HPE FlexFabric 5930 Series Network Management And Monitoring Command Reference

HPE FlexFabric 5930 Series Network Management And Monitoring Command Reference

Hide thumbs Also See for FlexFabric 5930 Series:
Table of Contents

Advertisement

Quick Links

HPE FlexFabric 5930 Switch Series

Network Management and Monitoring

Command Reference

Part number: 5998-7789R
Software version: Release 242x
Document version: 6W100-20151220

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the FlexFabric 5930 Series and is the answer not in the manual?

Questions and answers

Summary of Contents for HPE FlexFabric 5930 Series

  • Page 1: Network Management And Monitoring

    HPE FlexFabric 5930 Switch Series Network Management and Monitoring Command Reference Part number: 5998-7789R Software version: Release 242x Document version: 6W100-20151220...
  • Page 2 © Copyright 2015 Hewlett Packard Enterprise Development LP The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
  • Page 3: Table Of Contents

    Contents Ping, tracert, and system debugging commands ············································ 1     debugging ·················································································································································· 1   display debugging ······································································································································ 1   ping ···························································································································································· 2   ping ipv6 ····················································································································································· 5   tracert ························································································································································· 7   tracert ipv6 ················································································································································· 9 NTP commands ···························································································· 11  ...
  • Page 4   ptp announce-interval ······························································································································· 59   ptp announce-timeout ······························································································································ 60   ptp asymmetry-correction ························································································································· 61   ptp clock-source ······································································································································· 61   ptp clock-step ··········································································································································· 64   ptp delay-mechanism ······························································································································· 65   ptp destination-mac ·································································································································· 66   ptp domain ··············································································································································· 66  ...
  • Page 5   security-logfile save ································································································································ 105   terminal debugging ································································································································· 105   terminal logging level ····························································································································· 106   terminal monitor ····································································································································· 107 SNMP commands ······················································································· 108     display snmp-agent community ·············································································································· 108   display snmp-agent context ··················································································································· 109   display snmp-agent group ······················································································································ 110  ...
  • Page 6   data-fill ···················································································································································· 174   data-size ················································································································································· 175   description (any NQA operation type view) ···························································································· 176   destination ip ·········································································································································· 177   destination ipv6 ······································································································································ 178   destination port ······································································································································· 178   display nqa history ································································································································· 179   display nqa reaction counters ················································································································ 180  ...
  • Page 7   tos ·························································································································································· 237   ttl ···························································································································································· 237   type ························································································································································ 238   url ··························································································································································· 239   username ··············································································································································· 240   version ···················································································································································· 240   vpn-instance ··········································································································································· 241   NQA server commands ·································································································································· 242   display nqa server ·································································································································· 242  ...
  • Page 8   monitor process ······································································································································ 295   monitor thread ········································································································································ 300   process core ··········································································································································· 303   reset exception context ·························································································································· 304   reset kernel deadloop ····························································································································· 304   reset kernel exception ···························································································································· 304   reset kernel reboot ································································································································· 305   reset kernel starvation ····························································································································...
  • Page 9   xml ·························································································································································· 346 Packet capture commands ········································································· 348     packet-capture interface ························································································································· 348   packet-capture read ······························································································································· 350 Document conventions and icons ······························································· 351     Conventions ··················································································································································· 351   Network topology icons ·································································································································· 352 Support and other resources ······································································ 353  ...
  • Page 10: Ping, Tracert, And System Debugging Commands

    Ping, tracert, and system debugging commands debugging Use debugging to enable debugging for a module. Use undo debugging to disable debugging for a module. Syntax debugging { all [ timeout time ] | module-name [ option ] } undo debugging { all | module-name [ option ] } Default Debugging functions are disabled for all modules.
  • Page 11: Ping

    Views Any view Predefined user roles network-admin network-operator Parameters module-name: Specifies a module by its name. To display the current module name, use the display debugging ? command. Examples # Display all enabled debugging functions. <Sysname> display debugging DEV debugging switch is on Related commands debugging ping...
  • Page 12 -n: Disables domain name resolution for the host argument. If the host argument represents the host name of the destination, and if this keyword is not specified, the device translates host into an address. -p pad: Specifies the value of the pad field in an ICMP echo request, in hexadecimal format, 1 to 8 bits.
  • Page 13 56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms 56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms 56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms 56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms 56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms --- Ping statistics for 1.1.2.2 in VPN instance vpn1 --- 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms...
  • Page 14: Ping Ipv6

    Field Description • ttl—TTL value in the ICMP echo reply. • time—Response time. Routers through which the ICMP echo request passed. They are displayed in inversed order, which means the router with a smaller distance to the destination is displayed first. --- Ping statistics for 1.1.2.2 --- Statistics on data received and sent in the ping operation.
  • Page 15 -v: Displays detailed information (including the dst field and the idx field) about ICMPv6 echo replies. If this keyword is not specified, the system only displays brief information (not including the dst field and the idx field) about ICMPv6 echo replies. -vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the destination belongs, where the vpn-instance-name argument is a case-sensitive string of 1 to 31 characters.
  • Page 16: Tracert

    • The minimum/average/maximum/standard deviation roundtrip time of packets is 4 milliseconds, 25 milliseconds, 62 milliseconds, and 20 milliseconds. Figure 1 Command output Field Description Ping6(56 data bytes) An ICMPv6 echo reply with a data length of 56 bytes is sent from 2001::1to 2001::2.
  • Page 17 -q packet-number: Specifies the number of probe packets to send per hop. The value range is 1 to 65535, and the default is 3. -t tos: Specifies the ToS value of probe packets. The value range is 0 to 255, and the default is 0. -vpn-instance vpn-instance-name: Specifies the MPLS L3VPN instance to which the destination belongs, where the vpn-instance-name argument is a case-sensitive string of 1 to 31 characters.
  • Page 18: Tracert Ipv6

    Field Description 425 ms 30 ms name and IP address of the first hop, and the round-trip time of three probe packets. If the domain name of the first hop is not configured, the IP address is displayed. The number of packets that can be sent in each probe can be set through the -q keyword.
  • Page 19 Usage guidelines After identifying network failure with the ping ipv6 command, you can use the tracert ipv6 command to locate failed nodes. The output of the tracert ipv6 command includes IPv6 addresses of all the Layer 3 devices that the packets traverse from source to destination.
  • Page 20: Ntp Commands

    NTP commands The term "interface" in this chapter collectively refers to Layer 3 interfaces, including VLAN interfaces and Layer 3 Ethernet interfaces. You can set an Ethernet port as a Layer 3 interface by using the port link-mode route command (see Layer 2—LAN Switching Configuration Guide). display ntp-service ipv6 sessions Use display ntp-service ipv6 sessions to display information about all IPv6 NTP associations.
  • Page 21 Field Description Reference clock ID of the NTP server: • If the reference clock is the local clock, the value of this field is related to the value of the Clock stratum field: When the value of the Clock stratum field is 0 or 1, this field displays Local.
  • Page 22 Reachabilities:0, sync distance: 15.938 Precision: 2^10, version: 4, source interface: Not specified Reftime: 00000000.00000000 Thu, Feb 7 2036 6:28:16.000 Orgtime: d17cbb21.0f318106 Tue, May 17 2011 9:15:13.059 Rcvtime: 00000000.00000000 Thu, Feb 7 2036 6:28:16.000 Xmttime: 00000000.00000000 Thu, Feb 7 2036 6:28:16.000 Roundtrip delay samples: 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 Offset samples: 0.00 0.00...
  • Page 23 Field Description VPN instance of the NTP server. If the NTP server is in a public VPN instance network, the field is displayed as Not specified. Operation mode of the local device: • unspec—The mode is unspecified. • sym_active—Active mode. •...
  • Page 24: Display Ntp-Service Sessions

    Field Description Filter order Dispersion information. Status of the local clock. The field is displayed only when you use the ntp-service refclock-master command to set the local clock as a reference clock. Reference clock status When the reach field of the local clock is 255, the field is displayed as working normally.
  • Page 25 Field Description Reference clock ID of the NTP server: • If the reference clock is the local clock, the value of this field is related to the value of the stra field: When the value of the stra field is 0 or 1, this field displays LOCL. When the stra field has another value, this field displays the IP reference address of the local clock.
  • Page 26 Local mode: client, local poll interval: 6 Peer mode: server, peer poll interval: 6 Offset: 0.2862ms, roundtrip delay: 3.2653ms, dispersion: 4.5166ms Root roundtrip delay: 0.0000ms, root dispersion: 10.910ms Reachabilities:31, sync distance: 0.0194 Precision: 2^18, version: 3, source interface: Not specified Reftime: d17cbba5.1473de1e Tue, May 17 2011 9:17:25.079...
  • Page 27 Field Description Reference clock ID of the NTP server: • If the reference clock is the local clock, the value of this field is related to the value of the Clock stratum field: When the value of the Clock stratum field is 0 or 1, this field displays LOCL.
  • Page 28: Display Ntp-Service Status

    Field Description Synchronization distance relative to the upper-level clock, in sync distance seconds, and calculated from dispersion and roundtrip delay values. Precision Accuracy of the system clock. version NTP version in the range of 1 to 4. Source interface. source interface If the source interface is not specified, this field is Not specified.
  • Page 29 Root dispersion: 3.96367 ms Reference time: d0c5fc32.92c70b1e Wed, Dec 29 2010 18:28:02.573 # Display the NTP service status when time is not synchronized. <Sysname> display ntp-service status Clock status: unsynchronized Clock stratum: 16 Reference clock ID: none Clock jitter: 0.000000 s Stability: 0.000 pps Clock precision: 2^-10 Root delay: 0.00000 ms...
  • Page 30: Display Ntp-Service Trace

    Field Description Alarming status: • 00—Normal. • 01—Leap second, indicates that the last minute in a day Leap indicator has 61 seconds. • 10—Leap second, indicates that the last minute in a day has 59 seconds. • 11—Time is not synchronized. Difference between the system clock and reference clock, in Clock jitter seconds.
  • Page 31: Ntp-Service Acl

    Field Description Stratum Stratum level of the NTP server. Root mean square (RMS) value of the clock offset relative to the upper-level jitter clock, in seconds. Synchronization distance relative to the upper-level NTP server, in seconds, synch distance calculated from dispersion and roundtrip delay values. Identifier of the primary reference source.
  • Page 32: Ntp-Service Authentication Enable

    • If no ACL is created for an access right, the associated access right is not granted. • If no ACL is created for any access right, peer is granted. The ntp-service acl command provides minimal security for a system running NTP. A more secure method is NTP authentication.
  • Page 33: Ntp-Service Authentication-Keyid

    ntp-service authentication-keyid Use ntp-service authentication-keyid to set an NTP authentication key. Use undo ntp-service authentication-keyid to remove the NTP authentication key. Syntax ntp-service authentication-keyid keyid authentication-mode md5 { cipher | simple } value undo ntp-service authentication-keyid keyed Default No NTP authentication key is set. Views System view Predefined user roles...
  • Page 34: Ntp-Service Broadcast-Client

    ntp-service broadcast-client Use ntp-service broadcast-client to configure the device to operate in NTP broadcast client mode and use the current interface to receive NTP broadcast packets. Use undo ntp-service broadcast-client to remove the configuration. Syntax ntp-service broadcast-client undo ntp-service broadcast-client Default The device does not operate in any NTP association mode.
  • Page 35: Ntp-Service Dscp

    Predefined user roles network-admin Parameters authentication-keyid keyid: Specifies the key ID to be used for sending broadcast messages to broadcast clients, where keyid is in the range of 1 to 4294967295. If this option is not specified, the local device cannot synchronize broadcast clients enabled with NTP authentication. version number: Specifies the NTP version.
  • Page 36: Ntp-Service Enable

    [Sysname] ntp-service dscp 30 ntp-service enable Use ntp-service enable to enable the NTP service. Use undo ntp-service enable to disable the NTP service. Syntax ntp-service enable undo ntp-service enable Default The NTP service is not enabled. Views System view Predefined user roles network-admin Examples # Enable the NTP service.
  • Page 37: Ntp-Service Ipv6 Acl

    ntp-service ipv6 acl Use ntp-service ipv6 acl to configure the access-control right for the peer devices to access the IPv6 NTP services of the local device. Use undo ntp-service ipv6 acl to remove the configured NTP service access-control right. Syntax ntp-service ipv6 { peer | query | server | synchronization } acl acl-number undo ntp-service ipv6 { peer | query | server | synchronization } acl acl-number Default...
  • Page 38: Ntp-Service Ipv6 Dscp

    [Sysname] ntp-service ipv6 peer acl 2001 Related commands • ntp-service authentication enable • ntp-service authentication-keyid • ntp-service reliable authentication-keyid ntp-service ipv6 dscp Use ntp-server ipv6 dscp to configure a DSCP value for IPv6 NTP packets. Use undo ntp-server ipv6 dscp to restore the default. Syntax ntp-service ipv6 dscp dscp-value undo ntp-service ipv6 dscp...
  • Page 39: Ntp-Service Ipv6 Multicast-Client

    Predefined user roles network-admin Usage guidelines To disable an interface on the device from synchronizing the peer devices in the corresponding subnet or disable the device from being synchronized by the peer devices in the subnet corresponding to an interface, execute the undo ntp-service ipv6 inbound enable command on the interface.
  • Page 40: Ntp-Service Ipv6 Multicast-Server

    Related commands ntp-service ipv6 multicast-server ntp-service ipv6 multicast-server Use ntp-service ipv6 multicast-server to configure the device to operate in IPv6 NTP multicast server mode and use the current interface to send IPv6 NTP multicast packets. Use undo ntp-service ipv6 multicast-server to remove the configuration. Syntax ntp-service ipv6 multicast-server ipv6-multicast-address [ authentication-keyid keyid | ttl ttl-number ] *...
  • Page 41: Ntp-Service Ipv6 Unicast-Peer

    Syntax ntp-service ipv6 source interface-type interface-number undo ntp-service ipv6 source Default No source interface is specified for IPv6 NTP messages. The device automatically selects the source IP address for IPv6 NTP messages. For more information, see RFC 3484. Views System view Predefined user roles network-admin Parameters...
  • Page 42 Views System view Predefined user roles network-admin Parameters peer-name: Specifies the host name of the symmetric-passive peer, a case-insensitive string of 1 to 253 characters. ipv6-address: Specifies the IPv6 address of the symmetric-passive peer. It must be a unicast address, rather than a multicast address. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the symmetric-passive peer belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters.
  • Page 43: Ntp-Service Ipv6 Unicast-Server

    ntp-service ipv6 unicast-server Use ntp-service ipv6 unicast-server to specify an IPv6 NTP server for the device. Use undo ntp-service ipv6 unicast-server to remove an IPv6 NTP server specified for the device. Syntax ntp-service ipv6 unicast-server server-name ipv6-address vpn-instance vpn-instance-name ] [ authentication-keyid keyid | priority | source interface-type interface-number ] * undo ntp-service ipv6 unicast-server { server-name | ipv6-address } [ vpn-instance vpn-instance-name ]...
  • Page 44: Ntp-Service Max-Dynamic-Sessions

    If the specified IPv6 address of the NTP server is a link local address, you must specify the source interface for NTP messages and cannot specify a VPN for the NTP server. Examples # Specify the IPv6 NTP server 2001::1 for the device. <Sysname>...
  • Page 45: Ntp-Service Multicast-Client

    ntp-service multicast-client Use ntp-service multicast-client to configure the device to operate in NTP multicast client mode and use the current interface to receive NTP multicast packets. Use undo ntp-service multicast-client to remove the configuration. Syntax ntp-service multicast-client [ ip-address ] undo ntp-service multicast-client [ ip-address ] Default The device does not operate in any NTP association mode.
  • Page 46: Ntp-Service Refclock-Master

    View Interface view Predefined user roles network-admin Parameters ip-address: Specifies a multicast IP address. The default is 224.0.1.1. A multicast server and client must be configured with the same multicast IP address. authentication-keyid keyid: Specifies the key ID to be used for sending multicast messages to multicast clients, where keyid is in the range of 1 to 4294967295.
  • Page 47: Ntp-Service Reliable Authentication-Keyid

