HPE FlexNetwork MSR3012 Command Reference Manual

HPE FlexNetwork MSR3012 Command Reference Manual

Flexnetwork msr series comware 7 network management and monitoring
Hide thumbs Also See for FlexNetwork MSR3012:
Table of Contents

Advertisement

Quick Links

HPE FlexNetwork MSR Router Series
Comware 7 Network Management and Monitoring

Command Reference

Part number: 5200-2374
Software version: MSR-CMW710-R0411
Document version: 6W101-20161114

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the FlexNetwork MSR3012 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for HPE FlexNetwork MSR3012

  • Page 1: Command Reference

    HPE FlexNetwork MSR Router Series Comware 7 Network Management and Monitoring Command Reference Part number: 5200-2374 Software version: MSR-CMW710-R0411 Document version: 6W101-20161114...
  • Page 2 © Copyright 2016 Hewlett Packard Enterprise Development LP The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
  • Page 3: Table Of Contents

    Contents Ping, tracert, and system debugging commands ·····································1 debugging ···························································································································· 1 display debugging ················································································································· 1 ping ···································································································································· 2 ping ipv6 ······························································································································ 5 tracert ································································································································· 7 tracert ipv6 ························································································································· 10 NQA commands ············································································ 12 NQA client commands ················································································································ 12 advantage-factor ················································································································· 12 codec-type ·························································································································...
  • Page 4 rresolve-target ···················································································································· 65 route-option bypass-route ····································································································· 66 source interface ·················································································································· 67 source ip ···························································································································· 67 source ipv6 ························································································································ 68 source port ························································································································· 69 statistics hold-time ··············································································································· 69 statistics interval ·················································································································· 70 statistics max-group ············································································································· 71 target-only·························································································································· 71 tos ···································································································································· 72 ttl······································································································································...
  • Page 5 PoE commands ··········································································· 121 apply poe-profile ··············································································································· 121 apply poe-profile interface ··································································································· 122 display poe device ············································································································· 122 display poe interface ·········································································································· 124 display poe interface power ································································································· 127 display poe power-usage ···································································································· 128 display poe pse ················································································································· 130 display poe pse interface ···································································································· 132 display poe pse interface power ···························································································...
  • Page 6 snmp-agent trap life ··········································································································· 189 snmp-agent trap log ··········································································································· 189 snmp-agent trap queue-size ································································································ 190 snmp-agent usm-user { v1 | v2c } ························································································· 191 snmp-agent usm-user v3 ···································································································· 192 snmp-agent usm-user v3 user-role ······················································································· 196 RMON commands ········································································ 198 display rmon alarm ············································································································ 198 display rmon event ············································································································...
  • Page 7 value (trigger-Boolean view) ································································································ 250 wildcard context (action-set view) ························································································· 251 wildcard context (trigger view) ······························································································ 251 wildcard oid (action-set view) ······························································································· 252 wildcard oid (trigger view) ··································································································· 253 NETCONF commands ·································································· 254 netconf idle-timeout ··········································································································· 254 netconf log ······················································································································· 255 netconf soap http acl ··········································································································...
  • Page 8 Process monitoring and maintenance commands ································ 299 display exception context ···································································································· 299 display exception filepath ···································································································· 304 display kernel deadloop ······································································································ 305 display kernel deadloop configuration ···················································································· 308 display kernel exception ····································································································· 310 display kernel reboot ·········································································································· 313 display kernel starvation ····································································································· 316 display kernel starvation configuration ···················································································...
  • Page 9 ip netstream export v9-template refresh-rate packet ································································· 382 ip netstream export v9-template refresh-rate time ···································································· 382 ip netstream export version ································································································· 383 ip netstream max-entry ······································································································· 384 ip netstream mpls ·············································································································· 385 ip netstream timeout active·································································································· 385 ip netstream timeout inactive ······························································································· 386 reset ip netstream statistics ·································································································...
  • Page 10 info-center logfile size-quota ································································································ 433 info-center logging suppress duplicates ················································································· 433 info-center loghost ············································································································· 435 info-center loghost source ··································································································· 435 info-center security-logfile alarm-threshold ············································································· 436 info-center security-logfile directory ······················································································· 437 info-center security-logfile enable ························································································· 438 info-center security-logfile frequency ····················································································· 438 info-center security-logfile size-quota ····················································································...
  • Page 11: Ping, Tracert, And System Debugging Commands

    Ping, tracert, and system debugging commands debugging Use debugging to enable debugging for a module. Use undo debugging to disable debugging for a module. Syntax debugging module-name [ option ] undo debugging module-name [ option ] Default Debugging is disabled for all modules. Views User view Predefined user roles...
  • Page 12: Ping

    Views Any view Predefined user roles network-admin network-operator Parameters module-name: Specifies a module by its name. For a list of supported modules, use the display debugging ? command. If you do not specify a module name, this command displays the enabled debugging features for all modules.
  • Page 13 -n: Disables domain name resolution for the host argument. If the host argument represents the host name of the destination, and if this keyword is not specified, the device translates host into an address. -p pad: Specifies the value of the pad field in an ICMP echo request, in hexadecimal format, 1 to 8 bits.
  • Page 14 # Test whether the device with an IP address of 1.1.2.2 in VPN 1 is reachable. <Sysname> ping -vpn-instance vpn1 1.1.2.2 Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break 56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms 56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms 56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms 56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms 56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms...
  • Page 15: Ping Ipv6

    Field Description Received ICMP echo replies from the device whose IP address is 1.1.2.2. If no echo reply is received within the timeout period, no information is displayed. • bytes—Number of bytes in the ICMP echo reply. 56 bytes from 1.1.2.2: icmp_seq=0 •...
  • Page 16 -s packet-size: Specifies the length (in bytes) of ICMPv6 echo requests (excluding the IPv6 packet header and the ICMPv6 packet header). The value range is 20 to 8100, and the default is 56. -t timeout: Specifies the timeout time (in milliseconds) of an ICMPv6 echo reply. The value range is 0 to 65535, and the default is 2000.
  • Page 17: Tracert

    --- Ping6 statistics for 2001::2 --- 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 4.000/25.000/62.000/20.000 ms The output shows that: • The destination is reachable, and ICMPv6 echo requests are replied. • The minimum/average/maximum/standard deviation roundtrip time of packets is 4 milliseconds, 25 milliseconds, 62 milliseconds, and 20 milliseconds.
  • Page 18 -f first-ttl: Specifies the TTL of the first packet sent to the destination. The value range is 1 to 255, and the default is 1. It must be no greater than the value of the max-ttl argument. -m max-ttl: Specifies the maximum number of hops allowed for a probe packet. The value range is 1 to 255, and the default is 30.
  • Page 19 1.1.1.2 (1.1.1.2) 673 ms 425 ms 30 ms 1.1.2.2 (1.1.2.2) [AS 100] 580 ms 470 ms 80 ms # Display the path that the packets traverse from source to destination (1.1.3.2) in VPN instance vpn1, as well as the AS information of the hops along the path. <Sysname>...
  • Page 20: Tracert Ipv6

    tracert ipv6 Use tracert ipv6 to display the path that the IPv6 packets traverse from source to destination. Syntax tracert ipv6 [ -f first-hop | -m max-hops | -p port | -q packet-number | -t traffic-class | -vpn-instance vpn-instance-name [ -resolve-as { global | none | vpn } ] | -w timeout ] * host Views Any view Predefined user roles...
  • Page 21 The output from the tracert ipv6 command includes IPv6 addresses of all the Layer 3 devices that the packets traverse from source to destination. Asterisks (* * *) are displayed if the device cannot reply with an ICMP error message. The reason might be the destination is unreachable or sending ICMP timeout/destination unreachable packets is disabled.
  • Page 22: Nqa Commands

    NQA commands NQA client commands advantage-factor Use advantage-factor to set the advantage factor to be used for calculating Mean Opinion Scores (MOS) and Calculated Planning Impairment Factor (ICPIF) values. Use undo advantage-factor to restore the default. Syntax advantage-factor factor undo advantage-factor Default The advantage factor is 0.
  • Page 23: Data-Fill

    Views Voice operation view Predefined user roles network-admin Parameters g711a: Specifies G.711 A-law codec type. g711u: Specifies G.711 µ-law codec type g729a: Specifies G.729 A-law codec type. Examples # Set the codec type to g729a for the voice operation. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type voice [Sysname-nqa-admin-test-voice] codec-type g729a...
  • Page 24: Data-Size

    • For the UDP jitter operation, the first 68 bytes of the payload of a UDP packet are for special purpose. The string fills the remaining part of the payload. • For the voice operation, the first 16 bytes of the payload of a UDP packet are for special purpose.
  • Page 25: Description

    Parameters size: Specifies the payload size. Available value ranges include: • 20 to 65507 bytes for the ICMP echo, UDP echo, or UDP tracert operation. • 68 to 65507 bytes for the UDP jitter or path jitter operation. • 16 to 65507 bytes for the voice operation. Usage guidelines In ICMP echo and path jitter operations, the command sets the payload size for each ICMP echo request.
  • Page 26: Destination Ip

    destination ip Use destination ip to configure the destination IPv4 address for the operation. Use undo destination ip to restore the default. Syntax destination ip ip-address undo destination ip Default No destination IPv4 address is configured for an operation. Views DHCP/DLSw/DNS/SNMP/TCP/voice operation view ICMP/UDP echo operation view ICMP/path/UDP jitter operation view...
  • Page 27: Destination Port

    Examples # In ICMP echo operation view, specify 1::1 as the destination IPv6 address for ICMP echo requests. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] destination ipv6 1::1 destination port Use destination port to configure the destination port number for the operation. Use undo destination port to restore the default.
  • Page 28 network-operator Parameters admin-name operation-tag: Specifies an NQA operation by its administrator name and operation tag. The admin-name argument represents the name of the administrator who creates the NQA operation. The operation-tag argument represents the operation tag. Each of the arguments is a case-insensitive string of 1 to 32 characters that cannot contain hyphens (-).
  • Page 29: Display Nqa Reaction Counters

    Table 6 Command output Field Description History record ID. Index The history records in one UDP tracert operation have the same ID. TTL value in the probe packet. Round-trip time if the operation succeeds, timeout time upon timeout, or 0 if the Response operation cannot be completed, in milliseconds.
  • Page 30 <Sysname> display nqa reaction counters admin test NQA entry (admin admin, tag test) reaction counters: Index Checked Element Threshold Type Checked Num Over-threshold Num probe-duration accumulate probe-duration average probe-duration consecutive probe-fail accumulate probe-fail consecutive Table 7 Command output Field Description Index ID of a reaction entry.
  • Page 31: Display Nqa Result

    Monitored Threshold performance Collect data in Checked Num Over-threshold Num type metric ICPIF display nqa result Use display nqa result to display the most recent result of the specified NQA operation. Syntax display nqa result [ admin-name operation-tag ] Views Any view Predefined user roles network-admin...
  • Page 32 Last packet received time: 2015-03-09 17:40:29.8 Extended results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0 Packets arrived late: 0 ICMP-jitter results: RTT number: 10 Min positive SD: 0 Min positive DS: 0...
  • Page 33 Positive SD number: 5 Positive DS number: 2 Positive SD sum: 75 Positive DS sum: 32 Positive SD average: 15 Positive DS average: 16 Positive SD square-sum: 1189 Positive DS square-sum: 640 Min negative SD: 8 Min negative DS: 1 Max negative SD: 24 Max negative DS: 30 Negative SD number: 4...
  • Page 34 Max SD delay: 0 Max DS delay: 0 Min SD delay: 0 Min DS delay: 0 Number of SD delay: 0 Number of DS delay: 0 Sum of SD delay: 0 Sum of DS delay: 0 Square-Sum of SD delay: 0 Square-Sum of DS delay: 0 SD lost packets: 0 DS lost packets: 0...
  • Page 35 Path-Jitter Results: Jitter number: 9 Min/Max/Average jitter: 0/0/0 Positive jitter number: 0 Min/Max/Average positive jitter: 0/0/0 Sum/Square-Sum positive jitter: 0/0 Negative jitter number: 0 Min/Max/Average negative jitter: 0/0/0 Sum/Square-Sum negative jitter: 0/0 # Display the most recent result of the UDP tracert operation with administrator name admin and operation tag test.
  • Page 36 Field Description Failures due to internal error Number of failures due to internal errors. Failures due to other errors Failures due to other errors. Packets out of sequence Number of failures due to out-of-sequence packets. Packets arrived late Number of response packets received after a probe times out. UDP jitter operation results.
  • Page 37 Field Description Average absolute value of negative jitters from source to Negative SD average destination. Average absolute value of negative jitters from destination to Negative DS average source. Negative SD square-sum Square sum of negative jitters from source to destination. Negative DS square-sum Square sum of negative jitters from destination to source.
  • Page 38: Display Nqa Statistics

    Field Description Minimum/maximum/average positive jitter in milliseconds. Min/Max/Average positive jitter This field is available only for the path jitter operation. Sum/square sum of the positive jitter. Sum/Square-Sum positive jitter This field is available only for the path jitter operation. Number of negative jitter. Negative jitter number This field is available only for the path jitter operation.
  • Page 39 <Sysname> display nqa statistics admin test NQA entry (admin admin, tag test) test statistics: NO. : 1 Start time: 2007-01-01 09:30:20.0 Life time: 2 seconds Send operation times: 1 Receive response times: 1 Min/Max/Average round trip time: 13/13/13 Square-Sum of round trip time: 169 Extended results: Packet loss ratio: 0% Failures due to timeout: 0...
  • Page 40 Min SD delay: 1 Min DS delay: 1 Number of SD delay: 4 Number of DS delay: 4 Sum of SD delay: 4 Sum of DS delay: 5 Square-Sum of SD delay: 4 Square-Sum of DS delay: 7 Lost packets for unknown reason: 0 Reaction statistics: Index Checked Element...
  • Page 41 Sum of SD delay: 1475 Sum of DS delay: 1201 Square-Sum of SD delay: 5407 Square-Sum of DS delay: 3959 SD lost packets: 0 DS lost packets: 0 Lost packets for unknown reason: 0 Reaction statistics: Index Checked Element Threshold Type Checked Num Over-threshold Num jitter-DS...
  • Page 42 SD lost packets: 0 DS lost packets: 0 Lost packets for unknown reason: 0 Voice scores: Max MOS value: 4.40 Min MOS value: 4.40 Max ICPIF value: 0 Min ICPIF value: 0 Reaction statistics: Index Checked Element Threshold Type Checked Num Over-threshold Num ICPIF # Display the statistics for the path jitter operation with administrator name admin and operation tag...
  • Page 43 Packets out of sequence: 0 Packets arrived late: 0 Path-Jitter Results: Jitter number: 9 Min/Max/Average jitter: 0/0/0 Positive jitter number: 0 Min/Max/Average positive jitter: 0/0/0 Sum/Square-Sum positive jitter: 0/0 Negative jitter number: 0 Min/Max/Average negative jitter: 0/0/0 Sum/Square-Sum negative jitter: 0/0 Table 10 Command output Field Description...
  • Page 44 Field Description Max positive DS Maximum positive jitter from destination to source. Positive SD number Number of positive jitters from source to destination. Positive DS number Number of positive jitters from destination to source. Positive SD sum Sum of positive jitters from source to destination. Positive DS sum Sum of positive jitters from destination to source.
  • Page 45 Field Description Sum of SD delay Sum of delays from source to destination. Sum of DS delay Sum of delays from destination to source. Square-Sum of SD delay Square sum of delays from source to destination. Square-Sum of DS delay Square sum of delays from destination to source.
  • Page 46: Filename

    Field Description Number of negative jitters. Negative jitter number This field is available only for the path jitter operation. Minimum/maximum/average negative jitter in milliseconds. Min/Max/Average negative jitter This field is available only for the path jitter operation. Sum/square sum of negative jitters. Sum/Square-Sum negative jitter This field is available only for the path jitter operation.
  • Page 47: Frequency

    Use undo filename to restore the default. Syntax filename filename undo filename Default No file is specified. Views FTP operation view Predefined user roles network-admin Parameters filename: Specifies the name of a file, a case-sensitive string of 1 to 200 characters that cannot contain slashes (/).
  • Page 48: History-Record Enable

    Usage guidelines If an operation is not completed when the interval is reached, the next operation does not start. Examples # Configure the ICMP echo operation to repeat every 1000 milliseconds. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] frequency 1000 history-record enable Use history-record enable to enable the saving of history records for the NQA operation.
  • Page 49: History-Record Number

    undo history-record keep-time Default The history records of an NQA operation are kept for 120 minutes. Views DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view ICMP/UDP echo operation view UDP tracert operation view Predefined user roles network-admin Parameters keep-time: Specifies how long the history records can be saved. The value range is 1 to 1440 minutes.
  • Page 50: Init-Ttl

    Usage guidelines If the number of history records for an NQA operation exceeds the maximum number, earliest history records are removed. Examples # Set the maximum number of history records to 10 for the ICMP echo operation. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] history-record number 10 init-ttl...
  • Page 51: Max-Failure

    Views Path jitter operation view Predefined user roles network-admin Parameters ip-address&<1-8>: Specifies a space-separated list of up to eight IP addresses. Each IP address represents a hop on the path. Usage guidelines The path jitter operation first uses tracert to detect each hop to the destination. It then sends ICMP echo requests to measure the delay and jitters from the source to each node.
  • Page 52: Mode

    [Sysname-nqa-admin-test] type udp-tracert [Sysname-nqa-admin-test-udp-tracert] max-failure 20 mode Use mode to set the data transmission mode for the FTP operation. Use undo mode to restore the default. Syntax mode { active | passive } undo mode Default The FTP operation uses the active data transmission mode. Views FTP operation view Predefined user roles...
  • Page 53: Next-Hop Ipv6

    Usage guidelines If the next hop IPv4 address is not configured, the device searches the routing table to determine the next hop IPv4 address for the probe packets. Examples # Specify 10.1.1.1 as the next hop IPv4 address for the ICMP echo operation. <Sysname>...
  • Page 54: Nqa

    Default The no-fragmentation feature is disabled. Views UDP tracert operation view Predefined user roles network-admin Usage guidelines The no-fragmentation feature sets the DF field to 1. Packets with the DF field set cannot be fragmented during the forwarding process. You can use this command to test the path MTU of a link. Examples # Enable the no-fragmentation feature for the UDP tracert operation.
  • Page 55: Nqa Agent Enable

    nqa agent enable Use nqa agent enable to enable the NQA client. Use undo nqa agent enable to disable the NQA client and stop all operations being performed. Syntax nqa agent enable undo nqa agent enable Default The NQA client is enabled. Views System view Predefined user roles...
  • Page 56: Operation (Ftp Operation View)

    yyyy/mm/dd: Specifies the start date of an NQA operation. The default value is the current system time, and the value for the yyyy argument is in the range of 2000 to 2035. mm/dd/yyyy: Specifies the start date of an NQA operation. The default value is the current system time, and the value for the yyyy argument is in the range of 2000 to 2035.
  • Page 57: Operation (Http Operation View)

    Parameters get: Gets a file from the FTP server. put: Transfers a file to the FTP server. Usage guidelines When you perform the put operation with the filename command configured, make sure the file exists on the NQA client. If you get a file from the FTP server, make sure the file specified in the URL exists on the FTP server. The NQA client does not save the file obtained from the FTP server.
  • Page 58: Out Interface

    For the raw operation, the content in the request is configured in raw request view. You can use the raw-request command to enter the raw request view. Examples # Set the operation type to raw for the HTTP operation. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] operation raw...
  • Page 59: Password

    password Use password to specify a password. Use undo password to restore the default. Syntax password { cipher | simple } string undo password Default No password is specified. Views FTP operation view HTTP operation view Predefined user roles network-admin Parameters cipher: Specifies a password in encrypted form.
  • Page 60 Views DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view ICMP/UDP echo operation view ICMP/UDP jitter operation view UDP tracert operation view Predefined user roles network-admin Parameters times: Specifies the probe times. • For the UDP tracert operation, this argument specifies the times of probes to each hop along the path.
  • Page 61: Probe Packet-Interval

    [Sysname-nqa-admin-test-icmp-echo] probe count 10 probe packet-interval Use probe packet-interval to configure the packet sending interval in the probe. Use undo probe packet-interval to restore the default. Syntax probe packet-interval interval undo probe packet-interval Default The packet sending interval is 20 milliseconds. Views ICMP jitter operation view Path jitter operation view...
  • Page 62: Probe Packet-Timeout

    Voice operation view Predefined user roles network-admin Parameters packet-number: Specifies the number of packets to be sent per probe. Available value ranges include: • 10 to 1000 for the ICMP jitter, UDP jitter, or path jitter operation. • 10 to 60000 for the voice operation. Examples # Configure the UDP jitter probe to send 100 packets.
  • Page 63: Probe Timeout

    probe timeout Use probe timeout to set the probe timeout time. Use undo probe timeout to restore the default. Syntax probe timeout timeout undo probe timeout Default The timeout time of a probe is 3000 milliseconds. Views DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view ICMP/UDP echo operation view UDP tracert operation view Predefined user roles...
  • Page 64: Reaction Checked-Element { Jitter-Ds | Jitter-Sd

