displays detailed information about all NTP sessions. If you do not specify this keyword, the command only displays brief information about the NTP sessions.
  • Page 19 Field Description Reference clock ID of the clock source: • If the reference clock is the local clock, the value of this field is related to the value of the stra field: When the value of the stra field is 0 or 1, this field is LOCL. reference When the stra field has another value, this field is the IP address of the local clock.
  • Page 20 reftime: 10:56:22.442 UTC Jan 7 2011(CE2686D6.71484513) orgtime: 10:56:22.442 UTC Jan 7 2011(CE2686D6.71484513) rcvtime: 10:56:22.442 UTC Jan 7 2011(CE2686D6.7149E881) xmttime: 10:56:22.442 UTC Jan 7 2011(CE2686D6.71464DC2) filter delay : 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 filter offset: 0.00 0.00 0.00 0.00 0.00 0.00...
  • Page 21 Field Description Operation mode of the local device: • unspec—The mode is unspecified. • active—Active mode. • passive—Passive mode. local mode • client—Client mode. • server—Server mode. • bdcast—Broadcast server mode. • control—Control query mode. • private—Private message mode. Poll interval of the local device, in seconds. The value displayed is a local poll power of 2.
  • Page 22: Display Ntp-Service Status

    Field Description Source interface. peer interface If the source interface is not specified, this field is wildcard. reftime Reference timestamp in the NTP message. orgtime Originate timestamp in the NTP message. rcvtime Receive timestamp in the NTP message. xmttime Transmit timestamp in the NTP message. filter delay Delay information.
  • Page 23: Display Ntp-Service Trace

    Actual frequency: 100.0000 Hz Clock precision: 2^17 Clock offset: 0.0000 ms Root delay: 0.00 ms Root dispersion: 0.00 ms Peer dispersion: 0.00 ms Reference time: 00:00:00.000 UTC Jan 1 1900(00000000.00000000) Table 5 Command output Field Description Status of the system clock: •...
  • Page 24: Ntp-Service Access

    Parameters |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression.
  • Page 25: Ntp-Service Authentication Enable

    Default level 3: Manage level Parameters peer: Permits full access. This level of right permits the peer devices to perform synchronization and control query to the local device and also permits the local device to synchronize its clock to that of a peer device.
  • Page 26: Ntp-Service Authentication-Keyid

    View System view Default level 3: Manage level Parameters None Description Use ntp-service authentication enable to enable NTP authentication. Use undo ntp-service authentication enable to disable NTP authentication. By default, NTP authentication is disabled. Related commands: ntp-service authentication-keyid and ntp-service reliable authentication-keyid. Examples # Enable NTP authentication.
  • Page 27: Ntp-Service Broadcast-Client

    When the NTP authentication key is configured, configure the key as a trusted key by using the ntp-service reliable authentication-keyid command. Presently the system supports only the MD5 algorithm for key authentication. A maximum of 1,024 keys can be set for each device. If an NTP authentication key is specified as a trusted key, the key automatically changes to untrusted after you delete the key.
  • Page 28: Ntp-Service Dscp

    undo ntp-service broadcast-server View VLAN interface view Default level 3: Manage level Parameters authentication-keyid keyid: Specifies the key ID to be used for sending broadcast messages to broadcast clients, where keyid ranges from 1 to 4294967295. This parameter is not meaningful if authentication is not required.
  • Page 29: Ntp-Service In-Interface Disable

    <Sysname> system-view [Sysname] ntp-service dscp 30 ntp-service in-interface disable Syntax ntp-service in-interface disable undo ntp-service in-interface disable View VLAN interface view Default level 3: Manage level Parameters None Description Use ntp-service in-interface disable to disable an interface from receiving NTP messages. Use undo ntp-service in-interface disable to restore the default.
  • Page 30: Ntp-Service Multicast-Client

    By default, the number is 100. A single device can have a maximum of 128 concurrent associations, including static associations and dynamic associations. A static association refers to an association that a user has manually created by using an NTP command, while a dynamic association is a temporary association created by the system during operation.
  • Page 31: Ntp-Service Multicast-Server

    ntp-service multicast-server Syntax ntp-service multicast-server [ ip-address ] [ authentication-keyid keyid | ttl ttl-number | version number ] undo ntp-service multicast-server [ ip-address ] View VLAN interface view Default level 3: Manage level Parameters ip-address: Sets a multicast IP address, which defaults to 224.0.1.1. authentication-keyid keyid: Specifies the key ID to be used for sending multicast messages to multicast clients, where keyid is in the range of 1 to 4294967295.
  • Page 32: Ntp-Service Source-Interface

    Parameters keyid: Specifies an authentication key number, in the range of 1 to 4294967295. Description Use ntp-service reliable authentication-keyid to specify that the created authentication key is a trusted key. When NTP authentication is enabled, a client can be synchronized only to a server that can provide a trusted authentication key.
  • Page 33: Ntp-Service Unicast-Peer

    [Sysname] ntp-service source-interface vlan-interface 1 ntp-service unicast-peer Syntax ntp-service unicast-peer [ vpn-instance vpn-instance-name ] { ip-address | peer-name } [ authentication-keyid keyid | priority | source-interface interface-type interface-number | version number ] * undo ntp-service unicast-peer [ vpn-instance vpn-instance-name ] { ip-address | peer-name } View System view Default level...
  • Page 34: Ntp-Service Unicast-Server

    ntp-service unicast-server Syntax ntp-service unicast-server [ vpn-instance vpn-instance-name ] { ip-address | server-name } [ authentication-keyid keyid | priority | source-interface interface-type interface-number | version number ] * undo ntp-service unicast-server [ vpn-instance vpn-instance-name ] { ip-address | server-name } View System view Default level...
  • Page 35: Information Center Configuration Commands

    Information center configuration commands display channel Syntax display channel [ channel-number | channel-name ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters channel-number: Specifies a channel by its number in the range of 0 to 9. channel-name: Specifies a channel by its name, a default name or a self-defined name.
  • Page 36: Display Info-Center

    channel number:0, channel name:console MODU_ID NAME ENABLE LOG_LEVEL ENABLE TRAP_LEVEL ENABLE DEBUG_LEVEL ffff0000 default informational debugging debugging The output shows that the system is allowed to output log information with a severity from 0 to 4, trap information with a severity from 0 to 7, and debug information with a severity from 0 to 7 to the console. The information source modules are all modules (default).
  • Page 37 Examples # Display information center configuration information. <Sysname> display info-center Information Center:enabled Log host: 1.1.1.1, port number : 514, host facility : local7, channel number : 2, channel name : loghost Console: channel number : 0, channel name : console Monitor: channel number : 1, channel name : monitor SNMP Agent:...
  • Page 38: Display Logbuffer

    Field Description Configurations on the SNMP module destination, SNMP Agent: including the channel number and channel name channel number : 5, channel name : snmpagent used. Log buffer: Configurations on the log buffer destination, including whether information output to this destination is enabled,max buffer size 1024, current buffer size enabled or disabled, the maximum capacity, the 512,...
  • Page 39 Corresponding keyword Severity Value Description in commands Error Error condition. errors Warning Warning condition. warnings Notification Normal but significant condition. notifications Informational Informational message. informational Debug Debugging message. debugging size buffersize: Specifies the number of latest log messages to be displayed, in the range of 1 to 1,024. slot slot-number: Specifies an IRF member ID.
  • Page 40: Display Logbuffer Summary