    Predefined user roles network-admin Parameters ip-address: IP address of the local clock, which is 127.127.1.u, where u is the NTP process ID in the range of 0 to 3. If you do not specify ip-address, it defaults to 127.127.1.0. stratum: Stratum level of the local clock, in the range of 1 to 15. The default value is 8. A lower stratum level represents a higher clock accuracy.
  • Page 48: Ntp-Service Source

    Before you use the command, make sure NTP authentication is enabled and an authentication key is configured. The key automatically changes to untrusted after you delete the key. In this case, you do not need to execute the undo ntp-service reliable authentication-keyid command. You can set a maximum of 128 keys by executing the command.
  • Page 49: Ntp-Service Unicast-Peer

    unicast-server or ntp-service unicast-peer command works as the source interface for NTP messages. • If you have configured the ntp-service broadcast-server or ntp-service multicast-server command, the source interface for the broadcast or multicast NTP messages is the interface configured with the respective command. •...
  • Page 50: Ntp-Service Unicast-Server

    Usage guidelines When you specify a passive peer for the device, the device and its passive peer can be synchronized to each other. If their clocks are in synchronized state, the clock with a high stratum level is synchronized to the clock with a lower stratum level. To synchronize the PE to a PE or CE in a VPN, provide vpn-instance vpn-instance-name in your command.
  • Page 51 authentication-keyid keyid: Specifies the key ID to be used for sending NTP messages to the NTP server, where keyid is in the range of 1 to 4294967295. If the option is not specified, the local device and NTP server do not authenticate each other. priority: Specifies this NTP server as the first choice under the same condition.
  • Page 52: Sntp Commands

    SNTP commands display sntp ipv6 sessions Use display sntp ipv6 sessions to display information about all IPv6 SNTP associations. Syntax display sntp ipv6 sessions Views Any view Predefined user roles network-admin network-operator Examples # Display information about all IPv6 SNTP associations. <Sysname>...
  • Page 53: Sntp Authentication Enable

    Views Any view Predefined user roles network-admin network-operator Examples # Display information about all IPv4 SNTP associations. <Sysname> display sntp sessions SNTP server Stratum Version Last receive time 1.0.1.11 Tue, May 17 2011 9:11:20.833 (Synced) Table 11 Command output Field Description SNTP server (NTP server).
  • Page 54: Sntp Authentication-Keyid

    Related commands • sntp authentication-keyid • sntp reliable authentication-keyid sntp authentication-keyid Use sntp authentication-keyid to set an SNTP authentication key. Use undo sntp authentication-keyid to remove the SNTP authentication key. Syntax sntp authentication-keyid keyid authentication-mode md5 { cipher | simple } value undo sntp authentication-keyid keyid Default No SNTP authentication key is set.
  • Page 55: Sntp Enable

    • sntp reliable authentication-keyid sntp enable Use sntp enable to enable the SNTP service. Use undo sntp enable to disable the SNTP service. Syntax sntp enable undo sntp enable Default The SNTP service is not enabled. Views System view Predefined user roles network-admin Examples # Enable the SNTP service.
  • Page 56: Sntp Reliable Authentication-Keyid

    authentication-keyid keyid: Specifies the key ID to be used for sending NTP messages to the NTP server, where keyid is in the range of 1 to 4294967295. If this option is not specified, the local device and NTP server do not authenticate each other. source interface-type interface-number: Specifies the source interface for IPv6 NTP messages.
  • Page 57: Sntp Unicast-Server

    Parameters keyid: Specifies an authentication key number in the range of 1 to 4294967295. Usage guidelines If SNTP is enabled, the SNTP client is synchronized only to an NTP server that provides a trusted key. Before you use the command, make sure SNTP authentication is enabled and an authentication key is configured.
  • Page 58 authentication-keyid keyid: Specifies the key ID to be used for sending NTP messages to the NTP server, where keyid is in the range of 1 to 4294967295. If the option is not specified, the local device and NTP server do not authenticate each other. source interface-type interface-number: Specifies the source interface for NTP messages.
  • Page 59: Ptp Commands

    PTP commands display ptp clock Use display ptp clock to display PTP clock information. Syntax display ptp clock Views Any view Predefined user roles network-admin network-operator Usage guidelines If you specify neither a PTP profile nor PTP mode, no information is displayed. Examples # Display PTP clock information.
  • Page 60: Display Ptp Corrections

    Field Description Clock node type: • • E2ETC. • PTP mode E2ETC-OC. • • P2PTC. • P2PTC-OC. Whether the OC operates in Slave only mode: • Slave only Yes. • Clock ID Clock ID for the device. Clock type of the device: •...
  • Page 61: Display Ptp Foreign-Masters-Record

    If the subordinate port is changed, information recorded will be cleared. Examples # Display PTP corrections occurred on a subordinate port. <Sysname> display ptp corrections Slave port Correction time Corrections(s,ns) Rate ratio FGE1/0/1 Mar 11 03:14:54 2012 0,74 0.999999973 FGE1/0/1 Mar 11 03:14:55 2012 -1,17 0.999999980...
  • Page 62: Display Ptp Interface

    FGE1/0/1 000FE2-FFFE-FF0000 65535 FGE1/0/2 000FE2-FFFE-FF0001 65535 Table 14 Command output Field Description Interface Name of a PTP interface. Clock ID Clock ID of the foreign master node. Time class. Time accuracy. OSLV Offset of the grandmaster clock. Hops from the grandmaster to the local clock node. Whether the node represents the grandmaster clock: •...
  • Page 63 <Sysname> display ptp interface fortygige 1/0/1 Clock ID : 000FE2-FFFE-FF0000 Port number : 15 PTP version PTP enable : Enabled Transport of PTP : User Datagram Protocol (IPv4) Port state : Slave Force state : No Clock step : Two Asymmetry correction Delay mechanism : End to End...
  • Page 64: Display Ptp Parent

    Field Description PTP messages are transported by: • Transport of PTP User Datagram Protocol (IPv4). • IEEE 802.3/Ethernet. Whether the force state is configured: • Force state Yes. • value Announce message sending interval (in seconds) = 2 (this field displays Announce interval (log mean) the value for the value exponent).
  • Page 65: Display Ptp Statistics

    Grandmaster clock ID: 000FE2-FFFE-FF0000 Grandmaster clock quality: Class : 248 Accuracy : 254 Offset (log variance) : 65535 Priority1 : 128 Priority2 : 128 Table 16 Command output Field Description Parent port number Outgoing interface number of the parent clock. Offset from the parent clock node.
  • Page 66: Display Ptp Time-Property

    Sent packets -------------------------------------------------------------------------- Announce :476 Sync :2543 Signaling DelayReq :0 DelayResp :0 FollowUp :2542 PdelayReq:238 PdelayResp:0 PdelayRespFollowUp :0 Discarded packets -------------------------------------------------------------------------- Announce :0 Sync Signaling DelayReq :0 DelayResp :0 FollowUp PdelayReq:0 PdelayResp:0 PdelayRespFollowUp :0 Table 17 Command output Field Description Received packets Statistics about received PTP messages.
  • Page 67: Ptp Active Force-State

    PTP timescale : True Time source : 0xA0 (Internal oscillator) Table 18 Command output Field Description Whether the UTC offset is valid: • Current UTC offset valid True—Yes. • False—No. Cumulative offset (in seconds) between the Coordinated Universal Time (UTC) Current UTC offset of the grandmaster clock and the International Atomic Time (TAI).
  • Page 68: Ptp Announce-Interval

    Views System view Predefined user roles network-admin Usage guidelines This command is available only after you specify a PTP profile and a PTP mode. Examples # Activate the port role configuration. <Sysname> system-view [Sysname] ptp profile 1588v2 [Sysname] ptp mode oc [Sysname] ptp active force-state Related commands •...
  • Page 69: Ptp Announce-Timeout

    [Sysname] interface fortygige 1/0/1 [Sysname-FortyGigE1/0/1] ptp announce-interval 2 Related commands • ptp mode • ptp profile ptp announce-timeout Use ptp announce-timeout to configure the timeout value for receiving announce messages. Use undo ptp announce-timeout to restore the default. Syntax ptp announce-timeout multiple-value undo ptp announce-timeout Default The timeout value for receiving announce messages is 3.
  • Page 70: Ptp Asymmetry-Correction

    Related commands • ptp announce-interval • ptp mode • ptp profile ptp asymmetry-correction Use ptp asymmetry-correction to configure asymmetric delay correction time. Use undo ptp asymmetry-correction to restore the default. Syntax ptp asymmetry-correction { minus | plus } value undo ptp asymmetry-correction Default The asymmetric delay correction time is 0 nanoseconds, which means delay correction is not performed.
  • Page 71 undo ptp clock-source { bits1 | bits2 } { accuracy | class | time-source } Default For a Bits clock, the time accuracy is 254, the time class is 248, and the attribute value is 160. Views System view Predefined user roles network-admin Parameters bits1: Configures the Bits1 clock parameters.
  • Page 72 class class-value: Specifies the time class of the Bits clock, in the range of 0 to 255. A numerically smaller value indicates a higher time class. Table 20 shows the description of time classes (those not listed are reserved by the protocol). Table 20 Time class description Time class (in decimal Description...
  • Page 73: Ptp Clock-Step

    GM attribute values (in Description hexadecimal format) Other. Internal oscillator. F0 to FE For use by alternate PTP profiles. Reserved. Usage guidelines This command is available only after you specify a PTP profile and a PTP mode. Examples # Configure the time accuracy for the Bits1 clock as 44. <Sysname>...
  • Page 74: Ptp Delay-Mechanism

    Examples # Configure the mode for carrying timestamps on FortyGigE 1/0/1 as two-step. <Sysname> system-view [Sysname] ptp profile 1588v2 [Sysname] ptp mode oc [Sysname] interface fortygige 1/0/1 [Sysname-FortyGigE1/0/1] ptp clock-step two-step Related commands • ptp mode • ptp profile ptp delay-mechanism Use ptp delay-mechanism to specify a delay measurement mechanism for a BC or OC.
  • Page 75: Ptp Destination-Mac

    Related commands • ptp profile • ptp mode ptp destination-mac Use ptp destination-mac to configure the destination MAC address for non-peer delay messages. Use undo ptp destination-mac to restore the default. Syntax ptp destination-mac mac-address undo ptp destination-mac Default The destination MAC address for non-peer delay messages is 011B-1900-0000. Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Predefined user roles...
  • Page 76: Ptp Enable

    Syntax ptp domain domain-number undo ptp domain Default The PTP domain number is 0. Views System view Predefined user roles network-admin Parameters domain-number: Specifies the PTP domain by its domain number, in the range of 0 to 255. Usage guidelines This command is available only after you specify a PTP profile and a PTP mode.
  • Page 77: Ptp Force-State

    Examples # Configure the clock node type as OC and enable PTP on FortyGigE 1/0/1. <Sysname> system-view [Sysname] ptp profile 1588v2 [Sysname] ptp mode oc [Sysname] interface fortygige 1/0/1 [Sysname-FortyGigE1/0/1] ptp enable # Configure the clock node type as E2ETC, and enable PTP on FortyGigE 1/0/1 and FortyGigE 1/0/2.
  • Page 78: Ptp Min-Delayreq-Interval

    <Sysname> system-view [Sysname] ptp profile 1588v2 [Sysname] ptp mode oc [Sysname] interface fortygige 1/0/1 [Sysname-FortyGigE1/0/1] ptp force-state slave Related commands • ptp mode • ptp profile • ptp slave-only ptp min-delayreq-interval Use ptp min-delayreq-interval to configure the minimum interval for sending delay request messages.
  • Page 79: Ptp Mode

    ptp mode Use ptp mode to specify a clock node type for the device. Use undo ptp mode to restore the default. Syntax ptp mode { bc | e2etc | e2etc-oc | oc | p2ptc | p2ptc-oc } undo ptp mode Default No clock node type is specified.
  • Page 80: Ptp Port-Mode

    Default The interval for sending peer delay request messages is 1 (2 ) second. Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Predefined user roles network-admin Parameters value: Specifies the interval (in seconds) for sending peer delay request messages. The intervals use log base 2 values.
  • Page 81: Ptp Priority

    This command is applicable to an E2ETC+OC clock or a P2PTC+OC clock. Examples # Specify the clock node type as P2PTC+OC for the device. Configure the port type of FortyGigE 1/0/1 as OC. <Sysname> system-view [Sysname] ptp profile 1588v2 [Sysname] ptp mode p2ptc-oc [Sysname] interface fortygige 1/0/1 [Sysname-FortyGigE1/0/1] ptp port-mode oc Related commands...
  • Page 82: Ptp Profile

    [Sysname] ptp mode oc [Sysname] ptp priority clock-source local priority1 10 Related commands • ptp mode • ptp profile ptp profile Use ptp profile to configure a PTP profile for the device. Use undo ptp profile to restore the default. Syntax ptp profile { 1588v2 | 8021as } undo ptp profile...
  • Page 83: Ptp Source

    Views System view Predefined user roles network-admin Usage guidelines This command is available only after you specify a PTP profile and a PTP mode. This command is applicable only to OCs. You can execute the ptp force-state command to specify a subordinate port as a master port or passive port even if the OC operates as a member clock.
  • Page 84: Ptp Syn-Interval

    To enable the PTP functions to operate on the port, you must execute this command, if PTP messages are transported by UDP and IPv4. Examples # Configure the source IP address as 3.5.1.5 for the PTP message. <Sysname> system-view [Sysname] ptp profile 1588v2 [Sysname] ptp mode oc [Sysname] ptp source 3.5.1.5 Related commands...
  • Page 85: Ptp Transport-Protocol

    • ptp profile ptp transport-protocol Use ptp transport-protocol to configure UDP and IPv4 as the transport protocols for PTP messages. Use undo ptp transport-protocol to restore the default. Syntax ptp transport-protocol udp undo ptp transport-protocol Default PTP messages are transported through IEEE 802.3 and Ethernet. Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Predefined user roles...
  • Page 86: Ptp Utc Offset

    Views System view Predefined user roles network-admin Parameters leap59-date: Adjusts the UTC at the last minute (23:59) of the specified date so that the UTC is one second slower than the TAI. leap61-date: Adjusts the UTC at the last minute (23:59) of the specified date so that the UTC is one second faster than the TAI.
  • Page 87: Reset Ptp Statistics

    Parameters utc-offset: Specifies the cumulative offset between the UTC and TAI, in the range of 0 to 999 seconds. Usage guidelines This command is available only after you specify a PTP profile and a PTP mode. Examples # Configure the cumulative offset between the UTC and TAI as 33 seconds. <Sysname>...
  • Page 88: Information Center Commands

    Information center commands diagnostic-logfile save Use diagnostic-logfile save to manually save diagnostic logs from the diagnostic log file buffer to the diagnostic log file. Syntax diagnostic-logfile save Views Any view Predefined user roles network-admin Usage guidelines When this command is executed, the system displays a message that logs in the buffer have been saved to the diagnostic log file even if the diagnostic log file buffer does not contain diagnostic logs.
  • Page 89: Display Info-Center

    Diagnostic log file: Enabled. Diagnostic log file size quota: 10 MB Diagnostic log file directory: flash:/diagfile Writing frequency: 24 hour 0 min 0 sec Table 22 Command output Field Description • Enabled—Diagnostic logs can be output to the diagnostic log file. Diagnostic log file •...
  • Page 90: Display Logbuffer

    display logbuffer Use display logbuffer to display the state of the log buffer and the log information in the log buffer. Syntax display logbuffer [ reverse ] [ level severity | size buffersize | slot slot-number ] * Views Any view Predefined user roles network-admin network-operator...
  • Page 91: Display Logbuffer Summary

    Dropped messages: 0 Overwritten messages: 0 Current messages: 127 %Jun 19 18:03:24:55 2006 Sysname SYSLOG/7/SYS_RESTART:System restarted … Table 24 Command output Field Description • Enabled—Logs can be output to the log buffer. Log buffer • Disabled—Logs cannot be output to the buffer. Max buffer size Maximum buffer size supported by the device.
  • Page 92: Display Logfile Summary

    Table 25 Command output Field Description Slot IRF member ID. EMERG Represents emergency. For more information, see Table ALERT Represents alert. For more information, see Table CRIT Represents critical. For more information, see Table ERROR Represents error. For more information, see Table WARN Represents warning.
  • Page 93: Display Security-Logfile Summary