    Predefined user roles network-admin Usage guidelines This command places you in raw request view and deletes the previously configured request content. To ensure successful operations, make sure the request content is in the correct format. If the HTTP operation type is set to raw, you must enter raw request view and configure the request content to be sent to the HTTP server.
  • Page 65: Reaction Checked-Element { Owd-Ds | Owd-Sd

    threshold-value: Specifies threshold range in milliseconds. upper-threshold: Specifies the upper limit in the range of 0 to 3600000. lower-threshold: Specifies the lower limit in the range of 0 to 3600000. It must not be greater than the upper limit. action-type: Specifies the action to be triggered. The default action is none. none: Specifies the action of displaying results on the terminal display.
  • Page 66: Reaction Checked-Element Icpif

    Default No reaction entries for monitoring the one-way delay exist. Views ICMP jitter operation view UDP jitter operation view Voice operation view Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. owd-ds: Specifies the destination-to-source delay of each probe packet as the monitored element.
  • Page 67: Reaction Checked-Element Mos

    undo reaction item-number Default No reaction entries for monitoring ICPIF values exist. Views Voice operation view Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. threshold-value: Specifies threshold range. upper-threshold: Specifies the upper limit in the range of 1 to 100.
  • Page 68: Reaction Checked-Element Packet-Loss

    Views Voice operation view Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. threshold-value: Specifies threshold range. upper-threshold: Specifies the upper limit in the range of 1 to 500. lower-threshold: Specifies the lower limit in the range of 1 to 500.
  • Page 69: Reaction Checked-Element Probe-Duration

    Views ICMP jitter operation view UDP jitter operation view Voice operation view Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. threshold-type: Specifies a threshold type. accumulate accumulate-occurrences: Specifies the total number of lost packets in the operation. The value range is 1 to 15000 for the ICMP jitter and UDP jitter operations, and 1 to 60000 for the voice operation.
  • Page 70 Views DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view ICMP/UDP echo operation view Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. threshold-type: Specifies a threshold type. accumulate accumulate-occurrences: Checks the total number of threshold violations. The value range is 1 to 15.
  • Page 71: Reaction Checked-Element Probe-Fail (For Trap)

    [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction 2 checked-element probe-duration threshold-type accumulate 10 threshold-value 50 5 action-type trap-only # Create reaction entry 3 for monitoring the probe duration time of ICMP echo operation, and set the upper limit to 50 milliseconds and the lower limit to 5 milliseconds. Before the NQA operation starts, the initial state of the reaction entry is invalid.
  • Page 72: Reaction Checked-Element Probe-Fail (For Trigger)

    Usage guidelines You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use the undo reaction command to delete the entry, and then configure a new one. Examples # Create reaction entry 1 for monitoring the probe failures in ICMP echo operation. Before the NQA operation starts, the initial state of the reaction entry is invalid.
  • Page 73: Reaction Checked-Element Rtt

    action-type: Specifies what action to be triggered. trigger-only: Triggers other modules to react to certain conditions. Usage guidelines You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use the undo reaction command to delete the entry, and then configure a new one. Examples # Create reaction entry 1.
  • Page 74: Reaction Trap

    upper-threshold: Specifies the upper limit in the range of 0 to 3600000. lower-threshold: Specifies the lower limit in the range of 0 to 3600000. It must not be greater than the upper limit. action-type: Specifies what action to be triggered. The default action is none. none: Specifies the action of displaying results on the terminal display.
  • Page 75: Rresolve-Target

    ICMP/UDP echo operation view ICMP/UDP jitter operation view UDP tracert operation view Predefined user roles network-admin Parameters path-change: Sends a trap when the UDP tracert operation detects a different path to the destination. probe-failure consecutive-probe-failures: Sends a trap to the NMS if the number of consecutive probe failures in an operation is greater than or equal to consecutive-probe-failures.
  • Page 76: Route-Option Bypass-Route

    Predefined user roles network-admin Parameters domain-name: Specifies the domain name to be resolved. It is a dot-separated case-sensitive string of 1 to 255 characters including letters, digits, hyphens (-), and underscores (_) (for example, aabbcc.com). Each part consists of 1 to 63 characters, and consecutive dots (.) are not allowed. Examples # Specify domain1 as the domain name to be resolved.
  • Page 77: Source Interface

    source interface Use source interface to specify the IP address of the specified interface as the source IP address of probe packets. Use undo source interface to restore the default. Syntax source interface interface-type interface-number undo source interface Default No source IP address is specified for probe packets. The probe packets take the primary IP address of the outgoing interface as their source IP address.
  • Page 78: Source Ipv6

    Default The probe packets takes the IP address of their output interface as the source IP address. Views DHCP/DLSw/FTP/HTTP/SNMP/TCP/voice operation view ICMP/UDP echo operation view ICMP/path/UDP jitter operation view UDP tracert operation view Predefined user roles network-admin Parameters ip-address: Specifies the source IPv4 address for probe packets. Usage guidelines If you execute the source interface and source ip commands for an ICMP echo or UDP tracert operation multiple times, the most recent configuration takes effect.
  • Page 79: Source Port

    Usage guidelines If you execute the source interface and source ipv6 commands for an ICMP echo operation multiple times, the most recent configuration takes effect. The specified source IPv6 address must be the IPv6 address of a local interface. The local interface must be up.
  • Page 80: Statistics Interval

    Use undo statistics hold-time to restore the default. Syntax statistics hold-time hold-time undo statistics hold-time Default The hold time of statistics groups for an NQA operation is 120 minutes. Views DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP/voice operation view ICMP/UDP echo operation view ICMP/path/UDP jitter operation view Predefined user roles network-admin Parameters...
  • Page 81: Statistics Max-Group

    Usage guidelines NQA forms statistics within the same collection interval as a statistics group. To display information about the statistics groups, use the display nqa statistics command. Examples # Configure NQA to collect the ICMP echo operation statistics every 2 minutes. <Sysname>...
  • Page 82: Tos

    Syntax target-only undo target-only Default NQA performs the path jitter operation to the destination hop by hop. Views Path jitter operation view Predefined user roles network-admin Examples # Perform the path jitter operation only on the destination address. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type path-jitter [Sysname-nqa-admin-test-path-jitter] target-only...
  • Page 83: Type

    Syntax ttl value undo ttl Default The maximum number of hops is 30 for probe packets of the UDP tracert operation, and is 20 for probe packets of other types of operations. Views DLSw/DNS/FTP/HTTP/SNMP/TCP/voice operation view ICMP/UDP echo operation view ICMP/UDP jitter operation view UDP tracert operation view Predefined user roles...
  • Page 84: Url

    Parameters dhcp: Specifies the DHCP operation type. dlsw: Specifies the DLSw operation type. dns: Specifies the DNS operation type. ftp: Specifies the FTP operation type. http: Specifies the HTTP operation type. icmp-echo: Specifies the ICMP echo operation type. icmp-jitter: Specifies the ICMP jitter operation type. path-jitter: Specifies the path jitter operation type.
  • Page 85: Username

    Operation URL format Parameter description The host parameter represents the host name of the destination server. The host name is a dot-separated http://host/resource HTTP operation case-sensitive string including letters, digits, hyphens http://host:port/resource (-), and underscores (_). Host names are composed of series of labels, aabbcc.com for example.
  • Page 86: Version

    version Use version to specify the version used in the HTTP operation. Use undo version to restore the default. Syntax version { v1.0 | v1.1 } undo version Default Version 1.0 is used in the HTTP operation. Views HTTP operation view Predefined user roles network-admin Parameters...
  • Page 87: Nqa Server Commands

    Parameters vpn-instance-name: Specifies a VPN instance by its name, a case-sensitive string of 1 to 31 characters. Usage guidelines After you specify the VPN, the NQA operation tests the connectivity in the specified VPN instance. Examples # Apply the ICMP echo operation to vpn1. <Sysname>...
  • Page 88: Nqa Server Enable

    Field Description ToS value in reply packets sent by the NQA server. Name of the VPN instance to which the IP address that the NQA server Vpn-instance listens on belongs. This field displays a hyphen (-) if the NQA server listens on a public IP address.
  • Page 89: Nqa Server Udp-Echo

    Default No TCP listening services exist. Views System view Predefined user roles network-admin Parameters ip-address: Specifies the IP address for the TCP listening service. port-number: Specifies the port number for the TCP listening service, in the range of 1 to 65535. vpn-instance vpn-instance-name: Specifies a VPN instance by its name, a case-sensitive string of 1 to 31 characters.
  • Page 90 Views System view Predefined user roles network-admin Parameters ip-address: Specifies the IP address for the UDP listening service. port-number: Specifies the port number for the UDP listening service, in the range of 1 to 65535. vpn-instance vpn-instance-name: Specifies a VPN instance by its name, a case-sensitive string of 1 to 31 characters.
  • Page 91: Ntp Commands

    NTP commands NTP is supported on the following Layer 3 interfaces: • Layer 3 Ethernet interfaces. • Layer 3 Ethernet subinterfaces. • Layer 3 aggregate interfaces. • VLAN interfaces. • Tunnel interfaces. display ntp-service ipv6 sessions Use display ntp-service ipv6 sessions to display information about all IPv6 NTP associations. Syntax display ntp-service ipv6 sessions [ verbose ] Views...
  • Page 92 Field Description IPv6 address of the NTP server. If this field displays::, the IPv6 address of Source the NTP server has not been resolved successfully. Reference clock ID of the NTP server: • If the reference clock is the local clock, the value of this field is related to the value of the Clock stratum field: When the value of the Clock stratum field is 0 or 1, this field ...
  • Page 93 Peer mode: unspec, peer poll interval: 10 Offset: 0.0000ms, roundtrip delay: 0.0000ms, dispersion: 15937ms Root roundtrip delay: 0.0000ms, root dispersion: 0.0000ms Reachabilities:0, sync distance: 15.938 Precision: 2^10, version: 4, source interface: Not specified Reftime: 00000000.00000000 Thu, Feb 7 2036 6:28:16.000 Orgtime: d17cbb21.0f318106 Tue, May 17 2011 9:15:13.059...
  • Page 94 Field Description • If the reference clock is the local clock, the value of this field is related to the value of the Clock stratum field: When the value of the Clock stratum field is 0 or 1, this  field displays LOCL.
  • Page 95: Display Ntp-Service Sessions

    Field Description Synchronization distance relative to the upper-level clock, in sync distance seconds, and calculated from dispersion and roundtrip delay values. Precision Accuracy of the system clock. version NTP version in the range of 1 to 4. Source interface. source interface If the source interface is not specified, this field displays Not specified.
  • Page 96 source reference stra reach poll now offset delay disper ******************************************************************************** [12345]LOCAL(0) LOCL - 0.0000 0.0000 7937.9 [5]0.0.0.0 INIT - 0.0000 0.0000 0.0000 Notes: 1 source(master), 2 source(peer), 3 selected, 4 candidate, 5 configured. Total sessions: 1 Table 15 Command output Field Description •...
  • Page 97 Field Description • 1—Clock source selected by the system(the current reference source). • 2—The stratum level of the clock source is less than or equal to 15. • 3—The clock source has survived the clock selection algorithm. [12345] • 4—The clock source is a candidate clock source. •...
  • Page 98 Field Description Status of the clock source corresponding to this association: • configured—The association created configuration command. • dynamic—The association is established dynamically. • master—The clock source is the primary time server of the current system. • selected—The clock source has survived the clock selection algorithm.
  • Page 99: Display Ntp-Service Status

    Field Description Operation mode of the peer device: • unspec—The mode is unspecified. • active—Active mode. • passive—Passive mode. Peer mode • client—Client mode. • server—Server mode. • broadcast—Broadcast or multicast server mode. • bclient—Broadcast or multicast client mode. Polling interval of the peer device, in seconds. The value peer poll interval displayed is a power of 2.
  • Page 100 Syntax display ntp-service status Views Any view Predefined user roles network-admin network-operator Examples # Display NTP service status after time synchronization. <Sysname>display ntp-service status Clock status: synchronized Clock stratum: 2 System peer: LOCAL(0) Local mode: client Reference clock ID: 127.127.1.0 Leap indicator: 00 Clock jitter: 0.000977 s Stability: 0.000 pps...
  • Page 101 Field Description Operation mode of the local device: • unspec—The mode is unspecified. • active—Active mode. • passive—Passive mode. Local mode • client—Client mode. • server—Server mode. • broadcast—Broadcast or multicast server mode. • bclient—Broadcast or multicast client mode. For an IPv4 NTP server: The field represents the IP address of the remote server when the local device is synchronized to a remote NTP server.
  • Page 102: Display Ntp-Service Trace

    display ntp-service trace Use display ntp-service trace to display brief information about each NTP server from the local device back to the primary time server. Syntax display ntp-service trace [ source interface-type interface-number ] Views Any view Predefined user roles network-admin network-operator Parameters...
  • Page 103: Ntp-Service Acl

    Related commands ntp-service ipv6 source ntp-service ipv6 unicast-peer ntp-service ipv6 unicast-server ntp-service source ntp-service unicast-peer ntp-service unicast-server ntp-service acl Use ntp-service acl to configure the right for peer devices to access the NTP services on the local device. Use undo ntp-service acl to remove the configured NTP service access right. Syntax ntp-service { peer | query | server | synchronization } acl ipv4-acl-number undo ntp-service { peer | query | server | synchronization } [ acl ipv4-acl-number ]...
  • Page 104: Ntp-Service Authentication Enable

    The ntp-service acl command provides minimal security for a system running NTP. A more secure method is NTP authentication. Examples # Configure the peer devices on subnet 10.10.0.0/16 to have full access to the local device. <Sysname> system-view [Sysname] acl basic 2001 [Sysname-acl-ipv4-basic-2001] rule permit source 10.10.0.0 0.0.255.255 [Sysname-acl-ipv4-basic-2001] quit [Sysname] ntp-service peer acl 2001...
  • Page 105 Use undo ntp-service authentication-keyid to remove an NTP authentication key. Syntax ntp-service authentication-keyid keyid authentication-mode md5 { cipher | simple } string [ acl ipv4-acl-number | ipv6 acl ipv6-acl-number ] * undo ntp-service authentication-keyid keyed Default No NTP authentication key is set. Views System view Predefined user roles...
  • Page 106: Ntp-Service Broadcast-Client

    [Sysname] ntp-service authentication enable [Sysname] ntp-service authentication-keyid 10 authentication-mode md5 simple BetterKey Related commands ntp-service authentication enable ntp-service reliable authentication-keyid ntp-service broadcast-client Use ntp-service broadcast-client to configure the device to operate in NTP broadcast client mode and use the current interface to receive NTP broadcast packets. Use undo ntp-service broadcast-client to remove the configuration.
  • Page 107: Ntp-Service Dscp

    Default The device does not operate in any NTP association mode. Views Interface view Predefined user roles network-admin Parameters authentication-keyid keyid: Specifies the key ID to be used for sending broadcast messages to broadcast clients. The value range for the keyid argument is 1 to 4294967295. If you do not specify this option, the local device cannot synchronize broadcast clients enabled with NTP authentication.
  • Page 108: Ntp-Service Enable

    Usage guidelines The DSCP value is included in the ToS field of an IPv4 packet to identify the packet priority. Examples # Set the DSCP value for IPv4 NTP packets to 30. <Sysname> system-view [Sysname] ntp-service dscp 30 ntp-service enable Use ntp-service enable to enable the NTP service.
  • Page 109: Ntp-Service Ipv6 Acl

    • You do not want the device to be synchronized by the peer device in the subnet corresponding to the interface. Examples # Disable GigabitEthernet 1/0/1 from receiving NTP messages. <Sysname> system-view [Sysname] interface gigabitethernet 1/0/1 [Sysname-GigabitEthernet1/0/1] undo ntp-service inboundenable ntp-service ipv6 acl Use ntp-service ipv6 acl to configure the right for the peer devices to access the IPv6 NTP services of the local device.
  • Page 110: Ntp-Service Ipv6 Dscp

    The ntp-service ipv6 acl command provides a minimum security method. NTP authentication is more secure. Examples # Configure the peer devices on subnet 2001::1 to have full access to the local device. <Sysname> system-view [Sysname] acl ipv6 basic 2001 [Sysname-acl-ipv6-basic-2001] rule permit source 2001::1 64 [Sysname-acl-ipv6-basic-2001] quit [Sysname] ntp-service ipv6 peer acl 2001 Related commands...
  • Page 111: Ntp-Service Ipv6 Multicast-Client

    Syntax ntp-service ipv6 inbound enable undo ntp-service ipv6 inbound enable Default An interface receives IPv6 NTP messages. Views Interface view Predefined user roles network-admin Usage guidelines Execute the undo ntp-service ipv6 inbound enable command on an interface in the following cases: •...
  • Page 112: Ntp-Service Ipv6 Multicast-Server

    If you have configured the device to operate in IPv6 multicast client mode on an interface by using the command, do not add the interface to any aggregate group. To add the interface to an aggregate group, remove the configuration of the command. Examples # Configure the device to operate in IPv6 multicast client mode and receive IPv6 NTP multicast messages with the destination FF21::1 on GigabitEthernet 1/0/1.
  • Page 113: Ntp-Service Ipv6 Source

    [Sysname-GigabitEthernet1/0/1] ntp-service ipv6 multicast-server ff21::1 Related commands ntp-service ipv6 multicast-client ntp-service ipv6 source Use ntp-service ipv6 source to specify a source interface for IPv6 NTP messages. Use undo ntp-service ipv6 source to restore the default. Syntax ntp-service ipv6 source interface-type interface-number undo ntp-service ipv6 source Default No source interface is specified for IPv6 NTP messages.
  • Page 114: Ntp-Service Ipv6 Unicast-Peer

    ntp-service ipv6 unicast-peer Use ntp-service ipv6 unicast-peer to specify an IPv6 symmetric-passive peer for the device. Use undo ntp-service ipv6 unicast-peer to remove the IPv6 symmetric-passive peer specified for the device. Syntax ntp-service ipv6 unicast-peer { peer-name | ipv6-address } [ vpn-instance vpn-instance-name ] [ authentication-keyid keyid | priority | source interface-type interface-number ] * undo ntp-service ipv6 unicast-peer { peer-name | ipv6-address } [ vpn-instance vpn-instance-name ]...
  • Page 115: Ntp-Service Ipv6 Unicast-Server

    option in the command, the command removes the symmetric-passive peer with the IPv6 address of ipv6-address in the public network. If the specified IPv6 address of the passive peer is a link local address, you must specify the source interface for NTP messages and cannot specify a VPN for the passive peer. Examples # Specify the device with the IPv6 address of 2001::1 as the symmetric-passive peer of the local device, and specify the source interface for IPv6 NTP messages as GigabitEthernet 1/0/1.
  • Page 116: Ntp-Service Max-Dynamic-Sessions

    interface. If the specified IPv6 NTP server address is a link local address, the IPv6 NTP messages are sent from the specified source interface, and the source address of the messages is the link local address of the interface. The interface-type interface-number argument represents the interface type and number.
  • Page 117: Ntp-Service Multicast-Client

    by using an NTP command. A dynamic association is a temporary association created by the system during operation. This command limits the number of dynamic NTP associations and prevents dynamic NTP associations from occupying too many system resources. Examples # Set the maximum number of dynamic NTP associations to 50. <Sysname>...
  • Page 118: Ntp-Service Multicast-Server

    ntp-service multicast-server Use ntp-service multicast-server to configure the device to operate in NTP multicast server mode and use the current interface to send NTP multicast packets. Use undo ntp-service multicast-server to remove the configuration. Syntax ntp-service multicast-server [ ip-address ] [ authentication-keyid keyid | ttl ttl-number | version number ] * undo ntp-service multicast-server [ ip-address ] Default...
  • Page 119: Ntp-Service Reliable Authentication-Keyid

    Use undo ntp-service refclock-master to remove the configuration. Syntax ntp-service refclock-master [ ip-address ] [ stratum ] undo ntp-service refclock-master [ ip-address ] Default The device does not use its local clock as the reference clock. Views System view Predefined user roles network-admin Parameters ip-address: IP address of the local clock, 127.127.1.u, where u is the NTP process ID in the range of...
  • Page 120: Ntp-Service Source

    Views System view Predefined user roles network-admin Parameters keyid: Specifies an authentication key by its ID in the range of 1 to 4294967295. Usage guidelines When NTP authentication is enabled, a client can be synchronized only to a server that can provide a trusted authentication key.
  • Page 121: Ntp-Service Unicast-Peer

    Parameters interface-type interface-number: Specifies an interface by its type and number. Usage guidelines If you specify the source interface for NTP messages, the device uses the primary IP address of the specified interface as the source IP address to send NTP messages. Consequently, the destination address of the NTP response messages becomes the primary IP address of the source interface.
  • Page 122: Ntp-Service Unicast-Server

    ip-address: Specifies a symmetric-passive peer by its IP address. It must be a unicast address, rather than a broadcast address, a multicast address, or the IP address of the local clock. vpn-instance vpn-instance-name: Specifies the VPN to which the symmetric-passive peer belongs. The vpn-instance-name argument is a case-sensitive string of 1 to 31 characters.
  • Page 123 Default No NTP server is specified. Views System view Predefined user roles network-admin Parameters server-name: Specifies an NTP server by its host name, a case-insensitive string of 1 to 253 characters. ip-address: Specifies an NTP server by its IP address. It must be a unicast address, rather than a broadcast address, a multicast address, or the IP address of the local clock.
  • Page 124: Sntp Commands

