H3C S5830V2 Series Command Reference Manual
H3C S5830V2 Series Command Reference Manual

H3C S5830V2 Series Command Reference Manual

Network management and monitoring
Hide thumbs Also See for S5830V2 Series:
Table of Contents

Advertisement

H3C S5830V2 & S5820V2 Switch Series

Network Management and Monitoring

Command Reference

Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Software version: Release2108
Document version: 6W101-20120531

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the S5830V2 Series and is the answer not in the manual?

Questions and answers

Summary of Contents for H3C S5830V2 Series

  • Page 1: Network Management And Monitoring

    H3C S5830V2 & S5820V2 Switch Series Network Management and Monitoring Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release2108 Document version: 6W101-20120531...
  • Page 2 SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V G, V G, PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co., Ltd. All other trademarks that may be mentioned in this manual are the property of their respective owners Notice The information in this document is subject to change without notice.
  • Page 3 Preface The H3C S5830V2 & S5820V2 documentation set includes 10 command references, which describe the commands and command syntax options available for the H3C S5830V2 & S5820V2 Switch Series. The Network Management and Monitoring Command Reference describes network management and monitoring configuration commands.
  • Page 4: Command Conventions

    Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown. Italic Italic text represents arguments that you replace with actual values. Square brackets enclose syntax choices (keywords or arguments) that are optional. Braces enclose a set of required syntax choices separated by vertical bars, from which { x | y | ...
  • Page 5: Documentation Set

    Command references commands. Obtaining documentation You can access the most up-to-date H3C product documentation on the World Wide Web at http://www.h3c.com. Click the links on the top navigation bar to obtain different categories of product documentation: [Technical Support & Documents > Technical Documents] –...
  • Page 6: Table Of Contents

    Contents Ping, tracert, and system debugging commands ······································································································· 1   debugging ································································································································································· 1   display debugging ··················································································································································· 1   display memory ························································································································································ 2   display process ························································································································································· 3   display process cpu ················································································································································· 6   display process log ·················································································································································· 7  ...
  • Page 7 sntp authentication-keyid ······································································································································ 65   sntp ipv6 unicast-server ········································································································································· 66   sntp reliable authentication-keyid ························································································································ 67   sntp unicast-server ················································································································································· 68   Information center commands ··································································································································· 70   display info-center ················································································································································· 70   display logbuffer ···················································································································································· 71   display logbuffer summary ··································································································································· 73  ...
  • Page 8 snmp-agent trap source ······································································································································· 112   snmp-agent usm-user { v1 | v2c } ······················································································································ 113   snmp-agent usm-user v3 ······································································································································ 114   Port mirroring commands ······································································································································· 118   display mirroring-group ······································································································································ 118   mirroring-group ···················································································································································· 119   mirroring-group mirroring-port (interface view) ································································································ 120  ...
  • Page 9: Ping, Tracert, And System Debugging Commands

    The debugging option for a specific module. The option number and content differ for different modules. To display the supported options, use the debugging module-name ? command. Usage guidelines Outputting debugging information may degrade system efficiency. H3C recommends that you enable the debugging for a specific module, rather than multiple modules. Examples # Enable debugging for the device management module.
  • Page 10: Display Memory

    Syntax display debugging [ module-name ] Views Any view Predefined user roles network-admin network-operator Parameters module-name: Displays the debugging settings of the specified module. To display the current module name, use the display debugging ? command. Examples # Display all enabled debugging functions. <Sysname>...
  • Page 11: Display Process

    Table 1 Output description Field Description The statistics about memory Memory statistics, in KB is measured in KB: Slot ID of the IRF member device Memory usage information Total Size of the physical memory Used Size of the physical memory used Free Size of the free physical memory shared...
  • Page 12 Parent JID: 0 Parent PID: 0 Executable path: /sbin/scmd Instance: 0 Respawn: OFF Respawn count: 1 Max. spawns per minute: 0 Last started: Wed Jun 1 14:45:46 2011 Process state: sleeping Max. core: 0 ARGS: - LAST_CPU Stack State HH:MM:SS:MESC Name 0:0:5:220 scmd...
  • Page 13 Field Description Command-line arguments passed to the process. If no arguments pass, the ARGS hyphen (-) displays. Thread ID. LAST_CPU CPU where the process is located in the last assignment. Stack Stack size. Thread priority. Thread state: • R—In running state or waiting in the queue. •...
  • Page 14: Display Process Cpu

    Table 3 Output description Field Description Job ID that uniquely identifies a process. It remains the same even if the process restarts. USER Username. %CPU CPU usage in percentage. %MEM Memory usage in percentage. Process state: • R—In running state or waiting in the queue. •...
  • Page 15: Display Process Log

    0.0% 0.0% 0.0% [events/0] 0.0% 0.0% 0.0% [khelper] 0.0% 0.0% 0.0% [kblockd/0] 0.0% 0.0% 0.0% [vzmond] 0.0% 0.0% 0.0% [pdflush] 0.0% 0.0% 0.0% [pdflush] 0.0% 0.0% 0.0% [kswapd0] 0.0% 0.0% 0.0% [aio/0] 0.0% 0.0% 0.0% [mtdblockd] 0.0% 0.0% 0.0% [TNetJob] 0.0% 0.0% 0.0%...
  • Page 16: Display Process Memory

    Examples # Display log information about all processes. <Sysname> display process log Name Normal-exit Core Start-time End-time PKEYINIT 832 2010-12-20 09:45:45 2010-12-20 09:45:45 KNPHASE2 837 2010-12-20 09:45:45 2010-12-20 09:45:45 PKGM 2010-12-20 09:45:45 2010-12-20 09:45:45 recover 2010-12-20 09:45:47 2010-12-20 09:45:48 SSHD 2010-12-20 10:08:23 2010-12-20 10:08:23 SSHD 2010-12-20 10:08:23 2010-12-20 10:08:23...
  • Page 17 Parameters slot slot-number: Specifies an IRF member device ID. If this option is not specified, the command displays state information about processes on the master device. Usage guidelines When the process starts, it requests text, data, stack, and dynamic memories, where: •...
  • Page 18: Display Process Memory Heap

    display process memory heap Use the display process memory heap command to display the heap memory statistics for a specified process. Syntax display process memory heap job job-id [ verbose ] [ slot slot-number ] Views Any view Predefined user roles network-admin network-operator Parameters...
  • Page 19: Display Process Memory Heap Address

