H3C S7500E Series Command Reference Manual

H3C S7500E Series Command Reference Manual

Network management and monitoring
Hide thumbs Also See for S7500E Series:
Table of Contents

Advertisement

H3C S7500E Switch Series
Network Management and Monitoring
Command Reference
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Software version: S7500E Series--Release 6701 and Later
S7508E-X--------Release 6901 and Later
Document version: 6W101-20120903

Advertisement

Table of Contents
loading

Summary of Contents for H3C S7500E Series

  • Page 1 H3C S7500E Switch Series Network Management and Monitoring Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: S7500E Series--Release 6701 and Later S7508E-X--------Release 6901 and Later Document version: 6W101-20120903...
  • Page 2 SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V G, V G, PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co., Ltd. All other trademarks that may be mentioned in this manual are the property of their respective owners Notice The information in this document is subject to change without notice.
  • Page 3 Preface The H3C S7500E documentation set includes 12 command references, which describe the commands and command syntax options available for the H3C S7500E Release 6700 Series and the H3C S7508E-X Release 6900 Series. The Network Management and Monitoring Command Reference describes network management and monitoring configuration commands.
  • Page 4 The port numbers in this document are for illustration only and might be unavailable on your device. Obtaining documentation You can access the most up-to-date H3C product documentation on the World Wide Web at http://www.h3c.com. Click the links on the top navigation bar to obtain different categories of product documentation: [Technical Support &...
  • Page 5 Documentation feedback You can e-mail your comments about product documentation to info@h3c.com. We appreciate your comments.
  • Page 6: Table Of Contents

    Contents Ping, tracert, and system debugging commands ······································································································· 1   Ping and tracert commands ············································································································································· 1   ping ············································································································································································ 1   ping ipv6 ··································································································································································· 5   tracert ········································································································································································· 7   tracert ipv6 ································································································································································ 9   System debugging commands ······································································································································ 10  ...
  • Page 7 ptp utc offset ··························································································································································· 49   reset ptp ·································································································································································· 50   Information center configuration commands ············································································································ 51   display channel ····················································································································································· 51   display info-center ················································································································································· 52   display logbuffer ···················································································································································· 54   display logbuffer summary ··································································································································· 56   display logfile buffer ············································································································································· 58  ...
  • Page 8 snmp-agent ifmib long-ifindex enable ················································································································· 19   snmp-agent mib-view ············································································································································· 19   snmp-agent packet max-size ································································································································ 21   snmp-agent packet response dscp ······················································································································· 21   snmp-agent sys-info ··············································································································································· 22   snmp-agent target-host ·········································································································································· 23   snmp-agent trap enable ········································································································································ 24  ...
  • Page 9 display nqa reaction counters ······························································································································ 72   display nqa result ·················································································································································· 74   display nqa statistics ············································································································································· 78   filename ·································································································································································· 83   frequency ································································································································································ 84   history-record enable ············································································································································ 85   history-record keep-time ········································································································································ 85   history-record number ··········································································································································· 86  ...
  • Page 10 sFlow configuration commands ······························································································································ 123   display sflow ························································································································································ 123   sflow agent ··························································································································································· 125   sflow collector ······················································································································································ 125   sflow counter interval ·········································································································································· 126   sflow counter collector ········································································································································ 127   sflow flow collector ·············································································································································· 127   sflow flow max-header ········································································································································ 128  ...
  • Page 11 display ipc multicast-group ································································································································· 168   display ipc node ·················································································································································· 169   display ipc packet ··············································································································································· 169   display ipc performance ····································································································································· 170   display ipc queue ················································································································································ 172   ipc performance enable ····································································································································· 173   reset ipc performance ········································································································································· 174  ...
  • Page 12: Ping, Tracert, And System Debugging Commands

    Ping, tracert, and system debugging commands Ping and tracert commands ping Use ping to verify whether the destination in an IP network is reachable, and to display the related statistics. Syntax ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i interface-type interface-number | -m interval | -n | -p pad | -q | -r | -s packet-size | -t timeout | -tos tos | -v |-vpn-instance vpn-instance-name ] * host Views Any view...
  • Page 13 -p pad: Specifies the value of the pad field in an ICMP echo request, in hexadecimal format, 1 to 8 bits, in the range 0 to ffffffff. If the specified value is less than 8 bits, 0s are added in front of the value to extend it to 8 bits.
  • Page 14 --- 1.1.2.2 ping statistics --- 5 packet(s) transmitted 5 packet(s) received 0.00% packet loss round-trip min/avg/max = 1/41/205 ms The output shows the following: The destination was reachable. • • All ICMP echo requests sent by the source got responses. The minimum time, average time, and maximum time for the packet’s roundtrip time are 1 ms, 41 •...
  • Page 15 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms Record Route: 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms Record Route: 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms Record Route: 1.1.2.1 1.1.2.2...
  • Page 16: Ping Ipv6

    Field Description Received the ICMP reply from the device whose IP address is 1.1.2.2. If no reply is received during the timeout period, "Request time out" is displayed. • bytes—Number of data bytes in the ICMP reply. Reply from 1.1.2.2 : bytes=56 •...
  • Page 17 -s packet-size: Specifies length (in bytes) of an ICMPv6 echo request, which ranges from 20 to 8100 and defaults to 56. -t timeout: Specifies the timeout value (in milliseconds) of an ICMPv6 echo reply, which ranges from 0 to 65535 and defaults to 2000. -tos tos: Specifies the ToS value of an ICMP echo request, which ranges from 0 to 255 and defaults to 0.
  • Page 18: Tracert

    Reply from 2001::1 bytes=56 Sequence=1 hop limit=64 time = 62 ms Reply from 2001::1 bytes=56 Sequence=2 hop limit=64 time = 26 ms Reply from 2001::1 bytes=56 Sequence=3 hop limit=64 time = 20 ms Reply from 2001::1 bytes=56 Sequence=4 hop limit=64 time = 4 ms Reply from 2001::1 bytes=56 Sequence=5 hop limit=64...
  • Page 19 DSCP value as a reference to determine the packet priority for transmission. This option is available in S7500E Release 6703, S7508E-X Release 6903, and their later versions. -vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the destination belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option.
  • Page 20: Tracert Ipv6

    Field Description ICMP timeout packets on an MPLS network, carry MPLS label information: • Label—Label value that is used to identify a forwarding equivalence class (FEC). MPLS Label=100048 Exp=0 TTL=1 • Exp—Reserved, usually used for class of service (CoS). • TTL—TTL value.
  • Page 21: System Debugging Commands

    Usage guidelines Output information of the tracert ipv6 command includes IPv6 addresses of all the Layer 3 devices the packets traverse from source to destination. Asterisks (* * *) are displayed if the device cannot reply with an ICMP error message (probably because the destination is unreachable or sending ICMP timeout/destination unreachable packets is disabled).
  • Page 22: Display Debugging

    option: The debugging option for a specific module. Different modules have different debugging options in terms of their number and content. To display the currently supported options, use the debugging module-name ? command. Usage guidelines Debugging output can degrade system efficiency, so enable the debugging of the corresponding module for diagnosing network failure, and do not enable debugging of multiple modules at the same time.
  • Page 23 IP packet debugging is on Related commands debugging...
  • Page 24: Ntp Configuration Commands

    NTP configuration commands display ntp-service sessions Use display ntp-service sessions to display information about all NTP sessions. Syntax display ntp-service sessions [ verbose ] [ | { begin | exclude | include } regular-expression ] Views Any view Default command level 1: Monitor level Parameters verbose: Displays detailed information about all NTP sessions.
  • Page 25 Field Description Stratum level of the clock source, which determines the clock precision. The value is in the range of 1 to 16. The clock precision decreases from stratum 1 stra to stratum 16. A stratum 1 clock has the highest precision, and a stratum 16 clock is not synchronized.
  • Page 26 Table 4 Command output Field Description clock source IP address of the clock source. Stratum level of the clock source, which determines the clock precision. The value is in the range of 1 to 16. The clock precision clock stratum decreases from stratum 1 to stratum 16.
  • Page 27 Field Description Operation mode of the peer device: • unspec—The mode is unspecified. • active—Active mode. • passive—Passive mode. • peer mode client—Client mode. • server—Server mode. • bdcast—Broadcast server mode. • control—Control query mode. • private—Private message mode. Poll interval of the peer device, in seconds. The value displayed is a peer poll power of 2.
  • Page 28: Display Ntp-Service Status

    Field Description Status of the reference clock: • reference clock status working properly. • working improperly. timecode Time code. Total associations Total number of associations. When a device is operating in NTP broadcast/multicast server mode, the display ntp-service sessions command does not display the NTP session information corresponding to the broadcast/multicast server, but the sessions are counted in the total number of associations.
  • Page 29: Display Ntp-Service Trace

    Table 5 Command output Field Description Status of the system clock: • Synchronized—The system clock has been synchronized. Clock status • Unsynchronized—The system clock has not been synchronized. Clock stratum Stratum level of the system clock. When the system clock is synchronized to a remote time server, this field indicates the address of the remote time server.
  • Page 30: Ntp-Service Access

    exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Usage guidelines The display ntp-service trace command takes effect only when the local device and all the devices on the NTP server chain can reach one another.
  • Page 31: Ntp-Service Authentication Enable

    Default command level 3: Manage level Parameters peer: Permits full access. This level of right permits the peer devices to perform synchronization and control query to the local device and also permits the local device to synchronize its clock to that of a peer device.
  • Page 32: Ntp-Service Authentication-Keyid

    Views System view Default command level 3: Manage level Examples # Enable NTP authentication. <Sysname> system-view [Sysname] ntp-service authentication enable Related commands • ntp-service authentication-keyid ntp-service reliable authentication-keyid • ntp-service authentication-keyid Use ntp-service authentication-keyid to set the NTP authentication key. Use undo ntp-service authentication-keyid to remove the configured NTP authentication key.
  • Page 33: Ntp-Service Broadcast-Client

    A maximum of 1024 keys can be set for each device. If an NTP authentication key is specified as a trusted key, the key automatically changes to untrusted after you delete the key. In this case, you do not need to execute the undo ntp-service reliable authentication-keyid command.
  • Page 34: Ntp-Service Dscp

    Default The device does not operate in any NTP operation mode. Views Layer 3 Ethernet interface view, VLAN interface view Default command level 3: Manage level Parameters authentication-keyid keyid: Specifies the key ID to be used for sending broadcast messages to broadcast clients, where keyid is in the range of 1 to 4294967295.
  • Page 35: Ntp-Service In-Interface Disable

    ntp-service in-interface disable Use ntp-service in-interface disable to disable an interface from receiving NTP messages. Use undo ntp-service in-interface disable to restore the default. Syntax ntp-service in-interface disable undo ntp-service in-interface disable Default All interfaces are enabled to receive NTP messages. Views Layer 3 Ethernet interface view, VLAN interface view Default command level...
  • Page 36: Ntp-Service Multicast-Client

    using an NTP command, while a dynamic association is a temporary association created by the system during operation. A dynamic association is removed if the system fails to receive messages from it over a specific long time. In client/server mode, for example, when you carry out a command to synchronize the time to a server, the system creates a static association, and the server just responds passively upon the receipt of a message, rather than creating an association (static or dynamic).
  • Page 37: Ntp-Service Refclock-Master