    SNTP commands display sntp ipv6 sessions Use display sntp ipv6 sessions to display information about all IPv6 SNTP associations. Syntax display sntp ipv6 sessions Views Any view Predefined user roles network-admin network-operator Examples # Display information about all IPv6 SNTP associations. <Sysname>...
  • Page 125: Sntp Authentication Enable

    Views Any view Predefined user roles network-admin network-operator Examples # Display information about all IPv4 SNTP associations. <Sysname>display sntp sessions SNTP server Stratum Version Last receive time 1.0.1.112 Tue, May 17 2011 9:11:20.833 (Synced) Table 20 Command output Field Description SNTP server (NTP server).
  • Page 126: Sntp Authentication-Keyid

    Related commands sntp authentication-keyid sntp reliable authentication-keyid sntp authentication-keyid Use sntp authentication-keyid to set an SNTP authentication key. Use undo sntp authentication-keyid to remove an SNTP authentication key. Syntax sntp authentication-keyid keyid authentication-mode md5 { cipher | simple } string [ acl ipv4-acl-number | ipv6 acl ipv6-acl-number ] * undo sntp authentication-keyid keyid Default...
  • Page 127: Sntp Enable

    key. In this case, you do not need to execute the undo sntp-service reliable authentication-keyid command. You can set a maximum of 128 keys by executing the command. Examples # Set an MD5 authentication key, with the key ID of 10 and key value of BetterKey. Input the key in plain text.
  • Page 128: Sntp Reliable Authentication-Keyid

    Views System view Predefined user roles network-admin Parameters server-name: Specifies an NTP server by its host name, a case-insensitive string of 1 to 253 characters. ipv6-address: Specifies an NTP server by its IPv6 address. vpn-instance vpn-instance-name: Specifies the VPN to which the NTP server belongs. The vpn-instance-name argument is a case-sensitive string of 1 to 31 characters.
  • Page 129: Sntp Unicast-Server

    Syntax sntp reliable authentication-keyid keyid undo sntp reliable authentication-keyid keyid Default No trusted key is specified. Views System view Predefined user roles network-admin Parameters keyid: Specifies an authentication key by its ID in the range of 1 to 4294967295. Usage guidelines If SNTP is enabled, the SNTP client is synchronized only to an NTP server that provides a trusted key.
  • Page 130 Predefined user roles network-admin Parameters server-name: Specifies an NTP server by its host name, a case-insensitive string of 1 to 253 characters. ip-address: Specifies an NTP server by its IP address. It must be a unicast address, rather than a broadcast address, a multicast address, or the IP address of the local clock.
  • Page 131: Poe Commands

    PoE commands This feature is supported only by the MSR958 (JH301A) router and PoE-capable routers installed with the following module: • DSIC-9FSWP. • HMIM-24GSWP. • SIC-4FSWP. PoE-capable routers include the following models: • MSR3012/3024/3044/3064. • MSR4060/4080. Commands and descriptions for centralized devices apply to the following routers: •...
  • Page 132: Apply Poe-Profile Interface

    apply poe-profile interface Use apply poe-profile interface to apply a PoE profile to PIs. Use undo apply poe-profile interface to remove the PoE profile application from PIs. Syntax apply poe-profile { index index | name profile-name } interface interface-range undo apply poe-profile { index index | name profile-name } interface interface-range Default No PoE profile is applied to a PI.
  • Page 133 display poe device [ slot slot-number ] Views Any view Predefined user roles network-admin network-operator Parameters chassis chassis-number: Specifies an IRF member device by its member ID. If you do not specify a member device, the command displays information about all PSEs in the IRF fabric. (Distributed devices in IRF mode.) slot slot-number: Specifies an IRF member device by its member ID.
  • Page 134: Display Poe Interface

    Field Description SSlot No. Sub-slot number of the PSE. PortNum Number of PIs on the PSE. MaxPower(W) Maximum power of the PSE. PSE status: • On—The PSE is supplying power. State • Off—The PSE is not supplying power. • Faulty—The PSE has failed. Model PSE model.
  • Page 135 Table 22 Command output Field Description PoE status: • Enabled. PoE status • Disabled. Power supply priority of the PI: • Critical (highest). Power Priority • High. • Low. Operating status of a PI: • Off—PoE is disabled. • On—Power is being supplied to the PI correctly. •...
  • Page 136 Class Status GE1/0/1 Enabled Delivering Power GE1/0/2 Enabled Critical Disabled GE1/0/3 Enabled Disabled GE1/0/4 Enabled Critical Searching GE1/0/5 Enabled Delivering Power GE1/0/6 Enabled Disabled GE1/0/7 Disabled Fault On State Ports: 2; Used: 8.4(W); Remaining: 171.6(W) Table 23 Command output Field Description Interface Interface name of a PI.
  • Page 137: Display Poe Interface Power

    display poe interface power Use display poe interface power to display power information for PIs. Syntax display poe interface power [ interface-type interface-number ] Views Any view Predefined user roles network-admin network-operator Parameters interface-type interface-number: Specifies an interface by its type and number. If you do not specify an interface, this command displays power information for all PIs.
  • Page 138: Display Poe Power-Usage

    display poe power-usage Use display poe power-usage to display power usage statistics for PoE power supplies and PSEs. Syntax Distributed devices in standalone mode/centralized devices in IRF mode: display poe power-usage Distributed devices in IRF mode: display poe power-usage [ chassis chassis-number ] Centralized devices in IRF mode display poe power-usage [ slot slot-number ] Views...
  • Page 139 Powered PoE Ports : 60 Statistics by PSE: PSE ID Current Peak Average Remaining Powered Guaranteed(W) Ports Chassis 2 : PoE Current Power : 600 PoE Max Power : 2000 PoE Max Guaranteed Power : 1000 PoE Remaining Allocable Power : 800 PoE Remaining Guaranteed Power : 600...
  • Page 140: Display Poe Pse

    Table 25 Command output Field Description PoE power and PSE power information for member device 1. Chassis 1 (Distributed devices in IRF mode.) PoE power and PSE power information for member device 1. Slot 1 (Centralized devices in IRF mode.) PoE Current Power Total power that has been consumed by PSEs.
  • Page 141 <Sysname> display poe pse 7 PSE ID Slot No. PSE Model : LSBMPOEGV48TP PSE Status : Enabled PSE Preempted : No Power Priority : Low Current Power : 130 Average Power : 20 Peak Power : 240 Max Power : 200 Remaining Guaranteed Power : 120 PSE CPLD Version...
  • Page 142: Display Poe Pse Interface

    Field Description Slot No. Slot number of the PSE. SSlot No. Subslot number of the PSE. Chassis In IRF mode, member ID of the device where the PSE resides. PoE status of the PSE: • PSE Status Enabled. • Disabled. Power preemption status for the PSE: •...
  • Page 143 Parameters pse pse-id: Specifies a PSE ID. To display PSE ID and slot mappings, use the display poe device command. Examples # Display the status of all PIs on PSE 7. <Sysname> display poe pse 7 interface Interface Priority CurPower Oper IEEE Detection...
  • Page 144: Display Poe Pse Interface Power

    Field Description Power detection status of a PI: • Disabled—PoE function is disabled. • Searching—The PI is searching for the PD. • Delivering Power—The PI is supplying power to the PD. Detection Status • Fault—A fault occurred during the test. •...
  • Page 145: Display Poe-Power

    Field Description Peak Peak power of a PI. Maximum power of a PI. PD Description Type and location description for the PD connected with a PI. Ports On Number of PIs that are supplying power. Used Power consumed by all PIs. Remaining Remaining power on the PSE.
  • Page 146 PoE Lower Output Threshold : 45.00 PoE Upper Output Threshold : 57.00 PoE Hardware Version : 0002 PoE Software Version : 0001 PoE Power Supplies PoE Power Supply 1: Manufacturer : Tyco Electronics Com Type : PSE2500-A Status : Normal PoE Power Supply 2: Manufacturer : Tyco Electronics Com...
  • Page 147 PoE Lower Output Threshold : 45.00 PoE Upper Output Threshold : 57.00 PoE Hardware Version : 0002 PoE Software Version : 0001 PoE Power Supplies PoE Power Supply 1: Manufacturer : Tyco Electronics Com Type : PSE2500-A Status : Normal PoE Power Supply 2: Manufacturer : Tyco Electronics Com...
  • Page 148 PoE Lower Output Threshold : 45.00 PoE Upper Output Threshold : 57.00 PoE Hardware Version : 0002 PoE Software Version : 0001 PoE Power Supplies PoE Power Supply 1: Manufacturer : Tyco Electronics Com Type : PSE2500-A Status : Normal PoE Power Supply 2: Manufacturer : Tyco Electronics Com...
  • Page 149: Display Poe-Profile

    Field Description PoE power status: • Normal—The PoE power supply is operating correctly. • Absent—The PoE power supply is not present. • Off—The PoE power is turned off. • Active—The active PoE power supply is operating correctly. • Standby—The standby PoE power supply is operating correctly. Status •...
  • Page 150: Display Poe-Profile Interface

    PoE Profile Index ApplyNum Interfaces Configuration forIPphone GE1/0/5 poe enable GE1/0/6 poe priority critical GE1/0/7 GE1/0/8 GE1/0/9 GE1/0/1 Total ports: 0 Table 30 Command output Field Description PoE Profile Name of the PoE profile. Index Index number of the PoE profile. ApplyNum Number of PIs to which the PoE profile is applied.
  • Page 151: Poe Disconnect

    poe disconnect Use poe disconnect to configure a PD disconnection detection mode. Use undo poe disconnect to restore the default. Syntax poe disconnect { ac | dc } undo poe disconnect Default The PD disconnection detection mode is ac. Views System view Predefined user roles network-admin...
  • Page 152: Poe Enable Pse

    Usage guidelines If a PoE profile has been applied to a PI, remove the application before configuring the PI in PoE profile view. If a PI has been configured, remove the configuration before configuring the PI in PI view. Examples # Enable PoE on a PI in PI view.
  • Page 153: Poe Max-Power

    Use undo poe legacy enable to disable the PSE from detecting nonstandard PDs. Syntax poe legacy enable pse pse-id undo poe legacy enable pse pse-id Default Nonstandard PD detection is disabled. Views System view Predefined user roles network-admin Parameters pse pse-id: Specifies a PSE by its ID. Examples # Enable PSE 7 to detect nonstandard PDs.
  • Page 154: Poe Max-Power (System View)

    # Set the maximum PI power to 12000 milliwatts in PoE profile view. <Sysname> system-view [Sysname] poe-profile abc [Sysname-poe-profile-abc-1] poe max-power 12000 Related commands poe max-power (system view) poe max-power (system view) Use poe max-power to set the maximum PSE power. Use undo poe max-power to restore the default.
  • Page 155: Poe Pd-Policy Priority

    undo poe pd-description Default No description is configured for the PD that connects to a PI. Views PI view Predefined user roles network-admin Parameters text: Configures a description for the PD connected to the PI, a case-sensitive string of 1 to 80 characters.
  • Page 156: Poe Priority

    poe priority Use poe priority to set the power supply priority for a PI. Use undo poe priority to restore the default. Syntax poe priority { critical | high | low } undo poe priority Default The power supply priority of a PI is low. Views PI view PoE profile view...
  • Page 157: Poe Priority (System View)

    poe priority (system view) Use poe priority to set the power supply priority for a PSE. Use undo poe priority to restore the default. Syntax poe priority { critical | high | low } pse pse-id undo poe priority pse pse-id Default The power supply priority of a PSE is low.
  • Page 158: Poe Update

    undo poe pse-policy priority Default PSE power management is disabled. Views System view Predefined user roles network-admin Usage guidelines If PSE power management is disabled, the system does not supply power to new PSEs when PoE power overload occurs. If PSE power management is enabled, the system supplies power based on the PSE priority and PSE ID when a new PSE causes PoE power overload.
  • Page 159: Poe-Profile

    <Sysname> system-view [Sysname] poe update refresh POE-168.bin pse 7 poe-profile Use poe-profile to create a PoE profile and enter its view, or enter the view of an existing PoE profile. Use undo poe-profile to delete a PoE profile. Syntax poe-profile profile-name [ index ] undo poe-profile { index index | name profile-name } Default No PoE profiles exist.
  • Page 160: Poe Utilization-Threshold

    poe utilization-threshold Use poe utilization-threshold to configure a power alarm threshold for a PSE. Use undo poe utilization-threshold to restore the default power alarm threshold of a PSE. Syntax poe utilization-threshold value pse pse-id undo poe utilization-threshold pse pse-id Default The power alarm threshold for the PSE is 80%.
  • Page 161: Snmp Commands

    SNMP commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. The SNMP agent sends notifications (traps and informs) to inform the NMS of significant events, such as link state changes and user logins or logouts.
  • Page 162 Community name: userv1 Group name: testv1 Storage type: nonvolatile Community name: cc Group name: cc ACL name: testacl Storage type: nonVolatile Table 31 Command output Field Description Community name created by using the snmp-agent community command or Community name username created by using the snmp-agent usm-user { v1 | v2c } command. SNMP group name.
  • Page 163: Display Snmp-Agent Context

    display snmp-agent context Use display snmp-agent context to display an SNMP context. Syntax display snmp-agent context [ context-name ] Views Any view Predefined user roles network-admin network-operator Parameters context-name: Specifies an SNMP context by its name, a case-sensitive string of 1 to 32 characters. If no SNMP context is specified, this command displays all SNMP contexts created on the device.
  • Page 164: Display Snmp-Agent Local-Engineid

    Notifyview: <no specified> Storage-type: nonvolatile ACL name: testacl Table 32 Command output Field Description Group name SNMP group name. Security model of the SNMP group: • authPriv—Authentication with privacy. • authNoPriv—Authentication without privacy. Security model • noAuthNoPriv—No authentication, no privacy. Security model of an SNMPv1 or SNMPv2c group can only be noAuthNoPriv.
  • Page 165: Display Snmp-Agent Mib-Node

    Examples # Display the local engine ID. <Sysname> display snmp-agent local-engineid SNMP local engine ID: 800063A2800084E52BED7900000001 Related commands snmp-agent local-engineid display snmp-agent mib-node Use display snmp-agent mib-node to display SNMP MIB node information. Syntax display snmp-agent mib-node [ details | index-node | trap-node | verbose ] Views Any view Predefined user roles...
  • Page 166 |-*lldpMessageTxInterval<1.0.8802.1.1.2.1.1.1>(RW) |-*lldpMessageTxHoldMultiplier<1.0.8802.1.1.2.1.1.2>(RW) |-*lldpReinitDelay<1.0.8802.1.1.2.1.1.3>(RW) Table 33 Command output Field Description -std MIB node name. <1.0> OID of a MIB node. Permissions to MIB nodes: • NA—Not accessible. • NF—Notifications. • (NA) RO—Read-only access. • RW—Read and write access. • RC—Read-write-create access. •...
  • Page 167 Field Description (lldpMessageTxInterval) Name of a leaf node. Leaf node or MIB table node. # Display MIB table names, and node names and OIDs of MIB index nodes. <Sysname> display snmp-agent mib-node index-node Table |lldpPortConfigTable Index ||lldpPortConfigPortNum 1.0.8802.1.1.2.1.1.6.1.1 Table |lldpConfigManAddrTable Index ||lldpLocManAddrSubtype 1.0.8802.1.1.2.1.3.8.1.1...
  • Page 168 ||||1.0.8802.1.1.2.1.2.5 Name |lldpXMedTopologyChangeDetected ||1.0.8802.1.1.2.1.5.4795.0.1 Trap Object Name |||lldpRemChassisIdSubtype ||||1.0.8802.1.1.2.1.4.1.1.4 Name |||lldpRemChassisId ||||1.0.8802.1.1.2.1.4.1.1.5 Name |||lldpXMedRemDeviceClass ||||1.0.8802.1.1.2.1.5.4795.1.3.1.1.3 Name |mplsL3VpnVrfUp ||1.3.6.1.2.1.10.166.11.0.1 Trap Object Name |||mplsL3VpnIfConfRowStatus ||||1.3.6.1.2.1.10.166.11.1.2.1.1.5 Name |||mplsL3VpnVrfOperStatus ||||1.3.6.1.2.1.10.166.11.1.2.2.1.6 Table 36 Command output Field Description Name Name of a MIB notification node. OID of a MIB notification node. Trap Object Name and OID of a notification object.
  • Page 169 ||MOR: 0x00000000 Parent ||lldpConfiguration First child ||lldpPortConfigEntry Next leaf ||lldpPortConfigPortNum Next sibling ||lldpConfigManAddrTable Name |lldpPortConfigEntry ||1.0.8802.1.1.2.1.1.6.1 Properties ||NodeType: ||AccessType: NA ||DataType: ||MOR: 0x00000000 Parent ||lldpPortConfigTable First child ||lldpPortConfigPortNum Next leaf ||lldpPortConfigPortNum Next sibling Index ||[indexImplied:0, indexLength:1]: Name |lldpPortConfigPortNum ||1.0.8802.1.1.2.1.1.6.1.1 Properties ||NodeType: Column ||AccessType: NA...
  • Page 170 ['disabled', 4] Table 37 Command output Field Description Name MIB node name. OID of a MIB node. MIB node types: • Table—Table node. • Row—Row node in a MIB table. • Column—Column node in a MIB table. NodeType • Leaf—Leaf node. •...
  • Page 171: Display Snmp-Agent Mib-View

    Field Description Operation types allowed: • get/set/getnext—All operations. • get—Get operation. Allow • set—Set operation. • getnext—GetNext operation. Value range Value range of a MIB node. Index Table index. This field appears only for a table node. display snmp-agent mib-view Use display snmp-agent mib-view to display MIB views.
  • Page 172: Display Snmp-Agent Remote

    View name: ViewDefault MIB Subtree: snmpVacmMIB Subtree mask: Storage-type: nonVolatile View Type: excluded View status: active View name: ViewDefault MIB Subtree: snmpModules.18 Subtree mask: Storage-type: nonVolatile View Type: excluded View status: active ViewDefault is the default MIB view. The output shows that except for the MIB objects in the snmpUsmMIB, snmpVacmMIB, and snmpModules.18 subtrees, all the MIB objects in the iso subtree are accessible.
  • Page 173: Display Snmp-Agent Statistics

    Predefined user roles network-admin network-operator Parameters ipv4-address: Specifies the IPv4 address of a remote SNMP entity to display its SNMP engine ID. ipv6 ipv6-address: Specifies the IPv6 address of a remote SNMP entity to display its SNMP engine vpn-instance vpn-instance-name: Specifies the VPN for a remote SNMP entity. The vpn-instance-name argument specifies the name of the MPLS L3VPN, a case-sensitive string of 1 to 31 characters.
  • Page 174 network-operator Examples # Display SNMP message statistics. <Sysname> display snmp-agent statistics 1684 messages delivered to the SNMP entity. 5 messages were for an unsupported version. 0 messages used an unknown SNMP community name. 0 messages represented an illegal operation for the community supplied. 0 ASN.1 or BER errors in the process of decoding.
  • Page 175: Display Snmp-Agent Sys-Info

    Field Description Number of MIB objects that have been MIB objects altered successfully successfully modified. Number of GetRequest requests that have GetRequest-PDU accepted and processed been received and processed. Number of getNext requests that have been GetNextRequest-PDU accepted and processed received and processed.
  • Page 176: Display Snmp-Agent Trap Queue

    The SNMP version of the agent: SNMPv3 Related commands snmp-agent sys-info display snmp-agent trap queue Use display snmp-agent trap queue to display basic information about the trap queue, including the queue size and number of traps in the queue. Syntax display snmp-agent trap queue Views Any view...
  • Page 177: Display Snmp-Agent Usm-User

    arp notification is disabled. configuration notification is enabled. l3vpn notification is enabled. mac-address notification is enabled. mpls notification is disabled. ospfv3 notification is enabled. radius notification is disabled. standard notification is enabled. stp notification is disabled. syslog notification is disabled. system notification is enabled.
  • Page 178 Storage type: nonVolatile User status: active ACL: 2000 Username: userv3 Group name: mygroupv3 Engine ID: 8000259503000BB3100A508 Storage type: nonVolatile User status: active ACL name: testacl Username: userv3code Role name: groupv3code network-operator Engine ID: 800063A203000FE240A1A6 Storage type: nonVolatile User status: active Username: userv3code Role name: snmprole network-operator...
  • Page 179: Enable Snmp Trap Updown

    Field Description Number of the ACL that controls the access of the SNMP user (the NMS) to the device. To access the device, the IP address of the NMS must be permitted in the ACL. This field appears only when an SNMPv3 user is associated with an ACL rule. It is exclusive with the ACL name field.
  • Page 180: Snmp-Agent

    snmp-agent Use snmp-agent to enable the SNMP agent. Use undo snmp-agent to disable the SNMP agent. Syntax snmp-agent undo snmp-agent Default The SNMP agent is disabled. Views System view Predefined user roles network-admin Usage guidelines The SNMP agent is automatically enabled when you execute any command that begins with snmp-agent except for the snmp-agent calculate-password command.
  • Page 181: Snmp-Agent Community

    security strength) are available for the device. A more secure algorithm calculates slower. DES is enough to meet general security requirements. • 3desmd5: Calculates the encrypted form for the encryption key by using the 3DES encryption algorithm and HMAC-MD5 authentication algorithm. •...
  • Page 182 snmp-agent community [ simple | cipher ] community-name user-role role-name [ acl { ipv4-acl-number | name ipv4-acl-name } | acl ipv6 { ipv6-acl-number | name ipv6-acl-name } ] * undo snmp-agent community [ cipher ] community-name Default No SNMPv1 or SNMPv2c communities exist. Views System view Predefined user roles...
  • Page 183 The snmp-agent community command allows you to use either of the following modes to control SNMP community access to MIB objects: • View-based access control model—VACM mode controls access to MIB objects by assigning MIB views to SNMP communities. • Role based access control—RBAC mode controls access to MIB objects by assigning user roles to SNMP communities.
  • Page 184: Snmp-Agent Community-Map