    Field Description Log file directory Log file directory. Writing frequency Log file writing frequency. display security-logfile summary Use display security-logfile summary to display the summary of the security log file. Syntax display security-logfile summary Views Any view Predefined user roles security-audit Usage guidelines A local user can use this command only after being authorized as the security log administrator by...
  • Page 94: Enable Log Updown

    enable log updown Use enable log updown to enable an interface to generate link up or link down logs when the interface state changes. Use undo enable log updown to disable an interface from generating link up or link down logs when the interface state changes.
  • Page 95: Info-Center Diagnostic-Logfile Frequency

    <Sysname> system-view [Sysname] info-center diagnostic-logfile enable info-center diagnostic-logfile frequency Use info-center diagnostic-logfile frequency to configure the interval at which the system saves diagnostic logs from the diagnostic log file buffer to the diagnostic log file. Use undo info-center diagnostic-logfile frequency to restore the default saving interval. Syntax info-center diagnostic-logfile frequency freq-sec undo info-center diagnostic-logfile frequency...
  • Page 96: Info-Center Diagnostic-Logfile Directory

    Views System view Predefined user roles network-admin Parameters size: Specifies the maximum size of the diagnostic log file, in the range of 1 to 10 MB. Examples # Set the maximum size to 6 MB for the diagnostic log file. <Sysname>...
  • Page 97: Info-Center Enable

    Syntax info-center logfile overwrite-protection [ all-port-powerdown ] undo info-center logfile overwrite-protection Default Log file overwrite-protection is disabled. Views System view Predefined user roles network-admin Parameters all-port-powerdown: Shuts down all the physical ports except for the console port, the management Ethernet port, and IRF ports on the device when the log file is full or the storage media runs out of space.
  • Page 98: Info-Center Format

    [Sysname] info-center enable Information center is enabled. info-center format Use info-center format to set the format of logs sent to a log host. Use undo info-center format to restore the default. Syntax info-center format { unicom | cmcc } undo info-center format Default Logs are sent to a log host in standard format.
  • Page 99: Info-Center Logbuffer Size

    Examples # Enable log output to the log buffer. <Sysname> system-view [Sysname] info-center logbuffer Related commands • display logbuffer • info-center enable info-center logbuffer size Use info-center logbuffer size to set the maximum number of logs that can be stored in the log buffer.
  • Page 100: Info-Center Logfile Frequency

    undo info-center logfile enable Default The log file feature is enabled. Views System view Predefined user roles network-admin Examples # Enable log output to the log file. <Sysname> system-view [Sysname] info-center logfile enable info-center logfile frequency Use info-center logfile frequency to configure the interval for saving logs to the log file. Use undo info-center logfile frequency to restore the default saving interval.
  • Page 101: Info-Center Logfile Directory

    Syntax info-center logfile size-quota size undo info-center logfile size-quota Default The maximum size of the log file is 10 MB. Views System view Predefined user roles network-admin Parameters size: Specifies the maximum size for the log file, in MB. Usage guidelines When the maximum size of the log file is reached, the system deletes the earliest messages and writes new messages to the log file.
  • Page 102: Info-Center Logging Suppress Duplicates

    Examples # Create a directory named test under the flash root directory. <Sysname> mkdir test Creating directory flash:/test... Done. # Set the log file directory to flash:/test. <Sysname> system-view [Sysname] info-center logfile directory flash:/test Related commands info-center logfile enable info-center logging suppress duplicates Use info-center logging suppress duplicates to enable duplicate log suppression.
  • Page 103: Info-Center Loghost

    Device A continues to output the following log information: %Jan 1 07:27:48:636 2000 Sysname ARP/6/DUPIFIP: Duplicate address 172.16.0.1 on interface Vlan-interface100, sourced from 00e0-fc58-123d %Jan 1 07:28:19:639 2000 Sysname ARP/6/DUPIFIP: Duplicate address 172.16.0.1 on interface Vlan-interface100, sourced from 00e0-fc58-123d This message repeated 4 times in last 30 seconds. The output shows that after the duplicate log suppression function is enabled, the system outputs another duplicate log and starts the first suppression period for 30 seconds.
  • Page 104: Info-Center Loghost Source

    loghost: Specifies a log host by its host name, a case insensitive string of 1 to 253 characters. ipv4-address: Specifies an IPv4 log host by its IPv4 address. ipv6 ipv6-address: Specifies an IPv6 log host by its IPv6 address port port-number: Specifies the port number of the log host, in the range of 1 to 65535. The default is 514.
  • Page 105: Info-Center Security-Logfile Alarm-Threshold

    [Sysname-LoopBack0] ip address 2.2.2.2 32 [Sysname-LoopBack0] quit [Sysname] info-center loghost source loopback 0 info-center security-logfile alarm-threshold Use info-center security-logfile alarm-threshold to set the alarm threshold for security log file usage. Use undo info-center security-logfile alarm-threshold to restore the default. Syntax info-center security-logfile alarm-threshold usage undo info-center security-logfile alarm-threshold Default...
  • Page 106: Info-Center Security-Logfile Frequency

    Views System view Predefined user roles network-admin Usage guidelines This feature enables the system to output security logs to the security log file buffer, and saves the logs from the buffer to the security log file at a specific interval. Examples # Enable saving security logs to the security log file.
  • Page 107: Info-Center Security-Logfile Directory

    Syntax info-center security-logfile size-quota size undo info-center security-logfile size-quota Default The maximum size of the security log file is 10 MB. Views System view Predefined user roles network-admin Parameters size: Specifies the maximum size for the security log file, in MB. The value range for this argument varies by device model.
  • Page 108: Info-Center Source

    <Sysname> system-view [Sysname] info-center security-logfile directory flash:/test info-center source Use info-center source to configure a log output rule for a module. Use undo info-center source to restore the default. Syntax info-center source { module-name | default } { console | logbuffer | logfile | loghost | monitor } { deny | level severity } undo info-center source { module-name | default } { console | logbuffer | logfile | loghost | monitor }...
  • Page 109: Info-Center Synchronous

    logbuffer: Outputs logs to the log buffer. logfile: Outputs logs to the log file. loghost: Outputs logs to the log host. monitor: Outputs logs to the monitor terminal. deny: Disables log output. level severity: Specifies a severity level in the range of 0 to 7. The smaller the severity value, the higher the severity level.
  • Page 110: Info-Center Syslog Min-Age

    Examples # Enable synchronous information output, and then issue the display current-configuration command to view the current configuration of the device. <Sysname> system-view [Sysname] info-center synchronous Info-center synchronous output is on [Sysname] display current- At this time, the system receives log information. It displays the log information first, and then displays your previous input, which is display current- in this example.
  • Page 111: Info-Center Timestamp

    Usage guidelines When the log buffer or log file is full, new logs will automatically overwrite the oldest logs by default. After the minimum storage period is set, the system identifies the storage period of a log to determine whether to delete the log. The system current time minus a log's generation time is the log's storage period.
  • Page 112: Info-Center Timestamp Loghost

    [Sysname] info-center timestamp boot Related commands info-center timestamp loghost info-center timestamp loghost Use info-center timestamp loghost to configure the timestamp format for logs sent to a log host. Use undo info-center timestamp loghost to restore the default. Syntax info-center timestamp loghost { date | iso [ with-timezone ] | no-year-date | none } undo info-center timestamp loghost Default The timestamp format for logs sent to a log host is date.
  • Page 113: Logfile Save

    Views System view Predefined user roles network-admin Parameters size: Specifies the maximum size of the trace log file, in the range of 1 to 10 MB. Examples # Set the maximum size to 6 MB for the trace log file. <Sysname>...
  • Page 114: Security-Logfile Save

    Examples # Clear the log buffer. <Sysname> reset logbuffer Related commands display logbuffer security-logfile save Use security-logfile save to manually save security logs from the security log file buffer to the security log file. Syntax security-logfile save Views Any view Predefined user roles security-audit Usage guidelines...
  • Page 115: Terminal Logging Level

    Views User view Predefined user roles network-admin Usage guidelines To view debug information on the console, perform the following tasks: Execute the terminal debugging command. Enable the information center (enabled by default). Use a debugging command to enable the related debugging. To view debug information on the monitor terminal, perform the following tasks: Execute the terminal monitor and terminal debugging commands.
  • Page 116: Terminal Monitor

    Predefined user roles network-admin Parameters severity: Specifies the lowest level of the logs that can be output to the current terminal, in the range of 0 to 7. Usage guidelines If you specify the lowest level of the logs that can be output to the current terminal, the device outputs the logs with a severity level higher than or equal to the specified level.
  • Page 117: Snmp Commands

    SNMP commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. The SNMP agent sends notifications (traps and informs) to inform the NMS of significant events, such as link state changes and user logins or logouts.
  • Page 118: Display Snmp-Agent Context

    Table 29 Command output Field Description Displays the community name created by using the snmp-agent community Community name command or the username created by using the snmp-agent usm-user { v1 | v2c } command. SNMP group name. • If the community is created by using the snmp-agent community command, Group name the group name is the same as the community name.
  • Page 119: Display Snmp-Agent Group

    Parameters context-name: Specifies an SNMP context by its name, a case-sensitive string of 1 to 32 characters. If no SNMP context is specified, this command displays all SNMP contexts created on the device. Examples # Display all SNMP contexts created on the device. <Sysname>...
  • Page 120: Display Snmp-Agent Local-Engineid

    Field Description Readview Read-only MIB view accessible to the SNMP group. Writeview Write MIB view accessible to the SNMP group. Notify MIB view for the SNMP group. The SNMP users in the group can send Notifyview notifications only for the nodes in the notify MIB view. Storage type, including volatile, nonvolatile, permanent, readOnly, and other Storage-type (see...
  • Page 121 Views Any view Predefined user roles network-admin network-operator Parameters details: Specifies detailed MIB node information, including node name, last octet of an OID string, and name of the next leaf node. index-node: Specifies SNMP MIB tables, and node names and OIDs of MIB index nodes. trap-node: Specifies node names and OIDs of MIB notification nodes, and node names and OIDs of notification objects.
  • Page 122 Field Description Permissions to MIB nodes: NA—Not accessible. NF—Supports notifications. (NA) RO—Supports read-only access. RW—Supports read and write access. RC—Supports read-write-create access. WO—Supports write-only access. Leaf node or MIB table node. # Display detailed MIB node information. <Sysname> display snmp-agent mib-node details iso(1)(lldpMessageTxInterval) |-std(0)(lldpMessageTxInterval) |-iso8802(8802)(lldpMessageTxInterval)
  • Page 123 1.0.8802.1.1.2.1.1.6.1.1 Table |lldpConfigManAddrTable Index ||lldpLocManAddrSubtype 1.0.8802.1.1.2.1.3.8.1.1 Index ||lldpLocManAddr 1.0.8802.1.1.2.1.3.8.1.2 Table |lldpStatsTxPortTable Index ||lldpStatsTxPortNum 1.0.8802.1.1.2.1.2.6.1.1 Table |lldpStatsRxPortTable Index ||lldpStatsRxPortNum 1.0.8802.1.1.2.1.2.7.1.1 Table |lldpLocPortTable Index ||lldpLocPortNum 1.0.8802.1.1.2.1.3.7.1.1 Table 33 Command output Field Description Table MIB table name. Index Name of a MIB index node. OID of a MIB index node.
  • Page 124 Name |||lldpXMedRemDeviceClass ||||1.0.8802.1.1.2.1.5.4795.1.3.1.1.3 Name |mplsL3VpnVrfUp ||1.3.6.1.2.1.10.166.11.0.1 Trap Object Name |||mplsL3VpnIfConfRowStatus ||||1.3.6.1.2.1.10.166.11.1.2.1.1.5 Name |||mplsL3VpnVrfOperStatus ||||1.3.6.1.2.1.10.166.11.1.2.2.1.6 Table 34 Command output Field Description Name Name of a MIB notification node. OID of a MIB notification node. Trap Object Name and OID of a notification object. # Display detailed information about SNMP MIB nodes, including node names, OIDs, node types, permissions to MIB nodes, data types, MORs, and parent, child, and sibling nodes.
  • Page 125 ||AccessType: NA ||DataType: ||MOR: 0x00000000 Parent ||lldpPortConfigTable First child ||lldpPortConfigPortNum Next leaf ||lldpPortConfigPortNum Next sibling Index ||[indexImplied:0, indexLength:1]: Name |lldpPortConfigPortNum ||1.0.8802.1.1.2.1.1.6.1.1 Properties ||NodeType: Column ||AccessType: NA ||DataType: Integer32 ||MOR: 0x020c1201 Parent ||lldpPortConfigEntry First child Next leaf ||lldpPortConfigAdminStatus Next sibling ||lldpPortConfigAdminStatus Allow ||get/set/getnext Index...
  • Page 126 Field Description MIB node types: • Table—Table node. • Row—Row node in a MIB table. • Column—Column node in a MIB table. NodeType • Leaf—Leaf node. • Group—Group node (parent node of a leaf node). • Trapnode—Notification node. • Other—Other node types. Permissions to MIB nodes: •...
  • Page 127: Display Snmp-Agent Mib-View

    Field Description Index Table index. This field appears only for a table node. display snmp-agent mib-view Use display snmp-agent mib-view to display MIB views. Syntax display snmp-agent mib-view [ exclude | include | viewname view-name ] Views Any view Predefined user roles network-admin network-operator Parameters...
  • Page 128: Display Snmp-Agent Remote

    View name: ViewDefault MIB Subtree: snmpModules.18 Subtree mask: Storage-type: nonVolatile View Type: excluded View status: active ViewDefault is the default MIB view. The output shows that except for the MIB objects in the snmpUsmMIB, snmpVacmMIB, and snmpModules.18 subtrees, all the MIB objects in the iso subtree are accessible.
  • Page 129: Display Snmp-Agent Statistics

    vpn-instance vpn-instance-name: Specifies the VPN for a remote SNMP entity. The vpn-instance-name argument specifies the name of the MPLS L3VPN, a case-sensitive string of 1 to 31 characters. If this parameter is not specified, the remote SNMP entity is in the public network. Usage guidelines Every SNMP agent has one SNMP engine to provide services for sending and receiving messages, authenticating and encrypting messages, and controlling access to managed objects.
  • Page 130 0 ASN.1 or BER errors in the process of decoding. 1679 messages passed from the SNMP entity. 0 SNMP PDUs had badValue error-status. 0 SNMP PDUs had genErr error-status. 0 SNMP PDUs had noSuchName error-status. 0 SNMP PDUs had tooBig error-status (Maximum packet size 1500). 16544 MIB objects retrieved successfully.
  • Page 131: Display Snmp-Agent Sys-Info

    Field Description Number of get responses that have been GetResponse-PDU accepted and processed received and processed. Number of set requests that have been SetRequest-PDU accepted and processed received and processed. Number of notifications that have been Trap PDUs accepted and processed received and processed.
  • Page 132: Display Snmp-Agent Trap Queue

    display snmp-agent trap queue Use display snmp-agent trap queue to display basic information about the trap queue, including the queue size, and number of traps in the queue. Syntax display snmp-agent trap queue Views Any view Predefined user roles network-admin network-operator Examples # Display the trap queue configuration and usage status.
  • Page 133: Display Snmp-Agent Usm-User

    standard notification is enabled. system notification is enabled. Enabled notifications: 9; Disabled notifications: 2 Related commands snmp-agent trap enable display snmp-agent usm-user Use display snmp-agent usm-user to display SNMPv3 user information. Syntax display snmp-agent usm-user [ engineid engineid | group group-name | username user-name ] * Views Any view Predefined user roles...
  • Page 134: Enable Snmp Trap Updown

    Table 39 Command output Field Description Username SNMP username. Group name SNMP group name. Role name SNMP user role name. Engine ID Engine ID that the SNMP agent used when the SNMP user was created. Storage type: • volatile. • nonvolatile.
  • Page 135: Snmp-Agent

    Usage guidelines For an interface to generate linkUp/linkDown notifications when its state changes, you must also enable the linkUp/linkDown notification function globally by using the snmp-agent trap enable standard [ linkdown | linkup ] * command. Examples # Enable port FortyGigE 1/0/1 to send linkUp/linkDown SNMP traps to 10.1.1.1 in the community public.
  • Page 136: Snmp-Agent Calculate-Password