    Field Description Channel name of the log buffer. The default channel Channel name name is logbuffer. Dropped messages Number of dropped messages. Number of overwritten messages (when the buffer size Overwritten messages is not big enough to hold all messages, the latest messages overwrite the old ones).
  • Page 41: Display Trapbuffer

    Field Description EMERG Represents emergency, see Table 10 for details ALERT Represents alert, see Table 10 for details CRIT Represents critical, see Table 10 for details ERROR Represents error, see Table 10 for details WARN Represents warning, see Table 10 for details NOTIF Represents notice, see...
  • Page 42: Enable Log Updown

    Dropped messages : 0 Overwritten messages : 0 Current messages : 9 #Jan 7 08:03:27:421 2011 Sysname IFNET/4/INTERFACE UPDOWN: Trap 1.3.6.1.6.3.1.1.5.4<linkUp>: Interface 983041 is Up, ifAdminStatus is 1, ifOperStatus is 1 Table 13 Command output Field Description Trapping buffer configuration and contents State of the trap buffer, enabled or disabled.
  • Page 43: Info-Center Channel Name

    <Sysname> system-view [Sysname] interface GigabitEthernet1/0/1 [Sysname-GigabitEthernet1/0/1] undo enable log updown info-center channel name Syntax info-center channel channel-number name channel-name undo info-center channel channel-number View System view Default level 2: System level Parameters channel-number: Specifies a channel by its number in the range of 0 to 9. channel-name: Specifies a channel name, a case-insensitive string of 1 to 30 characters.
  • Page 44: Info-Center Enable

    Description Use info-center console channel to specify the console output channel. The system uses this channel to output information to the console. Use undo info-center console channel to restore the default console output channel. By default, the console output channel is channel 0. The info-center console channel command takes effect only when the information center has been enabled with the info-center enable command.
  • Page 45: Info-Center Logbuffer

    View System view Default level 2: System level Parameters None Description Use info-center format unicom to set the UNICOM format for system information sent to a log host. Use undo info-center format to restore the default. By default, the format for the system information sent to a log host is HP. System information sent to a log host has two formats: HP and UNICOM.
  • Page 46: Info-Center Loghost

    Examples # Output system information to the log buffer through channel 4, and set the log buffer size to 50. <Sysname> system-view [Sysname] info-center logbuffer size 50 info-center loghost Syntax info-center loghost [ vpn-instance vpn-instance-name ] { host-ipv4-address | ipv6 host-ipv6-address } [ port port-number ] [ dscp dscp-value ] [ channel { channel-number | channel-name } | facility local-number ] * undo info-center loghost [ vpn-instance vpn-instance-name ] { host-ipv4-address | ipv6...
  • Page 47: Info-Center Loghost Source

    Enter a correct log host IP address. The system prompts an invalid address if an incorrect IP address, such as an IPv6 loopback address, or the broadcast address, is entered. The switch supports up to four log hosts. Examples # Output log information to the log host 1.1.1.1. <Sysname>...
  • Page 48: Info-Center Monitor Channel

    Examples When no source IP address is specified for log information, log in to the FTP server using the username ftp. The following log information is displayed on the log host: <189>Jan 31 05:37:52 2011 Sysname %%10FTPD/5/FTPD_LOGIN(l): User ftp (192.168.1.23) has logged in successfully.
  • Page 49: Info-Center Snmp Channel

    info-center snmp channel Syntax info-center snmp channel { channel-number | channel-name } undo info-center snmp channel View System view Default level 2: System level Parameters channel-number: Specifies a channel by its number, in the range of 0 to 9. channel-name: Specifies a channel by its name, a default name or a self-defined name. For how to configure a channel name, see info-center channel name.
  • Page 50 log: Specifies log information. trap: Specifies trap information. level severity: Specifies a severity level. See Table 10 for more information. state state: Specifies whether to output the specified system information, on (enabled) or off (disabled). channel-number: Specifies a channel by its number, in the range of 0 to 9. channel-name: Specifies a channel by its name, a default name or a self-defined name.
  • Page 51: Info-Center Synchronous

    TRAP DEBUG Output Modules destinatio Enabled/ Enabled/ Enabled/ allowed Severity Severity Severity disabled disabled disabled default (all Informatio Informatio Trap buffer Disabled Enabled Disabled Debug modules) default (all Informatio Log buffer Enabled Disabled Debug Disabled Debug modules) SNMP default (all Informatio Disabled Debug...
  • Page 52: Info-Center Syslog Channel

    Examples # Enable synchronous information output, and then issue the display current-configuration command to view the current configuration of the switch. <Sysname> system-view [Sysname] info-center synchronous % Info-center synchronous output is on [Sysname] display current- At this time, the system receives log information. It displays the log information first, and then displays your previous input, which is display current- in this example.
  • Page 53: Info-Center Timestamp

    The default Web output channel is channel 6. Examples # Output system information to the Web interface through channel 7. <Sysname> system-view [Sysname] info-center syslog channel 7 info-center timestamp Syntax info-center timestamp { debugging | log | trap } { boot | date | none } undo info-center timestamp { debugging | log | trap } View System view...
  • Page 54: Info-Center Timestamp Loghost

    <Sysname> system-view [Sysname] info-center timestamp log boot At this time, if you log in to the FTP server by using the username ftp, the log information generated is as follows: %0.109391473 Sysname FTPD/5/FTPD_LOGIN: User ftp (192.168.1.23) has logged in successfully. # Configure the time stamp format for log information as date.
  • Page 55: Info-Center Trapbuffer

    Examples # Configure the time stamp format for system information sent to the log host as no-year-date. <Sysname> system-view [Sysname] info-center timestamp loghost no-year-date info-center trapbuffer Syntax info-center trapbuffer [ channel { channel-number | channel-name } | size buffersize ] * undo info-center trapbuffer [ channel | size ] View System view...
  • Page 56: Reset Trapbuffer

    Default level 3: Manage level Parameters None Description Use reset logbuffer to clear the log buffer. Examples # Clear the log buffer. <Sysname> reset logbuffer reset trapbuffer Syntax reset trapbuffer View User view Default level 3: Manage level Parameters None Description Use reset trapbuffer to clear the trap buffer.
  • Page 57: Terminal Logging

    Use undo terminal debugging to disable the display of debugging information on the current terminal. By default, the display of debugging information on the current terminal is disabled. To view debug information, execute the terminal monitor and terminal debugging commands, enable information center (enabled by default), and finally use a debugging command to enable the related debugging.
  • Page 58: Terminal Trapping

    undo terminal monitor View User view Default level 1: Monitor level Parameters None Description Use terminal monitor to enable the monitoring of system information on the current terminal. Use undo terminal monitor to disable the monitoring of system information on the current terminal. By default, monitoring of the system information is enabled on the console and disabled on the current terminal.
  • Page 59 To view the trap information, execute the terminal monitor and terminal trapping commands, and then enable information center (enabled by default). The configuration of this command is only valid for the current connection between the terminal and the switch. If a new connection is established, the display of trap information on the terminal restores the default.
  • Page 60: Snmp Configuration Commands

    SNMP configuration commands display snmp-agent community Syntax display snmp-agent community [ read | write ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters read: Displays information about SNMP read-only communities. write: Displays information about SNMP read and write communities.
  • Page 61: Display Snmp-Agent Group

    Table 15 Command output Field Description Displays the community name created by using the snmp-agent Community name community command or the username created by using the snmp-agent usm-user { v1 | v2c } command. SNMP group name: • If the community is created by using the snmp-agent community command, the group name is the same as the community name.
  • Page 62: Display Snmp-Agent Local-Engineid