    [Sysname] acl basic name testacl [Sysname-acl-ipv4-basic-testacl] rule permit source 1.1.1.2 0.0.0.0 [Sysname-acl-ipv4-basic-testacl] rule deny source any [Sysname-acl-ipv4-basic-testacl] quit [Sysname] snmp-agent sys-info version v2c [Sysname] snmp-agent community write simple writeaccess acl name testacl # Create the read and write community wr-sys-acc in plain text so an SNMPv1 or SNMPv2c NMS can use the community name wr-sys-acc to read or set the MIB objects in the system subtree (OID 1.3.6.1.2.1.1).
  • Page 185: Snmp-Agent Context

    Related commands display snmp-agent community snmp-agent context Use snmp-agent context to create an SNMP context. Use undo snmp-agent context to delete an SNMP context. Syntax snmp-agent context context-name undo snmp-agent context context-name Default No SNMP contexts exist. Views System view Predefined use roles network-admin Parameters...
  • Page 186 snmp-agent group v3 group-name [ authentication | privacy ] [ read-view read-view ] [ write-view write-view ] [ notify-view notify-view ] [ acl { ipv4-acl-number | name ipv4-acl-name } | acl ipv6 { ipv6-acl-number | name ipv6-acl-name } ] * SNMPv3 (in FIPS mode): snmp-agent group v3 group-name { authentication | privacy } [ read-view read-view ] [ write-view write-view ] [ notify-view notify-view ] [ acl { ipv4-acl-number | name ipv4-acl-name } |...
  • Page 187: Snmp-Agent Local-Engineid

    All users in an SNMP group share the security model and access rights of the group. You can create a maximum of 20 SNMP groups, including SNMPv1, SNMPv2c, and SNMPv3 groups. All SNMPv3 users in a group share the same security model, but can use different authentication and privacy key settings.
  • Page 188: Snmp-Agent Log

    Syntax snmp-agent local-engineid engineid undo snmp-agent local-engineid Default The engine ID of a device is the combination of the company ID and the device ID. The device ID varies by device model. Views System view Predefined user roles network-admin Parameters engineid: Specifies an SNMP engine ID, a hexadecimal string.
  • Page 189: Snmp-Agent Mib-View

    authfail: Enables logging SNMP authentication failures. get-operation: Enables logging SNMP Get operations. set-operation: Enables logging SNMP Set operations. Usage guidelines Use SNMP logging to record the SNMP operations performed on the SNMP agent or authentication failures from the NMS to the agent for auditing NMS behaviors. The SNMP agent sends log data to the information center.
  • Page 190: Snmp-Agent Packet Max-Size

    Usage guidelines A MIB view represents a set of MIB objects (or MIB object hierarchies) with certain access privilege. The MIB objects included in the MIB view are accessible while those excluded from the MIB view are inaccessible. Each view-name oid-tree pair represents a view record. If you specify the same record with different MIB subtree masks multiple times, the most recent configuration takes effect.
  • Page 191: Snmp-Agent Port

    Usage guidelines If any device on the path to the NMS does not support packet fragmentation, limit the SNMP packet size to prevent large-sized packets from being discarded. For most networks, the default value is sufficient. Examples # Set the maximum SNMP packet size to 1024 bytes. <Sysname>...
  • Page 192: Snmp-Agent { Inform | Trap } Source

    Syntax snmp-agent remote { ipv4-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ] engineid engineid undo snmp-agent remote ip-address Default No remote SNMP engine IDs exist. Views System view Predefined user roles network-admin Parameters ipv4-address: Specifies the IP address of a remote SNMP entity. ipv6 ipv6-address: Specifies the IPv6 address of a remote SNMP entity.
  • Page 193: Snmp-Agent Sys-Info Contact

    Views System view Predefined user roles network-admin Parameters inform: Specifies informs. trap: Specifies traps. interface-type { interface-number | interface-number.subnumber }: Specifies an interface by its type and number. The interface-number argument specifies a main interface number. The subnumber argument specifies a subinterface number in the range of 1 to 4094. Usage guidelines The snmp-agent source command enables the SNMP agent to use the primary IP address of an interface or subinterface as the source IP address in all its SNMP informs or traps, regardless of their...
  • Page 194: Snmp-Agent Sys-Info Location

    Parameters sys-contact: Specifies the system contact, a case-sensitive string of 1 to 255 characters. Usage guidelines Configure the system contact for system maintenance and management. Examples # Configure the system contact as Dial System Operator # 27345. <Sysname> system-view [Sysname] snmp-agent sys-info contact Dial System Operator # 27345 Related commands display snmp-agent sys-info snmp-agent sys-info location...
  • Page 195: Snmp-Agent Target-Host

    snmp-agent sys-info contact version { all | { v1 | v2c | v3 } * } undo snmp-agent sys-info version { all | { v1 | v2c | v3 } * } In FIPS mode: snmp-agent sys-info version v3 undo snmp-agent sys-info version v3 Default SNMPv3 is enabled.
  • Page 196 snmp-agent target-host inform address udp-domain { ipv4-address | ipv6 ipv6-address } [ udp-port port-number ] [ vpn-instance vpn-instance-name ] params securityname security-string v3 { authentication | privacy } snmp-agent target-host trap address udp-domain { ipv4-address | ipv6 ipv6-address } [ udp-port port-number ] [ vpn-instance vpn-instance-name ] params securityname security-string v3 { authentication | privacy } undo snmp-agent target-host { trap | inform } address udp-domain { ipv4-address | ipv6...
  • Page 197: Snmp-Agent Trap Enable

    Make sure the SNMP agent uses the same UDP port for SNMP notifications as the target host. Typically, NMSs, for example, IMC and MIB Browser, use port 162 for SNMP notifications as defined in the SNMP protocols. If none of the keywords v1, v2c, or v3 is specified, SNMPv1 is used. Make sure the SNMP agent uses the same SNMP version as the target host so the host can receive the notification.
  • Page 198: Snmp-Agent Trap If-Mib Link Extended

    Table 43 Standard SNMP notifications Keyword Definition Authentication failure notification sent when an NMS fails to authenticate to the authentication SNMP agent. coldstart Notification sent when the device restarts. linkdown Notification sent when the link of a port goes down. linkup Notification sent when the link of a port comes up.
  • Page 199: Snmp-Agent Trap Life

    Usage guidelines Extended linkUp and linkDown notifications add interface description and interface type to the standard linkUp/linkDown notifications for fast failure point identification. When you use this command, make sure the NMS supports the extended linkup and linkDown notifications. Examples # Enable extended linkUp/linkDown notifications.
  • Page 200: Snmp-Agent Trap Queue-Size

    Syntax snmp-agent trap log undo snmp-agent trap log Default SNMP notification logging is disabled. Views System view Predefined user roles network-admin Usage guidelines Use SNMP notification logging to record SNMP notifications sent by the SNMP agent for notification tracking. The SNMP agent sends the logs to the information center. You can configure the information center to output the logs to a destination as needed.
  • Page 201: Snmp-Agent Usm-User { V1 | V2C

    Related commands snmp-agent target-host snmp-agent trap enable snmp-agent trap life snmp-agent usm-user { v1 | v2c } Use snmp-agent usm-user { v1 | v2c } to create an SNMPv1 or SNMPv2c user. Use undo snmp-agent usm-user { v1 | v2c } to delete an SNMPv1 or SNMPv2c user. Syntax snmp-agent usm-user { v1 | v2c } user-name group-name [ acl { ipv4-acl-number | name ipv4-acl-name } | acl ipv6 { ipv6-acl-number | name ipv6-acl-name } ] *...
  • Page 202: Snmp-Agent Usm-User V3

    • Execute the snmp-agent community command. • Execute the snmp-agent usm-user { v1 | v2c } and snmp-agent group { v1 | v2c } commands to create an SNMPv1 or SNMPv2c user and the group that the user is assigned to. The system automatically creates an SNMP community by using the SNMPv1 or SNMPv2c username.
  • Page 203 Syntax In non-FIPS mode (in VACM mode): snmp-agent usm-user v3 user-name group-name [ remote { ipv4-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ] ] [ { cipher | simple } authentication-mode { md5 | sha } auth-password [ privacy-mode { aes128 | 3des | des56 } priv-password ] ] [ acl { ipv4-acl-number | name ipv4-acl-name } | acl ipv6 { ipv6-acl-number | name ipv6-acl-name } ] * undo snmp-agent usm-user v3 user-name { local | engineid engineid-string | remote { ipv4-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ] }...
  • Page 204 case-sensitive string of 1 to 31 characters. If this parameter is not specified, the target host is in the public network. cipher: Specifies an authentication key and an encryption key in encrypted form. The keys will be converted to a digest in encrypted form and stored in the device. simple: Specifies an authentication key and an encryption key in plaintext from.
  • Page 205 You can use either of the following modes to control SNMPv3 user access to MIB objects. • VACM—Controls user access to MIB objects by assigning the user to an SNMP group. To make sure the user takes effect, make sure the group has been created. An SNMP group contains one or multiple users and specifies the MIB views and security model for the users.
  • Page 206: Snmp-Agent Usm-User V3 User-Role

    <Sysname> system-view [Sysname] snmp-agent group v3 testGroup privacy [Sysname] snmp-agent usm-user v3 testUser testGroup simple authentication-mode sha 123456TESTauth&! privacy-mode aes128 123456TESTencr&! For an NMS to access the MIB objects in default view, make sure the following configurations are the same on both the NMS and the SNMP agent: •...
  • Page 207 Syntax snmp-agent usm-user v3 user-name user-role role-name undo snmp-agent usm-user v3 user-name user-role role-name Default An SNMPv3 user has the user role assigned to it at its creation. Views System view Predefined user roles network-admin Parameters user-name: Specifies an SNMPv3 username, a case-sensitive string of 1 to 32 characters. user-role role-name: Specifies a user role name, a case-sensitive string of 1 to 63 characters.
  • Page 208: Rmon Commands

    RMON commands display rmon alarm Use display rmon alarm to display information about RMON alarm entries. Syntax display rmon alarm [ entry-number ] Views Any view Predefined user roles network-admin network-operator Parameters entry-number: Specifies an alarm entry by its index in the range of 1 to 65535. If you do not specify an entry, the command displays all RMON alarm entries.
  • Page 209: Display Rmon Event

    Field Description Sample type: • absolute—RMON compares the value of the variable with the rising and falling thresholds at the end of the sampling interval. Sample type • delta—RMON subtracts the value of the variable at the previous sample from the current value, and then compares the difference with the rising and falling thresholds.
  • Page 210 Views Any view Predefined user roles network-admin network-operator Parameters entry-number: Specifies an event entry by its index in the range of 1 to 65535. If you do not specify an entry, the command displays all event entries. Usage guidelines An event entry includes the following information: •...
  • Page 211: Display Rmon Eventlog

    Field Description last triggered at Last time when the event occurred, which is represented as the amount of time that elapsed since the system startup. time uptime Related commands rmon event display rmon eventlog Use display rmon eventlog to display information about event log entries. Syntax display rmon eventlog [ entry-number ] Views...
  • Page 212: Display Rmon History

    • Two records were created when event 99 was triggered by private alarm entry 777. Table 46 Command output Field Description Event log entry owner and status: • entry-number—Event log entry index, which is the same as the event entry index for which this log entry is generated.
  • Page 213 Examples # Display the RMON history control entry and history samples for GigabitEthernet 1/0/1. <Sysname> display rmon history gigabitethernet 1/0/1 HistoryControlEntry 6 owned by user1 is VALID. Sampled interface : GigabitEthernet1/0/1<ifIndex.117> Sampling interval : 8(sec) with 3 buckets max Sampling record 1 : dropevents , octets : 5869...
  • Page 214 Table 47 Command output Field Description Status and owner of the history control entry: • entry-number—History control entry index. • owner—Entry owner. • status—Entry status: VALID—The entry is valid. HistoryControlEntry  entry-number owned by UNDERCREATION—The entry is invalid.  owner is status. The status field is not configurable at the CLI.
  • Page 215: Display Rmon Prialarm

    Related commands rmon history display rmon prialarm Use display rmon prialarm to display information about RMON private alarm entries. Syntax display rmon prialarm [ entry-number ] Views Any view Predefined user roles network-admin network-operator Parameters entry-number: Specifies an alarm entry index in the range of 1 to 65535. If you do not specify an entry, the command displays all private alarm entries.
  • Page 216 Field Description Sample type: • absolute—RMON compares the calculation result of the variable formula with the rising and falling thresholds at the end of the sampling Sample type interval. • delta—RMON subtracts the calculation result of the variable formula for the previous sampling interval from the current calculation result, and then compares the difference with the rising and falling thresholds.
  • Page 217: Display Rmon Statistics

    Related commands rmon prialarm display rmon statistics Use display rmon statistics to display RMON statistics. Syntax display rmon statistics [ interface-type interface-number ] Views Any view Predefined user roles network-admin network-operator Parameters interface-type interface-number: Specifies an interface by its type and number. If you do not specify an interface, the command displays RMON statistics for all interfaces.
  • Page 218: Rmon Alarm

    Table 49 Command output Field Description Statistics entry owner and status: • entry-number—Statistics entry index. • owner—Entry owner. • status—Entry status: VALID—The entry is valid. EtherStatsEntry  entry-number owned UNDERCREATION—The entry is invalid.  owner is status. The status field is not configurable at the CLI. All alarm entries created from the CLI are valid by default.
  • Page 219 Syntax rmon alarm entry-number alarm-variable sampling-interval { absolute | delta } [ startup-alarm { falling | rising | rising-falling } ] rising-threshold threshold-value1 event-entry1 falling-threshold threshold-value2 event-entry2 [ owner text ] undo rmon alarm entry-number Default No RMON alarm entries exist. Views System view Predefined user roles...
  • Page 220: Rmon Event

    crossed. The value range for the event-entry1 argument is 0 to 65535. If 0 is specified, the alarm does not trigger any event. falling-threshold threshold-value2 event-entry2: Sets the falling threshold. The threshold-value2 argument represents the falling threshold in the range of –2147483648 to +2147483647. The event-entry2 argument represents the index of the event that is triggered when the falling threshold is crossed.
  • Page 221 Syntax rmon event entry-number [ description string ] { log | log-trap security-string | none | trap security-string } [ owner text ] undo rmon event entry-number Default No RMON event entries exist. Views System view Predefined user roles network-admin Parameters entry-number: Specifies an event entry index in the range of 1 to 65535.
  • Page 222: Rmon History

    rmon history Use rmon history to create an RMON history control entry. Use undo rmon history to remove an RMON history control entry. Syntax rmon history entry-number buckets number interval interval [ owner text ] undo rmon history entry-number Default No RMON history control entries exist.
  • Page 223 Syntax rmon prialarm entry-number prialarm-formula prialarm-des sampling-interval { absolute | delta } [ startup-alarm { falling | rising | rising-falling } ] rising-threshold threshold-value1 event-entry1 falling-threshold threshold-value2 event-entry2 entrytype { forever | cycle cycle-period } [ owner text ] undo rmon prialarm entry-number Default No RMON private alarm entries exist.
  • Page 224 is crossed. The value range for the event-entry2 argument is 0 to 65535. If 0 is specified, the alarm does not trigger any event. forever: Configures the entry as a permanent entry. RMON retains a permanent private alarm entry until it is manually deleted. cycle cycle-period: Sets the lifetime of the entry, in the range of 0 to 4294967 seconds.
  • Page 225: Rmon Statistics

    rmon statistics Use rmon statistics to create an RMON statistics entry. Use undo rmon statistics to remove an RMON statistics entry. Syntax rmon statistics entry-number [ owner text ] undo rmon statistics entry-number Default No RMON statistics entry exists. Views Ethernet interface view Predefined user roles network-admin...
  • Page 226: Event Mib Commands

    Event MIB commands action Use action to set an action for an event. Use undo action to remove an action. Syntax action { notification | set } undo action { notification | set } Default An event does not have an action. Views Event view Predefined user roles...
  • Page 227: Comparison

    comparison Use comparison to specify a Boolean comparison type for the sampled value and the reference value. Use undo comparison to restore the default. Syntax comparison { equal | greater | greaterorequal | less | lessorequal | unequal } undo comparison Default The Boolean comparison type is unequal.
  • Page 228: Context (Action-Set View)

    context (action-set view) Use context to configure a context for the set-action object. Use undo context to restore the default. Syntax context context-name undo context Default A set action does not have a context. Views Action-set view Predefined user roles network-admin Parameters context-name: Specifies a context, a case-sensitive string of 1 to 32 characters.
  • Page 229: Delta Falling

    Predefined user roles network-admin Parameters context-name: Specifies a context, a case-sensitive string of 1 to 32 characters. Usage guidelines To uniquely identify a monitored object, configure a context for it. Examples # Configure the context contextname1 for a monitored object. <Sysname>...
  • Page 230: Delta Rising

    [Sysname] snmp mib event trigger owner owner1 name triggerA [Sysname-trigger-owner1-triggerA] test threshold [Sysname-trigger-owner1-triggerA-threshold] delta falling value 20 Related commands sample snmp mib event trigger test delta rising Use delta rising to set a delta rising threshold and specify a rising event. Use undo delta rising to restore the default.
  • Page 231: Description (Event View)

    description (event view) Use description to configure a description for an event. Use undo description to restore the default. Syntax description text undo description Default An event does not have a description. Views Event view Predefined user roles network-admin Parameters text: Specifies a description, a case-sensitive string of 1 to 255 characters.
  • Page 232: Display Snmp Mib Event

    Examples # Configure the description triggerA is configured for configured for network management events for the trigger with the owner owner1 and the name triggerA. <Sysname> system-view [Sysname] snmp mib event trigger owner owner1 name triggerA [Sysname-trigger-owner1-triggerA] description triggerA is configured for network management events Related commands snmp mib event trigger...
  • Page 233: Display Snmp Mib Event Event

    BoolObjName : Objects1 BoolEvtOwner : N/A BoolEvtName : N/A Event entry eventA owned by owner2: EvtComment : event is to set ifAdminStatus EvtAction : Notification | Set EvtEnabled : true Notification entry: NotifyOID : 1.3.6.1.2.1.88.2.0.1<mteTriggerFired> NotifyObjOwner : N/A NotifyObjName : N/A Set entry: SetObj : 1.3.6.1.2.1.2.2.1.7<ifAdminStatus>...
  • Page 234 1 to 32 characters. If you do not specify an event, this command displays information about all events and event actions. Examples # Display information about the event with the owner owner2 and name eventA and the event actions. <Sysname> display snmp mib event event owner owner2 name eventA Event entry eventA owned by owner2: EvtComment : event is to set ifAdminStatus...
  • Page 235: Display Snmp Mib Event Object List

    Field Description Wildcarding option for the context • false—Specifies a context. SetContextNameWildcard • true—Enables wildcard search for the context. Related commands snmp mib event display snmp mib event object list Use display snmp mib event event to display information about object lists. Syntax display snmp mib event object list [ owner objects-owner name objects-name ] Views...
  • Page 236: Display Snmp Mib Event Summary

    display snmp mib event summary Use display snmp mib event summary to display the Event MIB brief information. Syntax display snmp mib event summary Views Any view Predefined user roles network-admin network-operator Examples # Display Event MIB brief information. <Sysname> display snmp mib event summary TriggerFailures EventFailures SampleMinimum...
  • Page 237 Predefined user roles network-admin network-operator Parameters owner trigger-owner name trigger name: Specifies a trigger by its owner and name. The trigger-owner argument must be an existing SNMPv3 user. The trigger-name argument is case-sensitive string of 1 to 32 characters. If you do not specify a trigger, this command displays information about all triggers and trigger tests.
  • Page 238 ThresRisEvtOwner : owner1 ThresRisEvtName : event1 ThresFalEvtOwner : owner1 ThresFalEvtName : event1 ThresDeltaRisEvtOwner : owner1 ThresDeltaRisEvtName : event1 ThresDeltaFalEvtOwner : owner1 ThresDeltaFalEvtName : event1 Table 54 Command output Field Description Trigger entry TriggerComment Description for the trigger. Trigger test type: •...
  • Page 239 Field Description ExiObjName Name of the existence test object. ExiEvtOwner Owner of the existence test event. ExiEvtName Name of the existence test event. Boolean entry Boolean test type: • unequal. • equal. • BoolCmp less. • lessorequal. • greater. • greaterorequal.
  • Page 240: Event Enable

    Related commands snmp mib event trigger event enable Use event enable to enable an event. Use undo event enable to disable an event. Syntax event enable undo event enable Default An event is disabled. Views Event view Predefined user roles network-admin Usage guidelines For an event to be triggered when the trigger condition is met, execute the event enable command.
  • Page 241: Event Owner (Trigger-Existence View)