    Syntax ntp-service multicast-server [ ip-address ] [ authentication-keyid keyid | ttl ttl-number | version number ] undo ntp-service multicast-server [ ip-address ] Default The device does not operate in any NTP operation mode. Views Layer 3 Ethernet interface view, VLAN interface view Default command level 3: Manage level Parameters...
  • Page 38: Ntp-Service Reliable Authentication-Keyid

    Parameters ip-address: IP address of the local clock, which is 127.127.1.u, where u is the NTP process ID that is in the range of 0 to 3. If you do not specify the ip-address argument, it defaults to 127.127.1.0. stratum: Stratum level of the local clock, which is in the range of 1 to 15 and defaults to 8. Usage guidelines The stratum level of a clock defines the clock precision.
  • Page 39: Ntp-Service Unicast-Peer

    Use undo ntp-service source-interface to restore the default. Syntax ntp-service source-interface interface-type interface-number undo ntp-service source-interface Default No source interface is specified for NTP messages, and the system uses the IP address of the interface determined by the matched route as the source IP address of NTP messages. Views System view Default command level...
  • Page 40: Ntp-Service Unicast-Server

    Parameters vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the symmetric-passive peer belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the symmetric-passive peer is on the public network, do not specify this option. ip-address: IP address of the symmetric-passive peer. It must be a unicast address, rather than a broadcast address, a multicast address, or the IP address of the local clock.
  • Page 41 Default command level 3: Manage level Parameters vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the NTP server belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the NTP server is on the public network, do not specify this option. ip-address: Specifies an IP address of the NTP server.
  • Page 42: Ptp Configuration Commands

    PTP configuration commands Only the S7508E-X switch that has LSQ1QGC4SC or LSQ1QGS4SC installed supports PTP. display ptp Use display ptp to display PTP statistics. Syntax display ptp [ brief | interface interface-type interface-number ] [ | { begin | exclude | include } regular-expression ] Views Any view...
  • Page 43 Grandmaster clock ID 000FE2-FFFE-FF0000 Step removed Parent clock ID 000FE2-FFFE-FF0000 Receive port name Parent portnumber Local clock ID 000FE2-FFFE-FF0000 Local clock type Local Local priority1 Local priority2 Local clock class Local clock accuracy Grandmaster UTC info Time source UTC offset Leap None # Display detailed PTP statistics of FortyGigE 1/0/1.
  • Page 44 Discarded packet statistics -------------------------------------------------------------------------- Announce :0 Sync Signaling DelayReq :0 DelayResp :0 FollowUp PdelayReq:0 PdelayResp:0 PdelayRespFollowUp :0 Table 7 Command output Field Description Name PTP port name. PTP port role: • Master—Master port. Role • Slave—Subordinate port. • Passive—Passive port. Delay measurement mechanism: •...
  • Page 45 Field Description Local clock ID Local clock ID. Local clock type Local clock type. Local priority1 GM priority 1 of the local device. Local priority2 GM priority 2 of the local device. Local clock class GM time class of the local device. Local clock accuracy GM time accuracy of the local device.
  • Page 46: Ptp Active Force-State

    Field Description Minimum Delay_Req message sending interval (in seconds) = 2 value (value is Min-delayreq-interval displayed for this field). Received packet statistics Statistics of received PTP messages. Sent packet statistics Statistics of PTP messages sent. Discarded packet statistics Statistics of PTP messages discarded. ptp active force-state Use ptp active force-state to activate the port role configuration.
  • Page 47: Ptp Announce-Timeout

    Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Default command level 2: System level Parameters value: Specifies the announce message sending interval (in seconds). The intervals use log base 2 values, where value ranges from 0 to 6. Examples # Configure the announce message sending interval on FortyGigE 1/0/1 as 4 (2 ) seconds.
  • Page 48: Ptp Asym-Correction

    ptp asym-correction Use ptp asym-correction to configure the delay-correction time. Use undo ptp asym-correction to restore the default. Syntax ptp asym-correction { minus | plus } value undo ptp asym-correction Default The delay-correction time is 0 nanoseconds, which means delay-correction is not performed. Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Default command level...
  • Page 49 accuracy acc-value: Specifies the time accuracy of the clock, which ranges from 0 to 255. The smaller the value, the higher time accuracy of the GM. Table 8 shows the description of the time accuracy values. Table 8 Description of the time accuracy values Time accuracy value (in Description hexadecimal format)
  • Page 50 Time class (in decimal Description format) The former time class is 6. The clock node cannot synchronize to the specific time source. It enters the re-appointment mode and satisfies the re-appointment conditions. PTP assigns a time table to the clock node. A clock node with time class 7 cannot become the member clock of any other clocks in the domain.
  • Page 51: Ptp Clock-Step

    Examples # Configure priority 2 for the Bits clock as 100. <Sysname> system-view [Sysname] ptp clock-source priority2 100 ptp clock-step Use ptp clock-step to configure the mode for carrying timestamps. Use undo ptp clock-step to restore the default. Syntax ptp clock-step { one-step | two-step } undo ptp clock-step Default Two-step mode is adopted.
  • Page 52: Ptp Destination-Mac

    Default command level 2: System level Parameters e2e: Specifies the Request_Response mechanism used by E2ETC. p2p: Specifies the Peer Delay mechanism used by P2PTC. Usage guidelines This command is applicable to BCs and OCs only. Examples # Configure the clock node type as OC, and specify the delay-measurement mechanism on FortyGigE 1/0/1 as e2e.
  • Page 53: Ptp Enable

    Examples # Configure the destination MAC address for non-Pdelay messages as 0180-C200-000E on FortyGigE 1/0/1. <Sysname> system-view [Sysname] interface fortygige 1/0/1 [Sysname-FortyGigE1/0/1] ptp destination-mac 0180-c200-000e ptp enable Use ptp enable to enable PTP on the port. Use undo ptp enable to disable the function. Syntax ptp enable undo ptp enable...
  • Page 54: Ptp Force-State

    ptp force-state Use ptp force-state to configure the role of the PTP port. Use undo ptp force-state to remove the configuration. Syntax ptp force-state { master | passive | slave } undo ptp force-state Default The PTP port role is automatically specified through BMC. Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Default command level...
  • Page 55: Ptp Mode

    Syntax ptp min-delayreq-interval value undo ptp min-delayreq-interval Default The minimum interval for sending Delay_Req messages is 1 (2 ) second. Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Default command level 2: System level Parameters value: Specifies the minimum interval for sending Delay_Req messages (in seconds). The intervals use log base 2 values, where value ranges from –4 to 6.
  • Page 56: Ptp Pdelay-Req-Interval

    Usage guidelines Both PTP and NTP can synchronize the local device time. However, do not configure them as the target end at the same time for time synchronization. In other words, do not configure the local device as an NTP client when it is a PTP member clock or a PTP member clock when it is an NTP client. Before you change the clock node type of a device, disable relevant PTP configurations: remove the clock node type configuration, disable PTP on all interfaces, remove the working mode configuration for an OC, and remove the Peer Delay mechanism configuration on the PTP port for a non-TC clock.
  • Page 57: Ptp Port-Mode

    ptp port-mode Use ptp port-mode to configure the port type for a TC+OC (including E2ETC+OC and P2PTC+OC) as Use undo ptp port-mode to restore the default. Syntax ptp port-mode oc undo ptp port-mode Default The type of all ports on an E2ETC+OC or P2PTC+OC is TC. Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Default command level...
  • Page 58: Ptp Slave-Only

    Views System view Default command level 2: System level Parameters bits1: Specifies the priority of a Bits1 clock. bits2: Specifies the priority of a Bits2 clock. local: Specifies the priority of the local clock. priority1 pri1-value: Specifies priority 1 for the clock, which ranges from 0 to 255. The smaller the value, the higher the priority.
  • Page 59: Ptp Syn-Interval

    Related commands ptp mode ptp syn-interval Use ptp syn-interval to configure the interval for sending Sync messages. Use undo ptp syn-interval to restore the default. Syntax ptp syn-interval value undo ptp syn-interval Default The interval for sending Sync messages is 1/8 (2 ) second.
  • Page 60: Ptp Utc Offset

    Parameters leap59-date: Adjusts the UTC at the last minute (23:59) of the specified date so that the UTC is one second slower than the TAI. leap61-date: Adjusts the UTC at the last minute (23:59) of the specified date so that the UTC is one second faster than the TAI.
  • Page 61: Reset Ptp

    reset ptp Use reset ptp to clear PTP statistics. Syntax reset ptp [ interface interface-type interface-number ] Views User view Default command level 2: System level Parameters interface interface-type interface-number: Clears PTP statistics on the specified port. If no port is specified, this command clears PTP statistics on all ports.
  • Page 62: Information Center Configuration Commands

    Information center configuration commands The S7508E-X Switch Series does not support the log file feature. display channel Use display channel to display channel information. Syntax display channel [ channel-number | channel-name ] [ | { begin | exclude | include } regular-expression ] Views Any view Default command level...
  • Page 63: Display Info-Center

    Examples # Display information about channel 0. <Sysname> display channel 0 channel number:0, channel name:console MODU_ID NAME ENABLE LOG_LEVEL ENABLE TRAP_LEVEL ENABLE DEBUG_LEVEL ffff0000 default informational debugging debugging The output shows that the system is allowed to output log information with a severity from 0 to 4, trap information with a severity from 0 to 7, and debug information with a severity from 0 to 7 to the console.
  • Page 64 Examples # Display information center configuration information. <Sysname> display info-center Information Center:enabled Log host: 1.1.1.1, port number : 514, host facility : local7, channel number : 2, channel name : loghost Console: channel number : 0, channel name : console Monitor: channel number : 1, channel name : monitor SNMP Agent:...
  • Page 65: Display Logbuffer

    Field Description Log buffer: Configurations for the log buffer destination, including whether information output to this destination is enabled,max buffer size 1024, current buffer size enabled or disabled, the maximum capacity, the 512, current capacity, the current number of messages, the current messages 512, dropped messages 0, number of dropped messages, the number of overwritten messages 740...
  • Page 66 Table 14 Severity description Corresponding Severity Value Description keyword in commands Emergency The system is unsuable. emergencies Action must be taken Alert alerts immediately. Critical Critical condition. critical Error Error condition. errors Warning Warning condition. warnings Normal but significant Notification notifications condition.
  • Page 67: Display Logbuffer Summary

    Channel number : 4 , Channel name : logbuffer Dropped messages : 0 Overwritten messages : 0 Current messages : 168 %Feb 16 16:58:31:528 2011 H3C IC/6/SYS_RESTART: System restarted – The rest is omitted here. Table 15 Command output Field...
  • Page 68 Parameters level severity: Specifies a severity level in the range of 0 to 7. slot slot-number: Specifies a card by its slot number. (In standalone mode) chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument specifies the ID of the member device.
  • Page 69: Display Logfile Buffer

    display logfile buffer Use display logfile buffer to display contents of the log file buffer. Syntax display logfile buffer [ | { begin | exclude | include } regular-expression ] Views Any view Default command level 1: Monitor level Parameters |: Filters command output by specifying a regular expression.
  • Page 70: Display Trapbuffer

    exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Examples # Display the configuration of the log file. <Sysname>...
  • Page 71 Examples # Display the state of the trap buffer and the trap information recorded. <Sysname> display trapbuffer Trapping buffer configuration and contents:enabled Allowed max buffer size : 1024 Actual buffer size : 256 Channel number : 3 , channel name : trapbuffer Dropped messages : 0 Overwritten messages : 0 Current messages : 9...
  • Page 72: Enable Log Updown

    enable log updown Use enable log updown to allow a port to generate link up/down logs when the port state changes. Use undo enable log updown to disable a port from generating link up/down logs upon port state changes. Syntax enable log updown undo enable log updown Default...
  • Page 73: Info-Center Console Channel