    Description Use display snmp-agent group to display information about an SNMP group, including the group name, security model, MIB view, and storage type. If no group is specified, the command displays information about all SNMP groups. Examples # Display information about all SNMP groups. <Sysname>...
  • Page 63: Display Snmp-Agent Mib-View

    exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use display snmp-agent local-engineid to display the local SNMP engine ID. The local SNMP engine ID uniquely identifies the SNMP engine of the SNMP agent in an SNMP domain.
  • Page 64 MIB Subtree:iso Subtree mask: Storage-type: nonVolatile View Type:included View status:active View name:ViewDefault MIB Subtree:snmpUsmMIB Subtree mask: Storage-type: nonVolatile View Type:excluded View status:active View name:ViewDefault MIB Subtree:snmpVacmMIB Subtree mask: Storage-type: nonVolatile View Type:excluded View status:active View name:ViewDefault MIB Subtree:snmpModules.18 Subtree mask: Storage-type: nonVolatile View Type:excluded View status:active...
  • Page 65: Display Snmp-Agent Statistics

    display snmp-agent statistics Syntax display snmp-agent statistics [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.
  • Page 66: Display Snmp-Agent Sys-Info

    Table 18 Command output Field Description Number of messages that the SNMP agent has Messages delivered to the SNMP entity received. Number of messages that had an SNMP version not Messages which were for an unsupported version configured on the SNMP agent. Messages which used a SNMP community name not Number of messages that has a community name not known...
  • Page 67: Display Snmp-Agent Trap Queue

    View Any view Default level 1: Monitor level Parameters contact: Displays the system contact. location: Displays the system location. version: Displays the SNMP version of the SNMP agent. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.
  • Page 68: Display Snmp-Agent Trap-List

    include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use display snmp-agent trap queue to display basic information about the trap queue, including trap queue name, queue length and the number of traps in the queue currently. Related commands: snmp-agent trap life and snmp-agent trap queue-size.
  • Page 69: Display Snmp-Agent Usm-User

    Related commands: snmp-agent trap enable. Examples # Display the modules that can generate traps and their trap status. <Sysname> display snmp-agent trap-list bfd trap enable bgp trap enable configuration trap enable default-route trap enable flash trap enable ospf trap enable pim trap enable standard trap enable system trap enable...
  • Page 70: Enable Snmp Trap Updown

    Examples # Display information about SNMPv3 users. <Sysname> display snmp-agent usm-user User name: userv3 Group name: mygroupv3 Engine ID: 800063A203000FE240A1A6 Storage-type: nonVolatile UserStatus: active User name: userv3code Group name: groupv3code Engine ID: 800063A203000FE240A1A6 Storage-type: nonVolatile UserStatus: active Table 20 Command output Field Description User name...
  • Page 71: Snmp-Agent

    Use undo enable snmp trap updown to disable link state traps on an interface. By default, link state traps are enabled. For an interface to generate linkUp/linkDown traps when its state changes, you must also enable the linkUp/linkDown trap function globally by using the enable snmp trap updown command. Related commands: snmp-agent target-host and snmp-agent trap enable.
  • Page 72: Snmp-Agent Calculate-Password

    snmp-agent calculate-password Syntax snmp-agent calculate-password plain-password mode { 3desmd5 | 3dessha | md5 | sha } { local-engineid | specified-engineid engineid } View System view Default level 3: Manage level Parameters plain-password: Specifies a plaintext authentication or privacy key. mode: Specifies authentication and privacy algorithms. Select a mode option, depending on the authentication and privacy algorithm you are configuring with the snmp-agent usm-user v3 command.
  • Page 73: Snmp-Agent Community

    Examples # Use the local engine and the MD5 algorithm to convert the plaintext key authkey to an encrypted key. <Sysname> system-view [Sysname] snmp-agent calculate-password authkey mode md5 local-engineid The secret key is: 09659EC5A9AE91BA189E5845E1DDE0CC snmp-agent community Syntax snmp-agent community { read | write } community-name [ mib-view view-name ] [ acl acl-number | acl ipv6 ipv6-acl-number ] * undo snmp-agent community { read | write } community-name View...
  • Page 74: Snmp-Agent Group

    To make sure the MIB objects are accessible only to a specific NMS, use a basic ACL to identify the source IP address of the NMS. To set the range of the MIB objects available for the community, use a MIB view.
  • Page 75: Snmp-Agent Local-Engineid

    Parameters v1: Specifies SNMPv1. v2c: Specifies SNMPv2c. v3: Specifies SNMPv3. group-name: Specifies the group name, a string of 1 to 32 characters. authentication: Specifies the security model of the SNMPv3 group to be authentication only (without privacy). privacy: Specifies the security model of the SNMPv3 group to be authentication and privacy. read-view view-name: Specifies a read-only MIB view.
  • Page 76: Snmp-Agent Log

    undo snmp-agent local-engineid View System view Default level 3: Manage level Parameters engineid: Specifies an SNMP engine ID as a hexadecimal string. It must comprise an even number of hexadecimal characters, in the range of 10 to 64. All-zero and all-F strings are invalid. Description Use snmp-agent local-engineid to configure the SNMP engine ID of the local SNMP agent.
  • Page 77: Snmp-Agent Ifmib Long-Ifindex Enable

    Use undo snmp-agent log to restore the default. By default, SNMP logging is disabled. Use SNMP logging to record the SNMP operations performed on the SNMP agent for auditing NMS behaviors. The SNMP agent sends log data to the information center. You can configure the information center to output the data to a specific destination as needed.
  • Page 78: Snmp-Agent Mib-View

    snmp-agent mib-view Syntax snmp-agent mib-view { excluded | included } view-name oid-tree [ mask mask-value ] undo snmp-agent mib-view view-name View System view Default level 3: Manage level Parameters excluded: Denies access to any node in the specified MIB subtree. included: Permits access to the nodes in the specified MIB subtree.
  • Page 79: Snmp-Agent Packet Max-Size

    [Sysname] snmp-agent community read public mib-view mibtest An SNMPv1 NMS in the public community can query the objects in the mib-2 subtree, but not any object (for example, the ipForwarding or ipDefaultTTL node) in the ip subtree. snmp-agent packet max-size Syntax snmp-agent packet max-size byte-count undo snmp-agent packet max-size...
  • Page 80: Snmp-Agent Sys-Info

    Description Use snmp-agent packet response dscp to set the DSCP value for SNMP responses. Use undo snmp-agent packet response dscp to restore the default. The default DSCP value for SNMP responses is 0. Examples # Set the DSCP value to 45 for SNMP responses. <Sysname>...
  • Page 81: Snmp-Agent Target-Host

    [Sysname] snmp-agent sys-info contact Dial System Operator at beeper # 27345 snmp-agent target-host Syntax snmp-agent target-host trap address udp-domain { ip-address | ipv6 ipv6-address } [ udp-port port-number ] [ dscp dscp-value ] [ vpn-instance vpn-instance-name ] params securityname security-string [ v1 | v2c | v3 [ authentication | privacy ] ] undo snmp-agent target-host trap address udp-domain { ip-address | ipv6 ipv6-address } params securityname security-string [ vpn-instance vpn-instance-name ] View...
  • Page 82: Snmp-Agent Trap Enable