    Parameters event owner event-owner: Specifies the owner of an event. Use the trigger owner as the event owner. name event-name: Specifies the name of an event, a case-sensitive string of 1 to 32 characters. Examples # Specify an event for a Boolean test. <Sysname>...
  • Page 242: Falling

    falling Use falling to set a falling threshold and specify a falling event. Use undo falling to restore the default. Syntax falling { event owner event-owner name event-name | value integer-value } undo falling { event | value } Default The falling threshold is 0, and no falling event is specified.
  • Page 243: Object List (Action-Notification View)

    Default The sampling interval is 600 seconds. Views Trigger view Predefined user roles network-admin Parameters interval: Specifies a sampling interval in the range of 1 to 4294967295 seconds. The sampling interval must be greater than or equal to the minimum sampling interval. Usage guidelines To set the minimum sampling interval, execute the snmp mib event sample minimum command.
  • Page 244: Object List (Trigger View)

    Usage guidelines If you do not specify an object list for a notification action or the specified object list does not contain objects, no objects will be added to the triggered notification. For more information, see "object list (trigger view)." Examples # Specify the object list with the owner owner1 and name listA for an event with the owner owner1 and name EventA.
  • Page 245: Object List (Trigger-Boolean View)

    [Sysname-trigger-owner1-triggerA] object list owner owner1 name objectA Related commands snmp mib event trigger object list (trigger-Boolean view) Use object list to specify an object list for a Boolean trigger test. The objects in the list will be added to the notification triggered by the test. Use undo object list to restore the default.
  • Page 246: Object List (Trigger-Threshold View)

    Default No object list is specified for a trigger-existence test. Views Trigger-existence view Predefined user roles network-admin Parameters owner objects-owner: Specifies an object list owner. Use the trigger owner as the object list owner. name objects-name: Specifies an object list name, a case-sensitive string of 1 to 32 characters. Usage guidelines For more information, see "object list (trigger...
  • Page 247: Oid (Action-Notification View)

    Examples # Specify the object list with the owner owner1 and name objectA for the trigger-threshold test. <Sysname> system-view [Sysname] snmp mib event trigger owner owner1 name triggerA [Sysname-trigger-owner1-triggerA] test threshold [Sysname-trigger-owner1-triggerA-threshold] object list owner owner1 name objectA Related commands snmp mib event trigger test oid (action-notification view)
  • Page 248: Oid (Trigger View)

    Use undo oid to restore the default. Syntax oid object-identifier undo oid Default The OID is 0.0. No object is specified for a set action. Views Action-set view Predefined user roles network-admin Parameters object-identifier: Specifies an object by its OID or name, a case-sensitive string of 1 to 255 characters.
  • Page 249: Rising

    Parameters object-identifier: Specifies an object by its OID or name, a case-sensitive string of 1 to 255 characters. The object can be a table node, conceptual row node, table column node, leaf node, or parent leaf node. Examples # Specify the object with the OID 1.3.6.1.2.1.2.2.1.1.3 for trigger sampling. <Sysname>...
  • Page 250: Sample

    snmp mib event trigger test sample Use sample to specify a sampling method. Use undo sample to restore the default. Syntax sample { absolute | delta } undo sample Default The sampling method is absolute. Views Trigger view Predefined user roles network-admin Parameters absolute: Specifies the absolute sampling method.
  • Page 251: Snmp Mib Event Object List

    Default No event exists. Views System view Predefined user roles network-admin Parameters event-owner: Specifies an event owner. The event owner must be an existing SNMPv3 user. event-name: Specifies an event name, a case-sensitive string of 1 to 32 characters. Usage guidelines An event is identified by its owner and name.
  • Page 252: Snmp Mib Event Sample Instance Maximum

    oid object-identifier: Specifies an object by its OID or name, a case-sensitive string of 1 to 255 characters. The object can be a table node, a conceptual row node, a table column node, a leaf mode, or a parent leaf node. wildcard: Enables wildcard search for objects.
  • Page 253: Snmp Mib Event Sample Minimum

    Examples # Set the maximum number to 10 for the object instances that can be concurrently sampled. <Sysname> system-view [Sysname] snmp mib event sample instance maximum 10 Related commands snmp mib event sample minimum snmp mib event sample minimum Use snmp mib event sample minimum to specify the minimum sampling interval. Use undo snmp mib event sample minimum to restore the default.
  • Page 254: Snmp-Agent Trap Enable Event-Mib

    Syntax snmp mib event trigger owner trigger-owner name trigger-name undo snmp mib event trigger owner trigger-owner name trigger-name Default No trigger exists. Views System view Predefined user roles network-admin Parameters trigger-owner: Specifies an owner for a trigger, which must be an existing SNMPv3 user. trigger-name: Specifies a name for a trigger, a case-sensitive string of 1 to 32 characters.
  • Page 255: Startup (Trigger-Existence View)

    break trap, falling threshold break trap, trigger-condition detection failure trap, and set-action trigger failure trap. For the traps to be sent correctly, you must also configure SNMP on the device. For more information about SNMP configuration, see Network Management and Monitoring Configuration Guide. Examples # Enable the event MIB trap feature.
  • Page 256: Startup (Trigger-Threshold View)

    startup (trigger-threshold view) Use startup to specify a threshold trap type for the first sampling. Use undo startup to restore the default. Syntax startup { falling | rising | rising-or-falling } undo startup Default The threshold trap type for the first sampling is rising-or-falling. Views Trigger-threshold view Predefined user roles...
  • Page 257: Test

    undo startup enable Default An event is triggered for the first Boolean sampling. Views Trigger-Boolean view Predefined user roles network-admin Usage guidelines For an event to be triggered when a trigger condition is met at the first Boolean sampling, execute the startup enable command.
  • Page 258: Trigger Enable

    Usage guidelines For more information about the trigger tests, see the commands in the trigger-Boolean view, trigger-existence view, and trigger-threshold view . Examples # Specify the existence test for a trigger. <Sysname> system-view [Sysname] snmp mib event trigger owner owner1 name triggerA [Sysname-trigger-owner1-triggerA] test existence Related commands snmp mib event trigger...
  • Page 259: Value (Action-Set View)

    Syntax type { absent | changed | present } undo type { absent |changed | present } Default The existence test types are present and absent. Views Trigger-existence view Predefined user roles network-admin Parameters absent: Monitors the absence of an object. changed: Monitors the change of the value of an object.
  • Page 260: Value (Trigger-Boolean View)

    Predefined user roles network-admin Parameters integer-value: Specifies a value for a set-action object. The value is in the range of –2147483648 to +2147483647. Examples # Set the value to 5 for the set-action object with the OID 1.3.6.1.2.1.2.2.1.7.3. <Sysname> system-view [Sysname] snmp mib event owner owner1 name EventA [Sysname-event-owner1-EventA] action set [Sysname-event-owner1-EventA-set] oid 1.3.6.1.2.1.2.2.1.7.3...
  • Page 261: Wildcard Context (Action-Set View)

    Related commands snmp mib event trigger startup test wildcard context (action-set view) Use wildcard context to enable wildcard search for the contexts of a set-action object. Use undo wildcard context to restore the default. Syntax wildcard context undo wildcard context Default The context of the set action is fully specified.
  • Page 262: Wildcard Oid (Action-Set View)

    Default The context of an object is fully specified. Views Trigger view Predefined user roles network-admin Usage guidelines This command must be used with the context command. A wildcarded context has two parts: the context specified by the context command and the wildcarded part. Examples # Specify the contexts for the monitored object as contextname and enable wildcard search for the contexts.
  • Page 263: Wildcard Oid (Trigger View)

    [Sysname-event-owner1-EventA-set] oid 1.3.6.1.2.1.2.2.1.7 [Sysname-event-owner1-EventA-set] wildcard oid Related commands action set snmp mib event owner wildcard oid (trigger view) Use wildcard oid to enable wildcard search for the monitored object OIDs. Use undo wildcard oid to restore the default. Syntax wildcard oid undo wildcard oid Default A MIB object OID is fully specified.
  • Page 264: Netconf Commands

    NETCONF commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. netconf idle-timeout Use netconf idle-timeout to set the NETCONF session idle timeout time.
  • Page 265: Netconf Log

    netconf log Use netconf log to enable NETCONF logging. Use undo netconf log to remove the configuration for the specified NETCONF operation sources and NETCONF operations. Syntax netconf log source { all | { agent | soap | web } * } { { protocol-operation { all | { action | config | get | set | session | syntax | others } * } } | verbose } undo netconf log source { all | { agent | soap | web } * } { { protocol-operation { all | { action | config | get | set | session | syntax | others } * } } | verbose }...
  • Page 266: Netconf Soap Http Acl

    Examples # Configure the device to log NETCONF edit-config information sourced from agent clients. <Sysname> system-view [Sysname] netconf log source agent protocol-operation set netconf soap http acl Use netconf soap http acl to apply an ACL to NETCONF over SOAP over HTTP traffic. Use undo netconf soap http acl to restore the default.
  • Page 267: Netconf Soap Https Acl

    Default NETCONF over SOAP over HTTP is disabled. Views System view Predefined user roles network-admin Usage guidelines This command is not available in FIPS mode. This command enables the device to resolve NETCONF messages that are encapsulated with SOAP in HTTP packets. Examples # Enable NETCONF over SOAP over HTTP.
  • Page 268: Netconf Soap Https Enable

    [Sysname-acl-ipv4-basic-2001] quit [Sysname] netconf soap https acl 2001 netconf soap https enable Use netconf soap https enable to enable NETCONF over SOAP over HTTPS. Use undo netconf soap https enable to disable NETCONF over SOAP over HTTPS. Syntax netconf soap https enable undo netconf soap https enable Default NETCONF over SOAP over HTTPS is disabled.
  • Page 269: Netconf Ssh Server Port

    Before you execute this command, configure the authentication mode for users as scheme on the device. Then, the NETCONF-over-SSH-enabled user terminals can access the device through NETCONF over SSH. Only capability set urn:ietf:params:netconf:base:1.0 is available. It is supported by both the device and user terminals.
  • Page 270 When a NETCONF message includes the character "a," only the contents after the last "a" in the message can be processed. Examples # Enter XML view. <Sysname> xml <?xml version="1.0" encoding="UTF-8"?><hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"><capabilities><capability>urn:ietf:pa rams:netconf:base:1.1</capability><capability>urn:ietf:params:netconf:writable-runnin g</capability><capability>urn:ietf:params:netconf:capability:notification:1.0</capabi lity><capability>urn:ietf:params:netconf:capability:validate:1.1</capability><capabil ity>urn:ietf:params:netconf:capability:interleave:1.0</capability><capability>urn:hpe :params:netconf:capability:hpe-netconf-ext:1.0</capability></capabilities><session-id >1</session-id></hello>]]>]]> # Quit XML view. <rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> <close-session> </close-session> </rpc>]]>]]> <Sysname>...
  • Page 271: Cwmp Commands

    CWMP commands cwmp Use cwmp to enter CWMP view. Syntax cwmp Views System view Predefined user roles network-admin Examples # Enter CWMP view. <Sysname> system-view [Sysname] cwmp Related commands cwmp enable cwmp acs default password Use cwmp acs default password to configure a password for authentication to the default ACS URL.
  • Page 272: Cwmp Acs Default Url

    Usage guidelines You can configure only one password for authentication to the default ACS URL. If you execute this command multiple times, the most recent configuration takes effect. For a successful connection, make sure the CPE has the same username and password settings as the ACS.
  • Page 273: Cwmp Acs Default Username

    Related commands cwmp acs default password cwmp acs default username cwmp acs default username Use cwmp acs default username to configure the username for authentication to the default ACS. Use undo cwmp acs default username to restore the default. Syntax cwmp acs default username username undo cwmp acs default username Default...
  • Page 274: Cwmp Acs Url

    Default No password is configured for authentication to the preferred ACS URL. Views CWMP view Predefined user roles network-admin Parameters cipher: Specifies a password in encrypted form. simple: Specifies a password in plaintext form. For security purposes, the password specified in plaintext form will be stored in encrypted form.
  • Page 275: Cwmp Acs Username

    Parameters url: Specifies the preferred ACS URL, a string of 8 to 255 characters. The URL must use the http://host[:port]/path or https://host[:port]/path format. Usage guidelines The device supports only one preferred ACS URL. If you execute this command multiple times, the most recent configuration takes effect.
  • Page 276: Cwmp Cpe Connect Interface

    Related commands cwmp acs password cwmp cpe connect interface Use cwmp cpe connect interface to specify the CWMP connection interface. Use undo cwmp cpe connect interface to restore the default. Syntax cwmp cpe connect interface interface-type interface-number undo cwmp cpe connect interface Default No CWMP connection interface is specified.
  • Page 277: Cwmp Cpe Inform Interval

    Default The CPE retries a failed connection until the connection is established with the ACS. Views CWMP view Predefined user roles network-admin Parameters retries: Specifies the maximum number of CWMP connection retries. The value range is 0 to 100. To disable the CPE to retry a CWMP connection, set this argument to 0.
  • Page 278: Cwmp Cpe Inform Interval Enable

    [Sysname-cwmp] cwmp cpe inform interval enable [Sysname-cwmp] cwmp cpe inform interval 3600 Related commands cwmp cpe inform interval enable cwmp cpe inform interval enable Use cwmp cpe inform interval enable to enable the periodic Inform feature. Use undo cwmp cpe inform interval enable to restore the default. Syntax cwmp cpe inform interval enable undo cwmp cpe inform interval enable...
  • Page 279: Cwmp Cpe Password

    Predefined user roles network-admin Parameters time: Specifies the time at which the CPE sends an Inform message. The time format is yyyy-mm-ddThh:mm:ss, and the value range is 1970-01-01T00:00:00 to 2035-12-31T23:59:59. The specified time must be greater than the current system time. Examples # Configure the CPE to send an Inform message at 2007-12-01T20:00:00.
  • Page 280: Cwmp Cpe Provision-Code

    <Sysname> system-view [Sysname] cwmp [Sysname-cwmp] cwmp cpe password simple newpsw Related commands cwmp cpe username cwmp cpe provision-code Use cwmp cpe provision-code to configure the provision code of the CPE. Use undo cwmp cpe provision-code to restore the default. Syntax cwmp cpe provision-code provision-code undo cwmp cpe provision-code Default...
  • Page 281: Cwmp Cpe Username

    Default NAT traversal is disabled for CWMP. Views CWMP view Predefined user roles network-admin Usage guidelines Connection requests initiated from the CPE can reach the ACS through a NAT gateway without NAT traversal. However, for the connection request initiated from the ACS to reach the CPE, you must enable NAT traversal on the CPE when a NAT gateway resides between the CPE and the ACS.
  • Page 282: Cwmp Cpe Wait Timeout

    For a successful connection, make sure the ACS has the same username setting as the CPE. If a password is required, you must also make sure the ACS has the same password setting as the CPE. The ACS must provide the correct username when it requests the CPE to initiate a CWMP session. If the username is incorrect, the CPE denies the connection request from the ACS.
  • Page 283: Cwmp Enable

    cwmp enable Use cwmp enable to enable CWMP. Use undo cwmp enable to disable CWMP. Syntax cwmp enable undo cwmp enable Default CWMP is disabled. Views CWMP view Predefined user roles network-admin Usage guidelines CWMP configuration takes effect only after CWMP is enabled. Examples # Enable CWMP.
  • Page 284 Periodic inform : Disabled Inform interval : 600s Inform time : None Wait timeout : 30s Connection retries : Unlimited Source IP interface : None STUN state : Disabled SSL policy name : Null Table 56 Command output Field Description CWMP state Status of CWMP: Enabled or Disabled.
  • Page 285: Display Cwmp Status

    display cwmp status Use display cwmp status to display CWMP state information. Syntax display cwmp status Views Any view Predefined user roles network-admin network-operator Examples # Display CWMP state information. <Sysname> display cwmp status CWMP state : Enabled ACS URL of most recent connection : http://www.acs.com:80/acs ACS information source : User...
  • Page 286: Ssl Client-Policy

    Field Description Most recent successful Time of the most recent successful CWMP connection. This field displays None if no CWMP session was established. connection attempt Amount of time (in seconds) that the CPE must wait before it initiates the next Length of time before next connection.
  • Page 287: Eaa Commands

    EAA commands Commands and descriptions for centralized devices apply to the following routers: • MSR1002-4/1003-8S. • MSR2003. • MSR2004-24/2004-48. • MSR3012/3024/3044/3064. • MSR954 (JH296A/JH297A/JH298A/JH299A/JH373A). • MSR958 (JH300A/JH301A). Commands and descriptions for distributed devices apply to the MSR4060 and MSR4080 routers. action cli Use action cli to add a CLI action to a monitor policy.
  • Page 288: Action Reboot

    When you define an action, you can specify a value or specify a variable name for an argument. For more information about using EAA environment variables, see "rtm environment." Examples # Configure the CLI-defined policy test to shut down GigabitEthernet 1/0/1 when the policy is triggered.
  • Page 289: Action Switchover

    The following matrix shows the subslot subslot-number option and hardware compatibility: Hardware Option compatibility MSR954 (JH296A/JH297A/JH298A/JH299A/JH373A) MSR958 (JH300A/JH301A) MSR1002-4/1003-8S MSR2003 MSR2004-24/2004-48 MSR3012/3024/3044/3064 MSR4060/4080 Usage guidelines You can configure a series of actions to be executed in response to the event specified in a monitor policy.
  • Page 290: Action Syslog

    Default Monitor policies do not contain any actions. Views CLI-defined policy view Predefined user roles network-admin Parameters number: Specifies an action ID in the range of 0 to 231. Usage guidelines You can configure a series of actions to be executed in response to the event specified in a monitor policy.
  • Page 291: Commit

    Views CLI-defined policy view Predefined user roles network-admin Parameters number: Specifies an action ID in the range of 0 to 231. priority priority: Specifies the log severity level in the range of 0 to 7. A lower value represents a higher severity level.
  • Page 292: Display Rtm Environment

    After changing the settings in a policy that has been enabled, you must re-execute this command for the changes to take effect. Examples # Enable the CLI-defined policy test. <Sysname> system-view [Sysname] rtm cli-policy test [Sysname-rtm-test] commit display rtm environment Use display rtm environment to display user-defined EAA environment variables and their values.
  • Page 293 Views Any view Predefined user roles network-admin Parameters active: Displays policies that are running. registered: Displays policies that have been created. policy-name: Specifies a policy by its name. If you do not specify a policy, the command displays all monitor policies that are running or have been created. verbose: Displays detailed information about monitor policies.
  • Page 294: Event Cli

    Field Description TimeActive Time when the policy started to execute. TimeRegistered Time when the policy was created. Total number Total number of policies. User roles for executing the monitor policy. To execute the monitor policy, an User-role administrator must have at least one of the displayed user roles. event cli Use event cli to configure a CLI event for a CLI-defined monitor policy.
  • Page 295: Event Hotplug

    [Sysname] rtm cli-policy test [Sysname-rmt-test] event cli async skip mode execute pattern dis inter brief # Configure a CLI-defined policy to monitor the use of the Tab key at command lines that contain the dis inter brief string. Enable the system to execute the actions in the policy and display the complete parameter when Tab is pressed at a policy-matching command line.
  • Page 296 slot slot-number: Specifies an IRF member device by its member ID. (Centralized devices in IRF mode.) chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card.
  • Page 297: Event Interface

    [Sysname-rtm-test] event hotplug slot 2 # (Distributed devices in IRF mode.) Configure a CLI-defined policy to monitor the card in slot 2 of IRF member device 1 for card swapping. <Sysname> system-view [Sysname] rtm cli-policy test [Sysname-rtm-test] event hotplug chassis 1 slot 2 event interface Use event interface to configure an interface event for a CLI-defined monitor policy.
  • Page 298 Monitored traffic Description statistic output-errors Number of outgoing error packets. rcv-bps Receive rate, in bps. rcv-broadcasts Number of incoming broadcasts. rcv-pps Receive rate, in packets per second. tx-bps Transmit rate, in bps. tx-pps Transmit rate, in packets per second. Table 61 Comparison operators Comparison operator Description Equal to.
  • Page 299: Event Process

    [Sysname-rtm-test] event interface gigabitethernet 1/0/1 monitor-obj input-errors start-op gt start-val 1000 restart-op lt restart-val 50 interval 60 event process Use event process to configure a process event for a CLI-defined monitor policy. Use undo event to delete the event in a CLI-defined monitor policy. Syntax Distributed devices in standalone mode/centralized devices in standalone or IRF mode: event process { exception | restart | shutdown | start } [ name process-name [ instance...
  • Page 300: Event Snmp Oid

    chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, the policy applies to all cards on the specified member device.
  • Page 301: Event Snmp-Notification

    strings. The CLI online help system displays the value range as character strings of 1 to 512 characters. If the threshold value contains spaces, you must enclose the value in quotation marks (" "). interval interval: Specifies the sampling interval in the range of 1 to 4294967295, in seconds. The default value is 300.
  • Page 302: Event Syslog

    Predefined user roles network-admin Parameters oid oid: Specifies the OID of the monitored MIB variable, a string of 1 to 256 characters. oid-val oid-val: Specifies the threshold to be compared with the sampled value. The oid-val argument can be any data type supported by SNMP, including numerals and character strings. The CLI online help system displays the value range as character strings of 1 to 512 characters.
  • Page 303: Rtm Cli-Policy