    <Sysname> system-view [Sysname] info-center channel 0 name abc info-center console channel Use info-center console channel to specify the console output channel. The system uses this channel to output information to the console. Use undo info-center console channel to restore the default console output channel. Syntax info-center console channel { channel-number | channel-name } undo info-center console channel...
  • Page 74: Info-Center Format Unicom

    Default command level 2: System level Usage guidelines System information sent to a log host has two formats: H3C and UNICOM. For more information, see Network Management and Monitoring Configuration Guide. Examples # Set the UNICOM format for system information sent to a log host.
  • Page 75: Info-Center Logfile Enable

    Default The system outputs information to the log buffer through channel 4 (logbuffer) and the default buffer size is 512. Views System view Default command level 2: System level Parameters channel-number: Specifies a channel by its number in the range of 0 to 9. channel-name: Specifies a channel by its name, a default name or a self-defined name.
  • Page 76: Info-Center Logfile Frequency

    info-center logfile frequency Use info-center logfile frequency to configure the interval for saving system information to the log file. Use undo info-center logfile frequency to restore the default saving interval. Syntax info-center logfile frequency freq-sec undo info-center logfile frequency Default The default saving interval is 86400 seconds.
  • Page 77: Info-Center Logfile Switch-Directory

    <Sysname> system-view [Sysname] info-center logfile size-quota 6 info-center logfile switch-directory Use info-center logfile switch-directory to configure the directory where a log file is saved. Syntax info-center logfile switch-directory dir-name Default A log file is saved in logfile directory under the root directiory of the CF card. Views System view Default command level...
  • Page 78: Info-Center Loghost Source

    Parameters vpn-instance vpn-instance-name: Specifies an MPLS L3VPN by its name, a case-sensitive string of 1 to 31 characters. If the log host is on the public network, do not specify this option. ipv6 host-ipv6-address: Specifies the IPv6 address of a log host. host-ipv4-address: Specifies the IPv4 address of a log host.
  • Page 79 undo info-center loghost source Default The source IP address of output log information is the primary IP address of the matching route's egress interface. Views System view Default command level 2: System level Parameters interface-type interface-number: Specifies the egress interface for log information by the interface type and interface number.
  • Page 80: Info-Center Monitor Channel

    info-center monitor channel Use info-center monitor channel to configure the monitor channel. The system uses this channel to output information to the monitor. Use undo info-center monitor channel to restore the default monitor output channel. Syntax info-center monitor channel { channel-number | channel-name } undo info-center monitor channel Default The system outputs information to the monitor through channel 1 (monitor).
  • Page 81: Info-Center Source

    Parameters channel-number: Specifies a channel by its number, in the range of 0 to 9. channel-name: Specifies a channel by its name, a default name or a self-defined name. For how to configure a channel name, see the info-center channel name command. Examples # Output system information to the SNMP module through channel 6.
  • Page 82 Usage guidelines This command sets an output rule for a specified module or all modules. For example, you can output IP log information with a severity higher than warning to the log host, and output IP log information with a severity higher than informational to the log buffer.
  • Page 83: Info-Center Synchronous

    Trap Debug Destinatio Source Output Output Output modules Severity Severity Severity switch switch switch supported Enabled Debug interface modules Log file supported Enabled Debug Enabled Debug Disabled Debug modules Examples # Output VLAN module's trap information with a severity level of at least emergency to the console channel.
  • Page 84: Info-Center Timestamp

    At this time, the system receives log information. It displays the log information first, and then displays the user's previous input, which is display current- in this example. %May 21 14:33:19:425 2007 Sysname SHELL/4/LOGIN: VTY login from 192.168.1.44 [Sysname] display current- Enter configuration to complete your input of the display current-configuration command, and press the Enter key to execute the command.
  • Page 85: Info-Center Timestamp Loghost

    date: Sets the timestamp format as "Mmm dd hh:mm:ss:sss yyyy", such as Dec 8 10:12:21:708 2007. The date time shows the current system time. Mmm: Abbreviations of the months in English, which could be Jan, Feb, Mar, Apr, May, Jun, Jul, •...
  • Page 86: Info-Center Trapbuffer

    Views System view Default command level 2: System level Parameters date: Sets the timestamp format as "Mmm dd hh:mm:ss:ms yyyy", such as Dec 8 10:12:21:708 2007. The actual format depends on the log host. iso: Sets the ISO 8601 timestamp format. For example, 2009-09-21T15:32:55. no-year-date: Sets the timestamp format as the current system date and time without year.
  • Page 87: Logfile Save

    Usage guidelines The info-center trapbuffer command takes effect only after the information center is enabled with the info-center enable command. Examples # Output system information to the trap buffer through the default channel, and set the trap buffer size to <Sysname>...
  • Page 88: Reset Trapbuffer

    reset trapbuffer Use reset trapbuffer to clear the trap buffer. Syntax reset trapbuffer Views User view Default command level 3: Manage level Examples # Clear the trap buffer. <Sysname> reset trapbuffer terminal debugging Use terminal debugging to enable the display of debug information on the current terminal. Use undo terminal debugging to disable the display of debug information on the current terminal.
  • Page 89: Terminal Monitor

    Use undo terminal logging to disable the display of log information on the current terminal. Syntax terminal logging undo terminal logging Default The display of log information on the current terminal is enabled. Views User view Default command level 1: Monitor level Usage guidelines To view log information, execute the terminal monitor and terminal logging commands, and then enable the information center (enabled by default).
  • Page 90: Terminal Trapping

    The configuration of this command is only valid for the current connection between the terminal and the device. If a new connection is established, the monitoring of system information on the terminal restores the default. Examples # Enable the monitoring of system information on the current terminal. <Sysname>...
  • Page 91: Snmp Commands

    SNMP commands display snmp-agent community Use display snmp-agent community to display SNMPv1 and SNMPv2c community information. Syntax display snmp-agent community [ read | write ] [ | { begin | exclude | include } regular-expression ] Views Any view Default command level 1: Monitor level Parameters read: Displays information about SNMP read-only communities.
  • Page 92: Display Snmp-Agent Group

    Table 20 Command output Field Description Displays the community name created by using the snmp-agent Community name community command or the username created by using the snmp-agent usm-user { v1 | v2c } command. SNMP group name: • If the community is created by using the snmp-agent community command, the group name is the same as the community name.
  • Page 93 begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Usage guidelines If no group is specified, the command displays information about all SNMP groups.
  • Page 94: Display Snmp-Agent Local-Engineid

    display snmp-agent local-engineid Use display snmp-agent local-engineid to display the local SNMP engine ID. Syntax display snmp-agent local-engineid [ | { begin | exclude | include } regular-expression ] Views Any view Default command level 1: Monitor level Parameters |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.
  • Page 95 |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression.
  • Page 96: Display Snmp-Agent Statistics

    Field Description MIB Subtree MIB subtree covered by the MIB view. Subtree mask MIB subtree mask. Storage-type Type of the medium where the subtree view is stored. Access privilege for the MIB subtree in the MIB view: • Included—All objects in the MIB subtree are accessible in the MIB view.
  • Page 97 2 MIB objects altered successfully 7 GetRequest-PDU accepted and processed 7 GetNextRequest-PDU accepted and processed 1653 GetBulkRequest-PDU accepted and processed 1669 GetResponse-PDU accepted and processed 2 SetRequest-PDU accepted and processed 0 Trap PDUs accepted and processed 0 Alternate Response Class PDUs dropped silently 0 Forwarded Confirmed Class PDUs dropped silently Table 23 Command output Field...
  • Page 98: Display Snmp-Agent Sys-Info

    If no keyword is specified, the command displays all SNMP agent system information. Examples # Display SNMP agent system information. <Sysname> display snmp-agent sys-info The contact person for this managed node: Hangzhou H3C Technologies Co., Ltd. The physical location of this node: Hangzhou, China SNMP version running in the system: SNMPv3...
  • Page 99: Display Snmp-Agent Trap Queue

    display snmp-agent trap queue Use display snmp-agent trap queue to display basic information about the trap queue, including the trap queue name, queue length, and number of traps in the queue. Syntax display snmp-agent trap queue [ | { begin | exclude | include } regular-expression ] Views Any view Default command level...
  • Page 100: Display Snmp-Agent Usm-User

    Views Any view Default command level 1: Monitor level Parameters |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression.
  • Page 101 Views Any view Default command level 1: Monitor level Parameters engineid engineid: Displays SNMPv3 user information for the SNMP engine ID identified by engineid. When an SNMPv3 user is created, the system records the local SNMP entity engine ID. The user becomes invalid when the engine ID changes and becomes valid again when the recorded engine ID is restored.
  • Page 102: Enable Snmp Trap Updown

    Field Description Engine ID Engine ID for an SNMP entity. Storage type: • volatile. • nonvolatile. Storage-type • permanent. • readOnly. • other. UserStatus SNMP user status. Related commands snmp-agent usm-user v3 enable snmp trap updown Use enable snmp trap updown to enable link state traps on an interface. Use undo enable snmp trap updown to disable link state traps on an interface.
  • Page 103: Snmp-Agent

    snmp-agent Use snmp-agent to enable the SNMP agent. Use undo snmp-agent to disable the SNMP agent. Syntax snmp-agent undo snmp-agent Default The SNMP agent is disabled. Views System view Default command level 3: Manage level Usage guidelines The snmp-agent command is optional for an SNMP configuration task. The SNMP agent is automatically enabled when you perform any command that begins with snmp-agent except for the snmp-agent calculate-password and snmp-agent ifmib long-ifindex enable commands.
  • Page 104: Snmp-Agent Community

    the two authentication algorithms. MD5 is faster but less secure than SHA- 1 . For more information about these algorithms, see Security Configuration Guide. 3desmd5: Converts the plaintext privacy key to an encrypted key for 3DES encryption used together • with MD5 authentication.
  • Page 105 Default command level 3: Manage level Parameters read: Assigns the specified community the read only access to MIB objects. A read-only community can only inquire MIB information. write: Assigns the specified community the read and write access to MIB objects. A read and write community can configure MIB information.
  • Page 106: Snmp-Agent Group

    [Sysname-acl-basic-2001] rule deny source any [Sysname-acl-basic-2001] quit [Sysname] snmp-agent sys-info version v2c [Sysname] snmp-agent community write writeaccess acl 2001 # Create the read and write community wr-sys-acc so an NMS can use the protocol SNMPv1 or SNMPv2c, community name wr-sys-acc to read and set the MIB objects in the system subtree (OID 1.3.6.1.2.1.1).
  • Page 107: Snmp-Agent Local-Engineid

    authentication: Specifies the security model of the SNMPv3 group to be authentication only (without privacy). privacy: Specifies the security model of the SNMPv3 group to be authentication and privacy. read-view view-name: Specifies a read-only MIB view. The view-name represents a MIB view, a string of 1 to 32 characters.
  • Page 108: Snmp-Agent Log

    Views System view Default command level 3: Manage level Parameters engineid: Specifies an SNMP engine ID as a hexadecimal string. It must comprise an even number of hexadecimal characters, in the range of 10 to 64. All-zero and all-F strings are invalid. Usage guidelines An SNMP engine ID uniquely identifies an SNMP entity in an SNMP managed network.
  • Page 109: Snmp-Agent Ifmib Long-Ifindex Enable