    Make sure the SNMP agent uses the same UDP port number as the target host for traps. If udp-port port-number is not specified, UDP port 162 is used by default. Port 162 is the SNMP-specified port used for receiving traps, and is used by most NMSs, including iMC and MIB Browser. Make sure the SNMP agent uses the same SNMP version as the trap target host so the host can receive traps.
  • Page 83 flash: Enables Flash-related SNMP traps. default-route: Enables default route traps, which are sent when default routes are deleted. ospf: Enables SNMP traps for the OSPF module. • process-id: OSPF process ID, in the range of 1 to 65535. ifauthfail: Interface authentication failure traps. •...
  • Page 84: Snmp-Agent Trap If-Mib Link Extended

    newmaster: VRRP newmaster traps, which are sent when the device becomes the master. • Description Use snmp-agent trap enable to enable traps globally. Use undo snmp-agent trap enable to disable traps globally. By default, traps are enabled for all modules. After you globally enable a trap function for a module, whether the module generates traps also depends on the configuration of the module.
  • Page 85: Snmp-Agent Trap Life

    An extended linkUp trap is in the following format: • #Jan 24 11:43:09:896 2011 Sysname IFNET/4/INTERFACE UPDOWN: Trap 1.3.6.1.6.3.1.1.5.4<linkUp>: Interface 983555 is Up, ifAdminStatus is 1, ifOperStatus is 1, ifDescr is Ethernet1/1, ifType is 6 A standard linkDown trap is in the following format: •...
  • Page 86: Snmp-Agent Trap Queue-Size

    Examples # Configure the holding time of traps in the queue as 60 seconds. <Sysname> system-view [Sysname] snmp-agent trap life 60 snmp-agent trap queue-size Syntax snmp-agent trap queue-size size undo snmp-agent trap queue-size View System view Default level 3: Manage level Parameters size: Specifies the number of traps that can be stored in the trap sending queue, in the range of 1 to 1000.
  • Page 87: Snmp-Agent Usm-User { V1 | V2C

    Parameters interface-type interface-number: Specifies the interface type and interface number. Description Use snmp-agent trap source to specify the source IP address contained in the traps. Use undo snmp-agent trap source to restore the default. By default, SNMP chooses the IP address of an interface to be the source IP address of the traps. Upon the execution of this command, the system uses the primary IP address of the specified interface as the source IP address of the traps, and the NMS uses this IP address to uniquely identify the agent.
  • Page 88: Snmp-Agent Usm-User V3

    with the IPv6 addresses permitted in the ACL can use the specified username (community name) to access the SNMP agent. Description Use snmp-agent usm-user { v1 | v2c } to add a user to an SNMPv1 or SNMPv2c group. Use undo snmp-agent usm-user { v1 | v2c } to delete a user from an SNMPv1 or SNMPv2c group. When you create an SNMPv1 or SNMPv2c user, the system automatically creates a read-only community that has the same name as the SNMPv1 or SNMPv2c username.
  • Page 89 Parameters user-name: Specifies the username, a case-sensitive string of 1 to 32 characters. group-name: Specifies the group name, a case-sensitive string of 1 to 32 characters. cipher: Sets ciphertext authentication and privacy keys, If this keyword is not specified, auth-password and priv-password must be plaintext keys.
  • Page 90 acl ipv6 ipv6-acl-number: Specifies a basic ACL to filter NMSs by source IPv6 address. The ipv6-acl-number argument represents a basic ACL number in the range of 2000 to 2999. Only the NMSs with the IPv6 addresses permitted in the ACL can use the specified username to access the SNMP agent. local: Represents a local SNMP entity user.
  • Page 91 <Sysname> system-view [Sysname] snmp-agent group v3 testGroup privacy [Sysname] snmp-agent usm-user v3 testUser testGroup authentication-mode md5 authkey privacy-mode des56 prikey • Set the SNMP version on the NMS to SNMPv3. Fill in the username testUser. • Set the authentication algorithm to MD5. •...
  • Page 92: Rmon Configuration Commands

    RMON configuration commands display rmon alarm Syntax display rmon alarm [ entry-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters entry-number: Specifies the index of an RMON alarm entry, which ranges from 1 to 65535. If no entry is specified, the configuration of all alarm entries is displayed.
  • Page 93: Display Rmon Event

    Table 23 Command output Field Description Status of the alarm entry entry-number created by the owner is status: • entry-number—Alarm entry, corresponding to the MIB node alarmIndex. • owner—Entry owner, corresponding to the MIB node alarmOwner. • AlarmEntry entry-number status—Entry status, corresponding to the MIB node alarmStatus. owned by owner is status VALID—The entry is valid.
  • Page 94: Display Rmon Eventlog

    regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use display rmon event to display the configuration of the specified RMON event entry or all RMON event entries. Displayed information includes event index, event owner, event description, action triggered by the event (such as sending log or trap messages), and last time the event occurred (the elapsed time since system initialization/startup) in seconds.
  • Page 95 Default level 1: Monitor level Parameters entry-number: Specifies the index of an event entry, in the range of 1 to 65535. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow.
  • Page 96: Display Rmon History

    This example shows that event 1 generated two logs. display rmon history Syntax display rmon history [ interface-type interface-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters interface-type interface-number: Specifies an interface by its type and number.
  • Page 97: Field Description

    Sampled values of record 2 : dropevents , octets : 834 packets , broadcast packets multicast packets : 6 , CRC alignment errors : 0 undersize packets : 0 , oversize packets fragments , jabbers collisions , utilization Sampled values of record 3 : dropevents , octets : 1001...
  • Page 98: Display Rmon Prialarm

    Field Description Number of octets received during the sampling period, corresponding to the MIB octets node etherHistoryOctets. Number of packets received during the sampling period, corresponding to the packets MIB node etherHistoryPkts. Number of broadcasts received during the sampling period, corresponding to broadcastpackets the MIB node etherHistoryBroadcastPkts.
  • Page 99 Description Use display rmon prialarm to display the configuration of the specified private alarm entry or all private alarm entries. Related commands: rmon prialarm. Examples # Display the configuration of all private alarm entries. <Sysname> display rmon prialarm PrialarmEntry 1 owned by user1 is VALID. Samples type : absolute Variable formula...
  • Page 100: Display Rmon Statistics

    display rmon statistics Syntax display rmon statistics [ interface-type interface-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters interface-type interface-number: Specifies an interface by its type and number. |: Filters command output by specifying a regular expression.
  • Page 101 Field Description Entry status: • VALID—The entry is valid. • UNDERCREATION—The entry is invalid. VALID The display rmon command can display invalid entries, but the display current-configuration and display this commands do not display their settings. Status value is stored in the MIB node etherStatsStatus. Interface on which statistics are gathered, which corresponds to the Interface MIB node etherStatsDataSource.
  • Page 102: Rmon Alarm

    Field Description Incoming-packet statistics by packet length for the statistical period: • 64—Number of 64-byte packets. The value is stored in the MIB node etherStatsPkts64Octets. • 65-127—Number of 65- to 127-byte packets. The value is stored in the MIB node etherStatsPkts65to127Octets. •...
  • Page 103 falling-threshold threshold-value2 event-entry2: Sets the falling threshold, where the threshold-value2 argument represents the falling threshold, in the range –2147483648 to +2147483647 and the event-entry2 argument represents the index of the event triggered when the falling threshold is reached. event-entry2 ranges from 1 to 65535. If 0 is specified, the alarm does not trigger any event. owner text: Specifies the owner of the entry, a case-sensitive string of 1 to 127 characters that can contain spaces.
  • Page 104: Rmon Event

    Therefore, if you execute the rmon statistics 5 command, you can use etherStatsOctets.5 to replace the parameter. This example enables the RMON agent to do the following: Samples and monitors interface GigabitEthernet 1/0/1. • Obtains the incoming-packet count in its absolute value. If the total number of incoming bytes •...
  • Page 105: Rmon History