    7. A lower number represents higher priority level. For example, specify a severity level of 3 to match log messages from level 3 to level 0. msg msg: Specifies a regular expression to match the message body, a string of 1 to 255 characters. The log message must use the Hewlett Packard Enterprise format.
  • Page 304: Rtm Environment

    Usage guidelines You must create a CLI-defined monitor policy before you can use the CLI to configure settings in the policy. You can assign the same policy name to a CLI-defined policy and a Tcl-defined policy, but you cannot assign the same name to policies that are the same type. For a CLI-defined monitor policy to take effect, you must execute the commit command after you complete configuring the policy.
  • Page 305: Rtm Scheduler Suspend

    Variable name Description (Centralized devices in standalone mode.) 0. (Distributed devices.) ID of the slot where card hot-swapping occurs. _slot (Centralized devices in IRF mode.) ID of the member device that joins or leaves the IRF fabric. _subslot ID of the subslot where a hot swap event occurs. Interface: _ifname Interface name.
  • Page 306: Rtm Tcl-Policy

    undo rtm scheduler suspend Views System view Predefined user roles network-admin Usage guidelines This command disables all CLI-defined and Tcl-defined monitor policies except for the monitor policies that are running. To revise the Tcl script of a policy, you must suspend all monitor policies first, and then resume the policies after you finish revising the script.
  • Page 307: Running-Time

    after you finish revising the script. The system cannot execute a Tcl-defined policy if you edit its Tcl script without suspending all monitor policies. To bind a Tcl-defined policy to a different Tcl script file: Execute the undo rtm tcl-policy policy-name command to delete the Tcl policy. Create the Tcl policy again, and then bind it to the new Tcl script file.
  • Page 308 Syntax user-role role-name undo user-role role-name Default A monitor policy contains user roles that its creator had at the time of policy creation. Views CLI-defined policy view Predefined user roles network-admin Parameters role-name: Specifies a user role by its name, a case-sensitive string of 1 to 63 characters. Usage guidelines For EAA to execute an action in a monitor policy, you must assign the policy the user role that has access to the action-specific commands and resources.
  • Page 309: Process Monitoring And Maintenance Commands

    Process monitoring and maintenance commands Commands and descriptions for centralized devices apply to the following routers: • MSR1002-4/1003-8S. • MSR2003. • MSR2004-24/2004-48. • MSR3012/3024/3044/3064. • MSR954 (JH296A/JH297A/JH298A/JH299A/JH373A). • MSR958 (JH300A/JH301A). Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers. The display memory, display process, display process cpu, monitor process, and monitor thread commands display information about both user processes and kernel threads.
  • Page 310 cpu cpu-number: Specifies a CPU by its number. (Centralized devices in IRF mode/distributed devices in IRF or standalone mode.) Usage guidelines The system generates a context information entry for each process exception. A context information entry includes the process ID, the crash time, the core file directory, stack information, and register information.
  • Page 311 r14:0x00007fff88a5de30 r15:0x0000000000000000 rip:0x00007fae7dbad20c flag:0x0000000000000246 cs:0x0000000000000033 ss:0x000000000000002b ds:0x0000000000000000 es:0x0000000000000000 fs:0x0000000000000000 gs:0x0000000000000000 fs_base:0x00007fae80a5d6a0 gs_base:0x0000000000000000 orig_ax:0x00000000000000e8 # Display the exception context information on the PowerPC-based 32-bit device. <Sysname> display exception context Index 1 of 1 ------------------------------ Crashed PID: 133 (routed) Crash signal: SIGBUS Crash time: Wed Apr 10 15:47:49 2013 Core file path: flash:/core/node0_routed_133_7_20130410-154749_1365608869.core...
  • Page 312 grp04: 0x00000fffffd048c0 0x000000000000000a grp06: 0xffffffffffffffff 0x00000fff803c66b4 grp08: 0x000000008002d000 0x0000000000000000 grp10: 0x0000000000000000 0x0000000000000000 grp12: 0x0000000000000000 0x00000fff80a096b0 grp14: 0x000000007b964c00 0x000000007b7d0000 grp16: 0x0000000000000001 0x000000000000000b grp18: 0x0000000000000031 0x0000000000a205b8 grp20: 0x0000000000a20677 0x0000000000000000 grp22: 0x000000007bb91014 0x0000000000000000 grp24: 0xc0000000005ae1c8 0x0000000000000000 grp26: 0xc0000001f00bff20 0xc0000001f00b0000 grp28: 0x00000fffffd04a30 0x000000001001aed8 grp30: 0x00000fffffd04fae 0x00000fffffd04840 nip:0x00000fff803c66b4 lr:0x0000000010009b94 cr:0x0000000058000482...
  • Page 313 Crashed PID: 270 (routed) Crash signal: SIGBUS Crash time: Wed Mar 27 12:39:12 2013 Core file path: flash:/core/node16_routed_270_10_20130327-123912_1364387952.core 0x0000005555a3bcb4 0x0000000120006c1c Backtrace stopped. Registers' content zero:0x0000000000000000 at:0x0000000000000014 v0:0x0000000000000004 v1:0x0000000000000003 a0:0x0000000000000003 a1:0x000000ffff899d90 a2:0x000000000000000a a3:0x0000000000000001 a4:0x0000005555a9b4e0 a5:0x0000000000000000 a6:0xffffffff8021349c a7:0x20696e206368616e t0:0x0000000000000000 t1:0xffffffff80105068 t2:0xffffffff80213890 t3:0x0000000000000008 s0:0x0000005555a99c40 s1:0x000000ffff89af5f s2:0x0000000120007320...
  • Page 314: Display Exception Filepath

    Related commands reset exception context display exception filepath Use display exception filepath to display the core file directory. Syntax Centralized devices in standalone mode: display exception filepath Distributed devices in standalone mode/centralized devices in IRF mode: display exception filepath [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: display exception filepath [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] Views...
  • Page 315: Display Kernel Deadloop

    display kernel deadloop Use display kernel deadloop to display kernel thread deadloop information. Syntax Centralized devices in standalone mode: display kernel deadloop show-number [ offset ] [ verbose ] Distributed devices in standalone mode/centralized devices in IRF mode: display kernel deadloop show-number [ offset ] [ verbose ] [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: display kernel deadloop show-number [ offset ] [ verbose ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]...
  • Page 316 VCPU ID Kernel module info : module name (mrpnc) module address (0xe332a000) # Display detailed information about the latest kernel thread deadloop. <Sysname> display kernel deadloop 1 verbose ----------------- Deadloop record 1 ----------------- Description : BUG: soft lockup - CPU#0 stuck for 61! [comsh: 16306] Recorded at : 2013-05-01 11:16:00.823018...
  • Page 317 0xe2be5eb0: 00 00 00 04 00 00 00 00 00 00 00 28 05 8d 34 c4 0xe2be5ec0: 02 be 60 a0 01 86 ef f0 00 00 00 00 00 00 00 00 0xe2be5ed0: 02 04 05 b4 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5ef0: 95 47 73 35 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f00: a0 e1 64 21 00 00 00 00 00 00 00 00 00 00 00 00...
  • Page 318: Display Kernel Deadloop Configuration

    Table 64 Command output Field Description Description for the kernel thread deadloop, including the CPU number, Description thread running time, thread name, and thread number. Time when the kernel thread deadloop was recorded on the MPU, with Recorded at microsecond precision. Time when the kernel thread deadloop occurred, with microsecond Occurred at precision.
  • Page 319 display kernel deadloop configuration Distributed devices in standalone mode/centralized devices in IRF mode: display kernel deadloop configuration [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: display kernel deadloop configuration [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] Views Any view...
  • Page 320: Display Kernel Exception

    display kernel exception Use display kernel exception to display kernel thread exception information. Syntax Centralized devices in standalone mode: display kernel exception show-number [ offset ] [ verbose ] Distributed devices in standalone mode/centralized devices in IRF mode: display kernel exception show-number [ offset ] [ verbose ] [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: display kernel exception show-number [ offset ] [ verbose ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]...
  • Page 321 Context : thread context Chassis Slot VCPU ID Kernel module info : module name (mrpnc) module address (0xe332a000) module name (disk) module address (0xe00bd000) # Display detailed information about the latest kernel thread exception. <Sysname> display kernel exception 1 verbose ----------------- Exception record 1 ----------------- Description : Oops[#0]...
  • Page 322 Reg: ctr, Val = 0x682f7344 ; Reg: msr, Val = 0x00784b5c ; Reg: trap, Val = 0x0000b030 ; Reg: dar, Val = 0x77777777 ; Reg: dsisr, Val = 0x40000000 ; Reg: result, Val = 0x00020300 ; Dump stack (total 1024 bytes, 16 bytes/line): 0xe2be5ea0: 02 be 5e c0 24 00 00 24 00 00 00 00 05 7d 94 84 0xe2be5eb0: 00 00 00 04 00 00 00 00 00 00 00 28 05 8d 34 c4 0xe2be5ec0: 02 be 60 a0 01 86 ef f0 00 00 00 00 00 00 00 00...
  • Page 323: Display Kernel Reboot

    Instruction dump: 41a2fe9c 812300ec 800200ec 7f890000 409efe8c 80010014 540b07b9 40a2fe80 4bfffe6c 80780290 7f64db78 4804ea35 <807f002c> 38800000 38a00080 3863000c For detailed information about the command output, see Table Related commands reset kernel exception display kernel reboot Use display kernel reboot to display reboot information. Syntax Centralized devices in standalone mode: display kernel reboot show-number [ offset ] [ verbose ]...
  • Page 324 Examples # Display brief information about the latest reboot. <Sysname> display kernel reboot 1 ----------------- Reboot record 1 ----------------- Recorded at : 2013-05-01 11:16:00.823018 Occurred at : 2013-05-01 11:16:00.823018 Reason : 0x31 Thread : comsh (TID: 16306) Context : thread context Chassis Slot VCPU ID...
  • Page 325 0xe2be5f50: 02 be 5f 90 00 00 00 08 02 be 5f e0 00 00 00 08 0xe2be5f60: 02 be 5f 80 00 ac 1b 14 00 00 00 00 00 00 00 00 0xe2be5f70: 05 b4 5f 90 02 be 5f e0 00 00 00 30 02 be 5f e0 0xe2be5f80: 02 be 5f c0 00 ac 1b f4 00 00 00 00 02 45 00 00 0xe2be5f90: 00 03 00 00 00 00 00 00 02 be 5f e0 00 00 00 30 0xe2be5fa0: 02 be 5f c0 00 ac 1b 14 61 f1 2e ae 02 45 00 00...
  • Page 326: Display Kernel Starvation

    Field Description Number of the CPU that triggered the reboot. VCPU ID Number of the CPU core that triggered the reboot. Information about kernel modules that had been loaded when the kernel thread Kernel module info rebooted, including kernel module name and memory address. Last five kernel thread switches on the CPU before the reboot occurred, Last 5 thread switches including kernel thread name and kernel thread switching time, with...
  • Page 327 chassis chassis-number slot slot-number: Specifies an MPU on an IRF member device. If you do not specify this option, the command displays kernel thread starvation information for the global active MPU. (Distributed devices in IRF mode.) cpu cpu-number: Specifies a CPU by its number. (Centralized devices in IRF mode/distributed devices in IRF or standalone mode.) Examples # Display brief information about the latest kernel thread starvation.
  • Page 328 Reg: r8, Val = 0x77777777 ; Reg: r9, Val = 0x00000000 ; Reg: r10, Val = 0x00000001 ; Reg: r11, Val = 0x0000002c ; Reg: r12, Val = 0x057d9484 ; Reg: r13, Val = 0x00000000 ; Reg: r14, Val = 0x00000000 ; Reg: r15, Val = 0x02000000 ;...
  • Page 329: Display Kernel Starvation Configuration

    0xe2be6070: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0 0xe2be6080: 02 be 61 e0 00 00 00 02 00 00 00 00 02 be 61 70 0xe2be6090: 00 00 00 00 02 21 00 00 05 8d 34 c4 05 7d 92 44 Call trace: Function Address = 0x8012a4b4 Function Address = 0x8017989c...
  • Page 330: Display Process

    chassis chassis-number slot slot-number: Specifies a card on an IRF member device. If you do not specify this option, the command displays kernel thread starvation detection configuration for the global active MPU. (Distributed devices in IRF mode.) cpu cpu-number: Specifies a CPU by its number. (Centralized devices in IRF mode/distributed devices in IRF or standalone mode.) Examples # Display kernel thread starvation detection configuration.
  • Page 331 Parameters all: Specifies all processes. With the all keyword or without any parameters, the command displays state information for all processes. job job-id: Specifies a process by its job ID, in the range of 1 to 2147483647. Each process has a fixed job ID.
  • Page 332 Field Description Instance number of the process. Whether a process can run multiple instances Instance depends on the software implementation. Indicates whether the process restarts when an error occurs: • ON—The process automatically restarts. Respawn • OFF—The process does not automatically restarts. Respawn count Times that the process has restarted.
  • Page 333: Display Process Cpu

    00:00:00 [kblockd/0] 00:00:00 [ata/0] 00:00:00 [ata_aux] 00:00:00 [kseriod] 00:00:00 [vzmond] 00:00:00 [pdflush] 00:00:00 [pdflush] 00:00:00 [kswapd0] 00:00:00 [aio/0] 00:00:00 [scsi_eh_0] 00:00:00 [scsi_eh_1] 00:00:00 [scsi_eh_2] 00:00:00 [lipc_topology] ---- More ---- Table 69 Command output Field Description Job ID of a process. It never changes. Number of a process.
  • Page 334 Views Any view Predefined user roles network-admin network-operator Parameters slot slot-number: Specifies a card by its slot number. If you do not specify this option, the command displays CPU usage for all processes on the active MPU. (Distributed devices in standalone mode.) slot slot-number: Specifies an IRF member device by its member ID.
  • Page 335: Display Process Log

    Field Description Job ID of a process. It never changes. 5Sec CPU usage of the process within the last 5 seconds. 1Min CPU usage of the process within the last minute. 5Min CPU usage of the process within the last 5 minutes. Name of the process.
  • Page 336: Display Process Memory

    pkg_update 12-17 07:10:30 12-17 07:10:31 Table 71 Command output Field Description Process Name of a user process. JobID Job ID of a user process. ID of a user process. Indicates whether the process exited abnormally: • Abort Y—Yes. • N—No. Indicates whether the process can generate core files: •...
  • Page 337 chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays information for the global active MPU.
  • Page 338: Display Process Memory Heap

    display process memory heap Use display process memory heap to display heap memory usage for a user process. Syntax Centralized devices in standalone mode: display process memory heap job job-id [ verbose ] Distributed devices in standalone mode/centralized devices in IRF mode: display process memory heap job job-id [ verbose ] [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: display process memory heap job job-id [ verbose ] [ chassis chassis-number slot slot-number...
  • Page 339: Display Process Memory Heap Address

    Total allocated memory(in bytes) 161576 # Display detailed information about heap memory usage for the process identified by job ID 148. <Sysname> display process memory heap job 148 verbose Heap usage: Size Free Used Total Free Ratio 1262 1265 0.2% 5.1% 4096 8192...
  • Page 340: Display Process Memory Heap Size

    Views Any view Predefined user roles network-admin network-operator Parameters job job-id: Specifies a user process by its job ID, in the range of 1 to 2147483647. address starting-address: Specifies the starting memory block by its address. length memory-length: Specifies the memory block length in the range of 1 to 1024 bytes. slot slot-number: Specifies a card by its slot number.
  • Page 341 Distributed devices in standalone mode/centralized devices in IRF mode: display process memory heap job job-id size memory-size [ offset offset-size ] [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: display process memory heap job job-id size memory-size [ offset offset-size ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] Views Any view...
  • Page 342: Exception Filepath

    0xb7e30180 0xb7e30190 0xb7e301a0 0xb7e301b0 0xb7e301c0 0xb7e301d0 0xb7e301e0 0xb7e301f0 0xb7e30200 0xb7e30210 0xb7e30220 0xb7e30230 Related commands display process memory heap display process memory heap address exception filepath Use exception filepath to specify the directory for saving core files. Use undo exception filepath to remove the specified directory. Syntax exception filepath directory undo exception filepath directory...
  • Page 343: Monitor Kernel Deadloop Enable

    monitor kernel deadloop enable Use monitor kernel deadloop enable to enable kernel thread deadloop detection. Use undo monitor kernel deadloop enable to disable kernel thread deadloop detection. Syntax Centralized devices in standalone mode: monitor kernel deadloop enable undo monitor kernel deadloop enable Distributed devices in standalone mode/centralized devices in IRF mode: monitor kernel deadloop enable [ slot slot-number [ cpu cpu-number ] ] undo monitor kernel deadloop enable [ slot slot-number [ cpu cpu-number ] ]...
  • Page 344: Monitor Kernel Deadloop Exclude-Thread

    Related commands display kernel deadloop display kernel deadloop configuration monitor kernel deadloop exclude-thread monitor kernel deadloop time monitor kernel deadloop exclude-thread Use monitor kernel deadloop exclude-thread to disable kernel thread deadloop detection for a kernel thread. Use undo monitor kernel deadloop exclude-thread to enable kernel thread deadloop detection for a kernel thread.
  • Page 345: Monitor Kernel Deadloop Time

    Usage guidelines You can disable kernel thread deadloop detection for up to 128 kernel threads by executing the command. Inappropriate use of the command can cause service problems or system breakdown. Make sure you understand the impact of the command on your network before you use it. Examples # Disable kernel thread deadloop detection for kernel thread 15.
  • Page 346: Monitor Kernel Starvation Enable

    slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the master device is specified. (Centralized devices in IRF mode.) chassis chassis-number slot slot-number: Specifies a card on an IRF member device. If you do not specify this option, the global active MPU is specified.
  • Page 347: Monitor Kernel Starvation Exclude-Thread

    Parameters slot slot-number: Specifies a card by its slot number. If you do not specify this option, the active MPU is specified. (Distributed devices in standalone mode.) slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the master device is specified.
  • Page 348: Monitor Kernel Starvation Time

    undo monitor kernel starvation exclude-thread [ tid ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] Default Kernel thread starvation detection, if enabled, monitors all kernel threads. Views System view Predefined user roles network-admin Parameters tid: Specifies a kernel thread by its ID, in the range of 1 to 2147483647. If no kernel thread is specified for the undo command, the default is restored.
  • Page 349: Monitor Process

    monitor kernel starvation time time [ slot slot-number [ cpu cpu-number ] ] undo monitor kernel starvation time [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: monitor kernel starvation time time [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] undo monitor kernel starvation time [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]...
  • Page 350 Syntax Centralized devices in standalone mode: monitor process [ dumbtty ] [ iteration number ] Distributed devices in standalone mode/centralized devices in IRF mode: monitor process [ dumbtty ] [ iteration number ] [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: monitor process [ dumbtty ] [ iteration number ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]...
  • Page 351 Commands Description Sets the interval for refreshing process statistics, in the range of 1 to 2147483647 seconds. The default value is 5 seconds. Sorts processes by the number of open files in descending order. Files are identified by file descriptors (FDs). Kills a process.
  • Page 352 1047 1047 1420K 00:02:30 37.11% diagd 1092K 00:00:21 11.34% scmd 1000 1000 00:00:09 2.06% [sock/1] 1026 1026 26044K 00:00:05 1.54% syslogd 1027 1027 9280K 00:01:12 1.03% devd 00:00:06 0.51% [ksoftirqd/0] 1009 1009 00:00:08 0.51% [karp/1] 1010 1010 00:00:13 0.51% [kND/1] 5373 5373 1496K...
  • Page 353 1047 1047 1420K 00:02:39 14.13% diagd 1092K 00:00:23 3.98% scmd 1027 1027 9280K 00:01:13 1.44% devd 1000 1000 00:00:09 0.36% [sock/1] 1009 1009 00:00:09 0.36% [karp/1] 00:00:06 0.18% [ksoftirqd/0] 1010 1010 00:00:13 0.18% [kND/1] 4795 4795 2372K 00:00:01 0.18% telnetd 5491 5491 1500K...
  • Page 354: Monitor Thread

    CPU states: 90.66% idle, 0.88% user, 5.77% kernel, 2.66% interrupt Memory: 755M total, 414M available, page size 4K State HH:MM:SS Name 5384K 00:00:01 0.00% dbmd 2464K 00:00:02 0.00% ipbased 1956K 00:00:00 0.00% 30600K 00:00:00 0.00% lsmd 61592K 00:00:00 0.00% routed •...
  • Page 355 Syntax Centralized devices in standalone mode: monitor thread [ dumbtty ] [ iteration number ] Distributed devices in standalone mode/centralized devices in IRF mode: monitor thread [ dumbtty ] [ iteration number ] [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: monitor thread [ dumbtty ] [ iteration number ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]...
  • Page 356 Commands Description Quits interactive mode. < Moves sort field to the next left column. > Moves sort field to the next right column. Examples # Display thread statistics in dumbtty mode. <Sysname> monitor thread dumbtty 84 processes; 107 threads Thread states: 1 running, 106 sleeping, 0 stopped, 0 zombie CPU states: 83.19% idle, 1.68% user, 10.08% kernel, 5.04% interrupt Memory: 755M total, 417M available, page size 4K LAST_CPU...
  • Page 357 Set the delay interval between screen updates Kill a job Refresh the screen Set the maximum number of threads to display Quit the interactive display Sort by run time of threads since last restart < Move sort field to the next left column >...
  • Page 358: Process Core