    Usage guidelines Use SNMP logging to record the SNMP operations performed on the SNMP agent for auditing NMS behaviors. The SNMP agent sends log data to the information center. You can configure the information center to output the data to a specific destination as needed. Examples # Enable logging SNMP GET operations.
  • Page 110 Syntax snmp-agent mib-view { excluded | included } view-name oid-tree [ mask mask-value ] undo snmp-agent mib-view view-name Default The system creates the ViewDefault view when the SNMP agent is enabled. In the default MIB view, all MIB objects in the iso subtree but the snmpUsmMIB, snmpVacmMIB, and snmpModules.18 subtrees are accessible.
  • Page 111: Snmp-Agent Packet Max-Size

    Related commands snmp-agent community • snmp-agent group • snmp-agent packet max-size Use snmp-agent packet max-size to set the maximum size (in bytes) of SNMP packets that the SNMP agent can receive or send. Use undo snmp-agent packet max-size to restore the default packet size. Syntax snmp-agent packet max-size byte-count undo snmp-agent packet max-size...
  • Page 112: Snmp-Agent Sys-Info

    { contact | location | version { all | { v1 | v2c | v3 }* } } Default The contact is Hangzhou H3C Technologies Co., Ltd., the location is Hangzhou, China, and the SNMP version is SNMPv3.
  • Page 113: Snmp-Agent Target-Host

    Examples # Configure the system contact as Dial System Operator at beeper # 27345. <Sysname> system-view [Sysname] snmp-agent sys-info contact Dial System Operator at beeper # 27345 snmp-agent target-host Related commands display snmp-agent sys-info snmp-agent target-host Use snmp-agent target-host to configure a target host for receiving traps sent by the SNMP agent. Use undo snmp-agent target-host to remove settings for an SNMP trap target host.
  • Page 114: Snmp-Agent Trap Enable

    authentication: Specifies the security model to be authentication without privacy. You must specify • the authentication key when you create the SNMPv3 user. privacy: Specifies the security model to be authentication with privacy. You must specify the • authentication key and privacy key when you create the SNMPv3 user. Usage guidelines Make sure the SNMP agent uses the same UDP port number as the target host for traps.
  • Page 115 vifcfgerror | virifauthfail | virifrxbadpkt | virifstatechange | viriftxretransmit | virnbrstatechange ] * | pim [ candidatebsrwinelection | electedbsrlostelection | interfaceelection | invalidjoinprune | invalidregister | neighborloss | rpmappingchange ] * | standard [ authentication | coldstart | linkdown | linkup | warmstart ]* | system | vrrp [ authfailure | newmaster ] ] Default Traps are enabled.
  • Page 116: Snmp-Agent Trap If-Mib Link Extended

    pim: Enables SNMP traps for the PIM module. • candidatebsrwinelection: Traps for the winning of a candidate-bootstrap router (C-BSR) in bootstrap router (BSR) election. electedbsrlostelection: Traps for losing the BSR election. • interfaceelection: Traps for the election of a new DR or DF on an interface. •...
  • Page 117: Snmp-Agent Trap Life

    Syntax snmp-agent trap if-mib link extended undo snmp-agent trap if-mib link extended Default The SNMP agent sends standard linkUp/linkDown traps. Views System view Default command level 3: Manage level Usage guidelines The extended linkUp and linkDown traps add interface description and interface type to the standard linkUp and linkDown traps for fast failure point identification.
  • Page 118: Snmp-Agent Trap Queue-Size

    Default The holding time of SNMP traps in the queue is 120 seconds. Views System view Default command level 3: Manage level Parameters seconds: Specifies the timeout time, in the range of 1 to 2592000 seconds. Usage guidelines The SNMP module sends traps in queues. As soon as the traps are saved in the trap queue, a timer is started.
  • Page 119: Snmp-Agent Trap Source

    reaches the configured value, the newly generated traps are saved into the queue, and the earliest ones are discarded. Examples # Set the maximum number of traps that can be stored in the trap sending queue to 200. <Sysname> system-view [Sysname] snmp-agent trap queue-size 200 Related commands •...
  • Page 120: Snmp-Agent Usm-User { V1 | V2C

    Related commands snmp-agent target-host • snmp-agent trap enable • snmp-agent usm-user { v1 | v2c } Use snmp-agent usm-user { v1 | v2c } to add a user to an SNMPv1 or SNMPv2c group. Use undo snmp-agent usm-user { v1 | v2c } to delete a user from an SNMPv1 or SNMPv2c group. Syntax snmp-agent usm-user { v1 | v2c } user-name group-name [ acl acl-number | acl ipv6 ipv6-acl-number ] undo snmp-agent usm-user { v1 | v2c } user-name group-name...
  • Page 121: Snmp-Agent Usm-User V3

    <Sysname> system-view [Sysname] snmp-agent sys-info version v2c [Sysname] snmp-agent group v2c readCom [Sysname] snmp-agent usm-user v2c userv2c readCom # Add the user userv2c in the SNMPv2c group readCom so only the NMS at 1.1.1.1 can use the protocol SNMPv2c and read-only community name userv2c to access the SNMP agent. <Sysname>...
  • Page 122 auth-password: Specifies a case-sensitive plaintext or encrypted authentication key. A plaintext key is a string of 1 to 64 visible characters. If the cipher and md5 keywords are specified, auth-password represents a hexadecimal string of 32 characters or a non-hexadecimal string of 53 characters. If the cipher and sha keywords are specified, auth-password is a hexadecimal string of 40 characters or a non-hexadecimal string of 57 characters.
  • Page 123 that in the snmp-agent usm-user v3 cipher command, make sure the same encryption algorithm is specified for the two commands and the local engine ID specified in the snmp-agent usm-user v3 cipher command is consistent with the SNMP entity engine ID specified in the snmp-agent calculate-password command.
  • Page 124: Mib Configuration Commands

    H3C network management software based on the MIB style. Examples # After getting the device ID from node sysObjectID, you find that it is an H3C device, and hope to know the current MIB style or the MIB style after next boot of the device.
  • Page 125 H3C enterprise ID 25506, and private MIB is located under the enterprise ID 201 1. new: Specifies the MIB style of the device as H3C new, which means both sysOID and private MIB of the device are located under the H3C enterprise ID 25506.
  • Page 126: Rmon Configuration Commands

    RMON configuration commands display rmon alarm Use display rmon alarm to display RMON alarm entries. Syntax display rmon alarm [ entry-number ] [ | { begin | exclude | include } regular-expression ] Views Any view Default command level 1: Monitor level Parameters entry-number: Specifies the index of an RMON alarm entry, which ranges from 1 to 65535.
  • Page 127: Display Rmon Event

    Table 27 Command output Field Description Status of the alarm entry entry-number created by the owner is status. • entry-number—Alarm entry, corresponding to the MIB node alarmIndex. • owner—Entry owner, corresponding to the MIB node alarmOwner. AlarmEntry entry-number owned by owner is •...
  • Page 128 Default command level 1: Monitor level Parameters entry-number: Specifies the index of an RMON event entry, which ranges from 1 to 65535. If no entry is specified, the command displays the configuration of all event entries. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.
  • Page 129: Display Rmon Eventlog

    Field Description Time when the last event was triggered, corresponding to the MIB last triggered at node eventLastTimeSent. Related commands rmon event display rmon eventlog Use display rmon eventlog to display log information for the specified or all event entries. Syntax display rmon eventlog [ entry-number ] [ | { begin | exclude | include } regular-expression ] Views...
  • Page 130: Display Rmon History

    Table 29 Command output Field Description LogEntry Event entry, corresponding to the MIB node logIndex. owned by Event entry owner, corresponding to the MIB node eventOwner. Entry status: • VALID—The entry is valid. • UNDERCREATION—The entry is invalid. VALID The display rmon command can display invalid entries, but the display current-configuration and display this commands do not display their settings.
  • Page 131 Examples # Display RMON history control entry and history sampling information for GigabitEthernet 1/0/1. <Sysname> display rmon history gigabitethernet 1/0/1 HistoryControlEntry 1 owned by null is VALID Samples interface : GigabitEthernet1/0/1<ifIndex.1> Sampling interval : 10(sec) with 5 buckets max Sampled values of record 1 : dropevents , octets : 3166...
  • Page 132 Field Description Entry status: • VALID—The entry is valid. • UNDERCREATION—The entry is invalid. VALID The display rmon command can display invalid entries, but the display current-configuration and display this commands do not display their settings. Status value is stored in the MIB node historyControlStatus. Samples Interface Sampled interface.
  • Page 133: Display Rmon Prialarm

    Field Description Number of colliding packets received during the sampling collisions period, corresponding to the MIB node etherHistoryCollisions. Bandwidth utilization during the sampling period, utilization corresponding to the MIB node etherHistoryUtilization. Related commands rmon history display rmon prialarm Use display rmon prialarm to display the configuration of the specified or all private alarm entries. Syntax display rmon prialarm [ entry-number ] [ | { begin | exclude | include } regular-expression ] Views...
  • Page 134: Display Rmon Statistics

    Table 31 Command output Field Description PrialarmEntry Entry of the private alarm table. owned by Owner of the entry, user1 in this example. Entry status: • VALID—The entry is valid. • UNDERCREATION—The entry is invalid. VALID The display rmon command can display invalid entries, but the display current-configuration and display this commands do not display their settings.
  • Page 135 begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Usage guidelines This command displays the interface statistics during the period from the time the statistics entry is created to the time the command is executed.
  • Page 136: Rmon Alarm

    Field Description Number of undersize packets received by the interface during the etherStatsUndersizePkts statistical period, corresponding to the MIB node etherStatsUndersizePkts. Number of oversize packets received by the interface during the etherStatsOversizePkts statistical period, corresponding to the MIB node etherStatsOversizePkts. Number of undersize packets with CRC errors received by the etherStatsFragments interface during the statistical period, corresponding to the MIB node...
  • Page 137 undo rmon alarm entry-number Views System view Default command level 2: System level Parameters entry-number: Specifies an alarm entry index, which ranges from 1 to 65535. alarm-variable: Specifies an alarm variable, a string of 1 to 256 characters. It can be in dotted object identifier (OID) format (in the format of entry.integer.instance or leaf node name.instance, for example, 1.3.6.1.2.1.2.1.10.1), or a node name like ifInOctets.1.
  • Page 138: Rmon Event

    Ethernet interface with the rmon history command. Otherwise, although the alarm entry can be created, no alarm event is triggered. An entry cannot be created if the values of the specified alarm variable (alarm-variable), sampling interval (sampling-interval), sampling type (absolute or delta), rising threshold (threshold-value1) and falling threshold (threshold-value2) are identical to those of the existing alarm entry in the system.
  • Page 139: Rmon History

    Views System view Default command level 2: System level Parameters entry-number: Specifies an event entry index, which ranges from 1 to 65535. description string: Specifies an event description, a string of 1 to 127 characters. log: Logs the event when it occurs. log-trap log-trapcommunity: Log and trap events.
  • Page 140: Rmon Prialarm

    Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Default command level 2: System level Parameters entry-number: Specifies a history control entry index, which ranges 1 to 65535. buckets number: Sets a history table size for the entry, which ranges from 1 to 65535. The number varies by devices.
  • Page 141 undo rmon prialarm entry-number Views System view Default command level 2: System level Parameters entry-number: Specifies the index of a private alarm entry, which ranges from 1 to 65535. prialarm-formula: Specifies a private alarm variable formula, a string of 1 to 256 characters. The variables in the formula must be represented in OID format that starts with a point ".", the formula (.1.3.6.1.2.1.2.1.10.1)*8 for example.
  • Page 142: Rmon Statistics

    Before creating an alarm entry, define the events to be referenced in the event table with the rmon event command. An entry cannot be created if the values of the specified alarm variable formula (prialarm-formula), sampling type (absolute changeratio or delta), rising threshold (threshold-value1) and falling threshold (threshold-value2) are identical to those of the existing alarm entry in the system.
  • Page 143 Syntax rmon statistics entry-number [ owner text ] undo rmon statistics entry-number Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Default command level 2: System level Parameters entry-number: Specifies the index of statistics entry, which ranges from 1 to 65535. owner text: Specifies the entry owner, a string of case-sensitive 1 to 127 characters that can contain spaces.
  • Page 144: Port Mirroring Configuration Commands

    Port mirroring configuration commands Both Layer 2 and Layer 3 Ethernet interfaces support the port mirroring function. The term "interface" in this chapter collectively refers to these two types of interfaces. You can use the port link-mode command to configure an Ethernet port as a Layer 2 or Layer 3 interface (see Layer 2—LAN Switching Configuration Guide).
  • Page 145: Mirroring-Group

    mirroring port: GigabitEthernet1/0/1 inbound GigabitEthernet1/0/2 both monitor port: GigabitEthernet1/0/3 mirroring-group 2: type: remote-source status: active mirroring port: GigabitEthernet1/0/4 both reflector port: monitor egress port: GigabitEthernet1/0/8 remote-probe VLAN: 2 mirroring-group 3: type: remote-destination status: active monitor port: GigabitEthernet1/0/7 remote-probe VLAN: 3 Table 33 Command output Field Description...
  • Page 146: Mirroring-Group Mirroring-Port

    remote-destination: Creates a remote destination group or removes all remote destination groups with the undo command. remote-source: Creates a remote source group or removes all remote source groups with the undo command. Usage guidelines To mirror packets from a port to another port on the same device, create a local mirroring group. To mirror packets from a port (a source port) on the current device to another port (the monitor port) either on the same device or on a different device, create remote mirroring groups.
  • Page 147: Mirroring-Group Monitor-Egress

    Usage guidelines You cannot configure source ports for a remote destination group. When removing a source port from a mirroring group, make sure the traffic direction you specified in the undo mirroring-group mirroring-port command matches the actual monitored direction specified earlier in the mirroring-group mirroring-port command.
  • Page 148: Mirroring-Group Monitor-Port

    monitor-egress-port: Specifies a port to be configured as the egress port. It takes the form of interface-type interface-number, where interface-type specifies the port type and interface-number specifies the port number. Usage guidelines You can configure an egress port for a remote source group only, not for other types of mirroring groups. Examples # Create remote source group 1, and configure port GigabitEthernet 1/0/1 as its egress port in system view.
  • Page 149: Mirroring-Group Reflector-Port

    Usage guidelines You cannot configure a monitor port for a remote source group. You cannot assign a source port in an existing mirroring group to another mirroring group as the monitor port. Examples # Create local mirroring group 1, and configure port GigabitEthernet 1/0/1 as its monitor port. <Sysname>...
  • Page 150: Mirroring-Group Remote-Probe Vlan

    Usage guidelines You can configure a reflector port for a remote source group only, not for other types of mirroring groups. Examples # Create remote source group 1, and configure port GigabitEthernet 1/0/1 as its reflector port in system view. <Sysname>...
  • Page 151: Mirroring-Port

    Only a static VLAN that already exists can be configured as a remote probe VLAN. A VLAN can serve as the remote probe VLAN for only one mirroring group. To delete a VLAN that is configured as a remote probe VLAN, remove the remote probe VLAN configuration first.
  • Page 152: Monitor-Port

    Examples # Create local mirroring group 1, configure GigabitEthernet 1/0/1 as a source port of the mirroring group, and specify that the mirroring group monitor the bidirectional traffic of the port. <Sysname> system-view [Sysname] mirroring-group 1 local [Sysname] interface gigabitethernet 1/0/1 [Sysname-GigabitEthernet1/0/1] mirroring-group 1 mirroring-port both # Create remote source group 2, configure GigabitEthernet 1/0/2 as a source port of the mirroring group, and specify that the mirroring group monitor the bidirectional traffic of the port.
  • Page 153: Uni Mirroring-Port

    [Sysname] mirroring-group 2 remote-destination [Sysname] interface gigabitethernet 1/0/2 [Sysname-GigabitEthernet1/0/2] monitor-port Related commands mirroring-group uni mirroring-port Use uni mirroring-port to configure a UNI as the mirroring port. Use undo uni mirroring-port to cancel the configuration of a UNI as the mirroring port. Syntax uni uni-number mirroring-port { both | inbound | outbound } undo uni uni-number mirroring-port...
  • Page 154 Default command level 2: System level Parameters uni-number: Specifies the UNI number, in the range of 1 to the number of UNI ports of the current ONU. The number of UNIs can be up to 80. Examples # Mirror the outbound packets on UNI 1 to UNI 2. <Sysname>...
  • Page 155: Traffic Mirroring Configuration Commands

    Traffic mirroring configuration commands The traffic mirroring and remote traffic mirroring functions on the switch are implemented through the cooperation of a QoS policy and remote port mirroring. For the configuration commands about a QoS policy, see ACL and QoS Command Reference. mirror-to Use mirror-to to configure traffic mirroring for a traffic behavior.
  • Page 156: Nqa Configuration Commands

    NQA configuration commands NQA client configuration commands advantage-factor Use advantage-factor to configure the advantage factor that is used to count Mean Opinion Scores (MOS) and Calculated Planning Impairment Factor (ICPIF) values. Use undo advantage-factor to restore the default. Syntax advantage-factor factor undo advantage-factor Default The advantage factor is 0.
  • Page 157: Data-Fill

    Syntax codec-type { g71 1a | g71 1u | g729a } undo codec-type Default The codec type for the voice operation is G.71 1 A-law. Views Voice operation view Default command level 2: System level Parameters g71 1a: Specifies G.71 1 A-law codec type. g71 1u: Specifies G.71 1 μ-law codec type g729a: Specifies G.729 A-law codec type.
  • Page 158: Data-Size

    If the payload length is greater than the string length, the system fills the payload with the string • cyclically until the payload is full. For example, if you configure the string as abcd and the payload size as 6 bytes, abcdab is filled. How the string is filled varies with operation types: For the ICMP echo operation, the string fills the whole payload of ICMP echo requests.
  • Page 159: Description (Any Nqa Operation View)

    Test type Codec type Default value (in bytes) Voice G.711 μ-law Voice G.729 A-law Configure the size of the payload in each probe packet properly: If the traffic amount is large in the network, configure a smaller payload size to reduce network burden; if runt packets are required to be transmitted in the network, configure a bigger payload size to avoid packet loss.
  • Page 160: Destination Port

    Syntax destination ip ip-address undo destination ip Default No destination IP address is configured for the operation. Views DLSw operation view, FTP operation view, DNS operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation view, UDP echo operation view, UDP jitter operation view, voice operation view Default command level 2: System level...
  • Page 161: Display Nqa History

    Examples # Configure the destination port number of the UDP echo operation as 9000. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-echo [Sysname-nqa-admin-test-udp-echo] destination port 9000 display nqa history Use display nqa history to display the history records of the specified or all NQA operations. Syntax display nqa history [ admin-name operation-tag ] [ | { begin | exclude | include } regular-expression ] Views...
  • Page 162: Display Nqa Reaction Counters

    Succeeded 2011-04-29 20:54:24.5 Succeeded 2011-04-29 20:54:24.1 Succeeded 2011-04-29 20:54:23.8 Succeeded 2011-04-29 20:54:23.4 Table 35 Command output Field Description Index History record number. Round-trip time if the operation succeeds, timeout time upon timeout, or 0 if the Response operation cannot be completed (in milliseconds). Status value of test results: •...
  • Page 163 Usage guidelines If the threshold type is average value, or the monitored performance metric is ICPIF or MOS in the voice operation, the monitoring results are invalid. The monitoring results are accumulated since the NQA operation starts and are not cleared after the operation completes.
  • Page 164: Display Nqa Result

    Monitored Threshold performance Collect data in Checked Num Over-threshold Num type metric Number of packets of Number of packets which the round-trip Packets sent after the Accumulate sent after the time exceeds the operation starts operation starts threshold after the operation starts Average Number of packets of...
  • Page 165 Examples # Display the result of the UDP jitter operation. <Sysname> display nqa result admin test NQA entry (admin admin, tag test) test results: Destination IP address: 192.168.1.42 Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 15/46/26 Square-Sum of round trip time: 8103 Last succeeded probe time: 2011-05-29 10:56:38.7 Extended results:...
  • Page 166 Extended results: Packet loss in test: 100% Failures due to timeout: 1000 Failures due to disconnect: 0 Failures due to no connection: 0 Failures due to sequence error: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packet(s) arrived late: 0 Voice results: RTT number: 0...
  • Page 167 Field Description Max positive SD Maximum positive jitter from source to destination. Max positive DS Maximum positive jitter from destination to source. Positive SD number Number of positive jitters from source to destination. Positive DS number Number of positive jitters from destination to source. Positive SD sum Sum of positive jitters from source to destination.
  • Page 168: Display Nqa Statistics

    Field Description Square sum of DS delay Square sum of delays from destination to source. SD lost packet(s) Number of lost packets from the source to the destination. DS lost packet(s) Number of lost packets from the destination to the source. Lost packet(s) for unknown reason Number of lost packets for unknown reasons.
  • Page 169 NQA entry (admin admin, tag test) test statistics: NO. : 1 Destination IP address: 1.1.1.2 Start time: 2011-01-01 09:33:22.3 Life time: 23 seconds Send operation times: 100 Receive response times: 100 Min/Max/Average round trip time: 1/11/5 Square-Sum of round trip time: 24360 Extended results: Packet loss in test: 0% Failures due to timeout: 0...
  • Page 170 <Sysname> display nqa statistics admin test NQA entry (admin admin, tag test) test statistics: NO. : 1 Destination IP address: 1.1.1.2 Start time: 2011-01-01 09:33:45.3 Life time: 120 seconds Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 1/12/7 Square-Sum of round trip time: 620 Extended results: Packet loss in test: 0%...
  • Page 171 Table 39 Command output Field Description Statistics group number. Destination IP address IP address of the destination. Start time Time when the operation started. Life time Operation duration in seconds. Send operation times Number of probe packets sent. Receive response times Number of response packets received.
  • Page 172 Field Description Max negative DS Maximum absolute value among negative jitters from destination to source. Negative SD number Number of negative jitters from source to destination. Negative DS number Number of negative jitters from destination to source. Negative SD sum Sum of absolute values of negative jitters from source to destination.
  • Page 173: Filename

