HP FlexFabric 12500 Series Network Management And Monitoring Command Reference

HP FlexFabric 12500 Series Network Management And Monitoring Command Reference

Routing
Hide thumbs Also See for FlexFabric 12500 Series:
Table of Contents

Advertisement

HP FlexFabric 12500 and 12500E Routing
Switch Series

Network Management and Monitoring

Command Reference

Part number: 5998-4887
Software version: 12500-CMW710-R7328
Document version: 6PW100-20140128

Advertisement

Table of Contents
loading

Summary of Contents for HP FlexFabric 12500 Series

  • Page 1: Network Management And Monitoring

    HP FlexFabric 12500 and 12500E Routing Switch Series Network Management and Monitoring Command Reference Part number: 5998-4887 Software version: 12500-CMW710-R7328 Document version: 6PW100-20140128...
  • Page 2 The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty.
  • Page 3: Table Of Contents

    Contents Ping, tracert, and system debugging commands ······································································································· 1 debugging ································································································································································· 1 display debugging ··················································································································································· 2 ping ············································································································································································ 2 ping ipv6 ··································································································································································· 5 tracert ········································································································································································· 8 tracert ipv6 ····························································································································································· 10 NQA commands ························································································································································ 12 NQA client commands ·················································································································································· 12 advantage-factor ··················································································································································· 12 codec-type ······························································································································································...
  • Page 4 reaction checked-element mos ····························································································································· 56 reaction checked-element { owd-ds | owd-sd } ·································································································· 57 reaction checked-element packet-loss ·················································································································· 58 reaction checked-element probe-duration ··········································································································· 59 reaction checked-element probe-fail (for trap) ···································································································· 60 reaction checked-element probe-fail (for trigger) ······························································································· 62 reaction checked-element rtt ································································································································· 63 reaction trap ··························································································································································...
  • Page 5 SNTP commands ····················································································································································· 106 display sntp sessions ··········································································································································· 106 sntp authentication enable ································································································································· 106 sntp authentication-keyid ···································································································································· 107 sntp enable ··························································································································································· 108 sntp reliable authentication-keyid ······················································································································ 109 sntp unicast-server ··············································································································································· 109 SNMP commands ··················································································································································· 112 display snmp-agent community ·························································································································· 112 display snmp-agent context ································································································································...
  • Page 6 rmon event ···························································································································································· 171 rmon history ························································································································································· 172 rmon prialarm ······················································································································································ 173 rmon statistics ······················································································································································· 176 NETCONF commands ············································································································································ 178 xml········································································································································································· 178 netconf soap http enable ···································································································································· 179 netconf soap https enable ·································································································································· 180 Port mirroring commands ······································································································································· 181 display mirroring-group ······································································································································ 181 mirroring-group ····················································································································································...
  • Page 7 info-center logbuffer size ···································································································································· 217 info-center logfile enable ···································································································································· 217 info-center logfile frequency ······························································································································· 218 info-center logfile size-quota ······························································································································· 219 info-center logfile directory ································································································································· 219 info-center logging suppress duplicates ············································································································ 220 info-center loghost ··············································································································································· 222 info-center loghost source ··································································································································· 222 info-center security-logfile alarm-threshold ········································································································...
  • Page 8 ········································································································································· 302 reset kernel exception ········································································································································· 303 reset kernel reboot ··············································································································································· 303 reset kernel starvation ········································································································································· 304 Support and other resources ·································································································································· 306 Contacting HP ······························································································································································ 306 Subscription service ············································································································································ 306 Related information ······················································································································································ 306 Documents ···························································································································································· 306 Websites ······························································································································································· 306 Conventions ··································································································································································...
  • Page 9: Ping, Tracert, And System Debugging Commands

    Ping, tracert, and system debugging commands debugging Use debugging to enable debugging for a specific module. Use undo debugging to disable debugging for a specific module. Syntax debugging { all [ timeout time ] | module-name [ option ] } undo debugging { all | module-name [ option ] } Default Debugging functions are disabled for all modules.
  • Page 10: Display Debugging

    display debugging Use display debugging to display the enabled debugging functions. Syntax display debugging [ module-name ] Views Any view Predefined user roles network-admin network-operator mdc-admin mdc-operator Parameters module-name: Specifies a module by its name. To display the current module name, use the display debugging ? command.
  • Page 11 -a source-ip: Specifies an IP address of the device as the source IP address of ICMP echo requests. If this option is not specified, the source IP address of ICMP echo requests is the primary IP address of the outbound interface. -c count: Specifies the number of ICMP echo requests that are sent to the destination.
  • Page 12 Examples # Test whether the device with an IP address of 1.1.2.2 is reachable. <Sysname> ping 1.1.2.2 Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break 56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms 56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms 56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms 56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms 56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms...
  • Page 13: Ping Ipv6

    round-trip min/avg/max/std-dev = 4.685/4.761/4.834/0.058 ms The output shows that: The destination is reachable. • • The route is 1.1.1.1 <-> {1.1.1.2; 1.1.2.1} <-> 1.1.2.2. Table 1 Command output Field Description Test whether the device with IP address 1.1.2.2 is reachable. There are Ping 1.1.2.2 (1.1.2.2): 56 data 56 data bytes in each ICMP echo request.
  • Page 14 Parameters -a source-ipv6: Specifies an IPv6 address of the device as the source IP address of ICMP echo requests. If this option is not specified, the source IPv6 address of ICMP echo requests is the IPv6 address of the outbound interface. (The address selection rule is defined by RFC 3484.) -c count: Specifies the number of ICMPv6 echo requests that are sent to the destination.
  • Page 15 round-trip min/avg/max/std-dev = 4.000/25.000/62.000/20.000 ms # Test whether the IPv6 address (2001::2) is reachable. Only the statistics is displayed. <Sysname> ping ipv6 –q 2001::2 Ping6(56 data bytes) 2001::1 --> 2001::2, press CTRL_C to break --- Ping6 statistics for 2001::2 --- 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 4.000/25.000/62.000/20.000 ms # Test whether the IPv6 address (2001::2) is reachable.
  • Page 16: Tracert

    Field Description round-trip min/avg/max/ std-dev Minimum/average/maximum/standard deviation response time, in =4.000/25.000/62.000/20.000 milliseconds. tracert Use tracert to trace the path the packets traverse from source to destination. Syntax tracert [ -a source-ip | -f first-ttl | -m max-ttl | -p port | -q packet-number | -t tos | -vpn-instance vpn-instance-name | -w timeout ] * host Views Any view...
  • Page 17 ICMP error message (this can be because the destination is unreachable or sending ICMP timeout/destination unreachable packets is disabled). To abort the tracert operation during the execution of the command, press Ctrl+C. Examples # Display the path that the packets traverse from source to destination (1.1.2.2). <Sysname>...
  • Page 18: Tracert Ipv6

    tracert ipv6 Use tracert ipv6 to display the path that the IPv6 packets traverse from source to destination. Syntax tracert ipv6 [ -f first-hop | -m max-hops | -p port | -q packet-number | -t traffic-class | -vpn-instance vpn-instance-name | -w timeout ] * host Views Any view Predefined user roles...
  • Page 19 traceroute to 2001:3::2(2001:3::2), 30 hops at most, 60 byte packets, press CTRL_C to break 2001:1::2 0.661 ms 0.618 ms 0.579 ms 2001:2::2 0.861 ms 0.718 ms 0.679 ms 2001:3::2 0.822 ms 0.731 ms 0.708 ms Table 4 Command output Field Description Display the route that the IPv6 packets traverse from the current device to traceroute to 2001:3::2...
  • Page 20: Nqa Commands

    NQA commands NQA client commands advantage-factor Use advantage-factor to configure the advantage factor that is used to count Mean Opinion Scores (MOS) and Calculated Planning Impairment Factor (ICPIF) values. Use undo advantage-factor to restore the default. Syntax advantage-factor factor undo advantage-factor Default The advantage factor is 0.
  • Page 21: Data-Fill

    Syntax codec-type { g71 1a | g71 1u | g729a } undo codec-type Default The codec type for the voice operation is G.71 1 A-law. Views Voice operation view Predefined user roles network-admin mdc-admin Parameters g71 1a: Specifies G.71 1 A-law codec type. g71 1u: Specifies G.71 1 μ-law codec type g729a: Specifies G.729 A-law codec type.
  • Page 22: Data-Size

    Usage guidelines If the payload length is smaller than the string length, only the first part of the string is filled. For example, if you configure the string as abcd and the payload size as 3 bytes, abc is filled. If the payload length is greater than the string length, the system fills the payload with the string cyclically until the payload is full.
  • Page 23: Description (Any Nqa Operation Type View)

    Operation type Codec type Default size (bytes) UDP jitter Path jitter Voice G.711 A-law Voice G.711 μ-law Voice G.729 A-law Views ICMP echo operation view, path jitter operation view, UDP echo operation view, UDP jitter operation view, voice operation view, ICMP template view Predefined user roles network-admin mdc-admin...
  • Page 24: Destination Ip

    Predefined user roles network-admin mdc-admin Parameters text: Specifies a case-sensitive string of 1 to 200 characters. Examples # Configure the description for an NQA operation as icmp-probe. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] description icmp-probe # In ICMP template view, configure the description for an NQA operation as icmp-probe.
  • Page 25: Destination Ipv6

    # In ICMP template view, configure the destination IP address for the ICMP echo operation as 10.1.1.1. <Sysname> system-view [Sysname] nqa template icmp icmptplt [Sysname-nqatplt-icmp-icmptplt] destination ip 10.1.1.1 destination ipv6 Use destination ipv6 to configure the destination IPv6 address for the operation. Use undo destination ipv6 to remove the destination IPv6 address.
  • Page 26: Display Nqa History

    Predefined user roles network-admin mdc-admin Parameters port-number: Specifies the destination port number for the operation, in the range of 1 to 65535. Examples # Configure the destination port number for the UDP echo operation as 9000. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-echo [Sysname-nqa-admin-test-udp-echo] destination port 9000 # In TCP template view, configure the destination port number for the UDP echo operation as 9000.
  • Page 27: Display Nqa Reaction Counters

    <Sysname> display nqa history administrator test NQA entry (admin administrator, tag test) history records: Index Response Status Time Succeeded 2011-04-29 20:54:26.5 Succeeded 2011-04-29 20:54:26.2 Succeeded 2011-04-29 20:54:25.8 Succeeded 2011-04-29 20:54:25.5 Succeeded 2011-04-29 20:54:25.1 Succeeded 2011-04-29 20:54:24.8 Succeeded 2011-04-29 20:54:24.5 Succeeded 2011-04-29 20:54:24.1 Succeeded 2011-04-29 20:54:23.8...
  • Page 28 case-insensitive string of 1 to 32 characters that cannot contain hyphens (-). If these two arguments are not specified, the command displays the current monitoring results of reaction entries for all NQA operations. item-number: Specifies a reaction entry by its ID, in the range of 1 to 10. If no reaction entry is provided, the results of all reaction entries are displayed.
  • Page 29: Display Nqa Result

    Monitored Threshold performance Collect data in Checked Num Over-threshold Num type metric Probes after the Number of consecutive Number of probe failures. operation starts. completed probes. Packets sent after Number of packets with Number of sent accumulate the operation round-trip time exceeding packets.
  • Page 30 Examples # Display the most recent result of the TCP operation with the administrator name administrator and the operation tag test. <Sysname> display nqa result admin test NQA entry (admin admin, tag test) test results: Send operation times: 1 Receive response times: 1 Min/Max/Average round trip time: 35/35/35 Square-Sum of round trip time: 1225 Last succeeded probe time: 2011-05-29 10:50:33.2...
  • Page 31 Sum of SD delay: 125 Sum of DS delay: 132 Square-Sum of SD delay: 1805 Square-Sum of DS delay: 1988 SD lost packets: 0 DS lost packets: 0 Lost packets for unknown reason: 0 # Display the most recent result of the voice operation. <Sysname>...
  • Page 32 Receive response times: 10 Min/Max/Average round trip time: 1/1/1 Square-Sum of round trip time: 10 Extended Results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0 Packets arrived late: 0 Path-Jitter Results: Jitter number: 9...
  • Page 33 Field Description Square-Sum of round trip time Square sum of round-trip time. Time when the last successful probe was completed. If no probes are successful in an operation, the field displays 0. Last succeeded probe time This field is not available for UDP jitter, path jitter, and voice operations.
  • Page 34 Field Description Maximum absolute value among negative jitters from destination to Max negative DS source. Negative SD number Number of negative jitters from source to destination. Negative DS number Number of negative jitters from destination to source. Negative SD sum Sum of absolute values of negative jitters from source to destination.
  • Page 35: Display Nqa Statistics

    Field Description Sum/square sum of the positive jitter, available only in the path jitter Sum/Square-Sum positive jitter operation. Negative jitter number Number of negative jitter, available only in the path jitter operation. Minimum/maximum/average negative jitter in milliseconds, Min/Max/Average negative jitter available only in the path jitter operation.
  • Page 36 Send operation times: 1 Receive response times: 1 Min/Max/Average round trip time: 13/13/13 Square-Sum of round trip time: 169 Extended results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to disconnect: 0 Failures due to no connection: 0 Failures due to internal error: 0 Failures due to other errors: 0 # Display the statistics for the UDP jitter operation.
  • Page 37 Reaction statistics: Index Checked Element Threshold Type Checked Num Over-threshold Num jitter-DS accumulate jitter-SD average OWD-DS OWD-SD packet-loss accumulate accumulate # Display the statistics for the voice operation. <Sysname> display nqa statistics admin test NQA entry (admin admin, tag test) test statistics: NO.
  • Page 38 Max ICPIF value: 0 Min ICPIF value: 0 Reaction statistics: Index Checked Element Threshold Type Checked Num Over-threshold Num ICPIF # Display the statistics for the path jitter operation. <Sysname> display nqa statistics admin test NQA entry (admin admin, tag test) test statistics: NO.
  • Page 39 Positive jitter number: 0 Min/Max/Average positive jitter: 0/0/0 Sum/Square-Sum positive jitter: 0/0 Negative jitter number: 0 Min/Max/Average negative jitter: 0/0/0 Sum/Square-Sum negative jitter: 0/0 Table 10 Command output Field Description Statistics group ID. Start time Time when the operation started. Life time Duration of the operation in seconds.
  • Page 40 Field Description Positive SD square-sum Square sum of positive jitters from source to destination. Positive DS square-sum Square sum of positive jitters from destination to source. Minimum absolute value among negative jitters from source to Min negative SD destination. Minimum absolute value among negative jitters from destination Min negative DS to source.
  • Page 41 Field Description Max MOS value Maximum MOS value. Min MOS value Minimum MOS value. Max ICPIF value Maximum ICPIF value. Min ICPIF value Minimum ICPIF value. Reaction statistics Statistics about the reaction entry in the counting interval. Index ID of a reaction entry. Checked Element Monitored element.
  • Page 42: Expect Data