    Summary: Total virtual memory heap space (in bytes) 2293760 Total physical memory heap space (in bytes) : 58368 Total allocated memory (in bytes) 42368 The output shows that job 48 is allocated with 60 blocks each with a size of 16 bytes (52 already used and 8 available), 1265 blocks each with a size of 64 bytes (1262 used and 3 available), and so on.
  • Page 20: Display Process Memory Heap Size

    slot slot-number: Specifies an IRF member device ID. If this option is not specified, the command displays state information about processes on the master device. Usage guidelines When the process runs abnormally, use this command to diagnose and locate the failures. Examples # Display the memory space with a length of 128 bytes starting from the address 0xb7e30580 in job 1.
  • Page 21: Monitor Process

    Usage guidelines The address displayed using this command is in hexadecimal form. Using this address and the display process memory heap address command, you can check the memory information about the address. Examples # Display addresses of memory blocks with a size of 16 bytes used by job 1. <Sysname>...
  • Page 22 slot slot-number: Specifies an IRF member device ID. If this option is not specified, the command displays state information about processes on the master device. Usage guidelines If the keyword dumbtty is not specified, the statistics is displayed in interactive mode: The system automatically calculates the number of processes to be displayed on a screen.
  • Page 23 00:00:06 0.00% [ksoftirqd/0] 00:00:00 0.00% [watchdog/0] 00:00:01 0.00% [events/0] 00:00:00 0.00% [khelper] 4797 4797 28832K 00:00:02 0.00% comsh 5117 5117 1496K 00:00:00 0.00% <Sysname> # Display the process statistics as if on a dumb terminal. The statistics is displayed twice for one command.
  • Page 24 00:00:00 0.00% [kthreadd] 00:00:00 0.00% [migration/0] 00:00:06 0.00% [ksoftirqd/0] 00:00:00 0.00% [watchdog/0] 00:00:00 0.00% [khelper] 4796 4796 2744K 00:00:00 0.00% login 4797 4797 28832K 00:00:03 0.00% comsh <Sysname> # Display the process statistics in interactive mode. <Sysname> monitor process 76 processes; 103 threads; 687 fds Thread states: 1 running, 102 sleeping, 0 stopped, 0 zombie CPU states: 78.98% idle, 0.16% user, 14.57% kernel, 6.27% interrupt Memory: 496M total, 341M available, page size 4K...
  • Page 25 Thread states: 2 running, 111 sleeping, 0 stopped, 0 zombie CPU states: 86.57% idle, 0.83% user, 11.74% kernel, 0.83% interrupt Memory: 755M total, 414M available, page size 4K State HH:MM:SS Name 27020K 00:00:43 8.95% syslogd 1173 1173 2664K 00:00:01 2.37% 10276K 00:00:09 0.69%...
  • Page 26: Monitor Thread

    Field Description Memory state, in KB: • Total memory. Memory • Memory available. • Page size. Job ID that uniquely identifies a process. It remains the same even if the process restarts Process ID. Process priority. Process state: • R—In running state or waiting in the queue. •...
  • Page 27: Command Description

    slot slot-number: Specifies an IRF member device ID. If this option is not specified, the command displays state information about processes on the master device. Usage guidelines If the keyword dumbtty is not specified, the statistics are displayed in interactive mode: The system automatically calculates the number of processes to be displayed on a screen.
  • Page 28 CPU states: 94.43% idle, 0.76% user, 3.64% kernel, 1.15% interrupt Memory: 755M total, 417M available, page size 4K LAST_CPU State HH:MM:SS Name 1176 1176 00:00:01 3.42% 00:00:12 0.85% devd 00:00:09 0.64% diagd 00:00:06 0.42% scmd 1160 1160 00:00:01 0.21% sshd 00:00:00 0.00% [kthreadd]...
  • Page 29: Ping

    1176 1176 00:00:04 1.86% 00:00:14 0.87% devd 00:00:07 0.49% scmd 00:00:04 0.12% [DIBC] 00:00:22 0.12% [MNET] # Enter q to exit the interactive mode. Table 11 Output description Field Description 84 processes; 107 threads Total number of processes; total number of threads. Thread state: •...
  • Page 30 Syntax ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i interface-type interface-number | -m interval | -n | -p pad | -q | -r | -s packet-size | -t timeout | -tos tos | -v | -vpn-instance vpn-instance-name ] * host Views Any view Predefined user roles...
  • Page 31 -v: Displays non ICMP echo reply received. If this keyword is not specified, the system does not display non ICMP echo reply. -vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the destination belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option.
  • Page 32: Ping Ipv6

    PING 1.1.2.2 (1.1.2.2): 56 data bytes 56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=4.685 ms 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=4.834 ms (same route) 56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=4.770 ms (same route) 56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=4.812 ms (same route) 56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=4.704 ms (same route)
  • Page 33 Syntax ping ipv6 [ -a source-ipv6 | -c count | -m interval | -q | -s packet-size | -t timeout | –v | -vpn-instance vpn-instance-name ] * host [ -i interface-type interface-number ] Views Any view Predefined user roles network-admin Parameters -a source-ipv6: Specifies the source IPv6 address of an ICMP echo request.
  • Page 34 56 bytes from 2001::2, icmp_seq=1 hlim=64 time=23.000 ms 56 bytes from 2001::2, icmp_seq=2 hlim=64 time=20.000 ms 56 bytes from 2001::2, icmp_seq=3 hlim=64 time=4.000 ms 56 bytes from 2001::2, icmp_seq=4 hlim=64 time=16.000 ms --- 2001::2 ping6 statistics --- 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 4.000/25.000/62.000/20.000 ms # Test whether the IPv6 address 2001::2 is reachable.
  • Page 35: Process

    Field Description Received the ICMPv6 reply from the device whose IPv6 address is 2001::2. • The number of data bytes is 56. • The packet sequence is 1. 56 bytes from 2001::2, • The hop limit value is 64. icmp_seq=1 hlim=64 dst=2001::1 •...
  • Page 36: Tracert