    Table 40 Description of the threshold monitoring fields Monitored Threshold Collect data in Checked Num Over-threshold Num performance metric type Number of Number of probes of Probes in the finished probes in which the duration Accumulate counting the counting exceeds the threshold in interval interval the counting interval...
  • Page 174: Frequency

    undo filename Default No file is specified. Views FTP operation view Default command level 2: System level Parameters filename: Specifies the name of a file, a case-sensitive string of 1 to 200 characters. Examples # Specify the file to be transferred between the FTP server and the FTP client as config.txt. <Sysname>...
  • Page 175: History-Record Enable

    history-record enable Use history-record enable to enable the saving of history records of an NQA operation. Use undo history-record enable to disable the history records saving function. Syntax history-record enable undo history-record enable Default The history records of an NQA operation are not saved. Views Any NQA operation view Default command level...
  • Page 176: History-Record Number

    Parameters keep-time: Specifies how long the history records can be saved. The time is in the range of 1 to 1440 minutes. Usage guidelines When an NQA operation completes, the timer starts. All the records are removed when the lifetime is reached.
  • Page 177: Http-Version

    http-version Use http-version to specify the HTTP version used in the HTTP operation. Use undo http-version to restore the default. Syntax http-version v1.0 undo http-version Default HTTP 1.0 is used in the HTTP operation. Views HTTP operation view Default command level 2: System level Parameters v1.0: Uses HTTP version 1.0.
  • Page 178: Next-Hop

    passive: Sets the data transmission mode to passive for the FTP operation. In this mode, the FTP client initiates a connection request. Examples # Set the data transmission mode to passive for the FTP operation. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] mode passive next-hop...
  • Page 179: Nqa Agent Enable

    Default No NQA operation is created. Views System view Default command level 2: System level Parameters admin-name: Specifies the name of the administrator creating the NQA operation, a case-insensitive string of 1 to 32 characters excluding hyphens (-). operation-tag: Specifies the tag of the operation, a case-insensitive string of 1 to 32 characters excluding hyphens (-).
  • Page 180: Nqa Agent Max-Concurrent

    Related commands nqa server enable nqa agent max-concurrent Use nqa agent max-concurrent to configure the maximum number of operations that the NQA client can simultaneously perform. Use undo nqa agent max-concurrent to restore the default. Syntax nqa agent max-concurrent number undo nqa agent max-concurrent Default The maximum number of operations that the NQA client can simultaneously perform is two.
  • Page 181: Operation (Ftp Operation View)

    start-time: Specifies the start time and date of the NQA operation. hh:mm:ss: Specifies the start time of an NQA operation. yyyy/mm/dd: Specifies the start date of an NQA operation. The default value is the current system time, and yyyy is in the range of 2000 to 2035. now: Starts the operation immediately.
  • Page 182: Operation (Http Operation View)

    Usage guidelines When you execute the put command, the NQA client creates a file named file-name of fixed size on the FTP server. The file-name argument does not represent any file on the NQA client. When you execute the get command, the client does not save the file obtained from the FTP server. Examples # Specify the operation type for the FTP operation as put.
  • Page 183: Password (Ftp Operation View)

    undo operation interface Default No interface is specified to perform the DHCP operation. Views DHCP operation view Default command level 2: System level Parameters interface-type interface-number: Specifies an interface by its type and number. Usage guidelines The specified interface simulates the DHCP client to acquire an IP address and it does not change its IP address.
  • Page 184: Probe Count

    Usage guidelines The passwords set in ciphertext or in plaintext are saved in the configuration file in ciphertext. Examples # Configure the password used for logging in to the FTP server as ftpuser. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] password simple ftpuser Related commands...
  • Page 185: Probe Packet-Interval

    This command is not available for the voice operation. The voice operation can perform only one probe. Examples # Configure the ICMP echo operation to perform 10 probes. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Syaname-nqa-admin-test-icmp-echo] probe count 10 probe packet-interval Use probe packet-interval to configure the interval for sending packets in the probe.
  • Page 186: Probe Packet-Timeout

    Default command level 2: System level Parameters packet-number: Specifies the number of packets to be sent per probe. The value is in the range of 10 to 1000 for the UDP jitter operation, and 10 to 60000 for the voice operation. Examples # Configure the UDP jitter probe to send 100 packets.
  • Page 187: Reaction Checked-Element Icpif

    Syntax probe timeout timeout undo probe timeout Default The timeout time of a probe is 3000 milliseconds. Views DHCP operation view, DNS operation view, DLSw operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation view, UDP echo operation view Default command level 2: System level Parameters...
  • Page 188: Reaction Checked-Element { Jitter-Ds | Jitter-Sd

    threshold-value: Specifies threshold values. upper-threshold: Specifies the upper threshold, in the range of 1 to 100. lower-threshold: Specifies the lower threshold, in the range of 1 to 100. It must not be greater than the upper threshold. action-type: Specifies what action to be triggered and it defaults to none. none: Displays results on the terminal display only;...
  • Page 189 jitter-ds: Specifies the destination-to-source jitter of each probe packet as the monitored element (or performance metric). jitter-sd: Specifies source-to-destination jitter of each probe packet as the monitored element. threshold-type: Specifies a threshold type. accumulate accumulate-occurrences: Specifies the maximum number of threshold violations in the operation.
  • Page 190: Reaction Checked-Element Mos

    reaction checked-element mos Use reaction checked-element mos to configure a reaction entry for monitoring the MOS value in the NQA operation. Use undo reaction to delete the specified reaction entry. Syntax reaction item-number checked-element threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number Default No reaction entry for monitoring the MOS value is configured.
  • Page 191: Reaction Checked-Element { Owd-Ds | Owd-Sd

    reaction checked-element { owd-ds | owd-sd } Use reaction checked-element { owd-ds | owd-sd } to configure a reaction entry for monitoring the one-way delay. Use undo reaction to delete the specified reaction entry. Syntax reaction item-number checked-element { owd-ds | owd-sd } threshold-value upper-threshold lower-threshold undo reaction item-number Default...
  • Page 192: Reaction Checked-Element Packet-Loss

    [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element owd-ds threshold-value 50 reaction checked-element packet-loss Use reaction checked-element packet-loss to configure a reaction entry for monitoring packet loss in the NQA operation. Use undo reaction to delete the specified reaction entry. Syntax reaction item-number checked-element packet-loss threshold-type accumulate accumulate-occurrences [ action-type { none | trap-only } ] undo reaction item-number Default...
  • Page 193: Reaction Checked-Element Probe-Duration

    reaction checked-element probe-duration Use reaction checked-element probe-duration to configure a reaction entry for monitoring the operation duration. Use undo reaction to delete the specified reaction entry. Syntax reaction item-number checked-element probe-duration threshold-type accumulate accumulate-occurrences | average | consecutive consecutive-occurrences } threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number Default...
  • Page 194: Reaction Checked-Element Probe-Fail (For Trap)

    Examples # Create reaction entry 1 for monitoring the average duration of ICMP echo operation. Set the upper threshold to 50 milliseconds and lower threshold to 5 milliseconds. Before the NQA operation starts, the initial state of the reaction entry is invalid. After the operation, the average probe duration is checked. If it exceeds the upper threshold, the state is set to over-threshold;...
  • Page 195: Reaction Checked-Element Probe-Fail (For Trigger)

    Views DHCP operation view, DLSw operation view, DNS operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation view, UDP echo operation view Default command level 2: System level Parameters item-number: Specifies a reaction entry ID, in the range of 1 to 10. threshold-type: Specifies a threshold type.
  • Page 196: Reaction Checked-Element Rtt

    Use undo reaction to remove the specified reaction entry. Syntax reaction item-number checked-element probe-fail threshold-type consecutive consecutive-occurrences action-type trigger-only undo reaction item-number Default No reaction entries are configured. Views DHCP operation view, DNS operation view, DLSw operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation view, UDP echo operation view Default command level 2: System level...
  • Page 197 Syntax reaction item-number checked-element rtt threshold-type { accumulate accumulate-occurrences | average } threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number Default No reaction entry for monitoring packet round-trip time is configured. Views UDP jitter operation view, voice operation view Default command level 2: System level Parameters...
  • Page 198: Reaction Trap

    # Create reaction entry 2 for monitoring the round-trip time of UDP jitter probe packets. Set the upper threshold to 50 milliseconds, and lower threshold to 5 milliseconds. Before the NQA operation starts, the initial state of the reaction entry is invalid. After the operation, the packet round-trip time is checked. If the total number of threshold violations exceeds 100 (included), the state of the entry is set to over-threshold;...
  • Page 199: Resolve-Target

    [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction trap probe-failure 5 resolve-target Use resolve-target to set the domain name for the DNS operation. Use undo resolve-target to restore the default. Syntax resolve-target domain-name undo resolve-target Default No domain name is configured. Views DNS operation view Default command level 2: System level Parameters...
  • Page 200: Source Interface

    Default command level 2: System level Usage guidelines When the routing table bypass function is enabled, the routing table is not searched, and the packet is sent directly to the destination in a directly connected network. Examples # Enable the routing table bypass function. <Sysname>...
  • Page 201: Source Ip

    Related commands source ip source ip Use source ip to configure the source IP address of probe packets. The specified source IP address must be the IP address of a local interface. The local interface must be up; otherwise, no probe packets can be sent out.
  • Page 202: Statistics Hold-Time

    undo source port Default No source port number is configured. Views SNMP operation view, UDP echo operation view, UDP jitter operation view, voice operation view Default command level 2: System level Parameters port-number: Specifies the source port number of probe packets, in the range of 1 to 50,000. Examples # Configure port 8000 as the source port of probe packets in the UDP echo operation.
  • Page 203: Statistics Max-Group

    [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] statistics hold-time 3 statistics max-group Use statistics max-group to configure the maximum number of statistics groups that can be saved. Use undo statistics max-group to restore the default. Syntax statistics max-group number undo statistics max-group Default 2 statistics groups at most can be saved.
  • Page 204: Tos

    Views DLSw operation view, DNS operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation view, UDP echo operation view, UDP jitter operation view, voice operation view Default command level 2: System level Parameters interval: Specifies the interval in minutes for collecting statistics for an NQA operation, in the range of 1 to 35791394.
  • Page 205: Ttl

    Examples # Configure the ToS value in an IP packet header of probe packets as 1. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] tos 1 Use ttl to specify the TTL for probe packets. Use undo ttl to restore the default. Syntax ttl value undo ttl...
  • Page 206: Url

    Views NQA operation view Default command level 2: System level Parameters dhcp: Specifies the DHCP operation type. dlsw: Specifies the DLSw operation type. dns: Specifies the DNS operation type. ftp: Specifies the FTP operation type. http: Specifies the HTTP operation type. icmp-echo: Specifies the ICMP echo operation type.
  • Page 207: Username (Ftp Operation View)

    Usage guidelines The character string of the configured URL cannot contain spaces. Examples # Configure the website URL that the HTTP operation visits as /index.htm. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] url /index.htm username (FTP operation view) Use username to configure a username used to log in to the FTP server.
  • Page 208: Nqa Server Configuration Commands

    undo vpn-instance Default The ICMP echo operation applies to the public network. Views ICMP echo operation view Default command level 2: System level Parameters vpn-instance-name: Specifies the name of the MPLS L3VPN, a case-sensitive string of 1 to 31 characters. Examples # Specify vpn1 as the MPLS L3VPN.
  • Page 209: Nqa Server Enable

    tcp-connect: IP Address Port Status 2.2.2.2 2000 active udp-echo: IP Address Port Status 3.3.3.3 3000 inactive Table 41 Command output Field Description tcp-connect TCP connect listening service. udp-echo UDP echo listening service. IP address specified for the TCP/UDP listening service on the NQA IP Address server.
  • Page 210: Nqa Server Tcp-Connect

    nqa server tcp-connect Use nqa server tcp-connect to configure a listening service to enable the NQA server to listen and respond to the specified IP address and port. Use undo nqa server tcp-connect to remove the TCP listening service. Syntax nqa server tcp-connect ip-address port-number undo nqa server tcp-connect ip-address port-number Views...
  • Page 211: Nqa Server Tos