    Monitored Threshold performance Collect data in Checked Num Over-threshold Num type metric Number of probes of Probes in the Number of which the duration consecutive counting interval. completed probes. exceeds the threshold. Probes in the Number of accumulate Number of probe failures. counting interval.
  • Page 43: Expect Status

    mdc-admin Parameters expression: Specifies the expected data, a case-sensitive string of 1 to 200 characters. offset number: Specifies the offset between the expected data and the actual data. The value range for the number argument is 0 to 1000, and the default value is 0. Usage guidelines After you configure the expected data for the NQA operation, the NQA client checks the data in the received response.
  • Page 44: Expect Ip

    Examples # In HTTP template view, configure the expected status codes 200, 300, and 400 to 500. <Sysname> system-view [Sysname] nqa template http httptplt [Sysname-nqatplt-http-httptplt] expect status 200 300 400 to 500 expect ip Use expect ip to specify the expected IP address. Use undo expect ip to remove all expected IP addresses.
  • Page 45: Filename

    Views DNS template view Predefined user roles network-admin mdc-admin Parameters ip-address: Specifies the expected IPv6 address for a DNS echo request. Usage guidelines During a DNS operation, the NQA client compares the expected IPv6 address with the IPv6 address resolved by the DNS server. If they are the same, it considers the DNS server legal. Examples # In DNS template view, configure the expected IPv6 address as 1::1.
  • Page 46: Frequency

    # In FTP template view, specify the file to be transferred between the FTP server and the FTP client as config.txt. <Sysname> system-view [Sysname] nqa template ftp ftptplt [Sysname-nqatplt-ftp-ftptplt] filename config.txt frequency Use frequency to specify the interval at which the NQA operation repeats. Use undo frequency to restore the default.
  • Page 47: History-Record Enable

    history-record enable Use history-record enable to enable the saving of history records for the NQA operation. Use undo history-record enable to disable the saving of history records. Syntax history-record enable undo history-record enable Default The saving of history records is disabled for the NQA operation. Views DHCP operation view, DLSw operation view, DNS operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation view, UDP echo operation view...
  • Page 48: History-Record Number

    Views DHCP operation view, DLSw operation view, DNS operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation view, UDP echo operation view Predefined user roles network-admin mdc-admin Parameters keep-time: Specifies how long the history records can be saved. The value is in the range of 1 to 1440 minutes.
  • Page 49: Lsr-Path

    Usage guidelines If the number of history records for an NQA operation exceeds the maximum number, earliest history records are removed. Examples # Set the maximum number of history records for an NQA operation to 10. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] history-record number 10 lsr-path...
  • Page 50: Next-Hop

    Use undo mode to restore the default. Syntax mode { active | passive } undo mode Default The data transmission mode of active is used by the FTP operation. Views FTP operation view, FTP template view Predefined user roles network-admin mdc-admin Parameters active: Sets the data transmission mode to active.
  • Page 51: Nqa

    Parameters ip-address: Specifies the IP address of the next hop. Examples # Specify the next hop IP address as 10.1.1.1 for the ICMP echo operation. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] next-hop 10.1.1.1 Use nqa to create an NQA operation and enter its view. Use undo nqa to remove the operation.
  • Page 52: Nqa Template

    nqa template Use nqa template to create an NQA template and enter its view. Use undo nqa template to remove the NQA template. Syntax nqa template { dns | ftp | http | icmp | tcp } name undo nqa template { dns | ftp | http | icmp | tcp } name Default No NQA template is created.
  • Page 53: Nqa Schedule

    <Sysname> system-view [Sysname] nqa agent enable Related commands nqa server enable nqa schedule Use nqa schedule to configure the scheduling parameters for an NQA operation. Use undo nqa schedule to stop the operation. Syntax nqa schedule admin-name operation-tag start-time { hh:mm:ss [ yyyy/mm/dd | mm/dd/yyyy ] | now } lifetime { lifetime | forever } [ recurring ] undo nqa schedule admin-name operation-tag Default...
  • Page 54: Operation (Ftp Operation View)

    Examples # Schedule the operation with the administrator name admin and operation tag test to start on 08:08:08 2008/08/08 and last 1000 seconds. <Sysname> system-view [Sysname] nqa schedule admin test start-time 08:08:08 2008/08/08 lifetime 1000 recurring Related commands destination ip •...
  • Page 55: Operation (Http Operation View)

    # In FTP template view, specify the operation type for the FTP operation as put. <Sysname> system-view [Sysname] nqa template ftp ftptplt [Sysname-nqatplt-ftp-ftptplt] operation put operation (HTTP operation view) Use operation to specify the operation type for the HTTP operation. Use undo operation to restore the default.
  • Page 56: Probe Count

    Use undo password to remove the configuration. Syntax password { cipher | simple } password undo password Default No FTP or HTTP login password is configured. Views FTP operation view, HTTP operation view, FTP template view, HTTP template view Predefined user roles network-admin mdc-admin Parameters...
  • Page 57 Syntax probe count times undo probe count Default An operation performs one probe. Views DHCP operation view, DNS operation view, DLSw operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation, UDP echo operation view Predefined user roles network-admin mdc-admin...
  • Page 58: Probe Packet-Interval

    probe packet-interval Use probe packet-interval to configure the interval for sending packets in the probe. Use undo probe packet-interval to restore the default. Syntax probe packet-interval packet-interval undo probe packet-interval Default The interval is 20 milliseconds. Views Path jitter operation view, UDP jitter operation view, voice operation view Predefined user roles network-admin mdc-admin...
  • Page 59: Probe Packet-Timeout

    Parameters packet-number: Specifies the number of packets to be sent per probe. Available ranges: 10 to 1000 for the UDP jitter or path jitter operation. • • 10 to 60000 for the voice operation. Examples # Configure the UDP jitter probe to send 100 packets. <Sysname>...
  • Page 60: Raw-Request

    Syntax probe timeout timeout undo probe timeout Default The timeout time of a probe is 3000 milliseconds. Views DHCP operation view, DNS operation view, DLSw operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation view, UDP echo operation view, any NQA template view Predefined user roles network-admin...
  • Page 61: Reaction Checked-Element Icpif

    Predefined user roles network-admin mdc-admin Usage guidelines This command places you in raw request view and deletes the content of the previously configured GET request. Examples # Enter raw request view and specify the content of a request for the HTTP operation. <Sysname>...
  • Page 62: Reaction Checked-Element { Jitter-Ds | Jitter-Sd

    lower-threshold: Specifies the lower limit in the range of 1 to 100. It must not be greater than the upper limit. action-type: Specifies what action to be triggered. The default action is none. none: Specifies the action of only displaying results on the terminal display. trap-only: Specifies the action of displaying results on the terminal display and meanwhile sending SNMP trap messages to the NMS.
  • Page 63 jitter-ds: Specifies the destination-to-source jitter of each probe packet as the monitored element (or performance metric). jitter-sd: Specifies source-to-destination jitter of each probe packet as the monitored element. threshold-type: Specifies a threshold type. accumulate accumulate-occurrences: Checks the total number of threshold violations in the operation. The value is in the range of 1 to 14999 for the UDP jitter operation, and 1 to 59999 for the voice operation.
  • Page 64: Reaction Checked-Element Mos

    reaction checked-element mos Use reaction checked-element mos to configure a reaction entry for monitoring the MOS value in the voice operation. Use undo reaction to delete the specified reaction entry. Syntax reaction item-number checked-element threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number Default No reaction entry for monitoring the MOS value is configured.
  • Page 65: Reaction Checked-Element { Owd-Ds | Owd-Sd

    [Sysname-nqa-admin-test] type voice [Sysname-nqa-admin-test-voice] reaction 1 checked-element mos threshold-value 200 100 action-type trap-only reaction checked-element { owd-ds | owd-sd } Use reaction checked-element { owd-ds | owd-sd } to configure a reaction entry for monitoring the one-way delay. Use undo reaction to delete the specified reaction entry. Syntax reaction item-number checked-element { owd-ds | owd-sd } threshold-value upper-threshold lower-threshold...
  • Page 66: Reaction Checked-Element Packet-Loss

    over-threshold. If it is below the lower limit, the state is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element owd-ds threshold-value 50 reaction checked-element packet-loss Use reaction checked-element packet-loss to configure a reaction entry for monitoring packet loss in UDP...
  • Page 67: Reaction Checked-Element Probe-Duration

    reaction entry is set to over-threshold. Otherwise, the state is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element packet-loss threshold-type accumulate 100 action-type trap-only reaction checked-element probe-duration...
  • Page 68: Reaction Checked-Element Probe-Fail (For Trap)

    trap-only: Specifies the action of displaying results on the terminal display and meanwhile sending SNMP trap messages to the NMS. This keyword is not available for the DNS operation. Usage guidelines You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use undo reaction to delete the entry first and reconfigure a new one.
  • Page 69 Use undo reaction to delete the specified reaction entry. Syntax reaction item-number checked-element probe-fail threshold-type { accumulate accumulate-occurrences | consecutive consecutive-occurrences } [ action-type { none | trap-only } ] undo reaction item-number Default No reaction entry for monitoring probe failures is configured. Views DHCP operation view, DLSw operation view, DNS operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation view, UDP echo operation view...
  • Page 70: Reaction Checked-Element Probe-Fail (For Trigger)

    of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction 2 checked-element probe-fail threshold-type consecutive 10 action-type trap-only reaction checked-element probe-fail (for trigger) Use reaction checked-element probe-fail to configure a reaction entry for monitoring probe failures.
  • Page 71: Reaction Checked-Element Rtt

    Related commands Track (High Availability Command Reference) reaction checked-element rtt Use reaction checked-element rtt to configure a reaction entry for monitoring packet round-trip time. Use undo reaction to delete the specified reaction entry. Syntax reaction item-number checked-element rtt threshold-type { accumulate accumulate-occurrences | average } threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number Default...
  • Page 72: Reaction Trap

    Examples # Create reaction entry 1 for monitoring the average round-trip time of UDP jitter probe packets, setting the upper limit to 50 milliseconds and lower limit to 5 milliseconds. Before the NQA operation starts, the initial state of the reaction entry is invalid. After the operation, the average packet round-trip time is checked.
  • Page 73: Reaction Trigger Probe-Fail

    consecutive-probe-failures is in the range of 1 to 15. The system counts the number of consecutive probe failures for each operation, so multiple traps might be sent. test-complete: Sends a trap to indicate that the operation is completed. test-failure cumulate-probe-failures: Sends a trap if the total number of probe failures in an operation is greater than or equal to cumulate-probe-failures.
  • Page 74: Reaction Trigger Probe-Pass

    [Sysname-nqatplt-http-httptplt] reaction trigger probe-fail 5 reaction trigger probe-pass Use reaction trigger probe-pass to configure the number of consecutive successful probes that lead to a successful operation. Use undo reaction trigger probe-fail to restore the default. Syntax reaction trigger probe-pass count undo reaction trigger probe-pass Default When the number of consecutive successful probes reaches 3, the operation succeeds.
  • Page 75: Resolve-Type

    Predefined user roles network-admin mdc-admin Parameters domain-name: Specifies the domain name to be resolved. It is a dot-separated case-insensitive string of 1 to 255 characters including letters, digits, and hyphens (-) , and underscores (_) (for example, aabbcc.com). Each part consists of 1 to 63 characters. Consecutive dots (.) are not allowed. Examples # Set the domain name domain1 to be resolved.
  • Page 76: Route-Option Bypass-Route

    [Sysname-nqatplt-dns-dnstplt] resolve-type AAAA route-option bypass-route Use route-option bypass-route to enable the routing table bypass function to test the connectivity to the direct destination. Use undo route-option bypass-route to disable the routing table bypass function. Syntax route-option bypass-route undo route-option bypass-route Default The routing table bypass function is disabled.
  • Page 77: Source Ip

    Views ICMP echo operation view, ICMP template view Predefined user roles network-admin mdc-admin Parameters interface-type interface-number: Specifies an interface by its type and number. Usage guidelines If you configure both the source interface command and the source ip command, the most recent configuration takes effect.
  • Page 78: Source Ipv6

    Predefined user roles network-admin mdc-admin Parameters ip-address: Specifies the source IP address of the operation. Usage guidelines If you configure both the source interface command and the source ip command for an ICMP echo operation, the most recent configuration takes effect. The specified source IP address must be the IP address of a local interface.
  • Page 79: Source Port

    Parameters ipv6-address: Specifies the source IPv6 address of the operation. IPv6 link-local addresses are not supported. Usage guidelines If you configure both the source interface command and the source ipv6 command for an ICMP echo operation, the most recent configuration takes effect. The specified source IPv6 address must be the IPv6 address of a local interface.
  • Page 80: Statistics Hold-Time

    [Sysname-nqa-admin-test-udp-echo] source port 8000 # In DNS template view, configure port 8000 as the source port for probe packets in the DNS operation. <Sysname> system-view [Sysname] nqa template dns dnstplt [Sysname-nqatplt-dns-dnstplt] source port 8000 statistics hold-time Use statistics hold-time to configure the hold time of statistics groups for an NQA operation. Use undo statistics hold-time to restore the default.
  • Page 81: Statistics Max-Group

    Views Any operation view Predefined user roles network-admin mdc-admin Parameters interval: Specifies the interval in minutes, in the range of 1 to 35791394. Usage guidelines NQA collects statistics for operations completed within a specific period. The statistics form a statistics group.
  • Page 82: Target-Only

    <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] statistics max-group 5 target-only Use target-only to perform the path jitter operation on destination only. Use undo target-only to restore the default. Syntax target-only undo target-only Default NQA performs the path jitter operation to the destination hop by hop. Views Path jitter operation view Predefined user roles...
  • Page 83: Ttl

    Parameters value: Specifies the ToS value in the IP packet header, in the range of 0 to 255. Examples # Configure the ToS value in an IP packet header of probe packets as 1. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] tos 1 # In ICMP template view, configure the ToS value in an IP packet header of probe packets as 1.
  • Page 84: Type

    <Sysname> system-view [Sysname] nqa template icmp icmptplt [Sysname-nqatplt-icmp-icmptplt] ttl 16 type Use type to specify the operation type of the NQA operation and enter operation type view. Syntax type { dhcp | dlsw | dns | ftp | http | icmp-echo | path-jitter | snmp | tcp | udp-echo | udp-jitter | voice } Default No operation type is specified.
  • Page 85: Url