    <Sysname> process shutdown name diagd slot 1 Manually stopping or restarting a process can severely impact device operation. Use these commands only under the guidance of H3C engineers. Continue? [Y/N]:y Shutting down the process diagd[881] on slot 1 ... Succeeded.
  • Page 37 -w timeout: Specifies the timeout time of the reply packet of a probe packet. The timeout argument is in the range of 1 to 65535 milliseconds. The default value is 5000 milliseconds. host: IP address or host name (a string of 1 to 255 characters) for the destination. Usage guidelines After having identified network failure with the ping command, use the tracert command to locate the failed node(s).
  • Page 38: Tracert Ipv6

    Field Description ICMP timeout packets on an MPLS network, carrying MPLS label information: • Label—Label value that is used to identify a forwarding equivalence class (FEC). • MPLS Label=100048 Exp=0 Exp—Reserved, usually used for class of service (CoS). TTL=1 S=1 •...
  • Page 39 ICMP error message (probably because the destination is unreachable or sending ICMP timeout/destination unreachable packets is disabled). To abort the tracert operation during the execution of the command, press Ctrl+C. Examples # Display the path the packets traverse from source to destination with IPv6 address 2001:3::2. <Sysname>...
  • Page 40: Ntp Commands

    NTP commands display ntp-service ipv6 sessions Use the display ntp-service ipv6 sessions command to display information about all IPv6 NTP associations. Syntax display ntp-service ipv6 sessions [ verbose ] Views Any view Predefined user roles network-admin network-operator Parameters verbose: Displays detailed information about all IPv6 NTP associations. If you do not specify this keyword, only brief information about the IPv6 NTP associations is displayed.
  • Page 41 Field Description Reference clock ID of the NTP server • If the reference clock is the local clock, the value of this field is related to the value of the Clock stratum field: When the value of the Clock stratum field is 0 or 1, this field is displayed as "Local."...
  • Page 42 Xmttime: 00000000.00000000 Thu, Feb 7 2036 6:28:16.000 Roundtrip delay samples: 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 Offset samples: 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 Filter order: 0 Total sessions: 1 Table 17 Output description Field Description Clock source IPv6 address of the clock source Stratum level of the NTP server, which determines the clock...
  • Page 43 Field Description Operation mode of the local device: • unspec—The mode is unspecified. • sym_active—Active mode. • sym_passive—Passive mode. Local mode • client—Client mode. • server—Server mode. • broadcast—Broadcast or multicast server mode. • bclient—Broadcast or multicast client mode. Polling interval for the local device, in seconds. The value displayed local poll interval is a power of 2.
  • Page 44: Display Ntp-Service Sessions

    Field Description Xmttime Transmit timestamp in the NTP message Filter order Dispersion information Status of the local clock. The field is displayed only when you use the ntp-service refclock-master command to set the local clock as a reference clock. Reference clock status When the reach field of the local clock is 255, the field is displayed as working normally.
  • Page 45 Table 18 Output description Field Description • When the reference clock is the local clock, the field is displayed as LOCAL(number), which indicates that the IP address of the local clock is 127.127.1.number, where number represents the NTP process number in the source range of 0 to 3.
  • Page 46 Clock stratum: 2 Clock status: configured, master, sane, valid Reference clock ID: 127.127.1.0 VPN instance: Not specified Local mode: client, local poll interval: 6 Peer mode: server, peer poll interval: 6 Offset: 0.2862ms, roundtrip delay: 3.2653ms, dispersion: 4.5166ms Root roundtrip delay: 0.0000ms, root dispersion: 10.910ms Reachabilities:31, sync distance: 0.0194 Precision: 2^18, version: 3, source interface: Not specified Reftime: d17cbba5.1473de1e...
  • Page 47 Field Description Reference clock ID of the NTP server. • If the reference clock is the local clock, the value of this field is related to the value of the Clock stratum field: When the value of the Clock stratum field is 0 or 1, this field is Reference clock ID displayed as "LOCL."...
  • Page 48: Display Ntp-Service Status

    Field Description Synchronization distance relative to the upper-level clock, in sync distance seconds, and calculated from dispersion and roundtrip delay values. Precision Accuracy of the system clock version NTP version, in the range of 1 to 4. Source interface. source interface If the source interface is not specified, this field is Not specified.
  • Page 49 Clock precision: 2^-10 Root delay: 0.00000 ms Root dispersion: 3.96367 ms Reference time: d0c5fc32.92c70b1e Wed, Dec 29 2010 18:28:02.573 # Display the NTP service status when time is not synchronized. <Sysname> display ntp-service status Clock status: unsynchronized Clock stratum: 16 Reference clock ID: none Clock jitter: 0.000000 s Stability: 0.000 pps...
  • Page 50: Display Ntp-Service Trace

    Field Description For an IPv4 NTP server: The field represents the IP address of the remote server when the local device is synchronized to a remote NTP server. The field represents the local clock when the local device uses the local clock as a reference source.
  • Page 51: Ntp-Service Acl

    View Any view Predefined user roles network-admin network-operator Examples # Display the brief information of each NTP server from the local device back to the primary reference source. <Sysname> display ntp-service trace Server 127.0.0.1 Stratum 3, jitter 0.000, synch distance 0.0000. Server 3000::32 Stratum...
  • Page 52: Ntp-Service Authentication Enable

    Predefined user roles network-admin Parameters peer: Allows time requests and NTP control queries (such as alarms, authentication status, and time server information) from a peer device and allows the local device to synchronize itself to a peer device. query: Allows only NTP control queries from a peer device to the local device. server: Allows time requests and NTP control queries from a peer device, but does not allow the local device to synchronize itself to a peer device.
  • Page 53: Ntp-Service Authentication-Keyid

    undo ntp-service authentication enable Default NTP authentication is disabled. Views System view Predefined user roles network-admin Usage guidelines You need to enable NTP authentication in networks that require time synchronization security to make sure that NTP clients are only synchronized to authenticated NTP servers. To authenticate an NTP server, set an authentication key and specify it as a trusted key.
  • Page 54: Ntp-Service Broadcast-Client