    Syntax snmp-agent inform trap source interface-type interface-number interface-number.subnumber } undo snmp-agent { inform | trap } source Default The SNMP agent uses the IP address of the outgoing routed interface as the source IP address of notifications. Views System view Predefined user roles network-admin Parameters...
  • Page 137 In FIPS mode: snmp-agent calculate-password plain-password mode local-engineid specified-engineid engineid } Views System view Predefined user roles network-admin Parameters plain-password: Specifies a plaintext authentication or privacy key. mode: Specifies the same authentication mode and privacy mode as configured in the snmp-agent usm-user v3 command.
  • Page 138: Snmp-Agent Community

    snmp-agent community Use snmp-agent community to configure an SNMP community. Use undo snmp-agent community to delete an SNMP community. Syntax In VACM mode: snmp-agent community { read | write } [ simple | cipher ] community-name [ mib-view view-name ] [ acl acl-number | acl ipv6 ipv6-acl-number ] * undo snmp-agent community [ cipher ] community-name In RBAC mode: snmp-agent community [ simple | cipher ] community-name user-role role-name [ acl acl-number...
  • Page 139 If no ACL is specified, or the specified ACL does not exist, all NMSs in the SNMP community can access the SNMP agent. If the specified ACL does not have any rules, no NMS in the SNMP community can access the SNMP agent. Usage guidelines This command is for SNMPv1 and SNMPv2c, and is supported only in non-FIPS mode.
  • Page 140: Snmp-Agent Community-Map

    [Sysname-acl-basic-2001] quit [Sysname] snmp-agent sys-info version v2c [Sysname] snmp-agent community write simple writeaccess acl 2001 # Create the read and write community wr-sys-acc in plain text so an SNMPv1 or SNMPv2c NMS can use the community name wr-sys-acc to read or set the MIB objects in the system subtree (OID 1.3.6.1.2.1.1).
  • Page 141: Snmp-Agent Context

    snmp-agent context Use snmp-agent context to create an SNMP context. Use undo snmp-agent context to delete an SNMP context. Syntax snmp-agent context context-name undo snmp-agent context context-name Default No SNMP context is configured on the device. Views System view Predefined use roles network-admin Parameters context-name: Specifies an SNMP context, a case-sensitive string of 1 to 32 characters.
  • Page 142 snmp-agent group v3 group-name [ authentication | privacy ] [ read-view read-view ] [ write-view write-view ] [ notify-view notify-view ] [ acl acl-number | acl ipv6 ipv6-acl-number ] * undo snmp-agent group v3 group-name [ authentication | privacy ] In FIPS mode: snmp-agent group v3 group-name { authentication | privacy } [ read-view read-view ] [ write-view write-view ] [ notify-view notify-view ] [ acl acl-number | acl ipv6 ipv6-acl-number ] *...
  • Page 143: Snmp-Agent Local-Engineid

    You can create up to 20 SNMP groups, including SNMPv1, SNMPv2c, and SNMPv3 groups. All SNMPv3 users in a group share the same security model, but can use different authentication and privacy key settings. To implement a security model for a user and avoid SNMP communication failures, make sure the security model configuration for the group and the security key settings for the user are compliant with Table 40...
  • Page 144: Snmp-Agent Log

    Predefined user roles network-admin Parameters engineid: Specifies an SNMP engine ID as a hexadecimal string. It must comprise an even number of hexadecimal characters, in the range of 10 to 64. All-zero and all-F strings are invalid. Usage guidelines An SNMP engine ID uniquely identifies an SNMP entity in an SNMP managed network. Make sure the local SNMP engine ID is unique within your SNMP managed network to avoid communication problems.
  • Page 145: Snmp-Agent Mib-View

    Examples # Enable logging SNMP Get operations. <Sysname> system-view [Sysname] snmp-agent log get-operation # Enable logging SNMP Set operations. <Sysname> system-view [Sysname] snmp-agent log set-operation snmp-agent mib-view Use snmp-agent mib-view to create or update a MIB view. Use undo snmp-agent mib-view to delete a MIB view. Syntax snmp-agent mib-view { excluded | included } view-name oid-tree [ mask mask-value ] undo snmp-agent mib-view view-name...
  • Page 146: Snmp-Agent Packet Max-Size

    Examples # Include the mib-2 (OID 1.3.6.1) subtree in the mibtest view and exclude the system subtree from this view. <Sysname> system-view [Sysname] snmp-agent sys-info version v1 [Sysname] snmp-agent mib-view included mibtest 1.3.6.1 [Sysname] snmp-agent mib-view excluded mibtest system [Sysname] snmp-agent community read public mib-view mibtest An SNMPv1 NMS in the public community can query the objects in the mib-2 subtree but not any object (for example, the sysDescr or sysObjectID node) in the system subtree.
  • Page 147: Snmp-Agent Remote

    Syntax snmp-agent port port-number undo snmp-agent port Default The device uses UDP port 161 for receiving SNMP packets. Views System view Predefined user roles network-admin Parameters port-number: Specifies the UDP port for receiving SNMP packets, in the range of 1 to 65535. The default is 161.
  • Page 148: Snmp-Agent Sys-Info Contact

    vpn-instance vpn-instance-name: Specifies the VPN for a remote SNMP entity. The vpn-instance-name argument specifies the name of the MPLS L3VPN, a case-sensitive string of 1 to 31 characters. If this parameter is not specified, the remote SNMP entity is in the public network. engineid: Specifies the SNMP engine ID of the remote SNMP entity.
  • Page 149: Snmp-Agent Sys-Info Location

    snmp-agent sys-info location Use snmp-agent sys-info location to configure the system location. Use undo snmp-agent sys-info location to restore the default location. Syntax snmp-agent sys-info location sys-location undo snmp-agent sys-info location Default The system location is not configured. Views System view Predefined user roles network-admin Parameters...
  • Page 150: Snmp-Agent Target-Host

    Predefined user roles network-admin Parameters all: Specifies SNMPv1, SNMPv2c, and SNMPv3. v1: Specifies SNMPv1. v2c: Specifies SNMPv2c. v3: Specifies SNMPv3. Usage guidelines SNMPv1 and SNMPv2c settings in this command are supported only in non-FIPS mode. Configure the SNMP agent with the same SNMP version as the NMS for successful communications between them.
  • Page 151 Views System view Predefined user roles network-admin Parameters inform: Sends notifications as informs. trap: Sends notifications as traps. address: Specifies the destination address of SNMP notifications. udp-domain: Specifies UDP as the transport protocol. target-host: Specifies the IPv4 address or host name of the target host as the destination of SNMP notifications.
  • Page 152: Snmp-Agent Trap Enable

    [Sysname] snmp-agent target-host trap address udp-domain 10.1.1.1 params securityname public v3 Related commands • snmp-agent { inform | trap } source • snmp-agent trap enable • snmp-agent trap life snmp-agent trap enable Use snmp-agent trap enable to enable SNMP notifications globally. Use undo snmp-agent trap enable to disable SNMP notifications globally.
  • Page 153: Snmp-Agent Trap If-Mib Link Extended

    Usage guidelines The snmp-agent trap enable command enables the device to generate notifications, including both informs and traps, even though the keyword trap is used in this command. You can use the snmp-agent target-host command to enable the device to send the notifications as informs or traps to a host.
  • Page 154: Snmp-Agent Trap Log

    Use undo snmp-agent trap life to restore the default notification lifetime. Syntax snmp-agent trap life seconds undo snmp-agent trap life Default SNMP notification lifetime is 120 seconds. Views System view Predefined user roles network-admin Parameters seconds: Sets a lifetime in seconds, in the range of 1 to 2592000. Usage guidelines When congestion occurs, the SNMP agent buffers notifications in a queue.
  • Page 155: Snmp-Agent Trap Periodical-Interval

    Examples # Enable SNMP notification logging. <Sysname> system-view [Sysname] snmp-agent trap log snmp-agent trap periodical-interval Use snmp-agent trap periodical-interval to configure the interval for sending periodical notifications. Syntax snmp-agent trap periodical-interval interval-time Default Periodical notifications are sent every 60 seconds. Views System view Predefined user roles...
  • Page 156: Snmp-Agent Usm-User { V1 | V2C

    Views System view Predefined user roles network-admin Parameters size: Sets the maximum number of notifications that the SNMP notification queue can hold. The value range is 1 to 1000. Usage guidelines When congestion occurs, the SNMP agent buffers notifications in a queue. SNMP notification queue size sets the maximum number of notifications that this queue can hold.
  • Page 157: Snmp-Agent Usm-User V3

    acl acl-number: Specifies a basic IPv4 ACL to filter NMSs by source IPv4 address. The acl-number argument represents an ACL number in the range of 2000 to 2999. Only NMSs with an IPv4 address permitted in the ACL can use the specified username (community name) to access the SNMP agent. If no ACL is specified, or the specified ACL does not exist, any NMS can use the specified username to access the SNMP agent.
  • Page 158 Use undo snmp-agent usm-user v3 to delete a user from an SNMPv3 group or remove an SNMPv3 user. Syntax In non-FIPS mode: In VACM mode: snmp-agent usm-user v3 user-name group-name [ remote { ip-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ] ] [ { cipher | simple } authentication-mode { md5 | sha } auth-password [ privacy-mode { aes128 | des56 } priv-password ] ] [ acl acl-number | acl ipv6 ipv6-acl-number ] * undo snmp-agent usm-user v3 user-name group-name { local | engineid engineid-string | remote...
  • Page 159 case-sensitive string of 1 to 31 characters. If this parameter is not specified, the target host is in the public network. cipher: Specifies that auth-password and priv-password are encrypted keys, which can be calculated to a hexadecimal string by using the snmp-agent calculate-password command. simple: Specifies that auth-password and priv-password are plaintext keys.
  • Page 160 acl ipv6 ipv6-acl-number: Specifies a basic IPv6 ACL to filter NMSs by source IPv6 address. The ipv6-acl-number argument represents an ACL number in the range of 2000 to 2999. Only NMSs with an IPv6 address permitted in the IPv6 ACL can use the specified username to access the SNMP agent.
  • Page 161 SNMPv3 users are valid only on the SNMP engine that creates them. By default, SNMPv3 users are created on the local SNMP engine. When you create an SNMPv3 user for sending SNMP inform messages, you must associate it with the remote SNMP engine. For security purposes, all keys, including keys configured in plain text, are saved in cipher text.
  • Page 162 <Sysname> system-view [Sysname] snmp-agent usm-user v3 testUser user-role network-operator simple authentication-mode sha 123456TESTplat&! # For an NMS to have read-only access to all MIB objects, make sure the following configurations on the NMS are the same as the SNMP agent: •...
  • Page 163: Rmon Commands

    RMON commands display rmon alarm Use display rmon alarm to display entries in the RMON alarm table. Syntax display rmon alarm [entry-number] Views Any view Predefined user roles network-admin network-operator Parameters entry-number: Specifies an alarm entry index in the range of 1 to 65535. If you do not specify an entry, the command displays all entries in the RMON alarm table.
  • Page 164: Display Rmon Event

    Field Description Sample type (MIB object alarmSampleType): • absolute—RMON compares the value of the variable with the rising and falling thresholds at the end of the sampling interval. Sample type • delta—RMON subtracts the value of the variable at the previous sample from the current value, and then compares the difference with the rising and falling thresholds.
  • Page 165 Syntax display rmon event [entry-number] Views Any view Predefined user roles network-admin network-operator Parameters entry-number: Specifies an event entry index in the range of 1 to 65535. If you do not specify an entry, the command displays all event entries. Usage guidelines An event entry includes the event index, event owner, event description, action triggered by the event (such as logging the event or sending an SNMP notification), and last time when the event...
  • Page 166: Display Rmon Eventlog

    Field Description Last time when the event occurred, which is represented as the amount of last triggered at time that elapsed since the system startup. The MIB object for this field is time uptime eventLastTimeSent. Related commands rmon event display rmon eventlog Use display rmon eventlog to display event log entries.
  • Page 167: Display Rmon History

    • Two records were created when event 99 was triggered by alarm entry 777. Table 46 Command output Field Description Event log entry owner and status: • entry-number—Event log entry index (MIB object logEventIndex), which is the same as the event entry index for which this log entry is generated. •...
  • Page 168 Examples # Display the RMON history control entry and history samples for FortyGigE 1/0/1. <Sysname> display rmon history fortygige 1/0/1 HistoryControlEntry 6 owned by user1 is VALID. Sampled interface : FortyGigE 1/0/1 <ifIndex.117> Sampling interval : 8(sec) with 3 buckets max Sampling record 1 : dropevents , octets...
  • Page 169 Table 47 Command output Field Description Status and owner of the history control entry: • entry-number—History control entry index (MIB object historyControlIndex). • owner—Entry owner (MIB object historyControlOwner). • status—Entry status (MIB object historyControlStatus): HistoryControlEntry VALID—The entry is valid. entry-number owned by UNDERCREATION—The entry is invalid.
  • Page 170: Display Rmon Prialarm

    Field Description Number of oversize packets with CRC errors received during the sampling jabbers interval (MIB object etherHistoryJabbers). Number of colliding packets received during the sampling interval (MIB object collisions etherHistoryCollisions). Bandwidth utilization (in hundreds of a percent) during the sampling period utilization (MIB object etherHistoryUtilization).
  • Page 171 Table 48 Command output Field Description Alarm entry owner and status: • entry-number—Alarm entry index (MIB object hh3cRmonExtAlarmIndex). • owner—Entry owner (MIB object hh3cRmonExtAlarmOwner). • status—Entry status (MIB object hh3cRmonExtAlarmStatus): PrialarmEntry entry-number VALID—The entry is valid. owned by owner is status. UNDERCREATION—The entry is invalid.
  • Page 172: Display Rmon Statistics

    Field Description Event index associated with the alarm: • MIB object hh3cRmonExtAlarmRisingEvtIndex stores the event associated with event index that is used when the rising threshold is crossed. • MIB object hh3cRmonExtAlarmFallingEvtIndex stores the event index that is used when the falling threshold is crossed. Alarm that can be generated when the entry becomes valid (MIB object hh3cRmonExtAlarmStartupAlarm): •...
  • Page 173 Interface : FortyGigE1/0/1<ifIndex.1> etherStatsOctets : 12024 , etherStatsPkts : 105 etherStatsBroadcastPkts , etherStatsMulticastPkts : 16 etherStatsUndersizePkts , etherStatsOversizePkts etherStatsFragments , etherStatsJabbers etherStatsCRCAlignErrors : 0 , etherStatsCollisions etherStatsDropEvents (insufficient resources): 0 Incoming packets by size: : 26 65-127 : 63 128-255 256-511: 16 512-1023: 0 1024-1518: 0...
  • Page 174: Rmon Alarm

    Field Description Total number of events in which packets were dropped (MIB object etherStatsDropEvents). etherStatsDropEvents NOTE: This statistic is the number of times that a drop condition occurred. It is not necessarily the total number of dropped packets. Incoming-packet statistics by packet length: •...
  • Page 175 Format Examples Dotted OID format: 1.3.6.1.2.1.2.1.10.1 entry.integer.instance etherStatsOctets.1 etherStatsPkts.1 etherStatsBroadcastPkts.1 Object name.instance ifInOctets.1 ifInUcastPkts.1 ifInNUcastPkts.1 sampling-interval: Sets the sampling interval in the range of 5 to 65535 seconds. absolute: Specifies absolute sampling. RMON compares the value of the variable with the rising and falling thresholds at the end of the sampling interval.
  • Page 176: Rmon Event