    Related commands: display rmon event, rmon alarm, and rmon prialarm. Examples # Create event 10 in the RMON event table. <Sysname> system-view [Sysname] rmon event 10 log owner user1 rmon history Syntax rmon history entry-number buckets number interval sampling-interval [ owner text ] undo rmon history entry-number View Layer 2 Ethernet interface view...
  • Page 106: Rmon Prialarm

    [Sysname-GigabitEthernet1/0/1] rmon history 1 buckets 10 interval 5 owner user1 rmon prialarm Syntax rmon prialarm entry-number prialarm-formula prialarm-des sampling-interval { absolute | changeratio | delta } rising-threshold threshold-value1 event-entry1 falling-threshold threshold-value2 event-entry2 entrytype { forever | cycle cycle-period } [ owner text ] undo rmon prialarm entry-number View System view...
  • Page 107 Use undo rmon prialarm to remove a private alarm entry from the private alarm table of RMON. Before creating an alarm entry, use the rmon event command to define the events to be referenced in the event table. You cannot create an entry that has the same alarm variable formula (prialarm-formula), sampling type (absolute changeratio or delta), rising threshold (threshold-value1), and falling threshold (threshold-value2) as an existing private alarm entry.
  • Page 108: Rmon Statistics

    rmon statistics Syntax rmon statistics entry-number [ owner text ] undo rmon statistics entry-number View Layer 2 Ethernet interface view Default level 2: System level Parameters entry-number: Specifies the index of statistics entry, which ranges from 1 to 65535. owner text: Specifies the owner of the entry, a string of case-sensitive 1 to 127 characters that can contain spaces.
  • Page 109: Port Mirroring Configuration Commands

    Port mirroring configuration commands display mirroring-group Syntax display mirroring-group { group-id | all | local | remote-destination | remote-source } [ | { begin | exclude | include } regular-expression ] View Any view Default level 2: System level Parameters group-id: Number of the mirroring group to be displayed, ranging from 1 to 4.
  • Page 110: Mirroring-Group

    type: remote-source status: active mirroring port: GigabitEthernet1/0/14 both monitor egress port: GigabitEthernet1/0/15 remote-probe VLAN: 2 mirroring-group 3: type: remote-destination status: active monitor port: GigabitEthernet1/0/16 remote-probe VLAN: 3 Table 29 Command output Field Description mirroring-group Number of the mirroring group Type of the mirroring group, which can be local, remote-source, or type remote-destination status...
  • Page 111: Mirroring-Group Mirroring-Port

    Use undo mirroring-group to remove the specified mirroring groups. To mirror packets from a port to another port on the same device, create a local mirroring group. To mirror packets from a port (a source port) on the current device to another port (the monitor port) either on the same device or on a different device, create remote mirroring groups.
  • Page 112: Mirroring-Group Monitor-Egress

    When removing a source port from a mirroring group, make sure the traffic direction you specified in the undo mirroring-group mirroring-port command matches the actual monitored direction specified earlier in the mirroring-group mirroring-port command. Related commands: mirroring-group. Examples # Create local mirroring group 1, configure GigabitEthernet 1/0/1 as a source port of the mirroring group, and specify that the mirroring group monitor the bidirectional traffic of the port.
  • Page 113: Mirroring-Group Monitor-Port

    Examples # Create remote source group 1, and configure port GigabitEthernet 1/0/1 as its egress port in system view. <Sysname> system-view [Sysname] mirroring-group 1 remote-source [Sysname] mirroring-group 1 monitor-egress GigabitEthernet 1/0/1 # Create remote source group 2, and configure port GigabitEthernet 1/0/2 as its egress port in interface view.
  • Page 114: Mirroring-Group Remote-Probe Vlan

    [Sysname] mirroring-group 1 monitor-port GigabitEthernet 1/0/1 # Create remote destination group 2, and configure port GigabitEthernet 1/0/2 as its monitor port. <Sysname> system-view [Sysname] mirroring-group 2 remote-destination [Sysname] mirroring-group 2 monitor-port GigabitEthernet 1/0/2 mirroring-group remote-probe vlan Syntax mirroring-group group-id remote-probe vlan rprobe-vlan-id undo mirroring-group group-id remote-probe vlan rprobe-vlan-id View System view...
  • Page 115: Mirroring-Port

    [Sysname] mirroring-group 2 remote-probe vlan 20 mirroring-port Syntax [ mirroring-group group-id ] mirroring-port { inbound | outbound | both } undo [ mirroring-group group-id ] mirroring-port { inbound | outbound | both } View Interface view Default level 2: System level Parameters mirroring-group group-id: Specifies a local or remote source group by its number, which ranges from 1 to 4 and defaults to 1.
  • Page 116: Monitor-Port

    monitor-port Syntax [ mirroring-group group-id ] monitor-port undo [ mirroring-group group-id ] monitor-port View Interface view Default level 2: System level Parameters mirroring-group group-id: Specifies a local or remote destination group by its number, which ranges from 1 to 4 and defaults to 1. The mirroring group specified by group-id must already exist. Description Use monitor-port to assign the current port to a local or remote destination group as the monitor port.
  • Page 117: Traffic Mirroring Configuration Commands

    Traffic mirroring configuration commands The traffic mirroring and remote traffic mirroring functions on the switch are implemented through the cooperation of a QoS policy and remote port mirroring. For the configuration commands about a QoS policy, see ACL and QoS Command Reference. mirror-to Syntax mirror-to { cpu | interface interface-type interface-number }...
  • Page 118: Nqa Configuration Commands

    NQA configuration commands NQA client configuration commands advantage-factor Syntax advantage-factor factor undo advantage-factor View Voice operation view Default level 2: System level Parameters factor: Specifies the advantage factor, used to count Mean Opinion Scores (MOS) and Calculated Planning Impairment Factor (ICPIF) values. The value is in the range of 0 to 20. Description Use advantage-factor to configure the advantage factor that is used to count MOS and ICPIF values.
  • Page 119: Data-Fill

    View Voice operation view Default level 2: System level Parameters g71 1a: Specifies a G.71 1 A-law codec type. g71 1u: Specifies a G.71 1 μ-law codec type g729a: Specifies a G.729 A-law codec type. Description Use codec-type to configure the codec type for a voice test. Use undo codec-type to restore the default.
  • Page 120: Data-Size

    How the string is filled varies with test types: • For ICMP echo tests, the string fills the whole data field of ICMP echo requests. For UDP echo tests, the first five bytes of the data field of a UDP packet are for special purpose, so •...
  • Page 121: Description (Any Nqa Operation View)

    Examples # Configure the size of the data field in an ICMP echo request as 80 bytes. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] data-size 80 description (any NQA operation view) Syntax description text undo description View Any NQA operation view Default level...
  • Page 122: Destination Port

    Description Use destination ip to configure a destination IP address for a test operation. Use undo destination ip to remove the configured destination IP address. By default, no destination IP address is configured for a test operation. Examples # Configure the destination IP address of an ICMP echo test operation as 10.1.1.1. <Sysname>...
  • Page 123 Default level 1: Monitor level Parameters admin-name operation-tag: Displays history records of an NQA test group. If these two arguments are not specified, history records of all test groups are displayed. admin-name represents the name of the NQA test group administrator who creates the NQA operation. It is a case-insensitive string of 1 to 32 characters.
  • Page 124: Display Nqa Reaction Counters