    Use url to specify the URL of the destination HTTP or FTP server. Use undo url to remove the URL. Syntax url url undo url Views FTP operation view, HTTP operation view, FTP template view, HTTP template view Predefined user roles network-admin mdc-admin Parameters...
  • Page 86: Version

    Syntax username username undo username Default No FTP or HTTP login username is configured. Views FTP operation view, HTTP operation view, FTP template view, HTTP template view Predefined user roles network-admin mdc-admin Parameters username: Specifies the username string. It is a case-sensitive string of 1 to 32 characters. Valid characters include letters, digits, exclamation marks (!), dollar signs ($), asterisks (*), brackets (()), underscores (_), quotation marks ('), commas (,), dots (.), and hyphens (-).
  • Page 87: Vpn-Instance

    Predefined user roles network-admin mdc-admin Parameters v1.0: Uses HTTP version 1.0. v1.1: Uses HTTP version 1.1. Examples # Configure the HTTP operation to use the HTTP version 1.1. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] version v1.1 vpn-instance Use vpn-instance to apply the operation to the specified VPN.
  • Page 88: Nqa Server Commands

    [Sysname] nqa template ftp ftptplt [Sysname-nqatplt-ftp-ftptplt] vpn-instance vpn1 NQA server commands IMPORTANT: Configure the NQA server only for UDP jitter, TCP, UDP echo, and voice operations. display nqa server Use display nqa server status to display NQA server status. Syntax display nqa server Views Any view...
  • Page 89: Nqa Server Enable

    nqa server enable Use nqa server enable to enable the NQA server. Use undo nqa server enable to disable the NQA server. Syntax nqa server enable undo nqa server enable Default The NQA server is disabled. Views System view Predefined user roles network-admin mdc-admin Examples...
  • Page 90: Nqa Server Udp-Echo

    mdc-admin Parameters ip-address: Specifies the IP address for the TCP listening service. port-number: Specifies the port number for the TCP listening service, in the range of 1 to 65535. tos: Specifies the ToS value in the IP packet header of NQA probe packets. The value range is 0 to 255 and the default value is 0.
  • Page 91 Parameters ip-address: Specifies the IP address for the UDP listening service. port-number: Specifies the port number for the UDP listening service, in the range of 1 to 65535. tos: Specifies the ToS value in the IP packet header of NQA probe packets. The value range is 0 to 255 and the default value is 0.
  • Page 92: Ntp Commands

    NTP commands display ntp-service sessions Use display ntp-service sessions to display information about all IPv4 NTP associations. Syntax display ntp-service sessions [ verbose ] Views Any view Predefined user roles network-admin network-operator mdc-admin mdc-operator Parameters verbose: Displays detailed information about all IPv4 NTP associations. If you do not specify this keyword, the command displays only brief information about the NTP associations.
  • Page 93 Field Description Reference clock ID of the NTP server: • If the reference clock is the local clock, the value of this field is related to the value of the stra field: When the value of the stra field is 0 or 1, this field displays LOCL. reference When the stra field has another value, this field displays the IP address of the local clock.
  • Page 94 Reachabilities:31, sync distance: 0.0194 Precision: 2^18, version: 3, source interface: Not specified Reftime: d17cbba5.1473de1e Tue, May 17 2011 9:17:25.079 Orgtime: 00000000.00000000 Thu, Feb 7 2036 6:28:16.000 Rcvtime: d17cbbc0.b1959a30 Tue, May 17 2011 9:17:52.693 Xmttime: d17cbbc0.b1959a30 Tue, May 17 2011 9:17:52.693 Roundtrip delay samples: 0.007 0.010 0.006 0.011 0.010 0.005 0.007 0.003 Offset samples: 5629.55 3913.76 5247.27 6526.92 31.99 148.72 38.27 0.29 Filter order: 7...
  • Page 95 Field Description VPN instance to which the NTP server belongs. If the NTP server is VPN instance in a public network, the field displays Not specified. Operation mode of the local device: • unspec—The mode is unspecified. • active—Active mode. •...
  • Page 96: Display Ntp-Service Status

    Field Description Orgtime Originate timestamp in the NTP message. Rcvtime Receive timestamp in the NTP message. Xmttime Transmit timestamp in the NTP message. Filter order Sample information order. Status of the local clock. The field is displayed only when you use the ntp-service refclock-master command to set the local clock as a reference clock.
  • Page 97 Clock status: unsynchronized Clock stratum: 16 Reference clock ID: none Clock jitter: 0.000000 s Stability: 0.000 pps Clock precision: 2^-10 Root delay: 0.00000 ms Root dispersion: 0.00002 ms Reference time: d0c5fc32.92c70b1e Wed, Dec 29 2010 18:28:02.573 Table 15 Command output Field Description Status of the system clock:...
  • Page 98: Display Ntp-Service Trace

    Field Description Roundtrip delay from the local device to the primary reference Root delay source, in milliseconds. Maximum error of the system clock relative to the primary Root dispersion reference source, in milliseconds. Reference time Reference timestamp. display ntp-service trace Use display ntp-service trace to display brief information about each NTP server from the local device back to the primary reference source.
  • Page 99: Ntp-Service Acl

    Field Description Identifier of the primary reference source. When the stratum level of the primary RefID reference clock is 0, it is displayed as Local. Otherwise, it is displayed as the IP address of the primary reference clock. ntp-service acl Use ntp-service acl to configure the access-control right for peer devices to access NTP services of the local device.
  • Page 100: Ntp-Service Authentication Enable

    The ntp-service acl command provides minimal security for a system running NTP. A more secure method is NTP authentication. Examples # Configure the peer devices on subnet 10.10.0.0/16 to have full access to the local device. <Sysname> system-view [Sysname] acl number 2001 [Sysname-acl-basic-2001] rule permit source 10.10.0.0 0.0.255.255 [Sysname-acl-basic-2001] quit [Sysname] ntp-service access peer acl 2001...
  • Page 101: Ntp-Service Authentication-Keyid

    ntp-service authentication-keyid Use ntp-service authentication-keyid to set an NTP authentication key. Use undo ntp-service authentication-keyid to remove the NTP authentication key. Syntax ntp-service authentication-keyid keyid authentication-mode md5 { cipher | simple } value undo ntp-service authentication-keyid keyed Default No NTP authentication key is set. Views System view Predefined user roles...
  • Page 102: Ntp-Service Broadcast-Client

    ntp-service broadcast-client Use ntp-service broadcast-client to configure the device to operate in NTP broadcast client mode and use the current interface to receive NTP broadcast packets. Use undo ntp-service broadcast-client to remove the configuration. Syntax ntp-service broadcast-client undo ntp-service broadcast-client Default The device does not operate in any NTP association mode.
  • Page 103: Ntp-Service Dscp

    Views Interface view Predefined user roles network-admin mdc-admin Parameters authentication-keyid keyid: Specifies the key ID to be used for sending broadcast messages to broadcast clients, where keyid is in the range of 1 to 4294967295. If this option is not specified, the local device cannot synchronize broadcast clients enabled with NTP authentication.
  • Page 104: Ntp-Service Enable

    Parameters dscp-value: Sets a DSCP value in the range of 0 to 63 for IPv4 NTP packets. Usage guidelines The DSCP value is included in the ToS field of an IPv4 packet to identify the packet priority. Examples # Set the DSCP value for IPv4 NTP packets to 30. <Sysname>...
  • Page 105: Ntp-Service Max-Dynamic-Sessions

    Predefined user roles network-admin mdc-admin Usage guidelines To disable an interface on the device from synchronizing the peer device in the corresponding subnet or disable the device from being synchronized by the peer device in the subnet corresponding to an interface, execute the command on the interface.
  • Page 106: Ntp-Service Multicast-Client

    Related commands display ntp-service sessions ntp-service multicast-client Use ntp-service multicast-client to configure the device to operate in NTP multicast client mode and use the current interface to receive NTP multicast packets. Use undo ntp-service multicast-client to remove the configuration. Syntax ntp-service multicast-client [ ip-address ] undo ntp-service multicast-client [ ip-address ] Default...
  • Page 107: Ntp-Service Refclock-Master

    Syntax ntp-service multicast-server [ ip-address ] [ authentication-keyid keyid | ttl ttl-number | version number ] undo ntp-service multicast-server [ ip-address ] Default The device does not operate in any NTP association mode. Views Interface view Predefined user roles network-admin mdc-admin Parameters ip-address: Specifies a multicast IP address in the range of 224.0.1.1 to 224.0.1.255.
  • Page 108: Ntp-Service Reliable Authentication-Keyid

    Use this command with caution to avoid time errors. Before you execute the command, HP recommends that you adjust the local system time.
  • Page 109: Ntp-Service Source

    Default No trust key is specified. Views System view Predefined user roles network-admin mdc-admin Parameters keyid: Specifies an authentication key number in the range of 1 to 4294967295. Usage guidelines When NTP authentication is enabled, a client can be synchronized only to a server that can provide a trusted authentication key.
  • Page 110: Ntp-Service Unicast-Peer

    Views System view Predefined user roles network-admin mdc-admin Parameters interface-type interface-number: Specifies an interface by its type and number. Usage guidelines If you specify the source interface for NTP messages, the device sets the source IP address of the NTP messages as the primary IP address of the specified interface when sending the NTP messages.
  • Page 111 Predefined user roles network-admin mdc-admin Parameters peer-name: Specifies the host name of the symmetric-passive peer, a case-insensitive string of 1 to 253 characters. ip-address: Specifies an IP address of the symmetric-passive peer. It must be a unicast address, rather than a broadcast address, a multicast address or the IP address of the local clock. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the symmetric-passive peer belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters.
  • Page 112: Ntp-Service Unicast-Server

    ntp-service unicast-server Use ntp-service unicast-server to specify an NTP server for the device. Use undo ntp-service unicast-server to remove an NTP server specified for the device. Syntax ntp-service unicast-server { server-name | ip-address } [ vpn-instance vpn-instance-name ] [ authentication-keyid keyid | priority | source interface-type interface-number | version number ] * undo ntp-service unicast-server { server-name | ip-address } [ vpn-instance vpn-instance-name ] Default No NTP server is specified for the device.
  • Page 113 Examples # Specify NTP server 10.1.1.1 for the device, and configure the device to run NTP version 4. <Sysname> system-view [Sysname] ntp-service unicast-server 10.1.1.1 version 4 Related commands ntp-service authentication enable • ntp-service authentication-keyid • ntp-service reliable authentication-keyid •...
  • Page 114: Sntp Commands

    SNTP commands display sntp sessions Use display sntp sessions to display information about all SNTP associations. Syntax display sntp sessions Views Any view Predefined user roles network-admin network-operator mdc-admin mdc-operator Examples # Display information about all SNTP associations. <Sysname> display sntp sessions SNTP server Stratum Version...
  • Page 115: Sntp Authentication-Keyid

    Default SNTP authentication is disabled. Views System view Predefined user roles network-admin mdc-admin Usage guidelines You need to enable SNTP authentication in networks that require time synchronization security to make sure SNTP clients are only synchronized to authenticated NTP servers. To authenticate an NTP server, set an authentication key and specify it as a trusted key.
  • Page 116: Sntp Enable

    value: Specifies the MD5 authentication key string. If simple is specified, it is a string of 1 to 32 characters. If cipher is specified, it is a string of 1 to 73 characters. Usage guidelines You need to enable SNTP authentication in networks that require time synchronization security to make sure SNTP clients are only synchronized to authenticated NTP servers.
  • Page 117: Sntp Reliable Authentication-Keyid

    sntp reliable authentication-keyid Use sntp reliable authentication-keyid to specify the created authentication key as a trusted key. Use undo sntp reliable authentication-keyid to remove the specified trusted key. Syntax sntp reliable authentication-keyid keyid undo sntp reliable authentication-keyid keyid Default No trust key is specified. Views System view Predefined user roles...
  • Page 118 Syntax sntp unicast-server server-name ip-address vpn-instance vpn-instance-name [ authentication-keyid keyid | source interface-type interface-number | version number ] * undo sntp unicast-server { server-name | ip-address } [ vpn-instance vpn-instance-name ] Default No NTP server is specified for the device. Views System view Predefined user roles...
  • Page 119 sntp authentication-keyid • • sntp reliable authentication-keyid...
  • Page 120: Snmp Commands

    SNMP commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. The SNMP agent sends notifications (traps and informs) to inform the NMS of significant events, such as link state changes and user logins or logouts.
  • Page 121: Display Snmp-Agent Context

    Community name: bb Group name: bb Storage-type: nonVolatile Community name: userv1 Group name: testv1 Storage-type: nonVolatile Table 18 Command output Field Description Displays the community name created by using the snmp-agent community command Community name or the username created by using the snmp-agent usm-user { v1 | v2c } command. SNMP group name.
  • Page 122: Display Snmp-Agent Group

    Views Any view Predefined user roles network-admin network-operator mdc-admin mdc-operator Parameters context-name: Specifies an SNMP context by its name, a case-sensitive string of 1 to 32 characters. If no SNMP context is specified, the command displays all SNMP contexts created on the device. Examples # Display all SNMP contexts created on the device.
  • Page 123: Display Snmp-Agent Local-Engineid

    Group name: groupv3 Security model: v3 noAuthnoPriv Readview: ViewDefault Writeview: <no specified> Notifyview: <no specified> Storage-type: nonVolatile Table 19 Command output Field Description Group name SNMP group name. Security model of the SNMP group: • authPriv—authentication with privacy. • authNoPriv—authentication without privacy. Security model •...
  • Page 124: Display Snmp-Agent Mib-Node