    Usage guidelines In a network where there is a high security demand, the NTP authentication feature must be enabled for a system running NTP. This feature enhances the network security by means of the client-server key authentication, which prohibits a client from synchronizing to a device that has failed the authentication. When the NTP authentication key is configured, use the ntp-service reliable authentication-keyid command to configure the key as a trusted key.
  • Page 55: Ntp-Service Broadcast-Server

    <Sysname> system-view [Sysname] interface vlan-interface 1 [Sysname-Vlan-interface1] ntp-service broadcast-client Related commands ntp-service broadcast-server ntp-service broadcast-server Use the ntp-service broadcast-server command to configure the device to operate in NTP broadcast server mode and use the current interface to send NTP broadcast packets. Use the undo ntp-service broadcast-server command to remove the configuration.
  • Page 56: Ntp-Service Inbound Disable

    ntp-service reliable authentication-keyid • ntp-service inbound disable Use the ntp-service in-interface disable command to disable an interface from receiving NTP messages. Use the undo ntp-service in-interface disable command to restore the default. Syntax ntp-service in-interface disable undo ntp-service in-interface disable Default All interfaces are enabled to receive NTP messages.
  • Page 57: Ntp-Service Inbound Disable

    Parameters peer: Allows time requests and NTP control queries (such as alarms, authentication status, and time server information) and allows the local device to synchronize itself to a peer device. query: Allows only NTP control queries from a peer device to the local device. server: Allows time requests and NTP control queries, but does not allow the local device to synchronize itself to a peer device.
  • Page 58: Ntp-Service Ipv6 Multicast-Client

    Default All interfaces are enabled to receive IPv6 NTP messages. Views Interface view Predefined user roles network-admin Usage guidelines To disable an interface on the device from synchronizing the peer devices in the corresponding subnet or disable the device from being synchronized by the peer devices in the subnet corresponding to an interface, execute the command on the interface.
  • Page 59: Ntp-Service Ipv6 Multicast-Server

    [Sysname-Vlan-interface1] ntp-service ipv6 multicast-client ff21::1 Related commands ntp-service ipv6 multicast-client ntp-service ipv6 multicast-server Use the ntp-service ipv6 multicast-server command to configure the device to operate in IPv6 NTP multicast server mode and use the current interface to send IPv6 NTP multicast packets. Use the undo ntp-service ipv6 multicast-server command to remove the configuration.
  • Page 60: Ntp-Service Ipv6 Source

    ntp-service ipv6 source Use the ntp-service ipv6 source command to specify the source interface for IPv6 NTP messages. Use the undo ntp-service ipv6 source command to restore the default. Syntax ntp-service ipv6 source interface-type interface-number undo ntp-service ipv6 source Default No source interface is specified for IPv6 NTP messages.
  • Page 61 Syntax ntp-service ipv6 unicast-peer { ipv6-address | peer-name } [ vpn-instance vpn-instance-name ] [ authentication-keyid keyid | priority | source interface-type interface-number ] * undo ntp-service ipv6 unicast-peer { ipv6-address | peer-name } [ vpn-instance vpn-instance-name ] Default No IPv6 symmetric-passive peer is specified for the device. Views System view Predefined user roles...
  • Page 62: Ntp-Service Ipv6 Unicast-Server

    Related commands ntp-service authentication enable • ntp-service authentication-keyid • • ntp-service reliable authentication-keyid ntp-service ipv6 unicast-server Use the ntp-service ipv6 unicast-server command to specify an IPv6 NTP server for the device. Use the undo ntp-service ipv6 unicast-server command to remove an IPv6 NTP server specified for the device.
  • Page 63: Ntp-Service Max-Dynamic-Sessions

    If you include vpn-instance vpn-instance-name in the undo ntp-service unicast-server command, the command removes the NTP server with the IP address of ip-address in the specified VPN. If you do not include vpn-instance vpn-instance-name in this command, the command removes the NTP server with the IP address of ip-address in the public network.
  • Page 64: Ntp-Service Multicast-Client

    Related commands display ntp-service sessions ntp-service multicast-client Use the ntp-service multicast-client command to configure the device to operate in NTP multicast client mode and use the current interface to receive NTP multicast packets. Use the undo ntp-service multicast-client command to remove the configuration. Syntax ntp-service multicast-client [ ip-address ] undo ntp-service multicast-client [ ip-address ]...
  • Page 65: Ntp-Service Refclock-Master

    Default The device does not operate in any NTP association mode. View VLAN interface view Predefined user roles network-admin Parameters ip-address: Multicast IP address, in the range of 224.0.1.0 to 224.0.1.255, and defaults to 224.0.1.1. A multicast server and client must be configured with the same multicast IP address. authentication-keyid keyid: Specifies the key ID to be used for sending multicast messages to multicast clients, where keyid is in the range of 1 to 4294967295.
  • Page 66: Ntp-Service Reliable Authentication-Keyid

    Use this command with caution to avoid time errors. Before you execute the command, H3C recommends that you adjust the local system time.
  • Page 67: Ntp-Service Source

    Usage guidelines When NTP authentication is enabled, a client can be synchronized only to a server that can provide a trusted authentication key. Before you use the command, make sure that NTP authentication is enabled and an authentication key is configured. The key automatically changes to untrusted after you delete the key. In this case, you do not need to execute the undo ntp-service reliable authentication-keyid command.
  • Page 68: Ntp-Service Unicast-Peer

    If you do not want the IP address of an interface on the local device to become the destination address for response messages, use this command. If you have specified the source interface for NTP messages in the ntp-service unicast-server or •...
  • Page 69: Ntp-Service Unicast-Server

    vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the symmetric-passive peer belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the symmetric-passive peer is on the public network, do not specify this option. authentication-keyid keyid: Specifies the key ID to be used for sending NTP messages to the peer, where keyid is in the range of 1 to 4294967295.
  • Page 70 Predefined user roles network-admin Parameters ip-address: IP address of the NTP server. It must be a unicast address, rather than a broadcast address, a multicast address or the IP address of the local clock. server-name: Host name of the NTP server, a case-insensitive string of 1 to 255 characters. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the NTP server belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters.
  • Page 71: Sntp Commands