    Field Description Status value of test results, which can be one of the following values: • Succeeded • Status Unknown error • Internal error • Timeout Time Time when the test is completed display nqa reaction counters Syntax display nqa reaction counters [ admin-name operation-tag [ item-number ] ] [ | { begin | exclude | include } regular-expression ] View Any view...
  • Page 125 <Sysname> display nqa reaction counters admin test NQA entry (admin admin, tag test) reaction counters: Index Checked Element Threshold Type Checked Num Over-threshold Num probe-duration accumulate probe-duration average probe-duration consecutive probe-fail accumulate probe-fail consecutive Table 32 Command output Field Description Index ID of a reaction entry Checked Element...
  • Page 126: Display Nqa Result

    Monitore Threshold Collect data in Checked Num Over-threshold Num d element type Number of packets of which the one-way Packets sent since the Number of packets sent accumulate delay jitter exceeds the jitter-DS/jit test group starts since the test group starts threshold since the test ter-SD group starts...
  • Page 127 <Sysname> display nqa result admin test NQA entry (admin admin, tag test) test results: Destination IP address: 192.168.1.42 Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 15/46/26 Square-Sum of round trip time: 8103 Last succeeded probe time: 2011-01-23 10:56:38.7 Extended results: Packet loss in test: 0% Failures due to timeout: 0...
  • Page 128 Failures due to timeout: 1000 Failures due to disconnect: 0 Failures due to no connection: 0 Failures due to sequence error: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packet(s) arrived late: 0 Voice results: RTT number: 0 Min positive SD: 0 Min positive DS: 0...
  • Page 129 Field Description Failures due to internal error Number of failures due to internal errors Failures due to other errors Failures due to other errors Packet(s) arrived late Number of packets that arrived late UDP-jitter results UDP jitter test results, available only in UDP jitter tests Voice results Voice test results, available only in voice tests RTT number...
  • Page 130: Display Nqa Statistics

    Field Description One way results Uni-direction delay test result, displayed in a UDP jitter or voice test Max SD delay Maximum delay from source to destination Max DS delay Maximum delay from destination to source Min SD delay Minimum delay from source to destination Min DS delay Minimum delay from destination to source Number of SD delay...
  • Page 131 regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use display nqa statistics to display test result statistics for the specified or all test groups. Statistics cannot be generated until all probe operations in the first test of a test group have finished. If they have not finished and you display statistics by using this command, the statistics are display as all If a reaction entry is configured, the command displays the monitoring results of the reaction entry in the period specified by the statistics internal command.
  • Page 132 Min SD delay: 1 Min DS delay: 1 Number of SD delay: 550 Number of DS delay: 550 Sum of SD delay: 1475 Sum of DS delay: 1201 Square sum of SD delay: 5407 Square sum of DS delay: 3959 SD lost packet(s): 0 DS lost packet(s): 0 Lost packet(s) for unknown reason: 0...
  • Page 133 Max SD delay: 0 Max DS delay: 0 Min SD delay: 0 Min DS delay: 0 Number of SD delay: 0 Number of DS delay: 0 Sum of SD delay: 0 Sum of DS delay: 0 Square sum of SD delay: 0 Square sum of DS delay: 0 SD lost packet(s): 0 DS lost packet(s): 0...
  • Page 134 Field Description Positive DS number Number of positive delay jitters from destination to source Positive SD sum Sum of positive delay jitters from source to destination Positive DS sum Sum of positive delay jitters from destination to source Positive SD average Average of positive delay jitters from source to destination Positive DS average Average of positive delay jitters from destination to source...
  • Page 135 Field Description SD lost packet(s) Number of lost packets from the source to the destination DS lost packet(s) Number of lost packets from the destination to the source Lost packet(s) for unknown reason Number of lost packets for unknown reasons Voice scores Voice parameters, displayed only in a voice test Max MOS value...
  • Page 136: Filename

    Monitored Threshold type Collect data in Checked Num Over-threshold Num element Number of packets of Number of packets which the one-way delay Packets sent in the accumulate sent in the counting jitter exceeds the counting interval jitter-DS/jitter-SD interval threshold in the counting interval average Number of packets of...
  • Page 137: Frequency

    frequency Syntax frequency interval undo frequency View Any NQA operation view Default level 2: System level Parameters interval: Specifies the interval in milliseconds between two consecutive tests, in the range of 0 to 604800000. The value 0 sets the test group to perform only one test, and not to collect any statistics. Description Use frequency to configure the interval between two consecutive tests for a test group.
  • Page 138: History-Record Keep-Time

    By default, history records of an NQA test group are not saved. If the history records saving function is enabled, the system saves the history records. To view the history records of the NQA test group, use the display nqa history command. If the history records saving function is disabled, the system does not save the history records of the NQA test group and the existing history records are also removed.
  • Page 139: Http-Version

    undo history-record number View Any NQA operation view Default level 2: System level Parameters number: Specifies the maximum number of history records that can be saved in a test group. The value is in the range of 0 to 50. Description Use history-record number to configure the maximum number of history records that can be saved in a test group.
  • Page 140: Mode

    [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] http-version v1.0 mode Syntax mode { active | passive } undo mode View FTP operation view Default level 2: System level Parameters active: Sets the data transmission mode to active for FTP tests. In this mode, the FTP server initiates a data connection request.
  • Page 141: Nqa

    Description Use next-hop to configure the next hop IP address for ICMP echo requests of a test group. Use undo next-hop to remove the configured next hop IP address. By default, no next hop IP address is configured. Examples # Configure the next hop IP address as 10.1.1.1. <Sysname>...
  • Page 142: Nqa Agent Enable

    nqa agent enable Syntax nqa agent enable undo nqa agent enable View System view Default level 2: System level Parameters None Description Use nqa agent enable to enable the NQA client. Use undo nqa agent enable to disable the NQA client and stop all the tests being performed. By default, the NQA client is enabled.
  • Page 143: Nqa Schedule

    From the beginning to the end of a test, the NQA test is in test status. From the end of a test to the beginning of the next test, the NQA test is in waiting status. Examples # Configure the maximum number of tests that the NQA client can simultaneously perform as 5. <Sysname>...
  • Page 144: Operation (Ftp Operation View)

    Examples # Start the tests for the test group with the administrator name admin and operation tag test. The start time and duration of the test group are 08:08:08 201 1/01/08 and 1000 seconds. <Sysname> system-view [Sysname] nqa schedule admin test start-time 08:08:08 2011/01/08 lifetime 1000 operation (FTP operation view) Syntax operation { get | put }...
  • Page 145: Operation Interface

    post: Transfers data to the HTTP server. Description Use operation to configure the HTTP operation type. Use undo operation to restore the default. By default, the HTTP operation type is get. Examples # Configure the HTTP operation type as post. <Sysname>...
  • Page 146: Probe Count

    View FTP operation view Default level 2: System level Parameters cipher: Sets a ciphertext password. simple: Sets a plaintext password. password: Specifies a password used to log in to the FTP server. This argument is case sensitive. If simple is specified, it must be a string of 1 to 32 characters. If cipher is specified, it must be a ciphertext string of 1 to 73 characters.
  • Page 147: Probe Packet-Interval

    During a TCP or DLSw test, one probe operation means setting up one connection. • • During a UDP jitter or a voice test, one probe operation means continuously sending a specific number of probe packets. The number of probe packets is configurable with the probe packet-number command.
  • Page 148: Probe Packet-Number

    [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Syaname-nqa-admin-test-udp-jitter] probe packet-interval 100 probe packet-number Syntax probe packet-number packet-number undo probe packet-number View UDP jitter, voice operation view Default level 2: System level Parameters packet-number: Specifies the number of packets to be sent per probe operation. The value is in the range of 10 to 1000 for each probe operation in one UDP jitter test, and 10 to 60000 for each probe operation in one voice test.
  • Page 149: Probe Timeout