    • Triggers the event associated with the falling alarm if the sampled value is equal to or less than the falling threshold. Examples # Create an alarm entry to perform absolute sampling on the number of octets received on FortyGigE 1/0/1 (object instance 1.3.6.1.2.1.16.1.1.1.4.1) at 10-seconds intervals.
  • Page 177: Rmon History

    trap: Sends an SNMP notification when the event occurs. owner text: Specifies the entry owner, a case-sensitive string of 1 to 127 characters. NOTE: The SNMP community name setting for the security-string argument does not take effect even though you can configure it with the command. Instead, the system uses the settings you configure with SNMP when it sends RMON SNMP notifications.
  • Page 178: Rmon Prialarm

    interval sampling-interval: Specifies the sampling interval in the range of 5 to 3600 seconds. owner text: Specifies the entry owner, a case-sensitive string of 1 to 127 characters. Usage guidelines If an Ethernet interface has a history control entry, RMON periodically samples packet statistics on the interface and stores the samples to the history table.
  • Page 179 sampling-interval: Sets the sampling interval in the range of 10 to 65535 seconds. absolute: Specifies absolute sampling. RMON compares the value of the variable with the rising and falling thresholds at the end of the sampling interval. delta: Specifies delta sampling. RMON subtracts the value of the variable at the previous sample from the current value, and then compares the difference with the rising and falling thresholds.
  • Page 180: Rmon Statistics

    Examples # Add a permanent private alarm entry to monitor the ratio of incoming broadcasts to the total number of incoming packets on FortyGigE 1/0/1. Log the rising alarm event when the ratio exceeds 80%, take actions when ratio drops formula (1.3.6.1.2.1.16.1.1.1.6.1*100/.1.3.6.1.2.1.16.1.1.1.5.1), where 1.3.6.1.2.1.16.1.1.1.6.1 is the OID of the object instance etherStatsBroadcastPkts.1, and 1.3.6.1.2.1.16.1.1.1.5.1 is the OID of the object...
  • Page 181 To display the RMON statistics table, use the display rmon statistics command. You can create only one statistics entry for an Ethernet interface. You can create a maximum number of 200 statistics entries on a device. After the limit is reached, you cannot add new entries.
  • Page 182: Nqa Commands

    NQA commands NQA client commands advantage-factor Use advantage-factor to configure the advantage factor that is used to count Mean Opinion Scores (MOS) and Calculated Planning Impairment Factor (ICPIF) values. Use undo advantage-factor to restore the default. Syntax advantage-factor factor undo advantage-factor Default The advantage factor is 0.
  • Page 183: Data-Fill

    Views Voice operation view Predefined user roles network-admin Parameters g711a: Specifies G.711 A-law codec type. g711u: Specifies G.711 µ-law codec type g729a: Specifies G.729 A-law codec type. Examples # Configure the codec type as g729a for the voice operation. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type voice [Sysname-nqa-admin-test-voice] codec-type g729a...
  • Page 184: Data-Size

    • For the UDP echo operation, the first five bytes of the payload of a UDP packet are for special purpose. The string fills the remaining part of payload. • For the UDP jitter operation, the first 68 bytes of the payload of a UDP packet are for special purpose.
  • Page 185: Description (Any Nqa Operation Type View)

    Voice operation view ICMP/UDP template view Predefined user roles network-admin Parameters size: Specifies the size of the payload in each probe packet in bytes. Available value ranges include: • 20 to 8100 for probe packets of the ICMP echo, UDP echo, or UDP tracert operation. •...
  • Page 186: Destination Ip

    Examples # Configure the description for an NQA operation as icmp-probe. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] description icmp-probe # In ICMP template view, configure the description for an NQA operation as icmp-probe. <Sysname> system-view [Sysname] nqa template icmp icmptplt [Sysname-nqatplt-icmp-icmptplt] description icmp-probe destination ip...
  • Page 187: Destination Ipv6

    destination ipv6 Use destination ipv6 to configure the destination IPv6 address for the operation. Use undo destination ipv6 to remove the destination IPv6 address. Syntax destination ipv6 ipv6-address undo destination ipv6 Default No destination IPv6 address is configured for the operation. Views DNS/ICMP/TCP/UDP template view Predefined user roles...
  • Page 188: Display Nqa History

    Predefined user roles network-admin Parameters port-number: Specifies the destination port number for the operation, in the range of 1 to 65535. Examples # Configure the destination port number as 9000 for the UDP echo operation. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-echo [Sysname-nqa-admin-test-udp-echo] destination port 9000 # In TCP template view, configure the destination port number as 9000 for the UDP echo operation.
  • Page 189: Display Nqa Reaction Counters

    3.1.1.1 Succeeded 2013-09-09 14:46:02.2 3.1.1.1 Succeeded 2013-09-09 14:46:01.2 # Display the history records of the NQA operation with the administrator name administrator and the operation tag test. <Sysname> display nqa history administrator test NQA entry (admin administrator, tag test) history records: Index Response Status...
  • Page 190 Parameters admin-name operation-tag: Specifies an NQA operation by its administrator name and operation tag. The admin-name argument represents the name of the administrator who creates the NQA operation. The operation-tag argument represents the operation tag. Each of the arguments is a case-insensitive string of 1 to 32 characters that cannot contain hyphens (-).
  • Page 191: Display Nqa Result

    Monitored Threshold performance Collect data in Checked Num Over-threshold Num type metric Probes after the Number of accumulate Number of probe failures. operation starts. completed probes. probe-fail Probes after the Number of consecutive Number of probe failures. operation starts. completed probes. Packets sent Number of packets with Number of sent...
  • Page 192 Min/Max/Average round trip time: 35/35/35 Square-Sum of round trip time: 1225 Last succeeded probe time: 2011-05-29 10:50:33.2 Extended results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to disconnect: 0 Failures due to no connection: 0 Failures due to internal error: 0 Failures due to other errors: 0 # Display the most recent result of the UDP jitter operation.
  • Page 193 NQA entry (admin admin, tag test) test results: Send operation times: 1000 Receive response times: 0 Min/Max/Average round trip time: 0/0/0 Square-Sum of round trip time: 0 Last packet received time: 0-00-00 00:00:00.0 Extended results: Packet loss ratio: 100% Failures due to timeout: 1000 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0...
  • Page 194 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0 Packets arrived late: 0 Path-Jitter Results: Jitter number: 9 Min/Max/Average jitter: 0/0/0 Positive jitter number: 0 Min/Max/Average positive jitter: 0/0/0 Sum/Square-Sum positive jitter: 0/0 Negative jitter number: 0 Min/Max/Average negative jitter: 0/0/0 Sum/Square-Sum negative jitter: 0/0...
  • Page 195 Hop IP Time 3.1.1.1 2013-09-09 14:23:24.5 4.1.1.1 2013-09-09 14:23:24.5 Table 54 Command output Field Description Send operation times Number of operations. Receive response times Number of response packets received. Min/Max/Average round trip time Minimum/maximum/average round-trip time in milliseconds. Square-Sum of round trip time Square sum of round-trip time.
  • Page 196 Field Description Positive SD average Average positive jitters from source to destination. Positive DS average Average positive jitters from destination to source. Positive SD square-sum Square sum of positive jitters from source to destination. Positive DS square-sum Square sum of positive jitters from destination to source. Minimum absolute value among negative jitters from source to Min negative SD destination.
  • Page 197: Display Nqa Statistics

    Field Description DS lost packets Number of lost packets from the destination to the source. Lost packets for unknown reason Number of lost packets for unknown reasons. Voice parameters. Voice scores This field is available only for the voice operation. MOS value MOS value calculated for the voice operation.
  • Page 198 Predefined user roles network-admin network-operator Parameters admin-name operation-tag: Specifies an NQA operation by its administrator name and operation tag. The admin-name argument represents the name of the administrator who creates the NQA operation. The operation-tag argument represents the operation tag. Each of the arguments is a case-insensitive string of 1 to 32 characters that cannot contain hyphens (-).
  • Page 199 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0 Packets arrived late: 0 UDP-jitter results: RTT number: 550 Min positive SD: 1 Min positive DS: 1 Max positive SD: 7 Max positive DS: 1 Positive SD number: 220 Positive DS number: 97 Positive SD sum: 283...
  • Page 200 Packets out of sequence: 0 Packets arrived late: 0 Voice results: RTT number: 10 Min positive SD: 3 Min positive DS: 1 Max positive SD: 10 Max positive DS: 1 Positive SD number: 3 Positive DS number: 2 Positive SD sum: 18 Positive DS sum: 2 Positive SD average: 6 Positive DS average: 1...
  • Page 201 Packets arrived late: 0 Path-Jitter Results: Jitter number: 9 Min/Max/Average jitter: 0/0/0 Positive jitter number: 0 Min/Max/Average positive jitter: 0/0/0 Sum/Square-Sum positive jitter: 0/0 Negative jitter number: 0 Min/Max/Average negative jitter: 0/0/0 Sum/Square-Sum negative jitter: 0/0 Hop IP 192.168.50.209 Basic Results: Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 1/1/1...
  • Page 202 Field Description Failures due to no connection Number of failures to connect with the peer. Failures due to internal error Number of failures due to internal errors. Failures due to other errors Failures due to other errors. Packets out of sequence Number of failures due to out-of-sequence packets.
  • Page 203 Field Description Average absolute value of negative jitters from source to Negative SD average destination. Average absolute value of negative jitters from destination to Negative DS average source. Negative SD square-sum Square sum of negative jitters from source to destination. Negative DS square-sum Square sum of negative jitters from destination to source.
  • Page 204 Field Description Serial number for the path in the path jitter operation. Path This field is available only for the path jitter operation. IP address of the hop. Hop IP This field is available only for the path jitter operation. Path jitter operation results.
  • Page 205: Expect Data

    Monitored Threshold performance Collect data in Checked Num Over-threshold Num type metric the counting packets. which the one-way jitter interval. exceeds the threshold. average Packets sent in Number of packets of Number of sent OWD-DS/OWD-SD the counting which the one-way delay packets.
  • Page 206: Expect Ip

    • For features that use the HTTP template, the NQA client checks for the expected data if the HTTP response contains the Content-Length header. • For features that use the TCP or UDP template, the NQA client checks for the expected data if the data-fill command is configured.
  • Page 207: Expect Status

    Default No expected IPv6 address is configured. Views DNS template view Predefined user roles network-admin Parameters ip-address: Specifies the expected IPv6 address for a DNS echo request. Usage guidelines During a DNS operation, the NQA client compares the expected IPv6 address with the IPv6 address resolved by the DNS server.
  • Page 208: Filename

    [Sysname] nqa template http httptplt [Sysname-nqatplt-http-httptplt] expect status 200 300 400 to 500 filename Use filename to specify a file to be transferred between the FTP server and the FTP client. Use undo filename to restore the default. Syntax filename filename undo filename Default No file is specified.
  • Page 209: History-Record Enable

    Views Any NQA operation view, any NQA template view Predefined user roles network-admin Parameters interval: Specifies the interval between two consecutive operations, in the range of 0 to 604800000 milliseconds. An interval of 0 milliseconds sets NQA to perform the operation only once, and not to generate any statistics.
  • Page 210: History-Record Keep-Time

    [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] history-record enable Related commands display nqa history history-record keep-time Use history-record keep-time to set the lifetime of history records for an NQA operation. Use undo history-record keep-time to restore the default. Syntax history-record keep-time keep-time undo history-record keep-time...
  • Page 211: Init-Ttl

    Default A maximum of 50 records can be saved for an NQA operation. Views DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view ICMP/UDP echo operation view UDP tracert operation view Predefined user roles network-admin Parameters number: Specifies the maximum number of history records that can be saved for an NQA operation. The value range is 0 to 50.
  • Page 212: Lsr-Path

    lsr-path Use lsr-path to set a loose source routing (LSR) path. Use undo lsr-path to restore the default. Syntax lsr-path ip-address&<1-8> undo lsr-path Default No LSR path is configured. Views Path jitter operation view Predefined user roles network-admin Parameters ip-address&<1-8>: Specifies a space-separated list of up to eight IP addresses. Each IP address represents a hop on the path.
  • Page 213: Mode

    Parameters value: Specifies the maximum number in the range of 0 to 255. When this argument is set to 0 or 255, the UDP tracert operation does not stop when consecutive probe failures occur. Usage guidelines When a UDP tracert operation detects the maximum number of consecutive probe failures, the operation fails and stops probing the path.
  • Page 214: No-Fragment Enable

    Use undo next-hop to remove the next hop IP address. Syntax next-hop ip-address undo next-hop Default No next hop IP address is configured for the ICMP echo operation. Views ICMP echo operation view Predefined user roles network-admin Parameters ip-address: Specifies the IP address of the next hop. Examples # Specify the next hop IP address as 10.1.1.1 for the ICMP echo operation.
  • Page 215: Nqa

    [Sysname-nqa-admin-test-udp-tracert] no-fragment enable Use nqa to create an NQA operation and enter its view. Use undo nqa to remove the operation. Syntax nqa entry admin-name operation-tag undo nqa { all | entry admin-name operation-tag } Default No NQA operation is created. Views System view Predefined user roles...
  • Page 216: Nqa Schedule

    Predefined user roles network-admin Examples # Enable the NQA client. <Sysname> system-view [Sysname] nqa agent enable Related commands nqa server enable nqa schedule Use nqa schedule to configure scheduling parameters for an NQA operation. Use undo nqa schedule to stop the operation. Syntax nqa schedule admin-name operation-tag start-time { hh:mm:ss [ yyyy/mm/dd | mm/dd/yyyy ] | now } lifetime { lifetime | forever } [ recurring ]...
  • Page 217: Nqa Template

    Examples # Schedule the operation with the administrator name admin and operation tag test to start on 08:08:08 2008/08/08 and last 1000 seconds. <Sysname> system-view [Sysname] nqa schedule admin test start-time 08:08:08 2008/08/08 lifetime 1000 recurring Related commands • destination ip •...
  • Page 218: Operation (Http Operation View)

    Syntax operation { get | put } undo operation Default The FTP operation type is get. Views FTP operation view, FTP template view Predefined user roles network-admin Parameters get: Gets a file from the FTP server. put: Transfers a file to the FTP server. Usage guidelines When you perform the put operation with the filename command configured, make sure the file exists on the NQA client.
  • Page 219: Out Interface

    Predefined user roles network-admin Parameters get: Gets data from the HTTP server. post: Transfers data to the HTTP server. raw: Sends the HTTP request specified by the raw-request command to the HTTP server. Usage guidelines For the HTTP get or post operation, the content in the HTTP request is obtained from the URL specified by the url command.
  • Page 220: Password

    Examples # Specify VLAN-interface 2 as the output interface for probe packets in the UDP tracert operation. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-tracert [Sysname-nqa-admin-test-udp-tracert] out interface vlan-interface 2 password Use password to specify the FTP or HTTP login password. Use undo password to remove the configuration.
  • Page 221: Probe Count

    probe count Use probe count to specify the probe times. Use undo probe count to restore the default. Syntax probe count times undo probe count Default In an UDP tracert operation, the NQA client performs three probes to each hop along the path. In other types of operations, the NQA client performs one probe to the destination per operation.
  • Page 222: Probe Packet-Interval

    • A UDP tracert operation determines the routing path from the source to the destination. The number of probes to each hop is set by using the probe count command. If an operation is to perform multiple probes, the NQA client starts a new probe in one of the following conditions: •...
  • Page 223: Probe Packet-Timeout

    Syntax probe packet-number packet-number undo probe packet-number Default A UDP jitter or path jitter probe sends 10 packets and a voice probe sends 1000 packets. Views Path jitter operation view, UDP jitter operation view, voice operation view Predefined user roles network-admin Parameters packet-number: Specifies the number of packets to be sent per probe.
  • Page 224: Probe Timeout

    <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] probe packet-timeout 100 probe timeout Use probe timeout to specify the probe timeout time. Use undo probe timeout to restore the default. Syntax probe timeout timeout undo probe timeout Default The timeout time of a probe is 3000 milliseconds.
  • Page 225: Reaction Checked-Element { Jitter-Ds | Jitter-Sd