    Default command level 2: System level Parameters ip-address: Specifies the IP address for the UDP echo listening service. port-number: Specifies the port number for the UDP listening service, in the range of 1 to 50000. Usage guidelines Configure the command on the NQA server for the UDP jitter, UDP echo, and voice operations only. The IP address and port number must be consistent with those configured on the NQA client and must be different from those of an existing UDP listening service.
  • Page 212 DSCP 1. The network devices use the DSCP value as a reference to determine the packet priority for transmission. Packets with different ToS values but the same DSCP value have the same priority. Usage guidelines This feature is available in S7500E Release 6703, S7508E-X Release 6903, and their later versions. Examples # Set the ToS value to 30 in the packets sent by the TCP listening service on the NQA server.
  • Page 213: Sflow Configuration Commands

    sFlow configuration commands display sflow Use display sflow to display the sFlow configuration and operation information. Syntax In standalone mode: display sflow [ slot slot-number ] [ | { begin | exclude | include } regular-expression ] In IRF mode: display sflow [ chassis chassis-number slot slot-number ] [ | { begin | exclude | include } regular-expression ] Views...
  • Page 214 6343 1400 6343 1400 6343 1400 6343 1400 6343 1400 6343 1400 sFlow Port Information: Interface CID Interval(s) FID MaxHLen Rate Mode Status GE1/0/1 1000 Random Active GE1/0/2 1000 Random Active Table 42 Command output Field Description sFlow Version sFlow version, which can only take the value of 5. sFlow Global Information Global sFlow information.
  • Page 215: Sflow Agent

    Specifies an IPv6 address for the sFlow agent. Usage guidelines H3C recommends that you manually configure an IP address for the sFlow agent. Only one IP address can be specified for the sFlow agent on the device. Examples # Specify IP address 10.10.10.1 for the sFlow agent.
  • Page 216: Sflow Counter Interval

    Default command level 2: System level Parameters collector-id: Specifies an ID for the sFlow collector, ranging from 1 to 10. vpn-instance vpn-instance-name: Specifies the VPN instance of the sFlow collector by name, a case-sensitive string of 1 to 31 characters that cannot contain spaces. By default, the sFlow collector belongs to the public network.
  • Page 217: Sflow Counter Collector

    Parameters interval-time: Specifies the counter sampling interval in seconds, in the range of 2 to 86400. Examples # Set the counter sampling interval to 120 seconds on GigabitEthernet 1/0/1. <Sysname> system-view [Sysname] interface gigabitethernet 1/0/1 [Sysname-GigabitEthernet1/0/1] sflow counter interval 120 sflow counter collector Use sflow counter collector to specify an sFlow collector for counter sampling.
  • Page 218: Sflow Flow Max-Header

    Default Flow sampling can copy up to 128 bytes of a packet. H3C recommends that you use the default value. Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Default command level...
  • Page 219: Sflow Sampling-Rate

    Default The default mode is random. Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Default command level 2: System level Parameters determine: Specifies the fixed sampling mode. For example, if the flow sampling interval is set to 4000 (by using the sflow sampling-rate command), the device randomly samples a packet, like the tenth packet, from the first 4000 packets.
  • Page 220: Sflow Source

    Parameters interval: Specifies the number of packets out of which flow sampling will sample a packet, ranging from 1000 to 500000. Usage guidelines The bigger the value of the interval argument, the lower the sampling rate. Examples # Set GigabitEthernet 1/0/1 to sample a packet out of 4000 packets. <Sysname>...
  • Page 221: Netstream Configuration Commands

    NetStream configuration commands display ip netstream cache Use display ip netstream cache to display the NetStream entry information in the cache. Syntax In standalone mode: display ip netstream cache [ verbose ] [ slot slot-number ] [ | { begin | exclude | include } regular-expression ] In IRF mode: display ip netstream cache [ verbose ] [ chassis chassis-number slot slot-number ] [ | { begin | exclude...
  • Page 222 IP active stream entry number MPLS active stream entry number L2 active stream entry number IPL2 active stream entry number IP stream entry been counted MPLS stream entry been counted L2 stream entry been counted IPL2 stream entry been counted Last statistics reset time : Never IP packet size distribution (0 total packets):...
  • Page 223: Display Ip Netstream Export

    Field Description Distribution of IP packets by packet size, and the bracketed number is the total number of IP packets. IP packet size distribution (1103746 total packets): The value is displayed in the proportion of number of IP packets to the total IP packets and is displayed with 3 decimal places. Range of IP packet length (excluding data link layer header) in 1-32 64 96 128 160 192 224 256 bytes.
  • Page 224 Syntax display ip netstream export [ | { begin | exclude | include } regular-expression ] Views Any view Default command level 1: Monitor level Parameters |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.
  • Page 225: Display Ip Netstream Template

    Field Description Version 5 exported UDP datagram Number of UDP packets that are sent in version 5 format (number of number (failed) packets not successfully sent). Version 9 exported stream number Number of flows that are exported in version 9 format. Version 9 exported UDP datagram Number of UDP packets that are sent in version 9 format (number of number (failed)
  • Page 226 Examples # Display information about the NetStream flow record template. <Sysname> display ip netstream template Stream template refresh-rate packet : 20 Stream template refresh-rate time(in minute) : 30 Active stream templates Added stream templates : 10 source-prefix outbound template: Template ID : 276 Packets Last template export time...
  • Page 227: Enable

    Field Description First switched System time when the first packet was switched in millisecond. Last switched System time when the last packet was switched in millisecond. Source mask Length of the source address mask. Input SNMP SNMP index of the input interface. Output SNMP SNMP index of the output interface.
  • Page 228: Ip Netstream Aggregation

    Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Default command level 3: Manage level Parameters inbound: Enables NetStream for incoming traffic. outbound: Enables NetStream for outgoing traffic. Examples # Enable NetStream for incoming traffic on interface GigabitEthernet 1/0/1. <Sysname>...
  • Page 229: Ip Netstream Aggregation Advanced

    tos-protocol-port: Specifies the ToS-protocol-port aggregation by ToS, protocol number, source port, destination port, inbound interface index, and outbound interface index. tos-source-prefix: Specifies the ToS-source-prefix aggregation by ToS, source AS number, source prefix, source address mask length, and inbound interface index. Usage guidelines In the NetStream aggregation view, you can perform the following tasks: •...
  • Page 230: Ip Netstream Export Host

    Examples # Enable NetStream hardware aggregation. <Sysname> system-view [Sysname] ip netstream aggregation advanced Related commands ip netstream export host • ip netstream aggregation • ip netstream export host Use ip netstream export host to set the destination address and destination UDP port number for NetStream data export.
  • Page 231: Ip Netstream Export Rate

    NetStream traditional data are exported to all destination addresses configured in system view, and NetStream aggregation data are exported to all destination addresses configured in the related aggregation view. If you expect NetStream aggregation data only, configure the destination address in the aggregation view and do not configure the destination address in system view.
  • Page 232: Ip Netstream Export V9-Template Refresh-Rate Packet

    Different source interfaces can be configured in different aggregation views. If no source interface is configured in aggregation view, the source interface configured in system view is used. H3C recommends that you connect the network management interface to the NetStream server and configure it as the source interface. Examples # Configure the source interface for NetStream data export as VLAN-interface 1.
  • Page 233: Ip Netstream Export V9-Template Refresh-Rate Time

    Parameters packets: Specifies the number of packets that are sent before version 9 templates are sent to the NetStream server for an update. The value is in the range of 1 to 600. Usage guidelines Version 9 is template-based and supports user-defined formats, so the NetStream-enabled device needs to send the new template to the NetStream server for an update.
  • Page 234: Ip Netstream Export Version

    The refresh frequency and the refresh interval can be both configured, and the template is resent when either of the condition is reached. Examples # Configure the device to wait for 60 minutes before sending NetStream version 9 templates again to the NetStream server.
  • Page 235: Ip Netstream Filter

    Examples # Configure the device to export NetStream data in version 5 format and specify the NetStream data to include the source AS and destination AS. <Sysname> system-view [Sysname] ip netstream export version 5 origin-as ip netstream filter Use ip netstream filter to enable ACL-based NetStream filtering on an interface. Use undo ip netstream filter to disable the function.
  • Page 236: Ip Netstream Timeout Active

    Use undo ip netstream sampler to disable NetStream sampling. Syntax ip netstream sampler sampler-name { inbound | outbound } undo ip netstream sampler sampler-name { inbound | outbound } Default NetStream sampling is disabled. Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Default command level 3: Manage level Parameters...
  • Page 237: Ip Netstream Timeout Inactive

    You can configure both the aging timer for active flows and the aging timer for inactive flows. When either timer for a flow expires, the flow is aged out. The time precision is 10 seconds. Examples # Set the aging timer to 3 minutes for active flows. <Sysname>...
  • Page 238: Reset Ip Netstream Statistics

    Syntax netstream filter { deny | permit } undo netstream filter Views Traffic behavior view Default command level 2: System level Parameters deny: Specifies to forward packets without NetStream processing. permit: Specifies to perform NetStream processing for packets. Example # Configure the NetStream filtering action as permit for traffic behavior database. <Sysname>...
  • Page 239: Ipv6 Netstream Configuration Commands

    IPv6 NetStream configuration commands display ipv6 netstream cache Use display ipv6 netstream cache to display the IPv6 NetStream entry information in the cache. Syntax In standalone mode: display ipv6 netstream cache [ verbose ] [ slot slot-number ] [ | { begin | exclude | include } regular-expression ] In IRF mode: display ipv6 netstream cache [ verbose ] [ chassis chassis-number slot slot-number ] [ | { begin | exclude...
  • Page 240 IPv6 stream entries been counted : 10 MPLS stream entries been counted : 20 IPL2 stream entries been counted : 20 Last statistics reset time : 01/01/2000, 00:01:02 IPv6 packet size distribution (1103746 total packets): 1-32 .249 .694 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 576 1024 1536 2048 2560 3072 3584 4096 4608 >4608 .000 .000 .027 .000 .027 .000 .000 .000 .000 .000 .000 .000 Protocol...
  • Page 241: Display Ipv6 Netstream Export

    Field Description Range of IP packet size (excluding data link layer header) in bytes. In 1-32 64 96 128 160 192 224 the range of 1 to 576, the range increments in the step of 32. For 256 288 example, 1-32 shows the number of packets in size of 1 to 32 bytes, 320 352 384 416 448 480 512 and 64 shows the number of packets in size of 33 to 64 bytes.
  • Page 242: Display Ipv6 Netstream Template

    Parameters |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression.
  • Page 243 display ipv6 netstream template [ chassis chassis-number slot slot-number ] [ | { begin | exclude | include } regular-expression ] Views Any view Default command level 1: Monitor level Parameters slot slot-number: Displays IPv6 NetStream template information of a card. The slot-number argument specifies a card by its slot number.
  • Page 244 Sampling interval destination-prefix inbound template: Template ID : 294 Packets Last template export time : Never Field count : 13 Field type Field length (byte) --------------------------------------------------------------------------- Flows In packets In bytes First switched Last switched IPv6 destination address IPv6 destination mask IP protocol version Destination AS Output SNMP...
  • Page 245: Enable