    Description Use probe packet-timeout to configure the timeout time for waiting for a response in a UDP jitter or voice test. Use undo probe packet-timeout to restore the default. By default, the timeout time in a UDP jitter test is 3000 milliseconds, the timeout time in a voice test is 5000 milliseconds.
  • Page 150: Reaction Checked-Element Icpif

    reaction checked-element icpif Syntax reaction item-number checked-element icpif threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number View Voice operation view Default level 2: System level Parameters item-number: Specifies a reaction entry ID, in the range of 1 to 10. threshold-value: Specifies threshold values.
  • Page 151: Reaction Checked-Element { Jitter-Ds | Jitter-Sd

    reaction checked-element { jitter-ds | jitter-sd } Syntax reaction item-number checked-element { jitter-ds | jitter-sd } threshold-type { accumulate accumulate-occurrences | average } threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number View UDP jitter, voice operation view Default level 2: System level Parameters...
  • Page 152: Reaction Checked-Element Mos

    entry is set to over-threshold. Otherwise, the state is set to below-threshold. Once state of the reaction entry changes, a trap message is generated and sent to the network management server. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element jitter-ds threshold-type average threshold-value 50 5 action-type trap-only # Create reaction entry 2 for monitoring the destination-to-source delay jitter of UDP jitter probe packets.
  • Page 153: Reaction Checked-Element { Owd-Ds | Owd-Sd

    Use undo reaction to delete the specified reaction entry. By default, no reaction entry for monitoring the MOS value is configured. For the MOS threshold, the number is expressed in three digits representing ones, tenths, and hundredths. For example, to express a MOS threshold of 1, enter 100. Examples # Create reaction entry 1 for monitoring the MOS value of each voice test.
  • Page 154: Reaction Checked-Element Packet-Loss

    No actions can be configured for a reaction entry of monitoring one-way delays. The monitoring results and statistics, however, can be displayed by the display nqa reaction counters and display nqa statistics commands. Examples # Create reaction entry 1 for monitoring the destination-to-source delay of every UDP jitter probe packet. Set the upper threshold to 50 milliseconds and lower threshold to 5 milliseconds.
  • Page 155: Reaction Checked-Element Probe-Duration

    Examples # Create reaction entry 1 for monitoring the packet loss in each UDP jitter test. Before the NQA test group starts, the initial state of the reaction entry is invalid. After each test, the packet loss is checked. If the total number of lost packets exceeds 100 (included), the state of the reaction entry is set to over-threshold.
  • Page 156 Description Use reaction checked-element probe-duration to configure a reaction entry for monitoring the probe duration. You cannot edit a reaction entry. To change the attributes in a reaction entry, use undo reaction to delete this entire entry and start over. Use undo reaction to delete the specified reaction entry.
  • Page 157: Reaction Checked-Element Probe-Fail (For Trap)

    reaction checked-element probe-fail (for trap) Syntax reaction item-number checked-element probe-fail threshold-type { accumulate accumulate-occurrences | consecutive consecutive-occurrences } [ action-type { none | trap-only } ] undo reaction item-number View DHCP, DLSw, DNS, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo operation view Default level 2: System level Parameters...
  • Page 158: Reaction Checked-Element Probe-Fail (For Trigger)

    entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction 2 checked-element probe-fail threshold-type consecutive 10 action-type trap-only reaction checked-element probe-fail (for trigger) Syntax...
  • Page 159: Reaction Checked-Element Rtt

    reaction checked-element rtt Syntax reaction item-number checked-element rtt threshold-type { accumulate accumulate-occurrences | average } threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number View UDP jitter, voice operation view Default level 2: System level Parameters item-number: Specifies a reaction entry ID, in the range of 1 to 10.
  • Page 160: Reaction Trap

    [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element rtt threshold-type average threshold-value 50 5 action-type trap-only # Create reaction entry 2 for monitoring the round-trip time of UDP jitter probe packets. Set the upper threshold to 50 milliseconds, and lower threshold to 5 milliseconds. Before the NQA test group starts, the initial state of the reaction entry is invalid.
  • Page 161: Resolve-Target

    [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction trap probe-failure 5 resolve-target Syntax resolve-target domain-name undo resolve-target View DNS operation view Default level 2: System level Parameters domain-name: Specifies the domain name to be resolved. It is a case-insensitive string separated by dots (.), each part consisting of 1 to 63 characters.
  • Page 162: Source Interface

    Description Use route-option bypass-route to enable the routing table bypass function to test the direct connectivity to the direct destination. Use undo route-option bypass-route to disable the routing table bypass function. By default, the routing table bypass function is disabled. When the routing table bypass function is enabled, the routing table is not searched, and the packet is sent directly to the destination in a directly connected network.
  • Page 163: Source Ip

    source ip Syntax source ip ip-address undo source ip View DLSw, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo, UDP jitter, voice operation view Default level 2: System level Parameters ip-address: Specifies the source IP address of a test operation. Description Use source ip to configure the source IP address of probe packets.
  • Page 164: Statistics Hold-Time

    Description Use source port to configure the source port of probe packets. Use undo source port to remove the configured port number. By default, no source port number is configured. Examples # Configure port 8000 as the source port of probe packets in the UDP echo test group. <Sysname>...
  • Page 165: Statistics Interval

    View DLSw, DNS, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo, UDP jitter, voice operation view Default level 2: System level Parameters number: Specifies the maximum number of statistics groups that can be kept, in the range of 0 to 100. To disable collecting statistics, specify number 0.
  • Page 166: Tos

    This command is not supported by DHCP tests. Examples # Configure the interval for collecting the test result statistics of an ICMP test group as 2 minutes. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] statistics interval 2 Syntax tos value undo tos...
  • Page 167: Type

    Parameters value: Specifies the maximum number of hops that a probe packet traverses in the network, in the range of 1 to 255. Description Use ttl to configure the maximum number of hops that a probe packet traverses in the network. Use undo ttl to restore the default.
  • Page 168: Url

    Examples # Configure the test type of a test group as FTP and enter operation view. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] Syntax url url undo url View HTTP operation view Default level 2: System level Parameters url: Specifies the website that an HTTP test visits, a case-sensitive string of 1 to 185 characters.
  • Page 169: Vpn-Instance (Icmp Echo Operation View)

    Description Use username to configure a username used to log onto the FTP server. Use undo username to remove the configured username. By default, no username is configured for logging onto the FTP server. Related commands: password and operation. Examples # Configure the login username as administrator.
  • Page 170: Display Nqa Server Status

    display nqa server status Syntax display nqa server status [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.
  • Page 171: Nqa Server Enable

    nqa server enable Syntax nqa server enable undo nqa server enable View System view Default level 2: System level Parameters None Description Use nqa server enable to enable the NQA server. Use undo nqa server enable to disable the NQA server. By default, the NQA server is disabled.
  • Page 172: Nqa Server Tcp-Connect Tos

    The IP address and port number must be consistent with those on the NQA client and must be different from those for an existing listening service. The IP address must be that of an interface on the NQA server. Otherwise, the configuration will be invalid.
  • Page 173: Nqa Server Udp-Echo Tos