    Syntax raw-request undo raw-request Default No contents are specified. Views HTTP operation view, HTTP template view Predefined user roles network-admin Usage guidelines This command places you in raw request view and deletes the content of the previously configured GET request. Examples # Enter raw request view and specify the content of a request for the HTTP operation.
  • Page 226 Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. jitter-ds: Specifies the destination-to-source jitter of each probe packet as the monitored element (or performance metric). jitter-sd: Specifies source-to-destination jitter of each probe packet as the monitored element. threshold-type: Specifies a threshold type.
  • Page 227: Reaction Checked-Element { Owd-Ds | Owd-Sd

    reaction checked-element { owd-ds | owd-sd } Use reaction checked-element { owd-ds | owd-sd } to configure a reaction entry for monitoring the one-way delay. Use undo reaction to delete the specified reaction entry. Syntax reaction item-number checked-element { owd-ds | owd-sd } threshold-value upper-threshold lower-threshold undo reaction item-number Default...
  • Page 228: Reaction Checked-Element Icpif

    reaction checked-element icpif Use reaction checked-element icpif to configure a reaction entry for monitoring the ICPIF value in the voice operation. Use undo reaction to delete the specified reaction entry. Syntax reaction item-number checked-element icpif threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number Default No reaction entry for monitoring ICPIF values is configured.
  • Page 229: Reaction Checked-Element Mos

    reaction checked-element mos Use reaction checked-element mos to configure a reaction entry for monitoring the MOS value in the voice operation. Use undo reaction to delete the specified reaction entry. Syntax reaction item-number checked-element mos threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number Default No reaction entry for monitoring the MOS value is configured.
  • Page 230: Reaction Checked-Element Packet-Loss

    reaction checked-element packet-loss Use reaction checked-element packet-loss to configure a reaction entry for monitoring packet loss in UDP jitter or voice operation. Use undo reaction to delete the specified reaction entry. Syntax reaction item-number checked-element packet-loss threshold-type accumulate accumulate-occurrences [ action-type { none | trap-only } ] undo reaction item-number Default No reaction entry for monitoring packet loss is configured.
  • Page 231 Use undo reaction to delete the specified reaction entry. Syntax reaction item-number checked-element probe-duration threshold-type { accumulate accumulate-occurrences | average | consecutive consecutive-occurrences } threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number Default No reaction entry for monitoring the probe duration is configured. Views DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view ICMP/UDP echo operation view...
  • Page 232: Reaction Checked-Element Probe-Fail (For Trap)

    [Sysname-nqa-admin-test-icmp-echo] reaction 1 checked-element probe-duration threshold-type average threshold-value 50 5 action-type trap-only # Create reaction entry 2 for monitoring the probe duration of ICMP echo operation, and set the upper limit to 50 milliseconds and the lower limit to 5 milliseconds. Before the NQA operation starts, the initial state of the reaction entry is invalid.
  • Page 233: Reaction Checked-Element Probe-Fail (For Trigger)

    accumulate accumulate-occurrences: Checks the total number of probe failures. The value is in the range of 1 to 15. consecutive consecutive-occurrences: Checks the maximum number of consecutive probe failures. The value is in the range of 1 to 16. action-type: Specifies what action to be triggered. The default action is none. none: Specifies the action of displaying results on the terminal display.
  • Page 234: Reaction Checked-Element Rtt

    Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. threshold-type: Specifies a threshold type. consecutive consecutive-occurrences: Checks the maximum number of consecutive probe failures, in the range of 1 to 16. action-type: Specifies what action to be triggered.
  • Page 235: Reaction Trap

    accumulate accumulate-occurrences: Checks the total number of threshold violations. Available value ranges include: • 1 to 15000 for the UDP jitter operation. • 1 to 60000 for the voice operation. average: Checks the packet average round-trip time. threshold-value: Specifies threshold range in milliseconds. upper-threshold: Specifies the upper limit in the range of 0 to 3600000.
  • Page 236 Syntax reaction trap { path-change | probe-failure consecutive-probe-failures | test-complete | test-failure [ cumulate-probe-failures ] } undo reaction trap { path-change | probe-failure | test-complete | test-failure } Default No traps are sent to the NMS. Views DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP/voice operation view ICMP/UDP echo operation view UDP jitter operation view UDP tracert operation view...
  • Page 237: Reaction Trigger Probe-Fail

    reaction trigger probe-fail Use reaction trigger probe-fail to configure the number of consecutive probe failures that lead to an operation failure. Use undo reaction trigger probe-fail to restore the default. Syntax reaction trigger probe-fail count undo reaction trigger probe-fail Default When the number of consecutive probe failures reaches 3, the operation fails.
  • Page 238: Resolve-Target

    Usage guidelines If the operation succeeds, the NQA client notifies the feature that uses the template of the successful operation event. Examples # In HTTP template view, if the number of consecutive successful probes reaches 5, the operation succeeds. <Sysname> system-view [Sysname] nqa template http httptplt [Sysname-nqatplt-http-httptplt] reaction trigger probe-pass 5 resolve-target...
  • Page 239: Route-Option Bypass-Route

    undo resolve-type Default The domain name resolution type is type A. Views DNS template view Predefined user roles network-admin Parameters A: Specifies the type A queries. A type A query resolves a domain name to a mapped IPv4 address. AAAA: Specifies the type AAAA queries. A type AAAA query resolves a domain name to a mapped IPv6 address.
  • Page 240: Source Interface

    Examples # Enable the routing table bypass function. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] route-option bypass-route source interface Use source interface to specify the IP address of the specified interface as the source IP address of probe packets.
  • Page 241: Source Ip

    source ip Use source ip to configure the source IP address for probe packets. Use undo source ip to remove the configured source address. The IP address of the interface that sends a probe packet is the source IP address of the probe packet. Syntax source ip ip-address undo source ip...
  • Page 242: Source Ipv6

    source ipv6 Use source ipv6 to configure the source IPv6 address for probe packets. Use undo source ipv6 to remove the configured source IPv6 address. The IPv6 address of the interface that sends a probe packet is the source IPv6 address of the probe packet. Syntax source ipv6 ipv6-address undo source ipv6...
  • Page 243: Statistics Hold-Time

    Views SNMP/voice operation view UDP echo operation view UDP jitter operation view UDP tracert operation view DNS template view Predefined user roles network-admin Parameters port-number: Specifies the source port number in the range of 1 to 65535. Examples # Configure port 8000 as the source port for probe packets in the UDP echo operation. <Sysname>...
  • Page 244: Statistics Interval

    Examples # Configure the hold time of statistics groups as 3 minutes. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] statistics hold-time 3 statistics interval Use statistics interval to configure the interval for collecting statistics for an NQA operation. Use undo statistics interval to restore the default.
  • Page 245: Target-Only

    Default A maximum of two statistics groups can be saved. Views DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP/voice operation view ICMP/UDP echo operation view Path/UDP jitter operation view Predefined user roles network-admin Parameters number: Specifies the maximum number of statistics groups, in the range of 0 to 100. To disable statistics collection, set the value to 0.
  • Page 246: Tos

    Use tos to set the ToS value in the IP header for probe packets. Use undo tos to restore the default. Syntax tos value undo tos Default The ToS value in the IP header of probe packets is 0. Views Any operation view, any NQA template view Predefined user roles network-admin...
  • Page 247: Type

    Any NQA template view Predefined user roles network-admin Parameters value: Specifies the maximum number of hops that the probe packets can traverse, in the range of 1 to 255. Usage guidelines The route-option bypass-route command sets the TTL to 1 for probe packets. The ttl command does not take effect.
  • Page 248: Url

    snmp: Specifies the SNMP operation type. tcp: Specifies the TCP operation type. udp-echo: Specifies the UDP echo operation type. udp-jitter: Specifies the UDP jitter operation type. udp-tracert: Specifies the UDP tracert operation type. voice: Specifies the voice operation type. Examples # Specify the type of FTP operation and enter FTP operation view.
  • Page 249: Username

    [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] url http://www.company.com/index.html # In HTTP template view, configure the URL that the HTTP operation visits as http://www.company.com/index.htm. <Sysname> system-view [Sysname] nqa template http httptplt [Sysname-nqatplt-http-httptplt] url http://www.company.com/index.html username Use username to specify an FTP or HTTP login username. Use undo username to remove the configuration.
  • Page 250: Vpn-Instance

    Syntax version { v1.0 | v1.1 } undo version Default HTTP 1.0 is used in the HTTP operation. Views HTTP operation view, HTTP template view Predefined user roles network-admin Parameters v1.0: Uses HTTP version 1.0. v1.1: Uses HTTP version 1.1. Examples # Configure the HTTP operation to use the HTTP version 1.1.
  • Page 251: Nqa Server Commands

    [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] vpn-instance vpn1 # In FTP template view, apply the FTP operation to vpn1. <Sysname> system-view [Sysname] nqa template ftp ftptplt [Sysname-nqatplt-ftp-ftptplt] vpn-instance vpn1 NQA server commands IMPORTANT: Configure the NQA server only for UDP jitter, TCP, UDP echo, and voice operations. display nqa server Use display nqa server status to display NQA server status.
  • Page 252: Nqa Server Enable

    nqa server enable Use nqa server enable to enable the NQA server. Use undo nqa server enable to disable the NQA server. Syntax nqa server enable undo nqa server enable Default The NQA server is disabled. Views System view Predefined user roles network-admin Examples # Enable the NQA server.
  • Page 253: Nqa Server Udp-Echo

    vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance by its name, a case-sensitive string of 1 to 31 characters. If you do not specify this option, the NQA server listens on a public IP address. tos tos: Specifies the ToS value in the IP header for reply packets. The value range for the tos argument is 0 to 255, and the default value is 0.
  • Page 254 tos tos: Specifies the ToS value in the IP header for reply packets. The value range for the tos argument is 0 to 255, and the default value is 0. Usage guidelines Use this command on the NQA server only for the UDP jitter, UDP echo, and voice operations. When you configure the IP address and port number for a UDP listening service on the NQA server, follow these restrictions and guidelines: •...
  • Page 255: Port Mirroring Commands

    Port mirroring commands The port mirroring commands are available on Layer 2 Ethernet interfaces, Layer 3 Ethernet interfaces, and FC interfaces. The term "interface" in this chapter collectively refers to these types of interfaces. You can use the port link-mode command to configure an Ethernet port as a Layer 2 or Layer 3 interface (see Layer 2—LAN Switching Configuration Guide).
  • Page 256: Mirroring-Group

    Table 58 Command output Field Description Mirroring group Number of the mirroring group. Type of the mirroring group: • Local. Type • Remote source. • Remote destination. Status of the mirroring group: • Active—The mirroring group has taken effect. Status •...
  • Page 257: Mirroring-Group Mirroring-Port (System View)

    Use undo mirroring-group mirroring-port to remove a source port from a mirroring group. Syntax mirroring-group group-id mirroring-port { both | inbound | outbound } undo mirroring-group group-id mirroring-port Default No source port is configured for any mirroring group. Views Interface view Predefined user roles network-admin Parameters...
  • Page 258: Mirroring-Group Monitor-Egress

    undo mirroring-group group-id mirroring-port interface-list Default No source port is configured for a mirroring group. Views System view Predefined user roles network-admin Parameters group-id: Specifies a mirroring group by its number in the range of 1 to 4. The specified mirroring group must already exist.
  • Page 259: Mirroring-Group Monitor-Port (Interface View)

    undo mirroring-group group-id monitor-egress interface-type interface-number In interface view: mirroring-group group-id monitor-egress undo mirroring-group group-id monitor-egress Default No egress port is configured for a mirroring group. Views System view, interface view Predefined user roles network-admin Parameters group-id: Specifies a mirroring group by its number in the range of 1 to 4. The specified mirroring group must already exist.
  • Page 260: Mirroring-Group Monitor-Port (System View)

    Syntax mirroring-group group-id monitor-port undo mirroring-group group-id monitor-port Default No monitor port is configured for a mirroring group. Views Interface view Predefined user roles network-admin Parameters group-id: Specifies a mirroring group by its number in the range of 1 to 4. The specified mirroring group must already exist.
  • Page 261: Mirroring-Group Reflector-Port

    undo mirroring-group group-id monitor-port interface-type interface-number Default No monitor port is configured for a mirroring group. Views System view Predefined user roles network-admin Parameters group-id: Specifies a mirroring group by its number in the range of 1 to 4. The specified mirroring group must already exist.
  • Page 262: Mirroring-Group Remote-Probe Vlan

    mirroring-group group-id reflector-port undo mirroring-group group-id reflector-port Default No reflector port is configured for a mirroring group. A port does not act as the reflector port for a mirroring group. Views System view, interface view Predefined user roles network-admin Parameters group-id: Specifies a mirroring group by its number in the range of 1 to 4.
  • Page 263 Syntax mirroring-group group-id remote-probe vlan vlan-id undo mirroring-group group-id remote-probe vlan vlan-id Default No remote probe VLAN is configured for a mirroring group. Views System view Predefined user roles network-admin Parameters group-id: Specifies a mirroring group by its number in the range of 1 to 4. The specified mirroring group must already exist.
  • Page 264: Flow Mirroring Commands

    Flow mirroring commands The flow mirroring commands are available on both Layer 2 and Layer 3 Ethernet interfaces. The term "interface" in this chapter collectively refers to these two types of interfaces. You can use the port link-mode command to configure an Ethernet port as a Layer 2 or Layer 3 interface (see Layer 2—LAN Switching Configuration Guide).
  • Page 265 Examples # Create traffic behavior 1, and configure the action of mirroring traffic to the CPU for the traffic behavior. <Sysname> system-view [Sysname] traffic behavior 1 [Sysname-behavior-1] mirror-to cpu # Create traffic behavior 1, and configure the action of mirroring traffic to FortyGigE 1/0/1 for the traffic behavior.
  • Page 266: Sflow Commands

    sFlow commands display sflow Use display sflow to display sFlow configuration and operation information. Syntax display sflow Views Any view Predefined user roles network-admin network-operator Examples # Display sFlow configuration and operation information. <Sysname> display sflow sFlow datagram version: 5 Global information: Agent IP: 10.10.10.1(CLI) Source address: 10.0.0.1 2001::1...
  • Page 267: Sflow Agent

    Field Description Size Maximum length of the sFlow data portion in an sFlow packet. VPN-instance Name of the VPN bound with the sFlow collector. Description Description of the sFlow collector. Port information Information about interfaces configured with sFlow. Interface Interface configured with sFlow. ID of the sFlow collector, for receiving counter sampled packets.
  • Page 268: Sflow Collector

    Only one IP address can be specified for the sFlow agent on the device. A newly configured IP address overwrites the existing one. Examples # Specify IP address 10.10.10.1 for the sFlow agent. <Sysname> system-view [Sysname] sflow agent ip 10.10.10.1 sflow collector Use sflow collector to configure parameters for an sFlow collector.
  • Page 269: Sflow Counter Interval

    • Aging timer—1200 seconds. • Maximum length of the sFlow data portion in the sFlow packet—1000 bytes. <Sysname> system-view [Sysname] sflow collector 2 vpn-instance vpn1 ip 3.3.3.1 description netserver time-out 1200 datagram-size 1000 sflow counter interval Use sflow counter interval to enable counter sampling and set a counter sampling interval. Use undo sflow counter interval to restore the default.
  • Page 270: Sflow Flow Collector

    Examples # Specify sFlow collector 2 on FortyGigE 1/0/1 for counter sampling. <Sysname> system-view [Sysname] interface fortygige 1/0/1 [Sysname-FortyGigE1/0/1] sflow counter collector 2 sflow flow collector Use sflow flow collector to specify an sFlow collector for flow sampling. Use undo sflow flow collector to restore the default. Syntax sflow flow collector collector-id undo sflow flow collector...
  • Page 271: Sflow Sampling-Mode

    Parameters length: Specifies the maximum number of bytes that can be copied, in the range of 18 to 512. As a best practice, use the default. Examples # Set the maximum number of bytes that can be copied to 60 on FortyGigE 1/0/1. <Sysname>...
  • Page 272: Sflow Sampling-Rate

    sflow sampling-rate Use sflow sampling-rate to enable flow sampling and specify the number of packets out of which flow sampling will sample a packet on an interface. Use undo sflow sampling-rate to restore the default. Syntax sflow sampling-rate rate undo sflow sampling-rate Default No flow sampling rate is configured.
  • Page 273 Examples # Specify the source IPv4 address of sFlow packets as 10.0.0.1. <Sysname> system-view [Sysname] sflow source ip 10.0.0.1...
  • Page 274: Process Monitoring And Maintenance Commands