    The local SNMP engine ID uniquely identifies the SNMP engine of the SNMP agent in an SNMP domain. Examples # Display the local engine ID. <Sysname> display snmp-agent local-engineid SNMP local engine ID: 800007DB7F0000013859 Related commands snmp-agent local-engineid display snmp-agent mib-node Use display snmp-agent mib-node to display SNMP MIB node information.
  • Page 125 |-lldpMIB<1.0.8802.1.1.2>(NA) |-lldpNotifications<1.0.8802.1.1.2.0>(NA) |-lldpNotificationPrefix<1.0.8802.1.1.2.0.0>(NA) |-lldpRemTablesChange<1.0.8802.1.1.2.0.0.1>(NA) |-lldpObjects<1.0.8802.1.1.2.1>(NA) |-lldpConfiguration<1.0.8802.1.1.2.1.1>(NA) |-*lldpMessageTxInterval<1.0.8802.1.1.2.1.1.1>(RW) |-*lldpMessageTxHoldMultiplier<1.0.8802.1.1.2.1.1.2>(RW) |-*lldpReinitDelay<1.0.8802.1.1.2.1.1.3>(RW) Table 20 Command output Field Description -std MIB node name. <1.0> OID of a MIB node. Permissions to MIB nodes: NA—Not accessible. NF—Supports notifications. (NA) RO—Supports read-only access. RW—Supports read and write access. RC—Supports read-write-create access.
  • Page 126 |-*lldpPortConfigTLVsTxEnable(4)(lldpConfigManAddrPortsTxEnable) Table 21 Command output Field Description -std MIB node name. Last bit of a MIB OID string. (lldpMessageTxInterval) Name of a leaf node. Leaf node or MIB table node. # Display MIB table names, and node names and OIDs of MIB index nodes. <Sysname>...
  • Page 127 ||||1.0.8802.1.1.2.1.2.2 Name |||lldpStatsRemTablesDeletes ||||1.0.8802.1.1.2.1.2.3 Name |||lldpStatsRemTablesDrops ||||1.0.8802.1.1.2.1.2.4 Name |||lldpStatsRemTablesAgeouts ||||1.0.8802.1.1.2.1.2.5 Name |lldpXMedTopologyChangeDetected ||1.0.8802.1.1.2.1.5.4795.0.1 Trap Object Name |||lldpRemChassisIdSubtype ||||1.0.8802.1.1.2.1.4.1.1.4 Name |||lldpRemChassisId ||||1.0.8802.1.1.2.1.4.1.1.5 Name |||lldpXMedRemDeviceClass ||||1.0.8802.1.1.2.1.5.4795.1.3.1.1.3 Name |mplsL3VpnVrfUp ||1.3.6.1.2.1.10.166.11.0.1 Trap Object Name |||mplsL3VpnIfConfRowStatus ||||1.3.6.1.2.1.10.166.11.1.2.1.1.5 Name |||mplsL3VpnVrfOperStatus ||||1.3.6.1.2.1.10.166.11.1.2.2.1.6 Table 23 Command output Field Description Name Name of a MIB notification node.
  • Page 128 Name |lldpPortConfigTable ||1.0.8802.1.1.2.1.1.6 Properties ||NodeType: Table ||AccessType: NA ||DataType: ||MOR: 0x00000000 Parent ||lldpConfiguration First child ||lldpPortConfigEntry Next leaf ||lldpPortConfigPortNum Next sibling ||lldpConfigManAddrTable Name |lldpPortConfigEntry ||1.0.8802.1.1.2.1.1.6.1 Properties ||NodeType: ||AccessType: NA ||DataType: ||MOR: 0x00000000 Parent ||lldpPortConfigTable First child ||lldpPortConfigPortNum Next leaf ||lldpPortConfigPortNum Next sibling Index ||[indexImplied:0, indexLength:1]:...
  • Page 129 Allow ||get/set/getnext Index ||[indexImplied:0, indexLength:1]: Value range ['txOnly', 1] ['rxOnly', 2] ['txAndRx', 3] ['disabled', 4] Table 24 Command output Field Description Name MIB node name. OID of a MIB node. MIB node types: • Table—Table node. • Row—Row node in a MIB table. •...
  • Page 130: Display Snmp-Agent Mib-View

    Field Description Parent Name of a parent node. First child Name of the first leaf node. Next leaf Name of the next leaf node. Next sibling Name of the next sibling node. Operation types allowed: • get/set/getnext—All operations. • Allow get—Get operation.
  • Page 131 Subtree mask: Storage-type: nonVolatile View Type: included View status: active View name: ViewDefault MIB Subtree: snmpUsmMIB Subtree mask: Storage-type: nonVolatile View Type: excluded View status: active View name: ViewDefault MIB Subtree: snmpVacmMIB Subtree mask: Storage-type: nonVolatile View Type: excluded View status: active View name: ViewDefault MIB Subtree: snmpModules.18 Subtree mask:...
  • Page 132: Display Snmp-Agent Remote

    display snmp-agent remote Use display snmp-agent remote to display remote SNMP engine IDs configured by using the snmp-agent remote command. Syntax display snmp-agent remote [ ip-address [ vpn-instance vpn-instance-name ] | ipv6 ipv6-address [ vpn-instance vpn-instance-name ] ] Views Any view Predefined user roles network-admin network-operator...
  • Page 133: Display Snmp-Agent Statistics

    Related commands snmp-agent remote display snmp-agent statistics Use display snmp-agent statistics to display SNMP message statistics. Syntax display snmp-agent statistics Views Any view Predefined user roles network-admin network-operator mdc-admin mdc-operator Examples # Display SNMP message statistics. <Sysname> display snmp-agent statistics 1684 messages delivered to the SNMP entity.
  • Page 134: Display Snmp-Agent Sys-Info

    Field Description Number of messages that had an SNMP messages were for an unsupported version version not configured on the SNMP agent. Number of messages that used an unknown messages used an unknown SNMP community name SNMP community name. messages represented an illegal operation for the community Number of messages carrying an operation supplied that the community has no right to perform.
  • Page 135: Display Snmp-Agent Trap Queue

    Views Any view Predefined user roles network-admin network-operator mdc-admin mdc-operator Parameters contact: Displays the system contact. location: Displays the physical location of the device. version: Displays the SNMP agent version. Usage guidelines If none of the parameters is specified, this command displays all SNMP agent system information. Examples # Display all SNMP agent system information.
  • Page 136: Display Snmp-Agent Trap-List

    Examples # Display the trap queue configuration and usage status. <Sysname> display snmp-agent trap queue Queue size: 100 Message number: 6 Related commands snmp-agent trap life • snmp-agent trap queue-size • display snmp-agent trap-list Use display snmp-agent trap-list to display modules that can generate SNMP notifications and their notification function status (enable or disable).
  • Page 137 mdc-operator Parameters engineid engineid: Displays SNMPv3 user information for the SNMP engine ID identified by engineid. When an SNMPv3 user is created, the system records the local SNMP entity engine ID. The user becomes invalid when the engine ID changes and becomes valid again when the recorded engine ID is restored.
  • Page 138: Enable Snmp Trap Updown

    Field Description SNMP user status: • active—The SNMP user is effective. • notInService—The SNMP user is correctly configured but not activated. • notReady—The SNMP user configuration is incomplete. UserStatus • other—Any other status. SNMP users are active upon their creation at the CLI. To temporarily disable an SNMP user without deleting it, you can perform an SNMP set operation to change its status.
  • Page 139: Snmp-Agent

    [Sysname] snmp-agent trap enable [Sysname] snmp-agent target-host trap address udp-domain 10.1.1.1 params securityname public [Sysname] interface GigabitEthernet 3/0/1 [Sysname-GigabitEthernet3/0/1] enable snmp trap updown Related commands snmp-agent target-host • snmp-agent trap enable • snmp-agent Use snmp-agent to enable the SNMP agent. Use undo snmp-agent to disable the SNMP agent.
  • Page 140: Snmp-Agent Community

    snmp-agent calculate-password plain-password mode sha { local-engineid | specified-engineid engineid } Views System view Predefined user roles network-admin mdc-admin Parameters plain-password: Specifies a plaintext authentication or privacy key. mode: Specifies the same authentication mode as configured in the snmp-agent usm-user v3 command. MD5 is faster than SHA- 1 , while SHA- 1 provides higher security than MD5.
  • Page 141 Syntax snmp-agent community { read | write } [ simple | cipher ] community-name [ mib-view view-name ] [ acl acl-number | acl ipv6 ipv6-acl-number ] * undo snmp-agent community { read | write } [ cipher ] community-name Default No SNMP community exists.
  • Page 142: Snmp-Agent Community-Map

    An SNMPv1 or SNMPv2c community comprises a set of NMSs and SNMP agents, and is identified by a community name. An NMS and an SNMP agent must use the same community name to authenticate to each other. Typically, public is used as the read-only community name and private is used as the read and write community name.
  • Page 143: Snmp-Agent Context

    Views System view Predefined user roles network-admin mdc-admin Parameters community-name: Specifies an SNMP community, a case-sensitive string of 1 to 32 characters. context-name: Specifies an SNMP context, a case-sensitive string of 1 to 32 characters. Usage guidelines This command enables a module on an agent to obtain the context mapped to a community name when an NMS accesses the agent by using SNMPv1 or SNMPv2c.
  • Page 144: Snmp-Agent Group

    The NMS and the SNMP agent use the same SNMP context. • Otherwise, a timeout message appears, indicating a communication failure between the NMS and SNMP agent. You can create a maximum of 20 SNMP contexts. Examples # Create SNMP context trillcontext. <Sysname>...
  • Page 145 privacy: Specifies the authentication with privacy security model for the SNMPv3 group. read-view view-name: Specifies a read-only MIB view. The view-name represents a MIB view name, a string of 1 to 32 characters. If no read-only MIB view is specified, the SNMP group has read access to the default view ViewDefault.
  • Page 146: Snmp-Agent Local-Engineid

    Security model Security key settings Security model Remarks keyword for the group for the user The authentication and No authentication, no Neither authentication privacy keys, if None privacy nor privacy configured, do not take effect. Examples # Create the SNMPv3 group group1 and assigns the no authentication, no privacy security model to the group.
  • Page 147: Snmp-Agent Log

    Examples # Change the local engine ID to 123456789A. <Sysname> system-view [Sysname] snmp-agent local-engineid 123456789A Related commands display snmp-agent local-engineid • snmp-agent usm-user • snmp-agent log Use snmp-agent log to enable logging SNMP operations. Use undo snmp-agent log to disable logging SNMP operations. Syntax snmp-agent log { all | get-operation | set-operation } undo snmp-agent log { all | get-operation | set-operation }...
  • Page 148: Snmp-Agent Mib-View

    snmp-agent mib-view Use snmp-agent mib-view to create or update a MIB view. Use undo snmp-agent mib-view to delete a MIB view. Syntax snmp-agent mib-view { excluded | included } view-name oid-tree [ mask mask-value ] undo snmp-agent mib-view view-name Default The system creates the ViewDefault view when the SNMP agent is enabled.
  • Page 149: Snmp-Agent Packet Max-Size

    [Sysname] snmp-agent mib-view excluded mibtest system [Sysname] snmp-agent community read public mib-view mibtest An SNMPv1 NMS in the public community can query the objects in the mib-2 subtree but not any object (for example, the sysDescr or sysObjectID node) in the system subtree. Related commands •...
  • Page 150: Snmp-Agent Remote

    undo snmp-agent port Default The device uses UDP port 161 for receiving SNMP packets. Views System view Predefined user roles network-admin mdc-admin Parameters port-num: Specifies the UDP port for receiving SNMP packets, in the range of 1 to 65535. The default is 161.
  • Page 151: Snmp-Agent Source

    Parameters ip-address: Specifies the IP address of a remote SNMP entity. ipv6 ipv6-address: Specifies the IPv6 address of a remote SNMP entity. vpn-instance vpn-instance-name: Specifies the VPN for a remote SNMP entity. The vpn-instance-name argument specifies the name of the MPLS L3VPN, a case-sensitive string of 1 to 31 characters. If this parameter is not specified, the remote SNMP entity is in public network.
  • Page 152: Snmp-Agent Sys-Info Contact

    interface-type { interface-number | interface-number.subnumber }: Specifies an interface by its type and number. The interface-number argument specifies a main interface number. The subnumber argument specifies a subinterface number in the range of 1 to 4094. Usage guidelines The snmp-agent source command enables the SNMP agent to use the primary IP address of an interface or subinterface as the source IP address in all its SNMP informs or traps, regardless of their outgoing interfaces.
  • Page 153: Snmp-Agent Sys-Info Location

    <Sysname> system-view [Sysname] snmp-agent sys-info contact Dial System Operator # 27345 Related commands display snmp-agent sys-info snmp-agent sys-info location Use snmp-agent sys-info location to configure the system location. Use undo snmp-agent sys-info location to restore the default location. Syntax snmp-agent sys-info location sys-location undo snmp-agent sys-info location Views System view...
  • Page 154: Snmp-Agent Target-Host

    Default The default is SNMP v3. Views System view Predefined user roles network-admin mdc-admin Parameters all: Specifies SNMPv1, SNMPv2c, and SNMPv3. v1: Specifies SNMPv1. v2c: Specifies SNMPv2c. v3: Specifies SNMPv3. Usage guidelines SNMPv1 and SNMPv2c settings in this command are supported only in non-FIPS mode. Configure the SNMP agent with the same SNMP version as the NMS for successful communications between them.
  • Page 155 snmp-agent target-host inform address udp-domain { ip-address | ipv6 ipv6-address } [ udp-port port-number ] [ vpn-instance vpn-instance-name ] params securityname security-string v3 { authentication | privacy } snmp-agent target-host trap address udp-domain { ip-address | ipv6 ipv6-address } [ udp-port port-number ] [ vpn-instance vpn-instance-name ] params securityname security-string v3 { authentication | privacy } undo snmp-agent target-host { trap | inform } address udp-domain { ip-address | ipv6 ipv6-address }...
  • Page 156: Snmp-Agent Trap Enable

    Make sure the SNMP agent uses the same UDP port for SNMP notifications as the target host. Typically, NMSs, for example, IMC and MIB Browser, use port 162 for SNMP notifications as defined in the SNMP protocols. If none of the keywords v1, v2c, or v3 is specified, SNMPv1 is used. Make sure the SNMP agent uses the same SNMP version as the target host so the host can receive the notification.
  • Page 157: Snmp-Agent Trap If-Mib Link Extended

    Table 30 Standard SNMP notifications Keyword Definition Authentication failure notification sent when an NMS fails to authenticate to the SNMP authentication agent. coldstart Notification sent when the device restarts. linkdown Notification sent when the link of a port goes down. linkup Notification sent when the link of a port comes up.
  • Page 158: Snmp-Agent Trap Life

    Predefined user roles network-admin mdc-admin Usage guidelines Extended linkUp and linkDown notifications add interface description and interface type to the standard linkUp/linkDown notifications for fast failure point identification. When you use this command, make sure the NMS supports the extended linkup and linkDown notifications.
  • Page 159: Snmp-Agent Trap Log

    snmp-agent trap queue-size • snmp-agent trap log Use snmp-agent trap log to enable SNMP notification logging. Use undo snmp-agent trap log to disable SNMP notification logging. Syntax snmp-agent trap log undo snmp-agent trap log Default SNMP notification logging is disabled. Views System view Predefined user roles...
  • Page 160: Snmp-Agent Usm-User { V1 | V2C