    Parameters ip-address: Specifies the IP address specified for the UDP listening service on the NQA server. port-number: Specifies the port number specified for the UDP listening service on the NQA server, in the range of 1 to 50000. Description Use nqa server udp-echo to create a UDP listening service on the NQA server. Use undo nqa server udp-echo to remove the UDP listening service created.
  • Page 174: Sflow Configuration Commands

    sFlow configuration commands display sflow Syntax display sflow [ slot slot-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 2: System level Parameters slot slot-number: Displays the sFlow configuration and operation information of an IRF member switch. The slot-number argument specifies the ID of the IRF member switch.
  • Page 175: Sflow Agent

    sFlow Port Information: Interface CID Interval(s) FID MaxHLen Rate Mode Status GE1/0/1 1000 Random Active GE1/0/2 1000 Random Active Table 38 Command output Field Description sFlow Version Current sFlow version. 5—sFlow version 5. sFlow Global Information sFlow global configuration information. IP address of the sFlow agent: •...
  • Page 176: Sflow Collector

    View System view Default level 2: System level Parameters ip ip-address: Specifies the IPv4 address of the sFlow agent. ipv6 ipv6-address: Specifies the IPv6 address of the sFlow agent. Description Use sflow agent to configure the IP address of the sFlow agent. Use undo sflow agent to remove the configured IP address.
  • Page 177: Sflow Counter Interval

    port port-number: Specifies the port number of the sFlow collector, in the range of 1 to 65535. The default port number is 6343. time-out seconds: Specifies the aging time of the sFlow collector, in the range of 60 to 2147483647, in seconds.
  • Page 178: Sflow Counter Collector

    sflow counter collector Syntax sflow counter collector collector-id undo sflow counter collector View Layer 2 Ethernet interface view Default level 2: System level Parameters collector-id: Specifies the ID of the sFlow collector. Description Use sflow counter collector to specify the sFlow collector for counter sampling. Use undo sflow counter collector to remove the sFlow collector for counter sampling.
  • Page 179: Sflow Flow Max-Header

    This command is supported only on physical Ethernet interfaces, but not on logical interfaces (such as VLAN interfaces). Examples # Specify the collector number 2 on GigabitEthernet1/0/1 for flow sampling. <Sysname> system-view [Sysname] interface GigabitEthernet1/0/1 [Sysname-GigabitEthernet1/0/1] sflow flow collector 2 sflow flow max-header Syntax sflow flow max-header length...
  • Page 180: Sflow Sampling-Rate

    Default level 2: System level Parameters determine: Specifies the fixed sampling mode. For example, if the flow sampling interval is set to 4000 (by using the sflow sampling-rate command), the device randomly samples a packet, like the tenth packet, from the first 4000 packets. The next time the device samples the 4010th packet, and so on. random: Specifies the random sampling mode.
  • Page 181: Sflow Source

    Description Use sflow sampling-rate to specify the number of packets out of which the interface will sample a packet. Use undo sflow sampling-rate to disable sampling. By default, packet sampling is disabled. This command is supported only on Ethernet interfaces, but not on logical interfaces (such as VLAN interfaces).
  • Page 182: Ipc Configuration Commands

    IPC configuration commands The display commands for the IPC feature display only information about active nodes. display ipc channel Syntax display ipc channel { node node-id | self-node } [ | { begin | exclude | include } regular-expression ] View Any view Default level...
  • Page 183: Display Ipc Link

    Table 39 Command output Field Description Channel number, which has been predefined and assigned by the ChannelID system. One channel number corresponds to one module. The display ipc channel command displays the numbers of the current active modules. Description information, which is generated by the internal software of the device, is used to describe the functions of a channel.
  • Page 184: Display Ipc Multicast-Group

    Table 40 Command output Field Description Dst-NodeID Number of the peer node. Link status: • LinkStatus UP—A connection is established. • DOWN—A connection is terminated. display ipc multicast-group Syntax display ipc multicast-group { node node-id | self-node } [ | { begin | exclude | include } regular-expression ] View Any view...
  • Page 185: Display Ipc Node

    Field Description Link status: • Status INUSE—The multicast group is in use. • DELETE—The multicast group is to be deleted. ChannelID Channel number. display ipc node Syntax display ipc node [ | { begin | exclude | include } regular-expression ] View Any view Default level...
  • Page 186 Default level 1: Monitor level Parameters node node-id: Displays the packet statistics for the specified node, where node-id represents the number of the specified node. The value is in the range of 0 to 4. self-node: Displays the packet statistics for the local node. |: Filters command output by specifying a regular expression.
  • Page 187: Display Ipc Performance

    display ipc performance Syntax display ipc performance { node node-id | self-node } [ channel channel-id ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters node node-id: Displays the IPC performance statistics for the specified node, where node-id represents the number of the specified node.
  • Page 188: Display Ipc Queue

    ------------------------------------------------------------ Statistics for packets acknowledged: Peak 10Sec 1Min 5Min Total-Data ------------------------------------------------------------ Table 44 Command output Field Description Peak rate in pps (average rate is measured every 10 seconds, the greatest Peak value of which is taken as the peak rate). 10Sec Average rate (in pps) for the past 10 seconds.
  • Page 189: Ipc Performance Enable

    ------------------------------------------------------------ UNICAST 4096 UNICAST 4096 UNICAST 4096 UNICAST 4096 UNICAST 4096 UNICAST 4096 UNICAST 4096 UNICAST 4096 MULTICAST 4096 MULTICAST 4096 MULTICAST MULTICAST MULTICAST MULTICAST MIXCAST 2048 MIXCAST 2048 Table 45 Command output Field Description Queue type: • UNICAST—Unicast queue. QueueType •...
  • Page 190: Reset Ipc Performance

    self-node: Enables IPC performance statistics for the local node. channel channel-id: Enables IPC performance statistics for the specified channel, where channel-id represents the channel number. The value range depends on the switch model. Description Use ipc performance enable to enable IPC performance statistics. Use the undo ipc performance command to disable IPC performance statistics.
  • Page 191: Support And Other Resources

    Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.com/support Before contacting HP, collect the following information: Product model names and numbers • • Technical support registration number (if applicable) Product serial numbers •...
  • Page 192: Conventions

    Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown. Italic Italic text represents arguments that you replace with actual values. Square brackets enclose syntax choices (keywords or arguments) that are optional. Braces enclose a set of required syntax choices separated by vertical bars, from which { x | y | ...
  • Page 193 Network topology icons Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features.
  • Page 194: Index

    Index A C D E F H I M N O P R S T U V W display rmon statistics,94 display sflow,168 advantage-factor,1 12 display snmp-agent community,54 display snmp-agent group,55 display snmp-agent local-engineid,56 codec-type,1 12 display snmp-agent mib-view,57 display snmp-agent statistics,59 data-fill,1 13 display snmp-agent...
  • Page 195 info-center syslog channel,46 ping ipv6,5 info-center timestamp,47 probe count,140 info-center timestamp loghost,48 probe packet-interval,141 info-center trapbuffer,49 probe packet-number,142 ipc performance enable,183 probe packet-timeout,142 probe timeout,143 mirroring-group,104 mirroring-group mirroring-port,105 reaction checked-element { jitter-ds | jitter-sd },145 mirroring-group monitor-egress,106 reaction checked-element { owd-ds | owd-sd },147 mirroring-group monitor-port,107...
  • Page 196 snmp-agent sys-info,74 terminal debugging,50 snmp-agent target-host,75 terminal logging,51 snmp-agent trap enable,76 terminal monitor,51 snmp-agent trap if-mib link extended,78 terminal trapping,52 snmp-agent trap life,79 tos,160 snmp-agent trap queue-size,80 tracert,7 snmp-agent trap source,80 tracert ipv6,9 snmp-agent usm-user { v1 | v2c },81 ttl,160 snmp-agent usm-user v3,82...

This manual is also suitable for:

6125 blade switch series

Table of Contents