    Process monitoring and maintenance commands The display memory, display process, display process cpu, monitor process and monitor thread commands display information about both user processes and kernel threads. In these commands, "process" refers to both user processes and kernel threads. display exception context Use display exception context to display context information for process exceptions.
  • Page 275: Display Exception Filepath

    esp:0xbfe244b8 ebp:0xbfe244c8 esi:0xffffffff edi:0xbfe24674 eip:0xb7caba4a eflag:0x00000292 cs:0x00000073 ss:0x0000007b ds:0x0000007b es:0x0000007b fs:0x00000000 gs:0x00000033 Table 60 Command output Filed Description Crashed PID ID of the crashed process. Signals that lead to the crash: • SIGUNKNOW—Unknown reason. • SIGABRT—Abort. • SIGBUS—Bus error. • SIGFPE—Erroneous arithmetic operation.
  • Page 276: Display Kernel Deadloop

    display kernel deadloop Use display kernel deadloop to display kernel thread deadloop information. Syntax display kernel deadloop show-number [ offset ] [ verbose ] [ slot slot-number [ cpu cpu-number ] ] Views Any view Predefined user roles network-admin Parameters show-number: Specifies the number of deadloops to display, in the range of 1 to 20.
  • Page 277 Last 5 thread switches : migration/0 (11:16:00.823018)--> swapper (11:16:00.833018)--> kthreadd (11:16:00.833518)--> swapper (11:16:00.833550)--> disk (11:16:00.833560) Register content: Reg: r0, Val = 0x00000000 ; Reg: r1, Val = 0xe2be5ea0 ; Reg: r2, Val = 0x00000000 ; Reg: r3, Val = 0x77777777 ; Reg: r4, Val = 0x00000000 ;...
  • Page 278 0xe2be5fb0: 02 44 b3 74 02 be 5f d0 00 00 00 30 02 be 5f e0 0xe2be5fc0: 02 be 60 60 01 74 ff f8 00 00 00 00 00 00 08 00 0xe2be5fd0: 02 be 5f f0 00 e8 93 7e 02 be 5f f8 02 be 5f fc 0xe2be5fe0: 00 00 00 00 00 00 00 00 00 00 00 00 02 be 60 18 0xe2be5ff0: 02 be 60 10 00 e9 65 98 00 00 00 58 00 00 2a 4f 0xe2be6000: 02 be 60 10 00 00 00 00 00 00 00 00 02 be 60 68...
  • Page 279: Display Kernel Deadloop Configuration

    Field Description Last five kernel thread switches on the CPU before the kernel thread Last 5 thread switches deadloop was detected, including kernel thread name and kernel thread switching time with microsecond precision. Register information: • Register content Reg—Name of a register. •...
  • Page 280: Display Kernel Exception

    Field Description Kernel threads excluded from kernel thread deadloop detection. This field appears only if the monitor kernel deadloop exclude-thread Threads excluded from monitoring command is configured. Name Kernel thread name. Kernel thread number. No thread is excluded from All kernel threads are monitored by kernel thread deadloop detection. monitoring display kernel exception Use display kernel exception to display kernel thread exception information.
  • Page 281 # Display detailed information about the latest kernel thread exception. <Sysname> display kernel exception 1 verbose ----------------- Exception record 1 ----------------- Description : Oops[#0] Recorded at : 2013-05-01 11:16:00.823018 Occurred at : 2013-05-01 11:16:00.823018 Instruction address : 0x4004158c Thread : comsh (TID: 16306) Context : thread context Slot...
  • Page 282: Related Commands

    0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5ef0: 95 47 73 35 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f00: a0 e1 64 21 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f10: 00 00 00 00 00 00 00 00 00 00 00 00 01 e9 00 00 0xe2be5f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f30: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0...
  • Page 283: Display Kernel Reboot

    display kernel reboot Use display kernel reboot to display kernel thread reboot information. Syntax display kernel reboot show-number [ offset ] [ verbose ] [ slot slot-number [ cpu cpu-number ] ] Views Any view Predefined user roles network-admin Parameters show-number: Specifies the number of kernel thread reboots to display, in the range of 1 to 20.
  • Page 284 swapper (11:16:00.833018)--> kthreadd (11:16:00.833518)--> swapper (11:16:00.833550)--> disk (11:16:00.833560) Dump stack (total 1024 bytes, 16 bytes/line): 0xe2be5ea0: 02 be 5e c0 24 00 00 24 00 00 00 00 05 7d 94 84 0xe2be5eb0: 00 00 00 04 00 00 00 00 00 00 00 28 05 8d 34 c4 0xe2be5ec0: 02 be 60 a0 01 86 ef f0 00 00 00 00 00 00 00 00 0xe2be5ed0: 02 04 05 b4 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00...
  • Page 285: Display Kernel Starvation

    Function Address = 0x801223a0 Table 63 Command output Field Description Time when the kernel thread reboot was recorded on the system, with Recorded at microsecond precision. Occurred at Time when a kernel thread rebooted, with microsecond precision. Reason Reboot reason. Thread Name and number of the rebooted kernel thread.
  • Page 286 Examples # Display brief information about the latest kernel thread starvation. <Sysname> display kernel starvation 1 ----------------- Starvation record 1 ----------------- Description : INFO: task comsh: 16306 blocked for more than 10 seconds. Recorded at : 2013-05-01 11:16:00.823018 Occurred at : 2013-05-01 11:16:00.823018 Instruction address...
  • Page 287 Reg: r26, Val = 0x00000000 ; Reg: r27, Val = 0x057d9484 ; Reg: r28, Val = 0x0000002c ; Reg: r29, Val = 0x00000000 ; Reg: r30, Val = 0x0000002c ; Reg: r31, Val = 0x00000000 ; Reg: cr, Val = 0x84000028 ; Reg: nip, Val = 0x057d9550 ;...
  • Page 288: Display Kernel Starvation Configuration

    Function Address = 0x8012d734 Function Address = 0x80100a00 Function Address = 0xe0071004 Function Address = 0x8016ce0c Function Address = 0x801223a0 Instruction dump: 41a2fe9c 812300ec 800200ec 7f890000 409efe8c 80010014 540b07b9 40a2fe80 4bfffe6c 80780290 7f64db78 4804ea35 <807f002c> 38800000 38a00080 3863000c For detailed information about the command output, see Table Related commands reset kernel starvation...
  • Page 289: Display Process

    Related commands • monitor kernel starvation enable • monitor kernel starvation exclude-thread • monitor kernel starvation time display process Use display process to display process state information. Syntax display process [ all | job job-id | name process-name ] [ slot slot-number [ cpu cpu-number ] ] Views Any view Predefined user roles...
  • Page 290 Table 65 Command output Field Description Job ID Job ID of the process. The job ID never changes. Number of the process. The number identifies the process, and it might change as the process restarts. Parent JID Job ID of the parent process. Parent PID Number of the parent process.
  • Page 291: Display Process Cpu

    <Sysname> display process all PID %CPU %MEM STAT PRI TTY HH:MM:SS COMMAND 00:00:04 scmd 00:00:00 [kthreadd] 00:00:00 [migration/0] 00:00:05 [ksoftirqd/0] 00:00:00 [watchdog/0] 00:00:00 [events/0] 00:00:00 [khelper] 00:00:00 [kblockd/0] 00:00:00 [ata/0] 00:00:00 [ata_aux] 00:00:00 [kseriod] 00:00:00 [vzmond] 00:00:00 [pdflush] 00:00:00 [pdflush] 00:00:00 [kswapd0] 00:00:00 [aio/0] 00:00:00 [scsi_eh_0]...
  • Page 292 Syntax display process cpu [ slot slot-number [ cpu cpu-number ] ] Views Any view Predefined user roles network-admin network-operator Parameters slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the command displays CPU usage for all processes on the master device. cpu cpu-number: Specifies a CPU by its number.
  • Page 293: Display Process Log

    Field Description 5Min CPU usage of the process within the last 5 minutes. Name of the process. If square brackets ([ ]) exist in a process name, the Name process is a kernel thread. display process log Use display process log to display log information for all user processes. Syntax display process log [ slot slot-number [ cpu cpu-number ] ] Views...
  • Page 294: Display Process Memory

    Field Description End-time Time when the user process ended. display process memory Use display process memory to display memory usage for all user processes. Syntax display process memory [ slot slot-number [ cpu cpu-number ] ] Views Any view Predefined user roles network-admin network-operator Parameters...
  • Page 295: Display Process Memory Heap

    Field Description Text Text memory used by the user process, in KB. The value for a kernel thread is 0. Data Data memory used by the user process, in KB. The value for a kernel thread is 0. Stack Stack memory used by the user process, in KB. The value for a kernel thread is 0. Dynamic Dynamic memory used by the user process, in KB.
  • Page 296: Display Process Memory Heap Address

    Total allocated memory(in bytes) 161576 # Display detailed information about heap memory usage for the process identified by job ID 148. <Sysname> display process memory heap job 148 verbose Heap usage: Size Free Used Total Free Ratio 1262 1265 0.2% 5.1% 4096 8192...
  • Page 297: Display Process Memory Heap Size

    address starting-address: Specifies the starting memory block by its address. length memory-length: Specifies the memory block length in the range of 1 to 1024 bytes. slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the command displays memory content information on the master device.
  • Page 298: Exception Filepath

    slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the command displays block address information on the master device. cpu cpu-number: Specifies a CPU by its number. Usage guidelines The command displays memory block addresses in hexadecimal format. To view memory block content, execute the display process memory heap address command.
  • Page 299: Monitor Kernel Deadloop Enable

    If no directory is specified or the specified directory is not accessible, the system cannot store core files or record context information for process exceptions. Examples # Specify the directory for saving core files as flash:/. <Sysname> exception filepath flash:/ Related commands •...
  • Page 300: Monitor Kernel Deadloop Exclude-Thread

    • monitor kernel deadloop time monitor kernel deadloop exclude-thread Use monitor kernel deadloop exclude-thread to disable kernel thread deadloop detection for a kernel thread. Use undo monitor kernel deadloop exclude-thread to enable kernel thread deadloop detection for a kernel thread. Syntax monitor kernel deadloop exclude-thread tid [ slot slot-number [ cpu cpu-number ] ] undo monitor kernel deadloop exclude-thread [ tid ] [ slot slot-number [ cpu cpu-number ] ]...
  • Page 301: Monitor Kernel Starvation Enable

    Syntax monitor kernel deadloop time interval [ slot slot-number [ cpu cpu-number ] ] undo monitor kernel deadloop time [ slot slot-number [ cpu cpu-number ] ] Default The interval for identifying a kernel thread deadloop is 8 seconds. Views System view Predefined user roles network-admin...
  • Page 302: Monitor Kernel Starvation Exclude-Thread

    Predefined user roles network-admin Parameters slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the master device is specified. cpu cpu-number: Specifies a CPU by its number. Usage guidelines Starvation occurs when a thread is unable to access shared resources. The command enables the system to detect and report thread starvation.
  • Page 303: Monitor Kernel Starvation Time

    slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the master device is specified. cpu cpu-number: Specifies a CPU by its number. Usage guidelines You can disable kernel thread starvation detection for up to 128 kernel threads by executing the command.
  • Page 304: Monitor Process

    Examples # Set the interval for identifying a kernel thread starvation to 120 seconds. <Sysname> system-view [Sysname] monitor kernel starvation time 120 Related commands • display kernel starvation • display kernel starvation configuration • monitor kernel starvation enable • monitor kernel starvation exclude-thread monitor process Use monitor process to display process statistics.
  • Page 305 Commands Description Sorts processes by CPU usage in descending order, which is the default setting. Sets the interval for refreshing process statistics, in the range of 1 to 2147483647 seconds. The default value is 5 seconds. Sorts processes by the number of open files in descending order. Files are identified by file descriptors (FDs).
  • Page 306 State HH:MM:SS Name 1047 1047 1420K 00:02:30 37.11% diagd 1092K 00:00:21 11.34% scmd 1000 1000 00:00:09 2.06% [sock/1] 1026 1026 26044K 00:00:05 1.54% syslogd 1027 1027 9280K 00:01:12 1.03% devd 00:00:06 0.51% [ksoftirqd/0] 1009 1009 00:00:08 0.51% [karp/1] 1010 1010 00:00:13 0.51% [kND/1]...
  • Page 307 State HH:MM:SS Name 1047 1047 1420K 00:02:39 14.13% diagd 1092K 00:00:23 3.98% scmd 1027 1027 9280K 00:01:13 1.44% devd 1000 1000 00:00:09 0.36% [sock/1] 1009 1009 00:00:09 0.36% [karp/1] 00:00:06 0.18% [ksoftirqd/0] 1010 1010 00:00:13 0.18% [kND/1] 4795 4795 2372K 00:00:01 0.18% telnetd...
  • Page 308 Thread states: 1 running, 112 sleeping, 0 stopped, 0 zombie CPU states: 90.66% idle, 0.88% user, 5.77% kernel, 2.66% interrupt Memory: 755M total, 414M available, page size 4K State HH:MM:SS Name 5384K 00:00:01 0.00% dbmd 2464K 00:00:02 0.00% ipbased 1956K 00:00:00 0.00% 30600K...
  • Page 309: Monitor Thread

    monitor thread Use monitor thread to display thread statistics. Syntax monitor thread [ dumbtty ] [ iteration number ] [ slot slot-number [ cpu cpu-number ] ] Views Any view Predefined user roles network-admin Parameters dumbtty: Specifies dumbtty mode. In this mode, the command displays all thread statistics in descending order of CPU usage without refreshing statistics.
  • Page 310 CPU states: 83.19% idle, 1.68% user, 10.08% kernel, 5.04% interrupt Memory: 755M total, 417M available, page size 4K LAST_CPU State HH:MM:SS Name 1175 1175 00:00:00 10.75% 00:00:06 2.68% scmd 00:00:09 2.01% diagd 00:00:01 0.67% [DEVD] 00:00:11 0.67% devd 00:00:00 0.00% [kthreadd] 00:00:01 0.00%...
  • Page 311 Enter the delay interval between screen updates (1~2147483647): 3 • Enter n, and then enter a number to modify the maximum number of displayed threads. If you enter 5, statistics for five threads are displayed. Enter the max number of threads to display(0 means unlimited): 5 84 processes;...
  • Page 312: Process Core

    Field Description Name of a thread. If square brackets ([ ]) exist in a thread name, the thread is a Name kernel thread. process core Use process core to enable or disable a process to generate core files for exceptions and to set the maximum number of core files.
  • Page 313: Reset Exception Context

    reset exception context Use reset exception context to clear context information for process exceptions. Syntax reset exception context [ slot slot-number [ cpu cpu-number ] ] Views User view Predefined user roles network-admin Parameters slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the IRF master device is specified.
  • Page 314: Reset Kernel Reboot

    Syntax reset kernel exception [ slot slot-number [ cpu cpu-number ] ] Views User view Predefined user roles network-admin Parameters slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the command clears kernel thread exception information for the master device. cpu cpu-number: Specifies a CPU by its number.
  • Page 315 Views User view Predefined user roles network-admin Parameters slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the command clears kernel thread starvation information for the master device. cpu cpu-number: Specifies a CPU by its number. Examples # Clear kernel thread starvation information.
  • Page 316: Eaa Commands

    EAA commands action cli Use action cli to add a CLI action to a monitor policy. Use undo action to remove an action. Syntax action number cli command-line undo action number Default Monitor policies do not contain any actions. Views CLI-defined policy view Predefined user roles network-admin...
  • Page 317: Action Reboot

    action reboot Use action reboot to add a reboot action to a monitor policy. Use undo action to remove an action. Syntax action number reboot [ slot slot-number [ subslot subslot-number ] ] undo action number Default Monitor policies do not contain any actions. Views CLI-defined policy view Predefined user roles...
  • Page 318: Action Syslog

    Default Monitor policies do not contain any actions. Views CLI-defined policy view Predefined user roles network-admin Parameters number: Specifies an action ID in the range of 0 to 231. Usage guidelines This command will not be executed if the device forms a single-chassis IRF fabric. You can configure a series of actions to be executed in response to the event specified in a monitor policy.
  • Page 319: Commit

    Usage guidelines EAA sends log messages to the information center. You can configure the information center to output these messages to certain destinations. For more information about the information center, see "Configuring the information center." You can configure a series of actions to be executed in response to the event specified in a monitor policy.
  • Page 320: Display Rtm Policy

    Views Any view Predefined user roles network-admin Parameters var-name: Specifies a user-defined EAA environment variable by its name. If you do not specify a variable, this command displays all user-defined EAA environment variables. Examples # Display all user-defined EAA environment variables. <Sysname>...
  • Page 321: Event Cli