    SNTP commands display sntp ipv6 sessions Use the display sntp ipv6 sessions command to display information about all IPv6 SNTP associations. Syntax display sntp ipv6 sessions Views Any view Predefined user roles network-admin network-operator Examples # Display brief information about all IPv6 SNTP associations. <Sysname>...
  • Page 72: Sntp Authentication Enable

    Syntax display sntp sessions Views Any view Predefined user roles network-admin network-operator Examples # Display brief information about all SNTP associations. <Sysname> display sntp sessions SNTP server Stratum Version Last receive time 1.0.1.11 Tue, May 17 2011 9:11:20.833 (Synced) Table 23 Output description Field Description SNTP server...
  • Page 73: Sntp Authentication-Keyid

    Usage guidelines You need to enable SNTP authentication in networks that require time synchronization security to make sure that SNTP clients are only synchronized to authenticated NTP servers. To authenticate an NTP server, set an authentication key and specify it as a trusted key. Examples # Enable SNTP authentication.
  • Page 74: Sntp Ipv6 Unicast-Server

    A maximum of 128 keys can be set for the device by repeatedly executing the command. Examples # Set an MD5 authentication key, with the key ID of 10 and key value of BetterKey, in simple text. <Sysname> system-view [Sysname] sntp authentication enable [Sysname] sntp authentication-keyid 10 authentication-mode md5 simple BetterKey Related commands sntp authentication enable...
  • Page 75: Sntp Reliable Authentication-Keyid

    Usage guidelines When you specify an IPv6 NTP server for the device, the device is synchronized to the NTP server, but the NTP server is not synchronized to the device. If you include vpn-instance vpn-instance-name in the undo ntp-service unicast-server command, the command removes the NTP server with the IP address of ip-address in the specified VPN.
  • Page 76: Sntp Unicast-Server

    Examples # Enable NTP authentication, and specify the MD5 encryption algorithm, with the key ID of 37 and key value of BetterKey, in simple text. <Sysname> system-view [Sysname] sntp authentication enable [Sysname] sntp authentication-keyid 37 authentication-mode md5 simple BetterKey # Specify this key as a trusted key. [Sysname] sntp reliable authentication-keyid 37 Related commands sntp authentication-keyid...
  • Page 77 Usage guidelines When you specify an NTP server for the device, the device is synchronized to the NTP server, but the NTP server is not synchronized to the device. If you include vpn-instance vpn-instance-name in the undo ntp-service unicast-server command, the command removes the NTP server with the IP address of ip-address in the specified VPN.
  • Page 78: Information Center Commands

    Information center commands display info-center Use the display info-center command to display state information for output destinations. Syntax display info-center Views Any view Predefined user roles network-admin network-operator Examples # Display state information for output destinations. <Sysname> display info-center Information Center: Enabled Console: Enabled Monitor: Enabled Log host: Enabled...
  • Page 79: Display Logbuffer

    Field Description Monitoring terminal state: • Enabled—Logs can be output to the monitoring Monitor terminal. • Disabled—Logs cannot be output to the monitoring terminal. Log host configuration (This information is displayed only when a log host and related parameters are Log host: Enabled configured): IP address: 192.168.0.1, port number: 5000, host...
  • Page 80 Predefined user roles network-admin network-operator Parameters reverse: Displays log entries chronologically, with the most recent entry at the top. If this keyword is not specified, the log entries will be displayed chronologically, with the oldest entry at the top. level severity: Displays log information of at least the specified level, where severity represents information level, which ranges from 0 to 7.
  • Page 81: Display Logbuffer Summary

    The rest is omitted here. Table 26 Output description Field Description • Enabled—Logs can be output to the log buffer. Log buffer • Disabled—Logs cannot be output to the buffer. Max buffer size Maximum capacity of the Log buffer. Actual buffer size Actual capacity of the log buffer.
  • Page 82: Display Logfile Summary

    Table 27 Output description Field Description SLOT ID of the IRF member device. EMERG Represents emergency. For more information, see Table ALERT Represents alert. For more information, see Table CRIT Represents critical. For more information, see Table ERROR Represents error. For more information, see Table WARN Represents warning.
  • Page 83: Info-Center Enable

    info-center enable Use the info-center enable command to enable information center. Use the undo info-center enable command to disable information center. Syntax info-center enable undo info-center enable Default Information center is enabled. Views System view Predefined user roles network-admin Examples # Enable information center.
  • Page 84: Info-Center Logbuffer Size

    info-center logbuffer size Use the info-center logbuffer size command to set the maximum number of logs that can be stored in a log buffer. Use the undo info-center logbuffer size command to restore the default. Syntax info-center logbuffer [ size buffersize ] undo info-center logbuffer [ size ] Default The log buffer can store 512 logs.
  • Page 85: Info-Center Logfile Frequency

    Predefined user roles network-admin Examples # Enable the output of logs to the log file. <Sysname> system-view [Sysname] info-center logfile enable info-center logfile frequency Use the info-center logfile frequency command to configure the frequency with which the system saves the log file. Use the undo info-center logfile frequency command to restore the default frequency.
  • Page 86: Info-Center Logfile Switch-Directory

    undo info-center logfile size-quota Default The maximum storage space reserved for a log file is 10 MB. Views System view Predefined user roles network-admin Parameters size: Specifies the maximum storage space reserved for a log file, in MB. Usage guidelines The log file has a specific capacity.
  • Page 87: Info-Center Logging Suppress Duplicates

    Examples # Create a directory with the name test under flash root directory. <Sysname> mkdir test Directory flash:/test created. # Set the directory to save the log file to flash:/test. <Sysname> system-view [Sysname] info-center logfile switch-directory flash:/test Related commands info-center logfile enable info-center logging suppress duplicates Use the info-center logging suppress duplicates command enable duplicate log suppression.
  • Page 88: Info-Center Loghost

    info-center loghost Use the info-center loghost command to specify a log host and to configure the related parameters. Use the undo info-center loghost command to restore the default configurations on a log host. Syntax info-center loghost host-ipv4-address [ port port-number ] [ facility local-number ] undo info-center loghost host-ipv4-address Default Output of system information to the log host is disabled and no parameter is specified.
  • Page 89: Info-Center Source