    Parameters size: Sets the maximum number of notifications that the SNMP notification queue can hold. The value range is 1 to 1000. Usage guidelines When congestion occurs, the SNMP agent buffers notifications in a queue. SNMP notification queue size sets the maximum number of notifications that this queue can hold. When the queue size is reached, the oldest notifications are dropped for new notifications.
  • Page 161: Snmp-Agent Usm-User V3

    permitted in the ACL can use the specified username (community name) to access the SNMP agent. If no ACL is specified, the specified ACL does not exist, or the specified ACL does not have any rules, any NMS can use the specified username to access the SNMP agent. acl ipv6 ipv6-acl-number: Specifies a basic IPv6 ACL to filter NMSs by source IPv6 address.
  • Page 162 Use undo snmp-agent usm-user v3 to delete a user from an SNMPv3 group. Syntax In non-FIPS mode: snmp-agent usm-user v3 user-name group-name [ remote { ip-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ] ] [ { cipher | simple } authentication-mode { md5 | sha } auth-password [ privacy-mode { aes128 | des56 } priv-password ] ] [ acl acl-number | acl ipv6 ipv6-acl-number ] * undo snmp-agent usm-user v3 user-name group-name { local | engineid engineid-string | remote...
  • Page 163 visible characters, which must contain numbers, uppercase letters, lowercase letters, and special characters. If the cipher keyword is specified, the encrypted authentication key length requirements differ by authentication algorithm and key string format, as shown in Table Table 31 Encrypted authentication key length requirements Authentication Hexadecimal string Non-hexadecimal string...
  • Page 164 SNMPv3 users are valid only on the SNMP engine that creates them. By default, SNMPv3 users are created on the local SNMP engine. When you create an SNMPv3 user for sending SNMP inform messages, you must associate it with the remote SNMP engine. If you configure an SNMPv3 user multiple times, the most recent configuration takes effect.
  • Page 165: Rmon Commands

    RMON commands display rmon alarm Use display rmon alarm to display entries in the RMON alarm table. Syntax display rmon alarm [ entry-number ] Views Any view Predefined user roles network-admin network-operator mdc-admin mdc-operator Parameters entry-number: Specifies an alarm entry index in the range of 1 to 65535. If no entry is specified, the command displays all entries in the RMON alarm table.
  • Page 166 Table 33 Command output Field Description Alarm entry owner and status: • entry-number—Alarm entry index (MIB object alarmIndex). • owner—Entry owner (MIB object alarmOwner). • status—Entry status (MIB object alarmStatus): AlarmEntry entry-number VALID—The entry is valid. owned by owner is status. UNDERCREATION—The entry is invalid.
  • Page 167: Display Rmon Event

    Field Description Alarm that can be generated when the entry becomes valid (MIB object alarmStartupAlarm): • risingAlarm—Generates a rising alarm if the first sample after the entry becomes valid is greater than or equal to the rising threshold. • fallingAlarm—Generates a falling alarm if the first sample after the entry Alarm sent upon entry becomes valid is less than or equal to the rising threshold.
  • Page 168: Display Rmon Eventlog

    Table 34 Command output Field Description Event entry owner and status. • entry-number—Event entry index (MIB object eventIndex). • owner—Entry owner (MIB object eventOwner). • status—Entry status (MIB object eventStatus): EventEntry entry-number VALID—The entry is valid. owned by owner is status. UNDERCREATION—The entry is invalid.
  • Page 169 Parameters entry-number: Specifies an event entry index in the range of 1 to 65535. If no entry is specified, the command displays log entries for all event entries. Usage guidelines If the log action is specified for an event, the system adds a record in the event log table each time the event occurs.
  • Page 170: Display Rmon History

    Field Description LogEntry Time when an event record was created. entry-number • entry-number—Event record index (represented as logEventIndex.logIndex), which created at uniquely identifies the record among all records for the event. created-time • created-time—Time when the event entry was created (MIB object logTime). uptime.
  • Page 171 packets : 54 , broadcast packets multicast packets : 23 , CRC alignment errors : 0 undersize packets : 0 , oversize packets fragments , jabbers collisions , utilization Sampling record 2 : dropevents , octets : 5367 packets : 55 , broadcast packets multicast packets : 7 , CRC alignment errors : 0...
  • Page 172 Field Description Maximum number of samples that can be saved for the history control entry (MIB object historyControlBucketsGranted). If the expected bucket size specified with the rmon history command exceeds the buckets max available history table size, RMON sets the bucket size as closely to the expected bucket size as is possible.
  • Page 173: Display Rmon Prialarm

    display rmon prialarm Use display rmon prialarm to display entries in the private RMON alarm table. Syntax display rmon prialarm [ entry-number ] Views Any view Predefined user roles network-admin network-operator mdc-admin mdc-operator Parameters entry-number: Specifies an alarm entry index in the range of 1 to 65535. If no entry is specified, the command displays all private alarm entries.
  • Page 174 Field Description Sample type (MIB object hh3cRmonExtAlarmSampleType): • absolute—RMON compares the calculation result of the variable formula with the rising and falling thresholds at the end of the sampling Sample type interval. • delta—RMON subtracts the calculation result of the variable formula for the previous sampling interval from the current calculation result, and then compares the difference with the rising and falling thresholds.
  • Page 175: Display Rmon Statistics

    Field Description Lifetime of the entry. If the lifetime is set to forever (MIB object is hh3cRmonExtAlarmStatType), Entry lifetime the entry never expires. If the lifetime is set to an amount of time (MIB object hh3cRmonExtAlarmStatType), the entry is removed when the timer expires. Latest value Most recent sampled value (MIB object hh3cRmonExtAlarmValue).
  • Page 176 etherStatsDropEvents (insufficient resources): 0 Incoming packets by size: 65-127 128-255 256-511: 0 512-1023: 0 1024-1518: 0 Table 38 Command output Field Description Statistics entry owner and status: • entry-number—Statistics entry index (MIB object etherStatsIndex). • owner—Entry owner (MIB object etherStatsOwner). •...
  • Page 177: Rmon Alarm

    Field Description Incoming-packet statistics by packet length: • 64—Number of 64-byte packets. The value is stored in the MIB node etherStatsPkts64Octets. • 65-127—Number of 65- to 127-byte packets. The value is stored in the MIB node etherStatsPkts65to127Octets. • 128-255—Number of 128- to 255-byte packets. The value is stored in the MIB node etherStatsPkts128to255Octets.
  • Page 178 Format Examples Dotted OID format: 1.3.6.1.2.1.2.1.10.1 entry.integer.instance etherStatsOctets.1 etherStatsPkts.1 etherStatsBroadcastPkts.1 Object name.instance ifInOctets.1 ifInUcastPkts.1 ifInNUcastPkts.1 sampling-interval: Sets the sampling interval in the range of 5 to 65535 seconds. absolute: Specifies absolute sampling. RMON compares the value of the variable with the rising and falling thresholds at the end of the sampling interval.
  • Page 179: Rmon Event

    RMON samples the monitored alarm variable at the specified sampling interval, compares the sampled value with the predefined thresholds, and does one of the following: Triggers the event associated with the rising alarm if the sampled value is equal to or greater than •...
  • Page 180: Rmon History

    Parameters entry-number: Specifies an event entry index in the range of 1 to 65535. description string: Configures an event description, a case-sensitive string of 1 to 127 characters. The string can contain spaces, but it cannot contain the question mark (?) or any unprintable control characters in the US ASCII character set.
  • Page 181: Rmon Prialarm

    Syntax rmon history entry-number buckets number interval sampling-interval [ owner text ] undo rmon history entry-number Default The RMON history control table does not contain any entries. Views Ethernet interface view Predefined user roles network-admin mdc-admin Parameters entry-number: Specifies a history control entry index in the range of 1 to 65535. buckets number: Specifies the expected maximum number of samples to be retained for the entry, in the range of 1 to 65535.
  • Page 182 Syntax rmon prialarm entry-number prialarm-formula prialarm-des sampling-interval { absolute | delta } [ startup-alarm { falling | rising | rising-falling } ] rising-threshold threshold-value1 event-entry1 falling-threshold threshold-value2 event-entry2 entrytype { forever | cycle cycle-period } [ owner text ] undo rmon prialarm entry-number Default The private alarm table does not contain any entries.
  • Page 183 falling-threshold threshold-value2 event-entry2: Sets the falling threshold. The threshold-value2 argument represents the falling threshold in the range of –2147483648 to +2147483647. The event-entry2 argument represents the index of the event that is triggered when the falling threshold is crossed. The value range for the event-entry2 argument is 0 to 65535.
  • Page 184: Rmon Statistics

    The last number in the OID forms of variables must be the same as the statistics entry index for the interface. For example, if you execute the rmon statistics 5 command, you must replace 1.3.6.1.2.1.16.1.1.1.6.1 and 1.3.6.1.2.1.16.1.1.1.5.1 with 1.3.6.1.2.1.16.1.1.1.6.5 and 1.3.6.1.2.1.16.1.1.1.5.5, respectively.
  • Page 185 Related commands display rmon statistics...
  • Page 186: Netconf Commands

    Close-session NETCONF messages must comply with the XML format requirement and the XSD file semantic and syntactic requirements. To ensure successful configuration, HP recommends that you use third-party software to generate NETCONF messages. To quit XML view, use a NETCONF message instead of the quit command.
  • Page 187: Netconf Soap Http Enable

    Examples # Enter XML view. <Sysname> xml <?xml version="1.0" encoding="UTF-8"?><hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"><capabilities><capability>urn:ietf:pa rams:netconf:base:1.1</capability><capability>urn:ietf:params:netconf:writable-runnin g</capability><capability>urn:ietf:params:netconf:capability:notification:1.0</capabi lity><capability>urn:ietf:params:netconf:capability:validate:1.1</capability><capabil ity>urn:ietf:params:netconf:capability:interleave:1.0</capability><capability>urn:iet f:params:netconf:capability:hp-netconf-ext:1.0</capability></capabilities><session-id >1</session-id></hello>]]>]]> # Quit XML view. <rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> <close-session> </close-session> </rpc>]]>]]> <Sysname> netconf soap http enable Use netconf soap http enable to enable NETCONF over SOAP over HTTP.
  • Page 188: Netconf Soap Https Enable

    netconf soap https enable Use netconf soap https enable to enable NETCONF over SOAP over HTTPS. Syntax netconf soap https enable undo netconf soap https enable Default NETCONF over SOAP over HTTPS is disabled. Views System view Predefined user roles network-admin mdc-admin Usage guidelines...
  • Page 189: Port Mirroring Commands

    Port mirroring commands display mirroring-group Use display mirroring-group to display mirroring group information. Syntax display mirroring-group { group-id | all | local | remote-destination | remote-source } Views Any view Predefined user roles network-admin network-operator mdc-admin mdc-operator Parameters group-id: Displays information about a mirroring group specified by its number in the range of 1 to 64. all: Displays information about all mirroring groups.
  • Page 190: Mirroring-Group

    Type: Remote source Status: Incomplete Mirroring port: GigabitEthernet3/0/4 Both Remote probe VLAN: 1900 Mirroring group 9: Type: Remote destination Status: Active Monitor port: GigabitEthernet3/0/6 Remote probe VLAN: 1901 Table 40 Command output Field Description Mirroring group Number of the mirroring group. Type of the mirroring group: •...
  • Page 191: Mirroring-Group Mirroring-Port (Interface View)

    Predefined user roles network-admin mdc-admin Parameters group-id: Specifies the number of a mirroring group, in the range of 1 to 64. local: Specifies a local mirroring group. remote-destination: Specifies a remote destination group. remote-source: Specifies a remote source group. all: Specifies all mirroring groups. sampler sampler name: Specifies a sampler to be referenced by its name.
  • Page 192: Mirroring-Group Mirroring-Port (System View)

    inbound: Mirrors only received packets on the specified port. outbound: Mirrors only sent packets on the specified port. Usage guidelines You can configure source ports only for a local mirroring group or remote source group but not for a remote destination group. Do not assign a source port to a source VLAN or remote probe VLAN.
  • Page 193: Mirroring-Group Mirroring-Vlan

    Parameters group-id: Specifies the number of a mirroring group, in the range of 1 to 64. The mirroring group specified by the group-id argument must already exist. interface-list: Source port list, containing one or more ports, in the format of interface-list = { interface-type interface-number [ to interface-type interface-number ] }&<1-8>.
  • Page 194: Mirroring-Group Monitor-Port (Interface View)

    Views System view Predefined user roles network-admin mdc-admin Parameters group-id: Specifies the number of a mirroring group, in the range of 1 to 64. The mirroring group specified by the group-id argument must already exist. vlan-list: Specifies the source VLAN list, containing one or more VLANs, in the format of vlan-list = { vlan-id [ to vlan-id ] }&<1-8>.
  • Page 195: Mirroring-Group Monitor-Port (System View)

    Default No monitor port is configured for a mirroring group. Views Interface view Predefined user roles network-admin mdc-admin Parameters group-id: Specifies the number of a mirroring group, in the range of 1 to 64. The mirroring group specified by group-id must already exist. Usage guidelines You can configure the monitor port only for a local mirroring group or remote destination group but not for a remote source group.
  • Page 196: Mirroring-Group Reflector-Port

    Default No monitor port is configured for a mirroring group. Views System view Predefined user roles network-admin mdc-admin Parameters group-id: Specifies the number of a mirroring group, in the range of 1 to 64. The mirroring group specified by group-id must already exist. interface-type interface-number: Specifies a port to be configured as the monitor port by its type and number.
  • Page 197 mirroring-group group-id reflector-port interface-type interface-number undo mirroring-group group-id reflector-port interface-type interface-number In interface view: mirroring-group group-id reflector-port undo mirroring-group group-id reflector-port Default No reflector port is configured for a mirroring group. A port does not serve as the reflector port for a mirroring group.
  • Page 198: Mirroring-Group Remote-Probe Vlan

    [Sysname-GigabitEthernet3/0/2] mirroring-group 2 reflector-port This operation may delete all settings made on the interface. Continue? [Y/N]: y Related commands mirroring-group mirroring-group remote-probe vlan Use mirroring-group remote-probe vlan to specify a VLAN as the remote probe VLAN for a mirroring group. Use undo mirroring-group remote-probe vlan to remove a remote probe VLAN from a mirroring group.
  • Page 199 # Create remote destination group 2 and configure VLAN 20 as its remote probe VLAN. <Sysname> system-view [Sysname] mirroring-group 2 remote-destination [Sysname] mirroring-group 2 remote-probe vlan 20 Related commands mirroring-group...
  • Page 200: Traffic Mirroring Commands