    Table 75 Command output Field Description Job ID. This field is available for the display rtm policy active command. PolicyName Monitor policy name. Method for creating the policy: • Type TCL—The policy is configured by using Tcl. • CLI—The policy is configured from the CLI. Source of the event specified in the policy.
  • Page 322: Event Hotplug

    You can configure only one event for a monitor policy. If the monitor policy already contains an event, the new event replaces the old event. Examples # Configure a CLI-defined policy to monitor execution of commands that contain the dis inter brief string.
  • Page 323: Event Interface

    You can configure only one event for a monitor policy. If the monitor policy already contains an event, the new event replaces the old event. Examples # Configure a CLI-defined policy to monitor IRF member device 2 for active/standby switchover. <Sysname>...
  • Page 324 Monitored traffic Description statistic output-drops Number of discarded outgoing packets. output-errors Number of outgoing error packets. rcv-bps Receive rate, in bps. rcv-broadcasts Number of incoming broadcasts. rcv-pps Receive rate, in packets per second. tx-bps Transmit rate, in bps. tx-pps Transmit rate, in packets per second. Table 77 Comparison operators Comparison operator Description...
  • Page 325: Event Process

    [Sysname] rtm cli-policy test [Sysname-rtm-test] event interface fortygige 1/0/1 monitor-obj input-errors start-op gt start-val 1000 restart-op lt restart-val 50 interval 60 event process Use event process to configure a process event for a CLI-defined monitor policy. Use undo event to delete the event in a CLI-defined monitor policy. Syntax event process { exception | restart | shutdown | start } [ name process-name [ instance instance-id ] ] [ slot slot-number ]...
  • Page 326: Event Snmp Oid

    event snmp oid Use event snmp oid to configure an SNMP event for a CLI-defined monitor policy. Use undo event to delete the event in a CLI-defined monitor policy. Syntax event snmp oid oid monitor-obj { get | next } start-op start-op start-val start-val restart-op restart-op restart-val restart-val [ interval interval ] undo event Default...
  • Page 327: Event Snmp-Notification

    The following is the SNMP event monitor process of EAA: Compares the variable sample with the start threshold at sampling intervals until the comparison result meets the condition specified by the start operator. Executes the policy. Compares the variable sample with the restart threshold at sampling intervals until the comparison result meets the condition specified by the restart operator.
  • Page 328: Event Syslog

    3 to level 0. msg msg: Specifies a regular expression to match the message body, a string of 1 to 255 characters. The log message must use the HPE format. For more information about log message formats, see "Configuring the information center."...
  • Page 329: Rtm Cli-Policy

    NOTE: EAA does not count log messages generated by the RTM module when it counts log matches. You can configure only one event for a monitor policy. If the monitor policy already contains an event, the new event replaces the old event. Examples # Configure a CLI-defined policy to monitor Syslog messages for level 3 to level 0 messages that contain the down string.
  • Page 330: Rtm Environment

    rtm environment Use rtm environment to configure an EAA environment variable. Use undo rtm environment to delete a user-defined EAA environment variable. Syntax rtm environment var-name var-value undo rtm environment var-name Default The system provides the variables in Table 78. You cannot create, delete, or modify these system-defined variables.
  • Page 331: Rtm Scheduler Suspend

    Parameters var-name: Specifies an environment variable name, a string of 1 to 63 characters. A user-defined EAA environment variable name can contain digits, letters, and the underscore sign (_), but its leading character cannot be the underscore sign. var-value: Specifies the variable value. Usage guidelines When you define an action, you can enter a variable name with a leading dollar sign ($variable_name) instead of entering a value for an argument.
  • Page 332: Running-Time

    undo rtm tcl-policy policy-name Default No Tcl policies exist. Views System view Predefined user roles network-admin Parameters policy-name: Specifies a policy name, a case-sensitive string of 1 to 63 characters. tcl-filename: Specifies a .tcl script file name. The file name is case sensitive. You must make sure the file is available on a storage medium of the device.
  • Page 333: User-Role

    Parameters time: Specifies the runtime of the CLI-defined policy, in the range of 0 to 31536000 seconds. If you specify 0, the policy can run forever until it is manually interrupted. Usage guidelines Policy runtime limits the amount of time that the monitor policy can run from the time it is triggered. When the runtime is reached, the system stops executing the policy even if the execution is not finished.
  • Page 334 Examples # Assign user roles to a CLI-defined policy. <Sysname> system-view [Sysname] rtm cli-policy test [Sysname-rtm-test] user-role network-admin [Sysname-rtm-test] user-role admin...
  • Page 335: Cwmp Commands

    CWMP commands cwmp Use cwmp to enter CWMP view. Syntax cwmp Views System view Predefined user roles network-admin Examples # Enter CWMP view. <Sysname> system-view [Sysname] cwmp Related commands cwmp enable cwmp acs default password Use cwmp acs default password { cipher | simple } to configure a password for authentication to the default ACS URL.
  • Page 336: Cwmp Acs Default Url

    Usage guidelines You can configure only one password for authentication to the default ACS URL. If you use the command multiple times, the password configured most recently takes effect. For a successful connection, make sure the CPE has the same password setting as the ACS. You do not need to configure this command if the default ACS URL does not require a password for authentication.
  • Page 337: Cwmp Acs Default Username

    Related commands • cwmp acs default password • cwmp acs default username cwmp acs default username Use cwmp acs default username to configure the username for authentication to the default ACS. Use undo cwmp acs default username to restore the default. Syntax cwmp acs default username username undo cwmp acs default username...
  • Page 338: Cwmp Acs Url

    Views CWMP view Predefined user roles network-admin Parameters cipher: Specifies a password in ciphertext. simple: Specifies a password in plain text. For security purposes, all passwords, including passwords configured in plain text, are saved in ciphertext. password: Specifies the password string. This argument is case sensitive. If you specify the simple keyword, it must be a string of 1 to 255 characters.
  • Page 339: Cwmp Acs Username

    Usage guidelines The device supports only one preferred ACS URL. If you use the command multiple times, the final URL configuration takes effect. The preferred ACS URL is configurable from the CPE's CLI, the DHCP server, and the ACS. The CLI- and ACS-assigned URLs have higher priority than the DHCP-assigned URL.
  • Page 340: Cwmp Cpe Connect Interface

    cwmp cpe connect interface Use cwmp cpe connect interface to specify the CWMP connection interface. Use undo cwmp cpe connect interface to restore the default. Syntax cwmp cpe connect interface interface-type interface-number undo cwmp cpe connect interface Default No CWMP connection interface is specified. Views CWMP view Predefined user roles...
  • Page 341: Cwmp Cpe Inform Interval

    Views CWMP view Predefined user roles network-admin Parameters times: Specifies the maximum number of CWMP connection retries. The value range is 0 to 100. To disable the CPE to retry a CWMP connection, set this argument to 0. Usage guidelines The CPE retries connecting to the ACS when its initial connection attempt fails or the CWMP session is ended before the CPE receives a session closed message from the ACS.
  • Page 342: Cwmp Cpe Inform Interval Enable

    Related commands cwmp cpe inform interval enable cwmp cpe inform interval enable Use cwmp cpe inform interval enable to enable the periodic Inform feature. Use undo cwmp cpe inform interval enable to restore the default. Syntax cwmp cpe inform interval enable undo cwmp cpe inform interval enable Default The CPE does not send Inform messages periodically.
  • Page 343: Cwmp Cpe Password

    Parameters time: Specifies the time at which the CPE sends an Inform message. The time format is yyyy-mm-ddThh:mm:ss, and the value range is 1970-01-01T00:00:00 to 2035-12-31T23:59:59. The specified time must be greater than the current system time. Examples # Configure the CPE to send an Inform message at 2007-12-01T20:00:00. <Sysname>...
  • Page 344: Cwmp Cpe Provision-Code

    Related commands cwmp cpe username cwmp cpe provision-code Use cwmp cpe provision-code to configure the provision code of the CPE. Use undo cwmp cpe provision-code to restore the default. Syntax cwmp cpe provision-code provision-code undo cwmp cpe provision-code Default The provision code is PROVISIONCODE. Views CWMP view Predefined user roles...
  • Page 345: Cwmp Cpe Username

    Predefined user roles network-admin Usage guidelines Connection requests initiated from the CPE can reach the ACS through a NAT gateway without NAT traversal. However, for the connection request initiated from the ACS to reach the CPE, you must enable NAT traversal on the CPE when a NAT gateway resides between the CPE and the ACS. The NAT traversal feature complies with Simple Traversal of UDP Through NATs (STUN), RFC 3489.
  • Page 346: Cwmp Cpe Wait Timeout

    Examples # Configure the username used for authenticating the ACS. <Sysname> system-view [Sysname] cwmp [Sysname-cwmp] cwmp cpe username newname Related commands cwmp cpe password cwmp cpe wait timeout Use cwmp cpe wait timeout to configure the close-wait timer for the CPE to close an idle connection.
  • Page 347: Display Cwmp Configuration

    Syntax cwmp enable undo cwmp enable Default CWMP is enabled. Views CWMP view Predefined user roles network-admin Usage guidelines CWMP configuration takes effect only after CWMP is enabled. Examples # Disable CWMP. <Sysname> system-view [Sysname] cwmp [Sysname-cwmp] undo cwmp enable Related commands cwmp display cwmp configuration...
  • Page 348: Display Cwmp Status

    Source IP interface : None STUN state : Disable SSL policy name : Null Table 79 Command output Field Description CWMP state Status of CWMP: Enabled or Disabled. Preferred ACS URL. ACS URL This field displays Null if no preferred ACS URL has been specified. ACS username Username for the CPE to authenticate to the ACS.
  • Page 349 Views Any view Predefined user roles network-admin network-operator Examples # Display CWMP state information. <Sysname> display cwmp status CWMP state : Enabled ACS URL of most recent connection : http://www.acs.com:80/acs ACS information source : User ACS username of most recent connection : newname Connection status : Disconnected...
  • Page 350: Ssl Client-Policy

    ssl client-policy Use ssl client-policy to specify an SSL client policy for CWMP. Use undo ssl client-policy to remove the specified SSL client policy. Syntax ssl client-policy policy-name undo ssl client-policy Default No SSL client policy is specified for CWMP. Views CWMP view Predefined user roles...
  • Page 351: Netconf Commands

    NETCONF commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. netconf log Use netconf log to enable NETCONF logging.
  • Page 352: Netconf Soap Http Dscp

    edit-config operations. When an edit-config operation error occurs, this keyword logs detailed error information. Examples # Configure the device to log NETCONF edit-config information sourced from agent clients. <Sysname> system-view [sysname] netconf log source agent protocol-operation set netconf soap http dscp Use netconf soap http dscp to set the DSCP value for outgoing NETCONF over SOAP over HTTP packets.
  • Page 353: Netconf Soap Https Dscp

    Views System view Predefined user roles network-admin Usage guidelines This command is not available in FIPS mode. This command enables the device to resolve NETCONF messages that are encapsulated with SOAP in HTTP packets. Examples # Enable NETCONF over SOAP over HTTP. <Sysname>...
  • Page 354: Netconf Ssh Server Enable

    Syntax netconf soap https enable undo netconf soap https enable Default NETCONF over SOAP over HTTPS is disabled. Views System view Predefined user roles network-admin Usage guidelines This command enables the device to resolve NETCONF messages that are encapsulated with SOAP in HTTPS packets.
  • Page 355: Netconf Ssh Server Port

    netconf ssh server port Use netconf ssh server port to specify a port to listen for NETCONF over SSH connections. Use undo netconf ssh server port to restore the default. Syntax netconf ssh server port port-number undo netconf ssh server port Default Port 830 listens for NETCONF over SSH connections.
  • Page 356 User role NETCONF operations • • Get-bulk • Get-bulk-config network-operator • Get-config • Get-sessions • Close-session NETCONF messages must comply with the XML format requirements and the semantic and syntactic requirements in the NETCONF XML API reference for the switch. To ensure successful configuration, use third-party software to generate NETCONF messages.
  • Page 357: Packet Capture Commands

    Packet capture commands packet-capture interface Use packet-capture interface to capture incoming packets on an interface. Syntax Save captured packets to a file: packet-capture interface interface-type interface-number [ capture-filter capt-expression | limit-captured-frames limit | limit-frame-size bytes | autostop filesize kilobytes | autostop duration seconds | autostop files numbers | capture-ring-buffer filesize kilobytes | capture-ring-buffer duration seconds | capture-ring-buffer files numbers ] * write filepath [ raw | { brief | verbose } ] *...
  • Page 358 capture-ring-buffer filesize kilobytes: Rotates the packet file when the maximum file size is reached. The kilobytes argument sets the maximum file size. The value range is 1 to 65536 kilobytes. capture-ring-buffer duration seconds: Rotates the packet file when the rotation interval expires. The seconds argument sets the rotation interval.
  • Page 359: Packet-Capture Read

    Purpose Options Remarks capture-ring-buffer duration filesize option, the capture rotates the seconds file based on the file size specified for • the autostop filesize option. Rotate based on the file size specified for the autostop filesize kilobytes option: autostop files numbers autostop filesize kilobytes autostop filesize kilobytes capture-ring-buffer files numbers...
  • Page 360: Document Conventions And Icons

    Document conventions and icons Conventions This section describes the conventions used in the documentation. Port numbering in examples The port numbers in this document are for illustration only and might be unavailable on your device. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown.
  • Page 361: Network Topology Icons

    Network topology icons Convention Description Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features.
  • Page 362: Support And Other Resources

    Support and other resources Accessing Hewlett Packard Enterprise Support • For live assistance, go to the Contact Hewlett Packard Enterprise Worldwide website: www.hpe.com/assistance • To access documentation and support services, go to the Hewlett Packard Enterprise Support Center website: www.hpe.com/support/hpesc Information to collect •...
  • Page 363: Websites

    Hewlett Packard Enterprise is committed to providing documentation that meets your needs. To help us improve the documentation, send any errors, suggestions, or comments to Documentation Feedback (docsfeedback@hpe.com). When submitting your feedback, include the document title, part number, edition, and publication date located on the front cover of the document. For online help content, include the product name, product version, help edition, and publication date located on the legal notices page.
  • Page 364: Index

    Index A C D E F H I L M N O P R S T U V X display kernel deadloop,267 display kernel deadloop configuration,270 action cli,307 display kernel exception,271 action reboot,308 display kernel reboot,274 action switchover,308 display kernel starvation,276 action syslog,309 display kernel starvation configuration,279 advantage-factor,173...
  • Page 365 display snmp-agent group,110 info-center logging suppress duplicates,93 display snmp-agent local-engineid,111 info-center loghost,94 display snmp-agent mib-node,111 info-center loghost source,95 display snmp-agent mib-view,118 info-center security-logfile alarm-threshold,96 display snmp-agent remote,119 info-center security-logfile directory,98 display snmp-agent statistics,120 info-center security-logfile enable,96 display snmp-agent sys-info,122 info-center security-logfile frequency,97 display snmp-agent trap queue,123 info-center security-logfile size-quota,97 display snmp-agent trap-list,123...
  • Page 366 nqa,206 ptp announce-timeout,60 nqa agent enable,206 ptp asymmetry-correction,61 nqa schedule,207 ptp clock-source,61 nqa server enable,243 ptp clock-step,64 nqa server tcp-connect,243 ptp delay-mechanism,65 nqa server udp-echo,244 ptp destination-mac,66 nqa template,208 ptp domain,66 ntp-service acl,22 ptp enable,67 ntp-service authentication enable,23 ptp force-state,68 ntp-service authentication-keyid,24 ptp min-delayreq-interval,69 ntp-service broadcast-client,25...
  • Page 367 rtm cli-policy,320 snmp-agent trap queue-size,146 rtm environment,321 snmp-agent usm-user { v1 | v2c },147 rtm scheduler suspend,322 snmp-agent usm-user v3,148 rtm tcl-policy,322 sntp authentication enable,44 running-time,323 sntp authentication-keyid,45 sntp enable,46 sntp ipv6 unicast-server,46 security-logfile save,105 sntp reliable authentication-keyid,47 sflow agent,258 sntp unicast-server,48 sflow collector,259 source interface,231...

Table of Contents