    Field Description Priority level of a thread. State of a thread: • R—Running. • S—Sleeping. State • T—Traced or stopped. • D—Uninterruptible sleep. • Z—Zombie. HH:MM:SS Running time of a thread since last restart. Longest time that a single thread scheduling occupies the CPU, in milliseconds. CPU usage of a thread.
  • Page 359: Reset Exception Context

    slot slot-number: Specifies a card by its slot number. If you do not specify this option, the command enables or disables core file generation for a process and sets the maximum number of core files on the active MPU. (Distributed devices in standalone mode.) slot slot-number: Specifies an IRF member device by its member ID.
  • Page 360: Reset Kernel Deadloop

    slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the command clears context information for process exceptions on the IRF master device. (Centralized devices in IRF mode.) chassis chassis-number slot slot-number: Specifies an MPU on an IRF member device. If you do not specify this option, the command clears context information for process exceptions on the global active MPU.
  • Page 361: Reset Kernel Exception

    Related commands display kernel deadloop reset kernel exception Use reset kernel exception to clear kernel thread exception information. Syntax Centralized devices in standalone mode: reset kernel exception Distributed devices in standalone mode/centralized devices in IRF mode: reset kernel exception [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: reset kernel exception [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] Views...
  • Page 362: Reset Kernel Starvation

    Distributed devices in IRF mode: reset kernel reboot [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] Views User view Predefined user roles network-admin Parameters slot slot-number: Specifies an MPU by its slot number. If you do not specify this option, the command clears kernel thread reboot information for the active MPU.
  • Page 363: Third-Part-Process Start

    slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the command clears kernel thread starvation information for the master device. (Centralized devices in IRF mode.) chassis chassis-number slot slot-number: Specifies an MPU on an IRF member device. If you do not specify this option, the command clears kernel thread starvation information for the global active MPU.
  • Page 364 Views System view Predefined user roles network-admin Parameters pid&<1-10>: Specifies a space-separated list of up to 10 third-party processes that have been started. Usage guidelines This command can be used to stop only processes started by the third-part-process start command. To display the IDs of third-party processes, use the display process all command. "Y" in the THIRD field from the output indicates the third-party process and the PID field indicates the ID of the process.
  • Page 365: Sampler Commands

    Sampler commands Commands and descriptions for centralized devices apply to the following routers: • MSR1002-4/1003-8S. • MSR2003. • MSR2004-24/2004-48. • MSR3012/3024/3044/3064. • MSR954(JH296A/JH297A/JH298A/JH299A/JH373A). • MSR958(JH300A/JH301A). Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers. display sampler Use display sampler to display configuration information for a sampler. Syntax Centralized devices in standalone mode: display sampler [ sampler-name ]...
  • Page 366: Sampler

    Sampler name: 256 Mode: Fixed; Packet-interval: 8; IsNpower: Y # (Distributed devices in standalone mode.) Display the configuration information about sampler 256 for card 1. <Sysname> display sampler 256 slot 1 Sampler name: 256 Mode: Fixed; Packet-interval: 8; IsNpower: Y # (Distributed devices in IRF mode.) Display the configuration information about sampler 256 for card 1 on IRF member device 1.
  • Page 367 n-power: Specifies the sampling rate. If n-power is not specified, the sampling rate is the value of the rate argument. For example, if the rate argument is set to 100, one packet is selected from 100 packets in each sampling. The value range is 1 to 65536. If n-power is not specified, the sampling rate is 2 to the nth power, where n is value of the rate argument.
  • Page 368: Port Mirroring Commands

    Port mirroring commands Commands and descriptions for centralized devices apply to the following routers: • MSR1002-4/1003-8S. • MSR2003. • MSR2004-24/2004-48. • MSR3012/3024/3044/3064. • MSR954 (JH296A/JH297A/JH298A/JH299A/JH373A). • MSR958 (JH300A/JH301A). Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers. display mirroring-group Use display mirroring-group to display mirroring group information.
  • Page 369: Mirroring-Group

    Mirroring port: GigabitEthernet1/0/5 Inbound GigabitEthernet1/0/6 Both Monitor port: GigabitEthernet1/0/7 Table 79 Command output Field Description Mirroring group Number of the mirroring group. Type Type of the mirroring group: Local. Status of the mirroring group: • Active—The mirroring group has taken effect. Status •...
  • Page 370: Mirroring-Group Mirroring-Port (System View)

    Syntax mirroring-group group-id mirroring-port { both | inbound | outbound } undo mirroring-group group-id mirroring-port Default A port does not act as a source port for any mirroring groups. Views Interface view Predefined user roles network-admin Parameters group-id: Specifies an existing mirroring group by its ID in the range of 1 to 6. both: Mirrors both received and sent packets.
  • Page 371: Mirroring-Group Monitor-Port (Interface View)

    Parameters group-id: Specifies an existing mirroring group by its ID in the range of 1 to 6. interface-list: Specifies a space-separated list of up to eight port items. Each item specifies a single port or a port range in the form of interface-type interface-number1 to interface-type interface-number2.
  • Page 372: Mirroring-Group Monitor-Port (System View)

    Examples # Create local mirroring group 1 and configure GigabitEthernet 1/0/1 as its monitor port. <Sysname> system-view [Sysname] mirroring-group 1 local [Sysname] interface gigabitethernet 1/0/1 [Sysname-GigabitEthernet1/0/1] mirroring-group 1 monitor-port Related commands mirroring-group mirroring-group monitor-port (system view) Use mirroring-group monitor-port to configure the monitor ports for a mirroring group. Use undo mirroring-group monitor-port to remove the monitor ports from a mirroring group.
  • Page 373: Flow Mirroring Commands

    Flow mirroring commands mirror-to Use mirror-to to configure a mirroring action for a traffic behavior. Use undo mirror-to to delete a mirroring action. Syntax mirror-to interface interface-type interface-number undo mirror-to interface interface-type interface-number Default No mirroring action is configured for a traffic behavior. Views Traffic behavior view Predefined user roles...
  • Page 374: Netstream Configuration Commands

    NetStream configuration commands Commands and descriptions for centralized devices apply to the following routers: • MSR1002-4/1003-8S. • MSR2003. • MSR2004-24/2004-48. • MSR3012/3024/3044/3064. • MSR954 (JH296A/JH297A/JH298A/JH299A/JH373A). • MSR958 (JH300A/JH301A). Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers. display ip netstream cache Use display ip netstream cache to display NetStream entry information.
  • Page 375 label-position1 label-value1: Specifies a label by its position and value. The value range for the label-position1 argument is 1 to 6. The value range for the label-value1 argument is 0 to 1048575. label-position2 label-value2: Specifies a label by its position and value. The value range for the label-position2 argument is 1 to 6.
  • Page 376 TCP-FTP 5900082 TCP-FTPD 3200453 1006 TCP-WWW 546778274 11170 TCP-other 49148540 3752 UDP-DNS 117240379 UDP-other 45502422 2272 ICMP 14837957 IP-other 77406 Type DstIP(Port) SrcIP(Port) Pro ToS VNI APPID If(Direct) Pkts DstMAC(VLAN) SrcMAC(VLAN) TopLblType(IP/Mask) Lbl-Exp-S-List -------------------------------------------------------------------------- 11.1.1.1(1024) 11.1.1.2(21) 128 10 ET1/1(I) 42996 TCPFlag: DstMask: SrcMask:...
  • Page 377 TCPFlag: DstMask: SrcMask: NextHop: 172.16.2.10 DstAS: SrcAS: BGPNextHop: 0.0.0.0 InVRF: SamplerMode: SamplerInt: Active: 382.542 Bytes/Pkt: 1426 First packet arrived: 10/28/2013, 14:12:03 Last packet arrived: 10/28/2013, 14:23:03 # (Distributed devices in standalone mode.) Display detailed information about NetStream entries for the card in slot 1. <Sysname>...
  • Page 378 -------------------------------------------------------------------------- 11.1.1.1(1024) 11.1.1.2(21) 128 N/A ET1/1(I) 42996 TCPFlag: DstMask: SrcMask: NextHop: 0.0.0.0 DstAS: SrcAS: BGPNexthop: 0.0.0.0 InVRF: SamplerMode: SamplerInt: Active: 120.600 Bytes/Pkt: First packet arrived: 10/28/2013, 14:12:03 Last packet arrived: 10/28/2013, 14:23:03 0012-3f86-e94c(10) 0012-3f86-e86a(0) GE1/4/1(I) 1253 SamplerMode: SamplerInt: Active: 5.510 Bytes/Pkt: First packet arrived: 10/28/2013, 14:12:03 Last packet arrived:...
  • Page 379 Field Description IP active flow entries Number of active IP flows in the cache. MPLS active flow entries Number of active MPLS flows in the cache. L2 active flow entries Number of active Layer 2 flows in the cache. IPL2 active flow entries Number of active Layer 2 and Layer 3 flows in the cache.
  • Page 380 Field Description Statistics of the active flows in the current cache: • Flow type. Flows are classified into the following types: Layer 3 flows.  Layer 2 flows.  Layer 2 and Layer 3 flows.  MPLS flows without IP options. ...
  • Page 381: Display Ip Netstream Export

    Field Description Other information about the active flows in the cache: • TCP tag. • Destination mask. • Source mask. • Routing next hop. TCPFlag: • Destination AS. DstMask: SrcMask: • Source AS. NextHop: • BGP next hop. DstAS: SrcAS: •...
  • Page 382: Display Ip Netstream Template

    Flow destination IP address (UDP) : 10.10.0.10 (30000) Version 9 exported flows number : 20 Version 9 exported UDP datagrams number (failed) : 2 (0) as aggregation export information: Flow source interface : GigabitEthernet1/0/1 Flow destination VPN instance : VPN1 Flow destination IP address (UDP) : 10.10.0.10 (30000) Version 8 exported flows number...
  • Page 383 display ip netstream template [ chassis chassis-number slot slot-number ] Views Any view Predefined user roles network-admin network-operator Parameters slot slot-number: Specifies a card by its slot number. If you do not specify a card, the command displays NetStream template information for the active MPU. (Distributed devices in standalone mode.) slot slot-number: Specifies an IRF member device by its member ID.
  • Page 384 Sampling interval AS inbound template: Template ID : 3257 Packets Last template export time : Never Field count : 14 Field type Field length (bytes) --------------------------------------------------------------------------- Flows In packets In bytes First forwarded Last forwarded Source AS Destination AS Input interface index Output interface index Direction Sampling algorithm...
  • Page 385: Enable

    Field Description System time when the last packet was forwarded, accurate to Last forwarded milliseconds. Input interface index Index of the input interface. Output interface index Index of the output interface. Padding string. Sampling interval Sampling rate. enable Use enable to enable a NetStream aggregation mode. Use undo enable to disable a NetStream aggregation mode.
  • Page 386: Ip Netstream Filter

    Predefined user roles network-admin Parameters inbound: Enables NetStream for incoming traffic. outbound: Enables NetStream for outgoing traffic. Examples # Enable NetStream for incoming traffic on GigabitEthernet 1/0/1. <Sysname> system-view [Sysname] interface gigabitethernet 1/0/1 [Sysname-GigabitEthernet1/0/1] ip netstream inbound ip netstream filter Use ip netstream filter to enable NetStream filtering on an interface.
  • Page 387: Ip Netstream Sampler

    ip netstream sampler Use ip netstream sampler to enable NetStream sampling. Use undo ip netstream sampler to disable NetStream sampling. Syntax ip netstream [ inbound | outbound ] sampler sampler-name undo ip netstream [ inbound | outbound ] sampler Default NetStream sampling is disabled.
  • Page 388 Predefined user roles network-admin Parameters as: Specifies the AS aggregation by source AS number, destination AS number, inbound interface index, and outbound interface index. destination-prefix: Specifies the destination-prefix aggregation by destination AS number, destination address mask length, destination prefix, and outbound interface index. prefix: Specifies the source and destination prefix aggregation by the following criteria: •...
  • Page 389: Ip Netstream Export Host

    • Destination address mask length. • Destination prefix. • Inbound interface index. • Outbound interface index. tos-protocol-port: Specifies the ToS-protocol-port aggregation by ToS, protocol number, source port, destination port, inbound interface index, and outbound interface index. tos-source-prefix: Specifies the ToS-source-prefix aggregation by ToS, source AS number, source prefix, source address mask length, and inbound interface index.
  • Page 390: Ip Netstream Export Rate

    vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance to which the destination host belongs. The vpn-instance-name argument is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option. Usage guidelines You can specify the same destination IP address and UDP port in different NetStream aggregation mode views.
  • Page 391: Ip Netstream Export Source

    Parameters rate: Specifies the maximum number of packets to be exported per second. The value range is 1 to 1000. Examples # Allow a maximum of 10 packets to be exported per second. <Sysname> system-view [Sysname] ip netstream export rate 10 ip netstream export source Use ip netstream export source to specify the source interface for data packets sent to NetStream servers.
  • Page 392: Ip Netstream Export V9-Template Refresh-Rate Packet

    ip netstream export v9-template refresh-rate packet Use ip netstream export v9-template refresh-rate packet to configure the refresh frequency (in packets) for NetStream version 9 templates. The templates are sent after the specified number of packets are sent. Use undo ip netstream export v9-template refresh-rate packet to restore the default. Syntax ip netstream export v9-template refresh-rate packet packets undo ip netstream export v9-template refresh-rate packet...
  • Page 393: Ip Netstream Export Version

    Views System view Predefined user roles network-admin Parameters minutes: Specifies the refresh interval in the range of 1 to 3600 minutes. Usage guidelines Version 9 is template-based and supports user-defined formats. An NetStream device must send the version 9 templates to NetStream servers regularly, because the servers do not permanently save templates.
  • Page 394: Ip Netstream Max-Entry

    peer-as: Records the ASs before and after the AS where the NetStream device resides as the source AS and destination AS, respectively. bgp-nexthop: Records BGP next hops. Usage guidelines A NetStream entry records the source IP address and destination IP address, and two AS numbers for each IP address.
  • Page 395: Ip Netstream Mpls

    Examples # Set the upper limit to 5000 for NetStream entries. <Sysname> system-view [Sysname] ip netstream max-entry 5000 ip netstream mpls Use ip netstream mpls to enable MPLS packet statistics collection. Use undo ip netstream mpls to disable MPLS packet statistics collection. Syntax ip netstream mpls [ label-positions label-position1 [ label-position2 [ label-position3 ] ] ] [ no-ip-fields ]...
  • Page 396: Ip Netstream Timeout Inactive

    Default The aging timer is 30 minutes for active flows. Views System view Predefined user roles network-admin Parameters minutes: Sets the aging timer for active flows, in the range of 1 to 60 minutes. Usage guidelines A flow is considered active if packets for the NetStream entry arrive before the timer set by this command expires.
  • Page 397: Reset Ip Netstream Statistics

    Related commands ip netstream timeout active reset ip netstream statistics Use reset ip netstream statistics to age out all flows in the cache and export NetStream data. Syntax reset ip netstream statistics Views User view Predefined user roles network-admin Usage guidelines It takes the system several minutes to execute the command.
  • Page 398: Ipv6 Netstream Commands

    IPv6 NetStream commands Commands and descriptions for centralized devices apply to the following routers: • MSR1002-4/1003-8S. • MSR2003. • MSR2004-24/2004-48. • MSR3012/3024/3044/3064. • MSR954 (JH296A/JH297A/JH298A/JH299A/JH373A). • MSR958 (JH300A/JH301A). Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers. display ipv6 netstream cache Use display ipv6 netstream cache to display IPv6 NetStream entry information.
  • Page 399 Active flow timeout : 60 min Inactive flow timeout : 10 sec Max number of entries : 1000 IPv6 active flow entries MPLS active flow entries IPL2 active flow entries IPv6 flow entries counted : 10 MPLS flow entries counted : 20 IPL2 flow entries counted : 20...
  • Page 400 Inactive flow timeout : 10 sec Max number of entries : 1000 IPv6 active flow entries MPLS active flow entries IPL2 active flow entries IPv6 flow entries counted : 10 MPLS flow entries counted : 20 IPL2 flow entries counted : 20 Last statistics resetting time : 01/01/2000 at 00:01:02...
  • Page 401 2003::1(2048) 2008::1(0) GE1/0/2(O) IP& 2010::1(1024) 2020::1(67) 255 0x12345 0x0 GE1/0/3(I) 1848 MPLS LDP(4.4.4.4/24) 1:55-6-0 2:16-6-1 3:0-0-0 TcpFlag: DstMask: SrcMask: DstAS: SrcAS: NextHop: 2020::2 BGPNextHop: 0:0:0:0:0:0:0:0 InVRF: SamplerMode: SamplerInt: Active: Bytes/Pkt: 1426 Table 83 Command output Field Description Active flow timeout Aging timer for active flows, in minutes.
  • Page 402 Field Description Statistics of packets by protocol type: • Protocol type. • Total number of flows. Protocol Total Flows Packets/Sec • Number of packets per second. Flow/Sec Packets/flow • Number of flows per second. Active(sec)/ flow Idle(sec)/flow • Number of packets per flow. •...
  • Page 403: Display Ipv6 Netstream Export

    Field Description Other information about the active flows in the cache: • TCP flag. • Destination mask. • Source mask. • Destination AS. TcpFlag: • Source AS. DstMask: SrcMask: • Routing next hop. DstAS: SrcAS: • BGP next hop. NextHop: •...
  • Page 404: Display Ipv6 Netstream Template

    MPLS export information: Flow source interface : GigabitEthernet1/0/1 Flow destination VPN instance : VPN1 Flow destination IP address (UDP) : 40::1 (30000) Version 9 exported flows number : 20 Version 9 exported UDP datagrams number (failed) : 2 (0) Table 84 Command output Field Description IPv6 export information...
  • Page 405 Parameters slot slot-number: Specifies a card by its slot number. If you do not specify a card, the command displays IPv6 NetStream template information for the active MPU. (Distributed devices in standalone mode.) slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays IPv6 NetStream template information for the master device.
  • Page 406 In packets In bytes First forwarded Last forwarded Source AS Destination AS Input Interface Index Output Interface Index IP protocol version Direction Sampling algorithm Sampling interval L3 outbound template: Template ID : 3305 Field count : 27 Field type Field length (bytes) --------------------------------------------------------------------------- Out packets Out bytes...
  • Page 407 Field count : 27 Field type Field length (bytes) --------------------------------------------------------------------------- Out packets Out bytes First forwarded Last forwarded Input Interface Index Output Interface Index IPv6 source address IPv6 destination address IPv6 nexthop IPv6 flow label Source AS Destination AS L4 source port L4 destination port IP protocol version TCP flags...
  • Page 408: Enable

    Field Description Field length (bytes) Length of the field, in bytes. Flows Number of flows. Out packets Number of sent packets. In packets Number of received packets. Out bytes Number of sent bytes. In bytes Number of received bytes. System time when the first packet was forwarded, First forwarded accurate to milliseconds.
  • Page 409: Ipv6 Netstream Filter

    undo ipv6 netstream [ inbound | outbound ] Default IPv6 NetStream is disabled on an interface. Views Interface view Predefined user roles network-admin Parameters inbound: Enables IPv6 NetStream for incoming traffic. outbound: Enables IPv6 NetStream for outgoing traffic. Examples # Enable IPv6 NetStream for incoming traffic on GigabitEthernet 1/0/1. <Sysname>...
  • Page 410: Ipv6 Netstream Sampler

    Examples # Use ACL 2003 for outbound IPv6 NetStream filtering on GigabitEthernet 1/0/1. <Sysname> system-view [Sysname] interface gigabitethernet 1/0/1 [Sysname-GigabitEthernet1/0/1] ipv6 netstream outbound [Sysname-GigabitEthernet1/0/1] ipv6 netstream outbound filter acl 2003 ipv6 netstream sampler Use ipv6 netstream sampler to enable IPv6 NetStream sampling. Use undo ipv6 netstream sampler to disable IPv6 NetStream sampling.
  • Page 411 Default No IPv6 NetStream aggregation mode is specified. Views System view Predefined user roles network-admin Parameters as: Specifies the AS aggregation by source AS number, destination AS number, input interface index, and output interface index. bgp-nexthop: Specifies the BGP nexthop aggregation by BGP next hop IPv6 address and output interface index.
  • Page 412: Ipv6 Netstream Export Host

    ipv6 netstream export host Use ipv6 netstream export host to specify a destination host for IPv6 NetStream data export. Use undo ipv6 netstream export host to remove the specified destination host or all destination hosts that are configured in the current view. Syntax ipv6 netstream export host { ipv4-address | ipv6-address } udp-port [ vpn-instance vpn-instance-name ]...
  • Page 413: Ipv6 Netstream Export Rate

    # In AS aggregation mode view, specify 40::1 as the IP address of the destination host and UDP port 6000 as the export destination port number. <Sysname> system-view [Sysname] ipv6 netstream aggregation as [Sysname-ns6-aggregation-as] ipv6 netstream export host 40::1 6000 Related commands ipv6 netstream aggregation ipv6 netstream export source...
  • Page 414: Ipv6 Netstream Export V9-Template Refresh-Rate Packet