    Views System view Predefined user roles network-admin Parameters interface-type interface-number: Specifies the egress interface for logs by the interface type and interface number. Usage guidelines After the source IP address of logs is specified, no matter which physical interface is used to output the logs, the source IP address of the logs is the primary IP address of the specified interface.
  • Page 90 Security log Hidden log Output System destinatio informati Enabled/ Enabled/ Enabled/ Level Level Level on source disabled disabled disabled Informatio Informatio Log host supported Enabled Disabled Enabled modules Informatio Informatio Log buffer supported Enabled Disabled Enabled modules Informatio Informatio Log file supported Enabled Disabled...
  • Page 91: Info-Center Synchronous

    After you separately set the output rules for a module, you must use the module-name argument to • modify or remove the rules. The new configuration by using the default keyword is invalid on the module. Examples # Output VLAN module's log information with a severity level of at least emergency to the console. <Sysname>...
  • Page 92: Info-Center Timestamp

    [Sysname] display interface ten-gigabitethe After the above information is displayed, you can input rnet to complete your input of the display interface ten-gigabitethernet command, and then press the Enter key to execute the command. # Enable the synchronous information output function, and then save the current configuration (input interactive information).
  • Page 93: Info-Center Timestamp Loghost

    YYYY: Represents the year. • none: Indicates no time information is provided. Examples # Configure the time stamp format for log information as boot. <Sysname> system-view [Sysname] info-center timestamp boot Related commands info-center timestamp loghost info-center timestamp loghost Use the info-center timestamp loghost command to configure the time stamp format of the logs sent to the log host.
  • Page 94: Reset Logbuffer

    Syntax logfile save Views Any view Predefined user roles 2: System level Usage guidelines You can specify the directory to save the security log file with the info-center logfile switch-directory command. All contents in the log file buffer will be cleared after they are successfully saved into the log file. Examples # Save the contents in the log file buffer into the log file.
  • Page 95: Terminal Monitor

    undo terminal logging level Default The lowest level of the logs that can be output to the console is 7 (Debug), and that of the logs that can be output to the monitor terminal is 6 (Informational). Views User view Predefined user roles network-admin Parameters...
  • Page 96: Terminal Debugging

    Examples # Enable the monitoring of logs on the current terminal. <Sysname> terminal monitor The current terminal is enabled to display logs. terminal debugging Use terminal debugging to enable the display of debugging information on the current terminal (console/monitor terminal). Use undo terminal debugging to disable the display of debugging information on the current terminal (console/monitor terminal).
  • Page 97: Snmp Commands

    SNMP commands The SNMP agent sends notifications (traps and informs) to inform the NMS of significant events, such as link state changes and user logins or logouts. Unless otherwise stated, the trap keyword in the command line includes both traps and informs. display snmp-agent community Use the display snmp-agent community command to display SNMPv1 or SNMPv2c community information.
  • Page 98: Display Snmp-Agent Group

    Table 29 Output description Field Description Displays the community name created by using the snmp-agent community command Community name or the username created by using the snmp-agent usm-user { v1 | v2c } command. SNMP group name: • If the community is created by using the snmp-agent community command, the group name is the same as the community name.
  • Page 99: Display Snmp-Agent Local-Engineid

    Examples # Display information about all SNMP groups. <Sysname> display snmp-agent group Group name: groupv3 Security model: v3 noAuthnoPriv Readview: ViewDefault Writeview: <no specified> Notifyview: <no specified> Storage-type: nonVolatile Table 30 Output description Field Description Group name SNMP group name. Security model of the SNMP group: •...
  • Page 100: Display Snmp-Agent Mib-View

    Examples # Display the local engine ID. <Sysname> display snmp-agent local-engineid SNMP local engine ID: 800007DB7F0000013859 Related commands snmp-agent local-engineid display snmp-agent mib-view Use the display snmp-agent mib-view command to display MIB views. Syntax display snmp-agent mib-view [ exclude | include | viewname view-name ] Views Any view Predefined user roles...
  • Page 101: Display Snmp-Agent Remote

    Subtree mask: Storage-type: nonVolatile View Type: excluded View status: active View name: ViewDefault MIB Subtree: snmpModules.18 Subtree mask: Storage-type: nonVolatile View Type: excluded View status: active ViewDefault is the default MIB view. The output shows that except for the MIB objects in the snmpUsmMIB, snmpVacmMIB, and snmpModules.18 subtrees, all the MIB objects in the iso subtree are accessible.
  • Page 102: Display Snmp-Agent Statistics

    Parameters ip-address: Specifies the IP address of a remote SNMP entity to display its SNMP engine ID. Usage guidelines Every SNMP agent has one SNMP engine to provide services for sending and receiving messages, authenticating and encrypting messages, and controlling access to managed objects. If no IP address is specified, this command displays all remote SNMP engine IDs you have configured.
  • Page 103 2 MIB objects altered successfully. 7 GetRequest-PDU accepted and processed. 7 GetNextRequest-PDU accepted and processed. 1653 GetBulkRequest-PDU accepted and processed. 1669 GetResponse-PDU accepted and processed. 2 SetRequest-PDU accepted and processed. 0 Trap PDUs accepted and processed. 0 alternate Response Class PDUs dropped silently. 0 forwarded Confirmed Class PDUs dropped silently.
  • Page 104: Display Snmp-Agent Sys-Info

    If none of the parameters is specified, this command displays all SNMP agent system information. Examples # Display all SNMP agent system information. <Sysname> display snmp-agent sys-info The contact information of the agent: Hangzhou H3C Tech. Co., Ltd. The location information of the agent: Hangzhou, China The SNMP version of the agent: SNMPv3...
  • Page 105: Display Snmp-Agent Usm-User

    Views Any view Usage guidelines You can use the snmp-agent trap enable command to enable or disable the notification function of a module. For a module that has sub-modules, the notification function status is enable if the trap function of any of its sub-modules is enabled. Examples # Display the modules that can generate notification and their notification function status.
  • Page 106: Snmp-Agent