    Traffic mirroring commands mirror-to Use mirror-to to specify the mirroring destination for a traffic behavior. Use undo mirror-to to cancel the configuration. Syntax mirror-to { cpu | interface interface-type interface-number [ sampler sampler-name ] | vlan vlan-id } undo mirror-to { cpu | interface interface-type interface-number | vlan vlan-id } Default No mirroring destination is configured for a traffic behavior.
  • Page 201 # Create traffic behavior 1 and configure the action of mirroring traffic to interface GigabitEthernet 3/0/1 for the traffic behavior. <Sysname> system-view [Sysname] traffic behavior 1 [Sysname-behavior-1] mirror-to interface GigabitEthernet 3/0/1 # Create traffic behavior 1 and configure the action of mirroring traffic to VLAN 100 for the traffic behavior.
  • Page 202: Sampler Commands

    Sampler commands display sampler Use display sampler to display configuration information about a sampler. Syntax In standalone mode: display sampler [ sampler-name ] [ slot slot-number ] In IRF mode: display sampler [ sampler-name ] [ chassis chassis-number slot slot-number ] Views Any view Predefined user roles...
  • Page 203: Sampler

    Table 41 Command output Field Description Sampler name Name of the sampler. Sampling mode, including fixed mode and random mode. Mode Random mode is not supported in the current software version and is reserved for future use. Packet-interval Sampling rate. sampler Use sampler to create a sampler.
  • Page 204: Sflow Commands

    sFlow commands display sflow Use display sflow to display sFlow configuration and operation information. Syntax display sflow Views Any view Predefined user roles network-admin network-operator mdc-admin mdc-operator Examples # Display sFlow configuration and operation information. <Sysname> display sflow sFlow datagram version: 5 Global information: Agent IP: 10.10.10.1(CLI) Source address: 10.0.0.1 2001::1...
  • Page 205: Sflow Agent

    Field Description sFlow collector ID. sFlow collector IP address. Port sFlow collector port. Remaining lifetime of the sFlow collector. If this field displays N/A, the sFlow Aging collector never ages out. Size Maximum length of the sFlow data portion in an sFlow packet. VPN-instance Name of the VPN bound with the sFlow collector.
  • Page 206: Sflow Collector

    Specifies an IPv6 address for the sFlow agent. Usage guidelines HP recommends that you manually configure an IP address for the sFlow agent. Only one IP address can be specified for the sFlow agent on the device. A newly configured IP address overwrites the existing one.
  • Page 207: Sflow Counter Interval

    description text: Configures a description for the sFlow collector. The default description is "CLI Collector." datagram-size size: Specifies the maximum length of the sFlow data portion in an sFlow packet. The value range for the size argument is 200 to 3000 bytes and the default is 1400 bytes. port port-number: Specifies the port number of the sFlow collector, in the range of 1 to 65535.
  • Page 208: Sflow Counter Collector

    sflow counter collector Use sflow counter collector to specify an sFlow collector for counter sampling. Use undo sflow counter collector to restore the default. Syntax sflow counter collector collector-id undo sflow counter collector Default No sFlow collector is specified for counter sampling. Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Predefined user roles...
  • Page 209: Sflow Flow Max-Header

    Parameters length: Specifies the maximum number of bytes that can be copied, in the range of 18 to 512. HP recommends that you use the default. Examples # Set the maximum number of bytes that can be copied to 60 on GigabitEthernet 3/0/1.
  • Page 210: Sflow Sampling-Rate

    Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Predefined user roles network-admin mdc-admin Parameters determine: Specifies the fixed sampling mode. For example, if the flow sampling interval is set to 4000 (by using the sflow sampling-rate command), the device randomly samples a packet, like the tenth packet, from the first 4000 packets.
  • Page 211: Sflow Source

    Examples # Enable flow sampling to sample a packet out of 4000 packets on GigabitEthernet 3/0/1. <Sysname> system-view [Sysname] interface GigabitEthernet 3/0/1 [Sysname-GigabitEthernet3/0/1] sflow sampling-rate 4000 Related commands sflow sampling-mode sflow source Use sflow source to specify the source IP address of sFlow packets. Use undo sflow source to restore the default.
  • Page 212: Information Center Commands

    Information center commands diagnostic-logfile save Use diagnostic-logfile save to manually save diagnostic logs from the diagnostic log buffer to the diagnostic log file. Syntax diagnostic-logfile save Views Any view Predefined user roles network-admin mdc-admin Usage guidelines You can specify the directory to save the diagnostic log file with the info-center diagnostic-logfile directory command.
  • Page 213: Display Info-Center

    mdc-admin mdc-operator Examples # Display the diagnostic log file configuration. <Sysname> display diagnostic-logfile summary Diagnostic log file: Enabled. Diagnostic log file size quota: 10 MB Diagnostic log file directory: flash:/diagfile Writing frequency: 24 hour 0 min 0 sec Table 43 Command output Field Description •...
  • Page 214: Display Logbuffer

    Log buffer: Enabled Max buffer size 1024, current buffer size 512, Current messages 0, dropped messages 0, overwritten messages 0 Log file: Enabled Security log file: Enabled Information timestamp format: Loghost: Date Other output destination: Date display logbuffer Use display logbuffer to display the state of the log buffer and the log information in the log buffer. Syntax In standalone mode: display logbuffer [ reverse ] [ level severity | size buffersize | slot slot-number ] *...
  • Page 215 Corresponding Severity Level Description keyword in value commands Error condition. For example, the link state changes or a Error error storage card is unplugged. Warning condition. For example, an interface is Warning warning disconnected, or the memory resources are used up. Normal but significant condition.
  • Page 216: Display Logbuffer Summary

    Field Description Max buffer size Maximum buffer size supported by the device. Maximum buffer size configured by using the Actual buffer size info-center logbuffer size command. Dropped messages Number of dropped messages. Overwritten messages Number of overwritten messages. Current messages Number of current messages.
  • Page 217: Display Logfile Summary

    # (In IRF mode.) Display the summary of the log buffer. <Sysname> display logbuffer summary CHASSIS SLOT EMERG ALERT CRIT ERROR WARN NOTIF INFO DEBUG Table 46 Command output Field Description CHASSIS IRF member device ID. (In IRF mode.) SLOT Slot number of the card.
  • Page 218: Display Security-Logfile Summary

    Log file: Enabled. Log file size quota: 10 MB Log file directory: flash:/logfile Writing frequency: 0 hour 1 min 10 sec Table 47 Command output Field Description • Enabled—Logs can be output to a log file. Log file • Disabled—Logs cannot be output to a log file. Log file size quota Maximum storage space reserved for a log file, in MB.
  • Page 219: Enable Log Updown

    Table 48 Command output Field Description • Enabled—Security logs can be output to the security log file. Security log file • Disabled—Security logs cannot be output to the security log file. Security log file size quota Maximum storage space reserved for the security log file. Security log file directory Security log file directory.
  • Page 220: Info-Center Diagnostic-Logfile Frequency

    Syntax info-center diagnostic-logfile enable undo info-center diagnostic-logfile enable Default Saving diagnostic logs to the diagnostic log file is disabled. Views System view Predefined user roles network-admin mdc-admin Usage guidelines This command enables the system to save generated diagnostic logs to the diagnostic log file for centralized management.
  • Page 221: Info-Center Diagnostic-Logfile Quota

    Usage guidelines The system saves diagnostic logs into the diagnostic log buffer, and outputs the buffered diagnostic logs to the diagnostic log file at the specified interval. Examples # Configure the system to save diagnostic logs from the diagnostic log buffer to the diagnostic log file every 600 seconds.
  • Page 222: Info-Center Logfile Overwrite-Protection

    Default The diagnostic log file is saved in the diagfile directory under the root directory of the storage device. If the storage device has been partitioned, the diagnostic log file is saved in the diagfile directory on the second partition of the storage device. Views System view Predefined user roles...
  • Page 223: Info-Center Enable

    Parameters all-port-powerdown: Shuts down all the service ports on the device when the last log file is full or the storage device runs out of space. Usage guidelines This command is supported only in FIPS mode. The device supports up to 20 log files. With log file overwrite-protection disabled, when the twentieth log file is full or the storage device runs out of space, the device deletes the oldest log file and creates a new one.
  • Page 224: Info-Center Logbuffer

    Syntax info-center format { unicom | cmcc } undo info-center format Default Logs are sent to a log host in standard format. Views System view Predefined user roles network-admin mdc-admin Parameters unicom: Specifies the unicom format. cmcc: Specifies the China Mobile Communications Corporation (cmcc) format. Usage guidelines Logs can be sent to a log host in standard, unicom, or cmcc format.
  • Page 225: Info-Center Logbuffer Size

    [Sysname] info-center logbuffer Related commands • display logbuffer info-center enable • info-center logbuffer size Use info-center logbuffer size to set the maximum number of logs that can be stored in the log buffer. Use undo info-center logbuffer size to restore the default. Syntax info-center logbuffer size buffersize undo info-center logbuffer size...
  • Page 226: Info-Center Logfile Frequency

    undo info-center logfile enable Default The log file feature is enabled. Views System view Predefined user roles network-admin mdc-admin Examples # Enable the output of logs to a log file. <Sysname> system-view [Sysname] info-center logfile enable info-center logfile frequency Use info-center logfile frequency to configure the interval for saving logs to a log file. Use undo info-center logfile frequency to restore the default saving interval.
  • Page 227: Info-Center Logfile Size-Quota

    info-center logfile size-quota Use info-center logfile size-quota to set the maximum size for a log file. Use undo info-center logfile size-quota to restore the default. Syntax info-center logfile size-quota size undo info-center logfile size-quota Default The maximum size of a log file is 5 MB. Views System view Predefined user roles...
  • Page 228: Info-Center Logging Suppress Duplicates

    Predefined user roles network-admin mdc-admin Parameters dir-name: Specifies a directory by its name, a string of 1 to 64 characters. Usage guidelines The specified directory must have been created. The suffix of a log file is .log. When the default directory has no space for storing new log files, use this command to specify a new directory to save log files.
  • Page 229 Usage guidelines Outputting consecutive duplicate logs at an interval of less than 30 seconds wastes system and network resources With this feature enabled, the system starts a suppression period when outputting a new log: During the suppression period, the system does not output logs with the same module name, level, •...
  • Page 230: Info-Center Loghost

    info-center loghost Use info-center loghost to specify a log host and to configure output parameters. Use undo info-center loghost to restore the default. Syntax info-center loghost [ vpn-instance vpn-instance-name ] { ipv4-address | ipv6 ipv6-address } [ port port-number ] [ facility local-number ] undo info-center loghost [ vpn-instance vpn-instance-name ] { ipv4-address | ipv6 ipv6-address } Default No log host is specified.
  • Page 231: Info-Center Security-Logfile Alarm-Threshold

    Syntax info-center loghost source interface-type interface-number undo info-center loghost source Default The source IP address of output logs is the primary IP address of the matching route's egress interface. Views System view Predefined user roles network-admin mdc-admin Parameters interface-type interface-number: Specifies the egress interface for logs. Usage guidelines The system uses the primary IP address of the specified egress interface as the source IP address of log information no matter which physical interface is used to output the logs.
  • Page 232: Info-Center Security-Logfile Enable

    mdc-admin Parameters usage: Specifies an alarm threshold. The value must be an integer in the range of 1 to 100. Usage guidelines When the size of the security log file reaches the upper limit, the system deletes the oldest logs and then writes new logs into the security log file.
  • Page 233: Info-Center Security-Logfile Frequency

    info-center security-logfile frequency Use info-center security-logfile frequency to configure the interval for saving security logs to the security log file. Use undo info-center security-logfile frequency to restore the default saving interval. Syntax info-center security-logfile frequency freq-sec undo info-center security-logfile frequency Default The detault saving interval is 86400 seconds.
  • Page 234: Info-Center Security-Logfile Directory

    Predefined user roles network-admin mdc-admin Parameters size: Specifies the maximum size for the security log file, in MB. The value range is 1 to 10. Examples # Set the maximum size for the security log file to 6 MB. <Sysname> system-view [Sysname] info-center security-logfile size-quota 6 Related commands info-center security-logfile alarm-threshold...
  • Page 235: Info-Center Source

    info-center source Use info-center source to configure a log output rule for a module. Use undo info-center source to restore the default. Syntax info-center source { module-name | default } { console | logbuffer | logfile | loghost | monitor } { deny | level severity } undo info-center source { module-name | default } { console | logbuffer | logfile | loghost | monitor } Default...
  • Page 236: Info-Center Synchronous

    console: Outputs logs to the console. logbuffer: Outputs logs to the log buffer. logfile: Outputs logs to a log file. loghost: Outputs logs to the log host. monitor: Outputs logs to the monitor terminal. deny: Disables log output. level severity: Specifies a severity level in the range of 0 to 7. See Table 44 for more information.
  • Page 237: Info-Center Timestamp

    Predefined user roles network-admin mdc-admin Usage guidelines System log output interrupts ongoing configuration operations, including obscuring previously entered commands. Synchronous information output shows the obscured commands. It also provides a command prompt in command editing mode, or a [Y/N] string in interaction mode so you can continue your operation from where you were stopped.
  • Page 238: Info-Center Timestamp Loghost

    Default The timestamp format for logs sent to console, monitor terminal, log buffer, and log file is date. Views System view Predefined user roles network-admin mdc-admin Parameters boot: Sets the timestamp format as xxx.yyy, where xxx is the most significant 32 bits (in milliseconds) and yyy is the least significant 32 bits.
  • Page 239: Info-Center Trace-Logfile Quota

    Predefined user roles network-admin mdc-admin Parameters date: Sets the timestamp format as "mmm dd hh:mm:ss yyyy". Such as Dec 8 10:12:21 2007. The date time shows the current system time. iso: Sets the ISO 8601 timestamp format, for example, 2009-09-21T15:32:55. no-year-date: Sets the timestamp format as the current system date and time without year.
  • Page 240: Logfile Save

    logfile save Use logfile save to manually save logs in the log file buffer into a log file. Syntax logfile save Views Any view Predefined user roles 2: System level Usage guidelines You can specify the directory to save a log file with the info-center logfile directory command. The system clears the log file buffer after saving logs from the buffer to a log file automatically or manually.
  • Page 241: Security-Logfile Save

    security-logfile save Use security-logfile save to manually save security logs from the security log file buffer into the security log file. Syntax security-logfile save Views Any view Predefined user roles network-admin mdc-admin Usage guidelines The system clears the security log file buffer after saving security logs into the security log file automatically or manually.
  • Page 242: Terminal Logging Level

    mdc-admin Usage guidelines To view debug information, perform the following steps: Execute the terminal monitor and terminal debugging commands. Enable the information center (enabled by default). Use a debugging command to enable the related debugging. The configuration of this command is only valid for the current connection between the terminal and the device.
  • Page 243: Terminal Monitor

    of the logs that can be output to the current terminal to 6 (informational), logs with a severity value from 0 to 6 will be output. The configuration of this command is valid for only the current connection between the terminal and the device.
  • Page 244: Eaa Commands