    IPv6 NetStream aggregation mode view Parameters interface-type interface-number: Specifies a source interface by its type and number for the IPv6 NetStream data export. Usage guidelines You can configure different source interfaces in different IPv6 NetStream aggregation mode views. If no source interface is configured in IPv6 NetStream aggregation mode view, the source interface in system view applies.
  • Page 415: Ipv6 Netstream Export V9-Template Refresh-Rate Time

    Usage guidelines Version 9 is template-based and supports user-defined formats. An IPv6 NetStream device must send the version 9 templates to NetStream servers regularly, because the servers do not permanently save templates. You can configure the refresh frequency or refresh interval for the device to send version 9 templates.
  • Page 416: Ipv6 Netstream Export Version 9

    Related commands ipv6 netstream export v9-template refresh-rate packet ipv6 netstream export version 9 Use ipv6 netstream export version 9 to export IPv6 NetStream data in the version 9 format and choose whether to record AS and BGP next hop information. Use undo ipv6 netstream export version to restore the default.
  • Page 417: Ipv6 Netstream Timeout Active

    undo ipv6 netstream max-entry Default The upper limit for IPv6 NetStream entries is 10000. Views System view Predefined user roles network-admin Parameters max-entries: Specifies the upper limit for IPv6 NetStream entries that the cache can accommodate. The value range is 1000 to 100000. Usage guidelines (Distributed devices in standalone mode.) The max-entries argument takes effect on each card.
  • Page 418: Ipv6 Netstream Timeout Inactive

    Examples # Set the aging timer to 60 minutes for active flows. <Sysname> system-view [Sysname] ipv6 netstream timeout active 60 Related commands ipv6 netstream timeout inactive ipv6 netstream timeout inactive Use ipv6 netstream timeout inactive to set the aging timer for inactive flows. Use undo ipv6 netstream timeout inactive to restore the default.
  • Page 419 Usage guidelines It takes the system several minutes to execute the command. During this period, the system does not collect IPv6 NetStream data. Examples # Age out and export all IPv6 NetStream data. <Sysname> reset ipv6 netstream statistics This process may take a few minutes. NetStream statistic function is disabled during this process.
  • Page 420: Sflow Commands

    sFlow commands sFlow is not supported on Layer 2 Ethernet interfaces and Layer-configurable Ethernet interfaces. The following matrix shows the feature and hardware compatibility: Hardware sFlow compatibility MSR954 (JH296A/JH297A/JH298A/JH299A/JH373A) MSR958 (JH300A/JH301A) MSR1002-4/1003-8S MSR2003 Yes on GigabitEthernet 0/0 MSR2004-24/2004-48 No on GigabitEthernet 0/1 and GigabitEthernet 0/2 MSR3012/3024/3044/3064 No on the management Ethernet interfaces of the MPUs...
  • Page 421: Sflow Agent

    Table 86 Command output Field Description sFlow version, which can only take the value of 5. The device can send only sFlow datagram version sFlow packets whose sFlow version is 5. Global information Global sFlow information. IP address of the sFlow agent: •...
  • Page 422: Sflow Collector

    Default No IP address is configured for the sFlow agent. The device periodically identifies whether the sFlow agent has an IP address. If the sFlow agent does not have an IP address, the device automatically selects an IPv4 address for the sFlow agent. It does not save the IPv4 address in the configuration file.
  • Page 423: Sflow Counter Interval

    description string: Specifies a description, a case-sensitive string of 1 to 127 characters. The default description is "CLI Collector." datagram-size size: Specifies the maximum length of the sFlow data portion in an sFlow packet. The value range for the size argument is 200 to 3000 bytes, and the default value is 1400 bytes. port port-number: Specifies the UDP port number of the sFlow collector, in the range of 1 to 65535.
  • Page 424: Sflow Counter Collector

    sflow counter collector Use sflow counter collector to specify an sFlow collector for counter sampling. Use undo sflow counter collector to restore the default. Syntax sflow counter collector collector-id undo sflow counter collector Default No sFlow collector is specified for counter sampling. Views Layer 3 Ethernet interface view Predefined user roles...
  • Page 425: Sflow Flow Max-Header

    sflow flow max-header Use sflow flow max-header to set the maximum number of bytes (starting from the packet header) that flow sampling can copy per packet. Use undo sflow flow max-header to restore the default. Syntax sflow flow max-header length undo sflow flow max-header Default Flow sampling can copy up to 128 bytes of a packet.
  • Page 426: Sflow Sampling-Rate

    Examples # Specify fixed flow sampling mode on GigabitEthernet 1/0/1. <Sysname> system-view [Sysname] interface gigabitethernet 1/0/1 [Sysname-GigabitEthernet1/0/1] sflow sampling-mode determine Related commands sflow sampling-rate sflow sampling-rate Use sflow sampling-rate to enable flow sampling and specify the number of packets out of which flow sampling will sample a packet on an interface.
  • Page 427 Views System view Predefined user roles network-admin Parameters ip ipv4-address: Specifies the source IPv4 address of sent sFlow packets. ipv6 ipv6-address: Specifies the source IPv6 address of sent sFlow packets. Examples # Specify the source IPv4 address of sent sFlow packets as 10.0.0.1. <Sysname>...
  • Page 428: Information Center Commands

    Information center commands Commands and descriptions for centralized devices apply to the following routers: • MSR1002-4/1003-8S. • MSR2003. • MSR2004-24/2004-48. • MSR3012/3024/3044/3064. • MSR954 (JH296A/JH297A/JH298A/JH299A/JH373A). • MSR958 (JH300A/JH301A). Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers. diagnostic-logfile save Use diagnostic-logfile save to manually save diagnostic logs from the diagnostic log file buffer to the diagnostic log file.
  • Page 429: Display Info-Center

    Views Any view Predefined user roles network-admin network-operator Examples # Display the diagnostic log file configuration. <Sysname> display diagnostic-logfile summary Diagnostic log file: Enabled. Diagnostic log file size quota: 10 MB Diagnostic log file directory: flash:/diagfile Writing frequency: 24 hour 0 min 0 sec Table 87 Command output Field Description...
  • Page 430: Display Logbuffer

    Max buffer size 1024, current buffer size 512, Current messages 0, dropped messages 0, overwritten messages 0 Log file: Enabled Security log file: Enabled Information timestamp format: Log host: Date Other output destination: Date display logbuffer Use display logbuffer to display the state of the log buffer and the log information in the log buffer. Syntax Centralized devices in standalone mode: display logbuffer [ reverse ] [ level severity | size buffersize ] *...
  • Page 431 Corresponding Severity Level Description keyword value commands Normal but significant condition. For example, a Notification notification terminal logs in to the device, or the device reboots. Informational message. For example, a command or a informational Informational ping operation is executed. Debugging Debugging message.
  • Page 432: Display Logbuffer Summary

    Overwritten messages: 0 Current messages: 127 %Jun 19 18:03:24:55 2006 Sysname SYSLOG/7/SYS_RESTART:System restarted … Table 89 Command output Field Description • Enabled—Logs can be output to the log buffer. Log buffer • Disabled—Logs cannot be output to the buffer. Max buffer size Maximum buffer size supported by the device.
  • Page 433 chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays information for all cards.
  • Page 434: Display Logfile Summary

    display logfile summary Use display logfile summary to display the log file configuration. Syntax display logfile summary Views Any view Predefined user roles network-admin network-operator Examples # Display the log file configuration. <Sysname> display logfile summary Log file: Enabled. Log file size quota: 10 MB Log file directory: flash:/logfile Writing frequency: 0 hour 1 min 10 sec Table 91 Command output...
  • Page 435: Enable Log Updown

    <Sysname> display security-logfile summary Security log file: Enabled Security log file size quota: 10 MB Security log file directory: flash:/seclog Alarm threshold: 80% Current usage: 30% Writing frequency: 1 hour 0 min 0 sec Table 92 Command output Field Description •...
  • Page 436: Info-Center Diagnostic-Logfile Directory

    info-center diagnostic-logfile directory Use info-center diagnostic-logfile directory to configure the directory to save the diagnostic log file. Syntax info-center diagnostic-logfile directory dir-name Default Diagnostic log files are saved in the diagfile directory under the root directory of the storage device. Views System view Predefined user roles...
  • Page 437: Info-Center Diagnostic-Logfile Frequency

    Views System view Predefined user roles network-admin Usage guidelines This command enables saving diagnostic logs to the diagnostic log file for centralized management. Users can view the diagnostic logs to monitor device activities and to troubleshoot problems. Examples # Enable saving diagnostic logs to the diagnostic log file. <Sysname>...
  • Page 438: Info-Center Enable

    Syntax info-center diagnostic-logfile quota size undo info-center diagnostic-logfile quota Default The maximum size for the diagnostic log file is 5 MB. Views System view Predefined user roles network-admin Parameters size: Specifies the maximum size for the diagnostic log file, in MB. The value range is 1 to 10. Examples # Set the maximum size to 6 MB for the diagnostic log file.
  • Page 439: Info-Center Logbuffer

    undo info-center format Default Logs are sent to log hosts in standard format. Views System view Predefined user roles network-admin Parameters unicom: Specifies the unicom format. cmcc: Specifies the China Mobile Communications Corporation (cmcc) format. Usage guidelines Logs can be sent to log hosts in standard, unicom, or cmcc format. For more information about log formats, see Network Management and Monitoring Configuration Guide.
  • Page 440: Info-Center Logbuffer Size

    info-center logbuffer size Use info-center logbuffer size to set the maximum number of logs that can be stored in the log buffer. Use undo info-center logbuffer size to restore the default. Syntax info-center logbuffer size buffersize undo info-center logbuffer size Default The log buffer can store a maximum of 512 logs.
  • Page 441: Info-Center Logfile Enable

    Usage guidelines The specified directory must have been created. The log file has a .log extension. When the default log file directory runs out of space, use this command to specify a new log file directory. This command cannot survive a reboot. (Centralized devices in standalone mode.) This command cannot survive a reboot or an active/standby switchover.
  • Page 442: Info-Center Logfile Overwrite-Protection

    Use undo info-center logfile frequency to restore the default. Syntax info-center logfile frequency freq-sec undo info-center logfile frequency Default The log file saving interval is 86400 seconds. Views System view Predefined user roles network-admin Parameters freq-sec: Specifies the log file saving interval in seconds. The value range is 1 to 86400. Usage guidelines This command enables the system to automatically save logs in the log file buffer to the log file at the specified interval.
  • Page 443: Info-Center Logfile Size-Quota

    Log file overwrite protection enables the system to stop saving new logs when the last log file is full or the storage device runs out of space. Examples # Enable log file overwrite-protection. <Sysname> system-view [Sysname] info-center logfile overwrite-protection info-center logfile size-quota Use info-center logfile size-quota to set the maximum size for the log file.
  • Page 444 Predefined user roles network-admin Usage guidelines Outputting consecutive duplicate logs at an interval of less than 30 seconds wastes system and network resources. With this feature enabled, the system starts a suppression period when outputting a new log: • During the suppression period, the system does not output logs with the same module name, level, mnemonic, location, and text as the previous log.
  • Page 445: Info-Center Loghost

    The output shows that the system starts another suppression period. info-center loghost Use info-center loghost to specify a log host and to configure output parameters. Use undo info-center loghost to restore the default. Syntax info-center loghost [ vpn-instance vpn-instance-name ] { hostname | ipv4-address | ipv6 ipv6-address } [ port port-number ] [ facility local-number ] undo info-center loghost [ vpn-instance vpn-instance-name ] { hostname | ipv4-address | ipv6 ipv6-address }...
  • Page 446: Info-Center Security-Logfile Alarm-Threshold

    Syntax info-center loghost source interface-type interface-number undo info-center loghost source Default The source IP address of logs sent to log hosts is the primary IP address of their outgoing interfaces. Views System view Predefined user roles network-admin Parameters interface-type interface-number: Specifies a source interface. The interface's primary IP address will be used as the source IP address for logs sent to log hosts.
  • Page 447: Info-Center Security-Logfile Directory

    Usage guidelines When the security log file is full, the system deletes the oldest logs and then writes new logs to the security log file. This feature helps avoid security log loss by setting an alarm threshold for the security log file usage. When the threshold is reached, the system outputs log information to inform the administrator.
  • Page 448: Info-Center Security-Logfile Enable

    info-center security-logfile enable Use info-center security-logfile enable to enable saving of security logs to the security log file. Use undo info-center security-logfile enable to restore the default. Syntax info-center security-logfile enable undo info-center security-logfile enable Default The saving of security logs to the security log file is disabled. Views System view Predefined user roles...
  • Page 449: Info-Center Security-Logfile Size-Quota

    Examples # Set the security log file saving interval to 600 seconds. <Sysname> system-view [Sysname] info-center security-logfile frequency 600 Related commands info-center security-logfile enable info-center security-logfile size-quota Use info-center security-logfile size-quota to set the maximum size for the security log file. Use undo info-center security-logfile size-quota to restore the default.
  • Page 450 Table 93 Default output rules Source Common Diagnostic Destination Security log Hidden log modules supported Console debugging Disabled Disabled Disabled modules Monitor supported debugging Disabled Disabled Disabled terminal modules supported Log host informational Disabled Disabled informational modules supported Log buffer informational Disabled Disabled...
  • Page 451: Info-Center Synchronous

    If you execute this command for a module multiple times, the most recent configuration takes effect. If you execute this command for the default modules multiple times, the most recent configuration takes effect. Examples # Output only VLAN module's information with the emergency level to the console. <Sysname>...
  • Page 452: Info-Center Syslog Min-Age

    # Enable synchronous information output, and then save the current configuration (enter interactive information). <Sysname> system-view [Sysname] info-center synchronous Info-center synchronous output is on [Sysname] save The current configuration will be written to the device. Are you sure? [Y/N]: At this time, the system receives the log information. It displays the log information first and then displays [Y/N].
  • Page 453: Info-Center Timestamp

    Default The log trap buffer can store a maximum of 1024 traps. Views System view Predefined user roles network-admin Parameters buffersize: Specifies the maximum number of log traps that can be stored in the log trap buffer. The value range is 0 to 65535. Value 0 indicates that the device does not buffer log traps. Usage guidelines Log traps are SNMP notifications stored in the log trap buffer.
  • Page 454: Info-Center Timestamp Loghost

    • MMM: Abbreviations of the months in English, which could be Jan, Feb, Mar, Apr, May, Jun, Jul, Aug, Sep, Oct, Nov, or Dec. • DD: Date, starting with a space if it is less than 10, for example " 7". •...
  • Page 455: Info-Center Trace-Logfile Quota

    info-center trace-logfile quota Use info-center trace-logfile quota to set the maximum size for the trace log file. Use undo info-center trace-logfile quota to restore the default. Syntax info-center trace-logfile quota size undo info-center trace-logfile quota Default The maximum size for the trace log file is 1 MB. Views System view Predefined user roles...
  • Page 456: Reset Logbuffer

    Related commands info-center logfile enable info-center logfile directory reset logbuffer Use reset logbuffer to clear the log buffer. Syntax reset logbuffer Views User view Predefined user roles network-admin Examples # Clear the log buffer. <Sysname> reset logbuffer Related commands display logbuffer security-logfile save Use security-logfile save to manually save security logs from the security log file buffer to the security log file.
  • Page 457: Snmp-Agent Trap Enable Syslog

    Related commands info-center security-logfile directory authorization-attribute (Security Command Reference) snmp-agent trap enable syslog Use snmp-agent trap enable syslog to enable SNMP notifications for log messages. Use undo snmp-agent trap enable syslog to restore the default. Syntax snmp-agent trap enable syslog undo snmp-agent trap enable syslog Default The device does not send SNMP notifications for log messages.
  • Page 458: Terminal Logging Level

    Views User view Predefined user roles network-admin Usage guidelines To enable the display of debug information on the console, perform the following tasks: Execute the terminal debugging command. Enable the information center. The information center is enabled by default. Use a debugging command to enable the related debugging. To enable the display of debug information on the current terminal, perform the following tasks: Execute the terminal monitor and terminal debugging commands.
  • Page 459: Terminal Monitor

    Views User view Predefined user roles network-admin Parameters severity: Specifies a log severity level in the range of 0 to 7. Usage guidelines This command enables the device to output logs with a severity level higher than or equal to the specified level to the current terminal.
  • Page 460: Flow Log Commands

    Flow log commands display userlog export Use display userlog export to display flow log configuration and statistics. Syntax display userlog export Views Any view Predefined user roles network-admin network-operator Examples # Display flow log configuration and statistics. <Sysname> display userlog export Flow: Export flow log as UDP Packet.
  • Page 461: Reset Userlog Flow Export

    Field Description Load balancing status for flow log entries: • Enabled—Flow log entries are distributed Log load balancing function among available log hosts. • Disabled—Every flow log entry is copied and sent to all available log hosts. Whether or not the local time is used in the log timestamp: Local time stamp •...
  • Page 462: Userlog Flow Export Load-Balancing

    Syntax userlog flow export [ vpn-instance vpn-instance-name ] host { hostname | ipv4-address | ipv6 ipv6-address } port udp-port undo userlog flow export [ vpn-instance vpn-instance-name ] host { hostname | ipv4-address | ipv6 ipv6-address } Default No log hosts are specified. Views System view Predefined user roles...
  • Page 463: Userlog Flow Export Source-Ip

    Predefined user roles network-admin Usage guidelines In load balancing mode, flow log entries are distributed among log hosts based on the source IP addresses (before NAT) that are recorded in the entries. The flow log entries generated for the same source IP address are sent to the same log host.
  • Page 464: Userlog Flow Export Version

    Syntax userlog flow export timestamp localtime undo userlog flow export timestamp localtime Default The device uses the UTC time in the timestamp of flow logs. Views System view Predefined user roles network-admin Usage guidelines The device uses either the local time or the UTC time in the timestamp of flow logs. •...
  • Page 465: Userlog Flow Syslog

    Related commands userlog flow export host userlog flow syslog Use userlog flow syslog to specify the information center as the destination for flow log export. Use undo userlog flow syslog to restore the default. Syntax userlog flow syslog undo userlog flow syslog Default Flow log entries are not exported.
  • Page 466: Document Conventions And Icons

    Document conventions and icons Conventions This section describes the conventions used in the documentation. Port numbering in examples The port numbers in this document are for illustration only and might be unavailable on your device. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown.
  • Page 467: Network Topology Icons

    Network topology icons Convention Description Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features.
  • Page 468: Support And Other Resources

    Support and other resources Accessing Hewlett Packard Enterprise Support • For live assistance, go to the Contact Hewlett Packard Enterprise Worldwide website: www.hpe.com/assistance • To access documentation and support services, go to the Hewlett Packard Enterprise Support Center website: www.hpe.com/support/hpesc Information to collect •...
  • Page 469: Websites

    For more information and device support details, go to the following website: www.hpe.com/info/insightremotesupport/docs Documentation feedback Hewlett Packard Enterprise is committed to providing documentation that meets your needs. To help us improve the documentation, send any errors, suggestions, or comments to Documentation Feedback (docsfeedback@hpe.com). When submitting your feedback, include the document title,...
  • Page 470 part number, edition, and publication date located on the front cover of the document. For online help content, include the product name, product version, help edition, and publication date located on the legal notices page.
  • Page 471: Index

    Index A C D E F H I L M N O P R S T U V W X destination ip,16 destination ipv6,16 action,216 destination port,17 action cli,277 diagnostic-logfile save,418 action reboot,278 display cwmp configuration,273 action switchover,279 display cwmp status,275 action syslog,280...
  • Page 472 display poe-profile interface,140 event owner (trigger-existence view),231 display process,320 event process,289 display process cpu,323 event snmp oid,290 display process log,325 event snmp-notification,291 display process memory,326 event syslog,292 display process memory heap,328 exception filepath,332 display process memory heap address,329 display process memory heap size,330 falling,232 display rmon...
  • Page 473 ip netstream export rate,380 netconf idle-timeout,254 ip netstream export source,381 netconf log,255 ip netstream export v9-template refresh-rate netconf soap http acl,256 packet,382 netconf soap http enable,256 ip netstream export v9-template refresh-rate netconf soap https acl,257 time,382 netconf soap https enable,258 ip netstream export version,383 netconf ssh server...
  • Page 474 operation (FTP operation view),46 rising,239 operation (HTTP operation view),47 rmon alarm,208 interface,48 rmon event,210 rmon history,212 rmon prialarm,212 password,49 rmon statistics,215 ping,2 route-option bypass-route,66 ping ipv6,5 rresolve-target,65 disconnect,141 cli-policy,293 enable,141 environment,294 poe enable pse,142 rtm scheduler suspend,295 poe legacy enable,142 tcl-policy,296 max-power,143 running-time,297...
  • Page 475 snmp-agent trap enable syslog,447 tos,72 snmp-agent trap if-mib link extended,188 tracert,7 snmp-agent trap life,189 tracert ipv6,10 snmp-agent trap log,189 trigger enable,248 snmp-agent trap queue-size,190 ttl,72 snmp-agent usm-user { v1 | v2c },191 type,73 snmp-agent usm-user v3,192 type,248 snmp-agent usm-user v3 user-role,196 sntp authentication enable,115...

Table of Contents