    Group name: mygroupv3 Engine ID: 800063A203000FE240A1A6 Storage-type: nonVolatile UserStatus: active Username: userv3code Group name: groupv3code Engine ID: 800063A203000FE240A1A6 Storage-type: nonVolatile UserStatus: active ACL: 2001 Table 33 Output description Field Description Username SNMP username. Group name SNMP group name. Engine ID Engine ID that the SNMP agent used when the SNMP user was created.
  • Page 107: Snmp-Agent Calculate-Password

    Syntax snmp-agent undo snmp-agent Default SNMP agent is disabled. Views System view Predefined user roles network-admin Usage guidelines The snmp-agent command is optional for an SNMP configuration task. The SNMP agent is automatically enabled when you perform any command that begins with snmp-agent except for the snmp-agent calculate-password command.
  • Page 108: Snmp-Agent Community

    specified-engineid engineid: Uses a user-defined engine ID to calculate the encrypted key. The engineid argument specifies an SNMP engine ID as a hexadecimal string. It must comprise an even number of hexadecimal characters, in the range of 10 to 64. All-zero and all-F strings are invalid. Usage guidelines Make sure the SNMP agent is enabled before you execute the snmp-agent calculate-password command.
  • Page 109: Snmp-Agent Group

    mib-view view-name: Specifies the MIB view available for the community. The view-name argument represents a MIB view name, a string of 1 to 32 characters. A MIB view represents a set of accessible MIB objects. If no MIB view is specified, the specified community can access the MIB objects in the default MIB view ViewDefault.
  • Page 110 Use the undo snmp-agent group command to delete an SNMP group. Syntax SNMPv1 and SNMP v2c: snmp-agent group { v1 | v2c } group-name [ read-view view-name ] [ write-view view-name ] [ notify-view view-name ] [ acl acl-number ] undo snmp-agent group { v1 | v2c } group-name SNMPv3: snmp-agent group v3 group-name [ authentication | privacy ] [ read-view view-name ] [ write-view...
  • Page 111: Snmp-Agent Local-Engineid

    You can create up to 20 SNMP groups, including SNMPv1, SNMPv2c, and SNMPv3 groups. Examples # Create the SNMPv3 group group1 and assigns the no authentication, no privacy security model to the group. <Sysname> system-view [Sysname] snmp-agent group v3 group1 Related commands •...
  • Page 112: Snmp-Agent Log

    snmp-agent usm-user • snmp-agent log Use the snmp-agent log command to enable logging SNMP operations. Use the undo snmp-agent log command to disable logging SNMP operations. Syntax snmp-agent log { all | get-operation | set-operation } undo snmp-agent log { all | get-operation | set-operation } Default SNMP logging is disabled.
  • Page 113: Snmp-Agent Packet Max-Size

    Default The system creates the ViewDefault view when the SNMP agent is enabled. In this default MIB view, all MIB objects in the iso subtree but the snmpUsmMIB, snmpVacmMIB, and snmpModules.18 subtrees are accessible. Views System view Predefined user roles network-admin Parameters excluded: Denies access to any node in the specified MIB subtree.
  • Page 114: Snmp-Agent Remote

    Use the undo snmp-agent packet max-size command to restore the default packet size. Syntax snmp-agent packet max-size byte-count undo snmp-agent packet max-size Default The SNMP agent can receive and send SNMP messages that are up to 1500 bytes long. Views System view Predefined user roles network-admin...
  • Page 115: Snmp-Agent Sys-Info Contact

    Use the snmp-agent sys-info contact command to configure the system contact. Use the undo snmp-agent sys-info contact command to restore the default contact. Syntax snmp-agent sys-info contact sys-contact undo snmp-agent sys-info contact Default The contact is Hangzhou H3C Tech. Co.,Ltd. Views System view Predefined user roles network-admin Parameters sys-contact: Specifies the system contact, a string of 1 to 200 characters.
  • Page 116: Snmp-Agent Sys-Info Version

    Use the undo snmp-agent sys-info location command to restore the default location. Syntax snmp-agent sys-info location sys-location undo snmp-agent sys-info location Default The location is Hangzhou, China. Views System view Predefined user roles network-admin Parameters sys-location: Specifies the system location, a string of 1 to 200 characters. This information is stored in a management variable in the system group defined in RFC1213-MIB.
  • Page 117: Snmp-Agent Target-Host

    v2c: Specifies SNMPv2c. v3: Specifies SNMPv3. Usage guidelines Configure the SNMP agent with the same SNMP version as the NMS for successful communications between them. Examples # Enable SNMPv1 and SNMPv3. <Sysname> system-view [Sysname] snmp-agent sys-info version v1 v3 Related commands display snmp-agent sys-info snmp-agent target-host Use the snmp-agent target-host command to configure the SNMP agent to send SNMP notifications...
  • Page 118: Snmp-Agent Trap Enable

    params securityname security-string: Specifies the authentication parameter. The security-string argument specifies an SNMPv1 or SNMPv2c community name or an SNMPv3 username, a string of 1 to 32 characters. v1: Specifies SNMPv1. v2c: Specifies SNMPv2c. v3: Specifies SNMPv3. authentication: Specifies the security model to be authentication without privacy. You must specify •...
  • Page 119: Snmp-Agent Trap Life

    Views System view Predefined user roles network-admin Parameters configuration: Specifies configuration notifications. If configuration notifications are enabled, the system checks the running configuration and the startup configuration every 10 minutes for any change and generates a notification for the last change. standard: Specifies SNMP standard notifications.
  • Page 120: Snmp-Agent Trap Source

    Predefined user roles network-admin Parameters seconds: Sets a lifetime in seconds, in the range of 1 to 2592000. Usage guidelines When congestion occurs or the target host is not reachable, the SNMP agent buffers notifications in a queue. The notification lifetime sets how long a notification can stay in the queue. A notification is deleted when its lifetime expires.
  • Page 121: Snmp-Agent Usm-User { V1 | V2C

    Examples # Configure the IP address of Vlan-interface1 as the source address of SNMP notifications. <Sysname> system-view [Sysname] snmp-agent trap source Vlan-interface1 Related commands display snmp-agent community • snmp-agent target-host • snmp-agent trap enable • snmp-agent usm-user { v1 | v2c } Use the snmp-agent usm-user { v1 | v2c } command to add a user to an SNMPv1 or SNMPv2c group.
  • Page 122: Snmp-Agent Usm-User V3