    EAA commands action cli Use action cli to add a CLI action to a monitor policy. Use undo action to remove an action. Syntax action number cli command-line undo action number Default Monitor policies do not contain any actions. Views CLI-defined policy view Predefined user roles network-admin...
  • Page 245: Action Reboot

    [Sysname-rtm-test] action 3 cli shutdown action reboot Use action reboot to add a reboot action to a monitor policy. Use undo action to remove an action. Syntax In standalone mode: action number reboot [ slot slot-number ] undo action number In IRF mode: action number reboot [ chassis chassis-number [ slot slot-number ] ] undo action number...
  • Page 246: Action Switchover

    [Sysname-rtm-test] action 3 reboot # (In IRF mode.) Configure an action for the CLI-defined policy test to reboot IRF member device 1. <Sysname> system-view [Sysname] rtm cli-policy test [Sysname-rtm-test] action 3 reboot chassis 1 action switchover Use action switchover to add an active/standby switchover action to a monitor policy. Use undo action to remove an action.
  • Page 247: Commit

    Syntax action number syslog priority level facility local-number msg msg-body undo action number Default Monitor policies do not contain any actions. Views CLI-defined policy view Predefined user roles network-admin mdc-admin Parameters number: Specifies an action ID, in the range of 0 to 231. priority level: Specifies the log severity level in the range of 0 to 7.
  • Page 248: Display Rtm Environment

    Default No CLI-defined policies are enabled. Views CLI-defined policy view Predefined user roles network-admin mdc-admin Usage guidelines You must execute this command for a CLI-defined policy to take effect. After changing the settings in a policy that has been enabled, you must re-execute this command for the changes to take effect.
  • Page 249 Syntax display rtm policy { active | registered } [ policy-name ] Views Any view Predefined user roles network-admin mdc-admin Parameters active: Displays policies that are running. registered: Displays policies that have been created. policy-name: Specifies a policy by its name. If you do not specify a policy, the command displays all monitor policies that are running or have been created.
  • Page 250: Event Cli

    event cli Use event cli to configure a CLI event for a CLI-defined monitor policy. Use undo event to delete the event in a CLI-defined monitor policy. Syntax event cli { async [ skip ] | sync } mode { execute | help | tab } pattern regular-exp undo event Default No CLI events are configured.
  • Page 251: Event Hotplug

    # Configure a CLI-defined policy to monitor the use of the Tab key at command lines that contain the dis inter brief string. Enable the system to execute the actions in the policy and display the complete parameter when Tab is pressed at a policy-matching command line. <Sysname>...
  • Page 252: Event Interface

    Examples # (In standalone mode.) Configure a CLI-defined policy to monitor the card in slot 2 for card swapping. <Sysname> system-view [Sysname] rtm cli-policy test [Sysname-rtm-test] event hotplug slot 2 # (In IRF mode.) Configure a CLI-defined policy to monitor the card in slot 2 of IRF member device 1 for card swapping.
  • Page 253 interval interval: Specifies the interval to sample the monitored traffic statistic for a comparison. The value range is 1 to 4294967295 seconds. The default is 300 seconds. Table 51 Monitored objects Monitored traffic statistic Description input-drops Number of discarded incoming packets. input-errors Number of incoming error packets.
  • Page 254: Event Process

    threshold (1000), and then execute the policy again when the traffic statistic is less than the restart threshold (50). <Sysname> system-view [Sysname] rtm cli-policy test [Sysname-rtm-test] event interface GigabitEthernet 3/0/1 monitor-obj input-errors start-op gt start-val 1000 restart-op lt restart-val 50 interval 60 event process Use event process to configure a process event for a CLI-defined monitor policy.
  • Page 255: Event Snmp Oid

    chassis chassis-number: Specifies an IRF member device by its member ID. If you do not specify an IRF member device, the policy applies to all IRF member devices. (In IRF mode.) slot slot-number: Specifies a card by its slot number. If you do not specify a card, the policy applies to all cards.
  • Page 256: Event Snmp-Notification

    online help system displays the value range as character strings of 1 to 512 characters. If the threshold value contains spaces, you must enclose the value in quotation marks (" "). restart-op op: Specifies the operator for comparing the sampled value with the restart threshold. The policy is executed if the comparison result meets the condition.
  • Page 257: Event Syslog

    Views CLI-defined policy view Predefined user roles network-admin mdc-admin Parameters oid oid: Specifies the OID of the monitored MIB variable, a string of 1 to 256 characters. oid-val oid-val: Specifies the threshold to be compared with the sampled value. The oid-val argument can be any data type supported by SNMP, including numerals and character strings.
  • Page 258: Rtm Cli-Policy

    Views CLI-defined policy view Predefined user roles network-admin mdc-admin Parameters priority level: Specifies the lowest severity level for matching log messages. The level argument can be an integer in the range of 0 to 7, or the word all, which represents any severity level from 0 to 7. A lower number represents higher priority level.
  • Page 259: Rtm Environment

    Views System view Predefined user roles network-admin mdc-admin Parameters policy-name: Specifies the name of a CLI-defined monitor policy, a case-sensitive string of 1 to 63 characters. Usage guidelines You must create a CLI-defined monitor policy before you can use the CLI to configure settings in the policy.
  • Page 260 Variable name Description _event_severity Severity level of an event. CLI: _cmd Commands that are matched. Syslog: _syslog_pattern Log message content. Hotplug: _slot ID of the slot where a hot swap event occurs. _subslot ID of the subslot where a hot swap event occurs. Interface: _ifname Interface name.
  • Page 261: Rtm Scheduler Suspend

    rtm scheduler suspend Use rtm scheduler suspend to suspend monitor policies. Use undo rtm scheduler suspend to resume monitor policies. Syntax rtm scheduler suspend undo rtm scheduler suspend Views System view Predefined user roles network-admin mdc-admin Usage guidelines This command disables all CLI-defined and Tcl-defined monitor policies except for the monitor policies that are running.
  • Page 262: Running-Time

    tcl-filename: Specifies a .tcl script file name. The file name is case sensitive. You must make sure the file is available on a storage medium of the device. Usage guidelines Use this command to configure a monitor policy in Tcl. This command both creates and enables the specified Tcl-defined monitor policy.
  • Page 263: User-Role

    [Sysname] rtm cli-policy test [Sysname-rtm-test] running-time 60 user-role Use user-role to assign a user role to a CLI-defined policy. Use undo user-role to remove a user role from a CLI-defined policy. Syntax user-role role-name undo user-role role-name Default A monitor policy contains user roles that its creator had at the time of policy creation. Views CLI-defined policy view Predefined user roles...
  • Page 264: Process Monitoring And Maintenance Commands

    Process monitoring and maintenance commands The display memory, display process, display process cpu, monitor process and monitor thread commands display information about both user processes and kernel threads. In these commands, "process" refers to both user processes and kernel threads. display exception context Use display exception context to display context information for process exceptions.
  • Page 265 Crash time: Wed Apr 10 15:47:49 2013 Core file path: flash:/core/node0_routed_133_7_20130410-154749_1365608869.core 0x184720bc 0x10006b4c Backtrace stopped. Registers' content grp00: 0x000000ee 0x7ffd6ad0 0x1800f440 0x00000004 grp04: 0x7ffd6af8 0x0000000a 0xffffffff 0x184720bc grp08: 0x0002d200 0x00000003 0x00000001 0x1847209c grp12: 0x10006b4c 0x10020534 0xd6744100 0x00000000 grp16: 0x00000000 0xa0203ff0 0xa028b12c 0xa028b13c grp20: 0xa028b148 0xa028b168 0xa028b178 0xa028b190 grp24: 0xa028b1a8 0xa028b1b8 0x00000000 0x7ffd6c08 grp28: 0x10006cac 0x7ffd6f92 0x184c1b84 0x7ffd6ae0...
  • Page 266: Display Exception Filepath

    grp30: 0x00000fffffd04fae 0x00000fffffd04840 nip:0x00000fff803c66b4 lr:0x0000000010009b94 cr:0x0000000058000482 ctr:0x00000fff803c66ac msr:0x000000008002d000 xer:0x0000000000000000 ret:0xfffffffffffffffc dsisr:0x0000000000000000 gr3:0x0000000000000003 softe:0x0000000000000001 trap:0x0000000000000c00 dar:0x00000fff8059d14c Table 54 Command output Filed Description Crashed PID ID of the crashed process. Signals that led to the crash: • SIGUNKNOW—Unknown reason. • SIGABRT—Abort. • SIGBUS—Bus error.
  • Page 267: Display Kernel Deadloop

    mdc-admin Parameters slot slot-number: Specifies an MPU by its slot number. If you do not specify this option, the command displays the core file directory on the active MPU. (In standalone mode.) chassis chassis-number slot slot-number: Specifies an MPU on an IRF member device. If you do not specify this option, the command displays the core file directory on the global active MPU.
  • Page 268 Usage guidelines This command is supported only on the default MDC. Examples # Display brief information about the latest kernel thread deadloop. <Sysname> display kernel deadloop 1 ----------------- Deadloop record 1 ----------------- Description : BUG: soft lockup - CPU#0 stuck for 61! [comsh: 16306] Recorded at : 2013-05-01 11:16:00.823018...
  • Page 269 Reg: r16, Val = 0xe2be5f00 ; Reg: r17, Val = 0x00000000 ; Reg: r18, Val = 0x00000000 ; Reg: r19, Val = 0x00000000 ; Reg: r20, Val = 0x024c10f8 ; Reg: r21, Val = 0x057d9244 ; Reg: r22, Val = 0x00002000 ; Reg: r23, Val = 0x0000002c ;...
  • Page 270 Call trace: Function Address = 0x8012a4b4 Function Address = 0x8017989c Function Address = 0x80179b30 Function Address = 0x80127438 Function Address = 0x8012d734 Function Address = 0x80100a00 Function Address = 0xe0071004 Function Address = 0x8016ce0c Function Address = 0x801223a0 Instruction dump: 41a2fe9c 812300ec 800200ec 7f890000 409efe8c 80010014 540b07b9 40a2fe80 4bfffe6c 80780290 7f64db78 4804ea35 <807f002c>...
  • Page 271: Display Kernel Deadloop Configuration

    Related commands reset kernel deadloop display kernel deadloop configuration Use display kernel deadloop configuration to display kernel thread deadloop detection configuration. Syntax In standalone mode: display kernel deadloop configuration [ slot slot-number ] In IRF mode: display kernel deadloop configuration [ chassis chassis-number slot slot-number ] Views Any view Predefined user roles...
  • Page 272: Display Kernel Exception

    Field Description No thread is excluded from All kernel threads are monitored by kernel thread deadloop detection. monitoring display kernel exception Use display kernel exception to display kernel thread exception information. Syntax In standalone mode: display kernel exception show-number [ offset ] [ verbose ] [ slot slot-number ] In IRF mode: display kernel exception show-number [ offset ] [ verbose ] [ chassis chassis-number slot slot-number ] Views...
  • Page 273 Chassis Slot CPU ID Kernel module info : module name (mrpnc) module address (0xe332a000) module name (test_12500) module address (0xe00bd000) # Display detailed information about the latest kernel thread exception. <Sysname> display kernel exception 1 verbose ----------------- Exception record 1 ----------------- Description : Oops[#0] Recorded at...
  • Page 274 Dump stack (total 1024 bytes, 16 bytes/line): 0xe2be5ea0: 02 be 5e c0 24 00 00 24 00 00 00 00 05 7d 94 84 0xe2be5eb0: 00 00 00 04 00 00 00 00 00 00 00 28 05 8d 34 c4 0xe2be5ec0: 02 be 60 a0 01 86 ef f0 00 00 00 00 00 00 00 00 0xe2be5ed0: 02 04 05 b4 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00...
  • Page 275: Display Kernel Reboot

    4bfffe6c 80780290 7f64db78 4804ea35 <807f002c> 38800000 38a00080 3863000c For detailed information about the command output, see Table Related commands reset kernel exception display kernel reboot Use display kernel reboot to display kernel thread reboot information. Syntax In standalone mode: display kernel reboot show-number [ offset ] [ verbose ] [ slot slot-number ] In IRF mode: display kernel reboot show-number [ offset ] [ verbose ] [ chassis chassis-number slot slot-number ] Views...
  • Page 276 CPU ID Kernel module info : module name (mrpnc) module address (0xe332a000) module name (12500) module address (0xe00bd000) # Display detailed information about the latest kernel thread reboot. <Sysname> display kernel reboot 1 verbose ----------------- Reboot record 1 ----------------- Recorded at : 2013-05-01 11:16:00.823018 Occurred at...
  • Page 277 0xe2be6020: 02 be 60 40 00 00 00 00 00 00 00 00 02 be 60 98 0xe2be6030: 02 27 00 00 00 00 00 00 00 00 00 00 02 be 60 68 0xe2be6040: 02 be 60 60 00 00 00 01 00 00 b0 30 02 be 60 98 0xe2be6050: 00 00 00 04 02 21 00 00 00 00 00 00 01 e9 00 00 0xe2be6060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be6070: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0...
  • Page 278: Display Kernel Starvation

    display kernel starvation Use display kernel starvation to display kernel thread starvation information. Syntax In standalone mode: display kernel starvation show-number [ offset ] [ verbose ] [ slot slot-number ] In IRF mode: display kernel starvation show-number [ offset ] [ verbose ] [ chassis chassis-number slot slot-number ] Views Any view Predefined user roles...
  • Page 279 ----------------- Starvation record 1 ----------------- Description : INFO: task comsh: 16306 blocked for more than 10 seconds. Recorded at : 2013-05-01 11:16:00.823018 Occurred at : 2013-05-01 11:16:00.823018 Instruction address : 0x4004158c Thread : comsh (TID: 16306) Context : thread context Chassis Slot CPU ID...
  • Page 280 0xe2be5ef0: 95 47 73 35 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f00: a0 e1 64 21 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f10: 00 00 00 00 00 00 00 00 00 00 00 00 01 e9 00 00 0xe2be5f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f30: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0 0xe2be5f40: 02 be 61 e0 00 00 00 02 00 00 00 00 02 44 b3 a4...
  • Page 281: Display Kernel Starvation Configuration

    display kernel starvation configuration Use display kernel starvation configuration to display kernel thread starvation detection configuration. Syntax In standalone mode: display kernel starvation configuration [ slot slot-number] In IRF mode: display kernel starvation configuration [ chassis chassis-number slot slot-number ] Views Any view Predefined user roles...
  • Page 282: Display Process

    monitor kernel starvation time • display process Use display process to display process state information. Syntax In standalone mode: display process [ all | job job-id | name process-name ] [ slot slot-number ] In IRF mode: display process [ all | job job-id | name process-name ] [ chassis chassis-number slot slot-number ] Views Any view Predefined user roles...
  • Page 283 Process state: sleeping Max. core: 0 ARGS: - LAST_CPU Stack State HH:MM:SS:MESC Name 0:0:5:220 scmd Table 59 Command output Field Description Job ID Job ID of the process. The job ID never changes. Number of the process. The number identifies the process, and it might change as the process restarts.
  • Page 284 Field Description Thread state: • R—Running. • S—Sleeping. State • T—Traced or stopped. • D—Uninterruptible sleep. • Z—Zombie. HH:MM:SS:MESC Running time since the latest start. Name Process name. # Display state information for all processes. <Sysname> display process all PID %CPU %MEM STAT PRI TTY HH:MM:SS COMMAND 00:00:04 scmd 00:00:00 [kthreadd]...
  • Page 285: Display Process Cpu

    Field Description State of a process: • R—Running. • S—Sleeping. STAT • T—Traced or stopped. • D—Uninterruptible sleep. • Z—Zombie. Priority of a process for scheduling. TTY used by a process. It displays a hyphen (-) for non-default MDCs. HH:MM:SS Running time since the latest start.
  • Page 286: Display Process Log

    0.1% 0.0% 0.0% [ksoftirqd/0] 0.0% 0.0% 0.0% [watchdog/0] 0.0% 0.0% 0.0% [events/0] 0.0% 0.0% 0.0% [khelper] 0.0% 0.0% 0.0% [kblockd/0] 0.0% 0.0% 0.0% [vzmond] 0.0% 0.0% 0.0% [pdflush] 0.0% 0.0% 0.0% [pdflush] 0.0% 0.0% 0.0% [kswapd0] 0.0% 0.0% 0.0% [aio/0] 0.0% 0.0% 0.0%...
  • Page 287: Display Process Memory

    network-operator mdc-admin mdc-operator Parameters slot slot-number: Specifies a card by its slot number. Without this option, the command displays log information for all user processes on the active MPU. (In standalone mode.) chassis chassis-number slot slot-number: Specifies a card on an IRF member device. Without this option, the command displays log information for all user processes on the global active MPU.
  • Page 288 display process memory [ chassis chassis-number slot slot-number ] Views Any view Predefined user roles network-admin network-operator mdc-admin mdc-operator Parameters slot slot-number: Specifies a card by its slot number. Without this option, the command displays memory usage for all user processes on the active MPU. (In standalone mode.) chassis chassis-number slot slot-number: Specifies a card on an IRF member device.
  • Page 289: Display Process Memory Heap

    Field Description Stack Stack memory used by the user process, in KB. The value for a kernel thread is 0. Dynamic Dynamic memory used by the user process, in KB. The value for a kernel thread is 0. Name of the user process. If square brackets ([ ]) exist in a process name, the process is a Name kernel user mode thread.
  • Page 290: Display Process Memory Heap Address

    command, and view memory block contents by using the display process memory heap address command. Examples # Display brief information about heap memory usage for the process identified by job ID 148. <Sysname> display process memory heap job 148 Total virtual memory heap space(in bytes) : 2228224 Total physical memory heap space(in bytes) : 262144...
  • Page 291 display process memory heap job job-id address starting-address length memory-length [ slot slot-number ] In IRF mode: display process memory heap job job-id address starting-address length memory-length [ chassis chassis-number slot slot-number ] Views Any view Predefined user roles network-admin network-operator mdc-admin mdc-operator...
  • Page 292: Display Process Memory Heap Size

    display process memory heap size Use display process memory heap size to display the addresses of memory blocks with a specified size used by a process. Syntax In standalone mode: display process memory heap job job-id size memory-size [ offset offset-size ] [ slot slot-number ] In IRF mode: display process memory heap job job-id size memory-size [ offset offset-size ] [ chassis chassis-number slot slot-number ]...
  • Page 293: Exception Filepath

    # Display the addresses of 16-byte memory blocks starting from the fifth block used by process job 1. <Sysname> display process memory heap job 1 size 16 offset 4 0xb7e30100 0xb7e30110 0xb7e30120 0xb7e30130 0xb7e30140 0xb7e30150 0xb7e30160 0xb7e30170 0xb7e30180 0xb7e30190 0xb7e301a0 0xb7e301b0 0xb7e301c0 0xb7e301d0...
  • Page 294: Monitor Kernel Deadloop Enable

    monitor kernel deadloop enable Use monitor kernel deadloop enable to enable kernel thread deadloop detection. Use undo monitor kernel deadloop enable to disable kernel thread deadloop detection. Syntax In standalone mode: monitor kernel deadloop enable [ slot slot-number ] undo monitor kernel deadloop enable [ slot slot-number ] In IRF mode: monitor kernel deadloop enable [ chassis chassis-number slot slot-number ] undo monitor kernel deadloop enable [ chassis chassis-number slot slot-number ]...
  • Page 295: Monitor Kernel Deadloop Exclude-Thread

    monitor kernel deadloop time • monitor kernel deadloop exclude-thread Use monitor kernel deadloop exclude-thread to disable kernel thread deadloop detection for a kernel thread. Use undo monitor kernel deadloop exclude-thread to enable kernel thread deadloop detection for a kernel thread. Syntax In standalone mode: monitor kernel deadloop exclude-thread tid [ slot slot-number ]...
  • Page 296: Monitor Kernel Deadloop Time

    display kernel deadloop • • monitor kernel deadloop enable monitor kernel deadloop time • monitor kernel deadloop time Use monitor kernel deadloop time to set the interval for identifying a kernel thread deadloop. Use undo monitor kernel deadloop time to restore the default. Syntax In standalone mode: monitor kernel deadloop time interval [ slot slot-number ]...
  • Page 297: Monitor Kernel Starvation Enable

    Related commands display kernel deadloop configuration • display kernel deadloop • • monitor kernel deadloop enable monitor kernel deadloop exclude-thread • monitor kernel starvation enable Use monitor kernel starvation enable to enable kernel thread starvation detection. Use undo monitor kernel starvation enable to disable kernel thread starvation detection. Syntax In standalone mode: monitor kernel starvation enable [ slot slot-number ]...
  • Page 298: Monitor Kernel Starvation Exclude-Thread

    Examples # Enable kernel thread starvation detection. <Sysname> system-view [Sysname] monitor kernel starvation enable Related commands display kernel starvation configuration • display kernel starvation • monitor kernel starvation time • monitor kernel starvation exclude-thread • monitor kernel starvation exclude-thread Use monitor kernel starvation exclude-thread to disable kernel thread starvation detection for a kernel thread.
  • Page 299: Monitor Kernel Starvation Time

    Inappropriate use of this command can cause service problems or system breakdown. Make sure you understand the impact of this command on your network before you use it. This command is supported only on the default MDC. Examples # Disable kernel thread starvation detection for kernel thread 15. <Sysname>...
  • Page 300: Monitor Process

    Usage guidelines If a thread is not executed within the specified interval, the system considers that a starvation has occurred, and outputs a starvation message. Inappropriate use of this command can cause service problems or system breakdown. Make sure you understand the impact of this command on your network before you use it.
  • Page 301 chassis chassis-number slot slot-number: Specifies a card on an IRF member device. Without this option, the command displays process statistics for the global active MPU. (In IRF mode.) Usage guidelines If you do not specify the dumbtty keyword, the command displays process statistics in an interactive mode.
  • Page 302 00:00:01 0.00% [events/0] 00:00:00 0.00% [khelper] 4797 4797 28832K 00:00:02 0.00% comsh 5117 5117 1496K 00:00:00 0.00% <Sysname> # Display process statistics twice in dumbtty mode. <Sysname> monitor process dumbtty iteration 2 76 processes; 103 threads; 687 fds Thread states: 1 running, 102 sleeping, 0 stopped, 0 zombie CPU states: 44.84% idle, 0.51% user, 39.17% kernel, 15.46% interrupt Memory: 496M total, 341M available, page size 4K State...
  • Page 303 00:00:00 0.00% [watchdog/0] 00:00:00 0.00% [khelper] 4796 4796 2744K 00:00:00 0.00% login 4797 4797 28832K 00:00:03 0.00% comsh <Sysname> # Display process statistics in interactive mode. <Sysname> monitor process 76 processes; 103 threads; 687 fds Thread states: 1 running, 102 sleeping, 0 stopped, 0 zombie CPU states: 78.98% idle, 0.16% user, 14.57% kernel, 6.27% interrupt Memory: 496M total, 341M available, page size 4K State...
  • Page 304 Thread states: 2 running, 111 sleeping, 0 stopped, 0 zombie CPU states: 86.57% idle, 0.83% user, 11.74% kernel, 0.83% interrupt Memory: 755M total, 414M available, page size 4K State HH:MM:SS Name 27020K 00:00:43 8.95% syslogd 1173 1173 2664K 00:00:01 2.37% 10276K 00:00:09 0.69%...
  • Page 305: Monitor Thread

    Field Description State of a process: • R—Running. • S—Sleeping. State • T—Traced or stopped. • D—Uninterruptible sleep. • Z—Zombie. Number of open files for a process. Memory usage. It displays 0 for a kernel thread. HH:MM:SS Running time of a process since last restart. CPU usage of a process.
  • Page 306 Usage guidelines If you do not specify the dumbtty keyword, the command displays thread statistics in an interactive mode. In this mode, the system automatically determines the number of displayed thread processes according to the screen size and does not display exceeding processes. You can also input interactive commands as shown in Table 67 to perform relevant operations.
  • Page 307 CPU states: 94.43% idle, 0.76% user, 3.64% kernel, 1.15% interrupt Memory: 755M total, 417M available, page size 4K LAST_CPU State HH:MM:SS Name 1176 1176 00:00:01 3.42% 00:00:12 0.85% devd 00:00:09 0.64% diagd 00:00:06 0.42% scmd 1160 1160 00:00:01 0.21% sshd 00:00:00 0.00% [kthreadd]...
  • Page 308: Process Core

    LAST_CPU State HH:MM:SS Name 1176 1176 00:00:04 1.86% 00:00:14 0.87% devd 00:00:07 0.49% scmd 00:00:04 0.12% [DIBC] 00:00:22 0.12% [MNET] • Enter q to quit interactive mode. Table 68 Command output Field Description 84 processes; 107 Numbers of processes and threads. threads Job ID of a thread, which never changes.
  • Page 309: Reset Exception Context

    Default A process generates a core file for the first exception and does not generate any core files for subsequent exceptions. Predefined user roles network-admin mdc-admin Parameters off: Disables core file generation. maxcore value: Enables core file generation and sets the maximum number of core files, in the range of 1 to 10.
  • Page 310: Reset Kernel Deadloop

    In IRF mode: reset exception context [ chassis chassis-number slot slot-number ] Views User view Predefined user roles network-admin mdc-admin Parameters slot slot-number: Specifies an MPU by its slot number. If you do not specify this option, the command clears context information for process exceptions on the active MPU. (In standalone mode.) chassis chassis-number slot slot-number: Specifies an MPU on an IRF member device.
  • Page 311: Reset Kernel Exception

    Examples # Clear kernel thread deadloop information. <Sysname> reset kernel deadloop Related commands display kernel deadloop reset kernel exception Use reset kernel exception to clear kernel thread exception information. Syntax In standalone mode: reset kernel exception [ slot slot-number ] In IRF mode: reset kernel exception [ chassis chassis-number slot slot-number ] Views...
  • Page 312: Reset Kernel Starvation

    reset kernel reboot [ chassis chassis-number slot slot-number ] Views User view Predefined user roles network-admin Parameters slot slot-number: Specifies an MPU by its slot number. If you do not specify this option, the command clears kernel thread reboot information for the active MPU. (In standalone mode.) chassis chassis-number slot slot-number: Specifies an MPU on an IRF member device.
  • Page 313 Examples # Clear kernel thread starvation information. <Sysname> reset kernel starvation Related commands display kernel starvation...
  • Page 314: Support And Other Resources

    Related information Documents To find related documents, browse to the Manuals page of the HP Business Support Center website: http://www.hp.com/support/manuals For related documentation, navigate to the Networking section, and select a networking category. •...
  • Page 315: Conventions

    Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown. Italic Italic text represents arguments that you replace with actual values. Square brackets enclose syntax choices (keywords or arguments) that are optional. Braces enclose a set of required syntax choices separated by vertical bars, from which { x | y | ...
  • Page 316 Network topology icons Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features.
  • Page 317: Index

    Index A C D E F H I L M N O P R S T U V X display nqa statistics,27 display ntp-service sessions,84 action cli,236 display ntp-service status,88 action reboot,237 display ntp-service trace,90 action switchover,238 display process,274 action syslog,238 display process cpu,277...
  • Page 318 event cli,242 info-center timestamp,229 event hotplug,243 info-center timestamp loghost,230 event interface,244 info-center trace-logfile quota,231 event process,246 event snmp oid,247 logfile save,232 event snmp-notification,248 lsr-path,41 event syslog,249 exception filepath,285 expect data,34 mirroring-group,182 expect ip,36 mirroring-group mirroring-port (interface view),183 expect ipv6,36 mirroring-group mirroring-port (system view),184 expect status,35...
  • Page 319 ntp-service inbound disable,96 resolve-type,67 ntp-service max-dynamic-sessions,97 rmon alarm,169 ntp-service multicast-client,98 rmon event,171 ntp-service multicast-server,98 rmon history,172 ntp-service refclock-master,99 rmon prialarm,173 ntp-service reliable authentication-keyid,100 rmon statistics,176 ntp-service source,101 route-option bypass-route,68 ntp-service unicast-peer,102 cli-policy,250 ntp-service unicast-server,104 environment,251 rtm scheduler suspend,253 tcl-policy,253 operation (FTP operation view),46 running-time,254 operation (HTTP operation...
  • Page 320 snmp-agent trap log,151 terminal debugging,233 snmp-agent trap queue-size,151 terminal logging level,234 snmp-agent usm-user { v1 | v2c },152 terminal monitor,235 snmp-agent usm-user v3,153 tos,74 sntp authentication enable,106 tracert,8 sntp authentication-keyid,107 tracert ipv6,10 sntp enable,108 ttl,75 sntp reliable authentication-keyid,109 type,76 sntp unicast-server,109 source interface,68...

This manual is also suitable for:

Flexfabric 12500e series

Table of Contents