    The snmp-agent usm-user { v1 | v2c } command enables managing SNMPv1 and SNMPv2c communities in the same way as managing SNMPv3 users. It does not affect the way of configuring SNMPv1 and SNMPv2c communities on the NMS. Examples # Add the user userv2c to the SNMPv2c group readCom so an NMS can use the protocol SNMPv2c and the read-only community name userv2c to access the device.
  • Page 123 group-name: Specifies an SNMPv3 group name, a case-sensitive string of 1 to 32 characters. remote ip-address: Specifies the IP address of the remote SNMP entity. To send SNMPv3 informs to an NMS, you must specify the IP address of the NMS in the snmp-agent usm-user v3 command and map the IP address to the SNMP engine ID of the NMS by using the snmp-agent remote command.
  • Page 124 For secrecy, the system always displays the authentication and privacy keys in cipher text. • If you specify the cipher keyword, the system considers the keys as having been encrypted, and displays them as they are. If you specify the simple keyword, the system considers the keys as in plain text and encrypts them. •...
  • Page 125 Related commands display snmp-agent usm-user • snmp-agent calculate-password • • snmp-agent group...
  • Page 126: Port Mirroring Commands

    Port mirroring commands display mirroring-group Use the display mirroring-group command to display mirroring group information. Syntax display mirroring-group { group-id | all | local | remote-destination | remote-source } Views Any view Predefined user roles network-admin network-operator Parameters group-id: Number of the mirroring group. The value ranges from 1 to 4. all: Displays the information of all mirroring groups.
  • Page 127: Mirroring-Group

    Table 35 Output description Field Description Mirroring group Number of the mirroring group Type of the mirroring group: • Local Type • Remote source • Remote destination Status of the mirroring group: • Active Status • Incomplete—The mirroring group is not configured completely and cannot take effect.
  • Page 128: Mirroring-Group Mirroring-Port (Interface View)

    mirroring-group mirroring-port (interface view) Use the mirroring-group mirroring-port command to configure a source port for a mirroring port. Use the undo mirroring-group mirroring-port command to remove a source port from the mirroring group. Syntax mirroring-group group-id mirroring-port { both | inbound | outbound } undo mirroring-group group-id mirroring-port Default No source port is configured for any mirroring group.
  • Page 129: Mirroring-Group Mirroring-Port (System View)

    Related commands mirroring-group mirroring-group mirroring-port (system view) Use the mirroring-group mirroring-port command to configure source ports for a mirroring group. Use the undo mirroring-group mirroring-port command to remove source ports from a mirroring group. Syntax mirroring-group group-id mirroring-port interface-list { both | inbound | outbound } undo mirroring-group group-id mirroring-port interface-list Default No source port is configured for a mirroring group.
  • Page 130: Mirroring-Group Monitor-Egress

    # Create remote source group 2, configure Ten-GigabitEthernet 1/0/2 as a source port of the mirroring group, and configure the mirroring group to monitor the bidirectional traffic of the port. <Sysname> system-view [Sysname] mirroring-group 2 remote-source [Sysname] mirroring-group 2 mirroring-port ten-gigabitethernet 1/0/2 both Related commands mirroring-group mirroring-group monitor-egress...
  • Page 131: Mirroring-Group Monitor-Port (Interface View)

    Examples # Create remote source group 1, and configure port Ten-GigabitEthernet 1/0/1 as its egress port in system view. <Sysname> system-view [Sysname] mirroring-group 1 remote-source [Sysname] mirroring-group 1 monitor-egress ten-gigabitethernet 1/0/1 # Create remote source group 2, and configure port Ten-GigabitEthernet 1/0/2 as its egress port in interface view.
  • Page 132: Mirroring-Group Monitor-Port (System View)

    Examples # Create local mirroring group 1, and configure port Ten-GigabitEthernet 1/0/1 as its monitor port. <Sysname> system-view [Sysname] mirroring-group 1 local [Sysname] interface ten-gigabitethernet 1/0/1 [Sysname-Ten-GigabitEthernet1/0/1] mirroring-group 1 monitor-port # Create remote destination group 2, and configure port Ten-GigabitEthernet 1/0/2 as its monitor port. <Sysname>...
  • Page 133: Mirroring-Group Reflector-Port

    Use a monitor port only for port mirroring to make sure that the data monitoring device receives and analyzes only the mirrored traffic rather than a mix of mirrored traffic and normally forwarded traffic. Do not configure a port of an existing mirroring group as the monitor port. Examples # Create local mirroring group 1, and configure port Ten-GigabitEthernet 1/0/1 as its monitor port.
  • Page 134: Mirroring-Group Remote-Probe Vlan

    Usage guidelines You can configure reflector ports only for remote source groups but not for local mirroring groups or remote destination groups. Use a port that is not being used on the device as the reflector port and do not connect a network cable to the reflector port.
  • Page 135 Usage guidelines You can configure a remote probe VLAN only for a remote source group or remote destination group but not for a local mirroring group. When a VLAN is configured as a remote probe VLAN, use the remote probe VLAN for port mirroring exclusively.
  • Page 136: Index

    Index D I L M N P R S T info-center logfile size-quota,77 info-center logfile switch-directory,78 debugging,1 info-center logging suppress duplicates,79 display debugging,1 info-center loghost,80 display info-center,70 info-center loghost source,80 display logbuffer,71 info-center source,81 display logbuffer summary,73 info-center synchronous,83 display logfile summary,74 timestamp,84 info-center...
  • Page 137 ntp-service multicast-client,56 snmp-agent packet max-size,105 ntp-service multicast-server,56 snmp-agent remote,106 ntp-service refclock-master,57 snmp-agent sys-info contact,107 ntp-service reliable authentication-keyid,58 snmp-agent sys-info location,107 ntp-service source,59 snmp-agent sys-info version,108 ntp-service unicast-peer,60 snmp-agent target-host,109 ntp-service unicast-server,61 snmp-agent trap enable,1 10 snmp-agent trap life,1 1 1 snmp-agent trap source,1 12 ping,21...

This manual is also suitable for:

S5820v2 series

Table of Contents