    Field Description IPv6 destination mask Length of the IPv6 destination address mask. Output SNMP SNMP index of the output interface. Sampling interval Sampling rate. enable Use enable to enable current IPv6 NetStream aggregation. Use undo enable to disable current IPv6 NetStream aggregation. Syntax enable undo enable...
  • Page 246: Ipv6 Netstream Aggregation

    Parameters inbound: Filters incoming IPv6 traffic. outbound: Filters outgoing IPv6 traffic. Examples # Enable IPv6 NetStream for incoming traffic on interface GigabitEthernet 1/0/1. <Sysname> system-view [Sysname] interface GigabitEthernet1/0/1 [Sysname- GigabitEthernet1/0/1] ipv6 netstream inbound ipv6 netstream aggregation Use ipv6 netstream aggregation to set an IPv6 NetStream aggregation mode and enter the IPv6 NetStream aggregation view.
  • Page 247: Ipv6 Netstream Aggregation Advanced

    Related commands enable • ipv6 netstream export host • • ipv6 netstream export source ipv6 netstream aggregation advanced Use ipv6 netstream aggregation advanced to enable IPv6 NetStream hardware aggregation. Use undo ipv6 netstream aggregation advanced to disable IPv6 NetStream hardware aggregation. Syntax ipv6 netstream aggregation advanced undo ipv6 netstream aggregation advanced...
  • Page 248 ipv6 netstream export host ip-address udp-port [ vpn-instance vpn-instance-name ] undo ipv6 netstream export host [ ip-address [ vpn-instance vpn-instance-name ] ] Default No destination address or destination UDP port number is configured in system view or aggregation view. Views System view, NetStream aggregation view Default command level 3: Manage level...
  • Page 249: Ipv6 Netstream Export Rate

    Related commands ipv6 netstream aggregation • ipv6 netstream export source • ipv6 netstream export rate Use ipv6 netstream export rate to configure the limit on the IPv6 NetStream data export. Use undo ipv6 netstream export rate to remove the IPv6 NetStream data export limit. Syntax ipv6 netstream export rate rate undo ipv6 netstream export rate...
  • Page 250: Ipv6 Netstream Export V9-Template Refresh-Rate Packet

    Different source interfaces can be configured in different aggregation views. If no source interface is configured in NetStream aggregation view, the source interface configured in system view is used. H3C recommends that you connect the network management interface to the NSC and configure it as the source interface. Examples # Configure the source interface for IPv6 NetStream data export as Vlan-interface1.
  • Page 251: Ipv6 Netstream Export V9-Template Refresh-Rate Time

    Examples # Configure the device to wait until 100 packets are sent before sending NetStream version 9 templates again to the NetStream server. <Sysname> system-view [Sysname] ipv6 netstream export v9-template refresh-rate packet 100 Related commands ipv6 netstream export v9-template refresh-rate time ipv6 netstream export v9-template refresh-rate time Use ipv6 netstream export v9-template refresh-rate time to configure the refresh interval for IPv6 NetStream version 9 templates so that the templates are sent after the specified time period.
  • Page 252: Ipv6 Netstream Export Version 9

    ipv6 netstream export version 9 Use ipv6 netstream export version 9 to export IPv6 NetStream data in version 9 format, and choose whether to record data about AS and BGP next hop information. Use undo ipv6 netstream export version to restore the default. Syntax ipv6 netstream export version 9 [ origin-as | peer-as ] [ bgp-nexthop ] undo ipv6 netstream export version...
  • Page 253 Usage guidelines When you execute the command, messages appear telling you that the process of clearing the cache takes several minutes and the system does not perform NetStream during this process. Examples # Age out and export all IPv6 NetStream data and clear the cache. <Sysname>...
  • Page 254: Sampler Configuration Commands

    Sampler configuration commands display sampler Use display sampler to view configuration and running information about a sampler. Syntax In standalone mode: display sampler [ sampler-name ] [ slot slot-number ] [ | { begin | exclude | include } regular-expression ] In IRF mode: display sampler [ sampler-name ] [ chassis chassis-number slot slot-number ] [ | { begin | exclude | include } regular-expression ]...
  • Page 255: Sampler

    Field Description Index Index number identifying a sampler. Mode Sampling mode, which can only be fixed. Packet-interval Sampling rate. sampler Use sampler to create a sampler. Use undo sampler to delete a sampler. Syntax sampler sampler-name mode fixed packet-interval rate undo sampler sampler-name Views System view...
  • Page 256: Ipc Configuration Commands

    IPC configuration commands The display commands in this document display only information about active nodes. In standalone mode, "Local node" refers to the active MPU. In IRF mode, "Local node" refers to the global active MPU of the IRF fabric. display ipc channel Use display ipc channel to display channel information for a node.
  • Page 257: Display Ipc Link

    Table 50 Command output Field Description Channel number, which has been predefined and assigned by the ChannelID system. One channel number corresponds to one module. The display ipc channel command displays the numbers of the current active modules. Description information, which is generated by the internal software of the device, is used to describe the functions of a channel.
  • Page 258: Display Ipc Multicast-Group

    Table 51 Command output Field Description Dst-NodeID Number of the peer node. Link status: LinkStatus • UP—The connection has been established. • DOWN—The connection has been terminated. display ipc multicast-group Use display ipc multicast-group to display multicast group information for the specified node. Syntax display ipc multicast-group { node node-id | self-node } [ | { begin | exclude | include } regular-expression ]...
  • Page 259: Display Ipc Node

    Field Description ChannelID Channel number. display ipc node Use display ipc node to display node information. Syntax display ipc node [ | { begin | exclude | include } regular-expression ] Views Any view Default command level 1: Monitor level Parameters |: Filters command output by specifying a regular expression.
  • Page 260: Display Ipc Performance

    Parameters node node-id: Displays the packet statistics for the specified node, where node-id represents the number of the specified node. The value range for the node-id argument is 0 to 135. self-node: Displays the packet statistics for the local node. |: Filters command output by specifying a regular expression.
  • Page 261 Syntax display ipc performance { node node-id | self-node } [ channel channel-id ] [ | { begin | exclude | include } regular-expression ] Views Any view Default command level 1: Monitor level Parameters node node-id: Displays the IPC performance statistics for the specified node, where node-id represents the number of the specified node.
  • Page 262: Display Ipc Queue

    Table 55 Command output Field Description Peak rate in pps (average rate is computed every 10 seconds, Peak and the greatest average rate is taken as the peak rate). 10Sec Average rate (in pps) in the last 10 seconds. 1Min Average rate (in pps) in the last 1 minute.
  • Page 263: Ipc Performance Enable

    UNICAST 4096 UNICAST 4096 UNICAST 4096 UNICAST 4096 UNICAST 4096 UNICAST 4096 MULTICAST 4096 MULTICAST 4096 MULTICAST MULTICAST MULTICAST MULTICAST MIXCAST 2048 MIXCAST 2048 Table 56 Command output Field Description Queue type: • UNICAST—Unicast queue. QueueType • MULTICAST—Multicast (including broadcast) queue. •...
  • Page 264: Reset Ipc Performance

    Parameters node node-id: Enables IPC performance statistics for the specified node, where node-id represents the number of the specified node. The value range for the node-id argument is 0 to 135. self-node: Enables IPC performance statistics for the local node. channel channel-id: Enables IPC performance statistics for the specified channel, where channel-id represents the channel number.
  • Page 265: Apply Poe-Profile

    apply poe-profile Use apply poe-profile to apply the PoE configuration file to the current PoE interface. Use undo apply poe-profile to remove the application of the PoE configuration file to the current PoE interface. Syntax apply poe-profile { index index | name profile-name } undo apply poe-profile { index index | name profile-name } Views PoE interface view...
  • Page 266: Display Poe Device

    Views System view Default command level 2: System level Parameters index index: Index number of the PoE configuration file, in the range of 1 to 100. name profile-name: Name of the PoE configuration file, a string of 1 to 15 characters. interface-range: Range of Ethernet interface numbers, indicating multiple Ethernet interfaces.
  • Page 267: Display Poe Interface

    |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression.
  • Page 268 Default command level 1: Monitor level Parameters interface-type interface-number: Specifies an interface by its type and number. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression.
  • Page 269 Field Description Operating state of a PoE interface: • off—PoE is disabled. • on—Power is supplied for a PoE interface normally. • power-lack—The guaranteed remaining power of the PSE is not high enough to supply power for a critical PoE interface. Port Operating Status •...
  • Page 270: Display Poe Interface Power

    GE7/0/8 enabled searching GE7/0/9 enabled searching 1 port(s) on, 3.6 (W) consumed, 107.4 (W) remaining --- Table 59 Command output Field Description Chassis IRF member device ID. Interface Shortened form of a PoE interface. PoE state: Enable • enabled. • disabled.
  • Page 271 Syntax display poe interface power [ interface-type interface-number ] [ | { begin | exclude | include } regular-expression ] Views Any view Default command level 1: Monitor level Parameters interface-type interface-number: Specifies an interface by its type and number. |: Filters command output by specifying a regular expression.
  • Page 272: Display Poe Power-Usage

    Field Description Description of the PD connected with a PoE interface. When the description contains more than 34 PD Description characters, the first 30 characters followed by four dots are displayed. port(s) on Number of PoE interfaces that are supplying power. consumed Power currently consumed by all PoE interfaces.
  • Page 273 Getting detailed information of PoE and PSE is not successful. . # In IRF mode, display power information for the PoE power and all PSEs. <Sysname> display poe power-usage Chassis 1 : PoE Current Power PoE Max Power : 6720 PoE Remaining Allocated Power : 6681 PoE Total Powered Port Number...
  • Page 274: Display Poe Pse

    display poe pse Use display poe pse to display PSE power information. Syntax display poe pse [ pse-id ] [ | { begin | exclude | include } regular-expression ] Views Any view Default command level 1: Monitor level Parameters pse-id: PSE ID.
  • Page 275 PSE ID PSE Chassis No PSE Slot No PSE SubSlot No PSE Model : LSQ1FV48SA PSE Power Enabled : disabled PSE Power Preempted : no PSE Power Priority : low PSE Current Power : 0 W PSE Average Power : 0 W PSE Peak Power PSE Max Power : 37 W...
  • Page 276: Display Poe Pse Interface

    Field Description PSE CPLD Version PSE CPLD version. PSE Software Version PSE software version number. PSE Hardware Version PSE hardware version number. Nonstandard PD detection by the PSE: enabled or PSE Legacy Detection disabled. PSE Utilization-threshold PSE power alarm threshold. PSE Pse-policy Mode PSE power management policy mode.
  • Page 277: Display Poe Pse Interface Power

    GE1/0/16 enabled power-itself disabled GE1/0/17 disabled fault 2 port(s) on, 8.4(W) consumed, 28.6(W) Remaining --- Table 63 Command output Field Description Interface Shortened form of a PoE interface. PoE enabled/disabled state. For the value, see Table Enable Priority Priority of a PoE interface. For the value, see Table CurPower Current power of a PoE interface.
  • Page 278: Display Poe-Power

    Examples # Display power information for PoE interfaces connected with PSE 7. <Sysname> display poe pse 7 interface power Interface CurPower PeakPower MaxPower PD Description GE1/0/25 IP Phone on Room 309 for Peter Smith..GE1/0/26 15.4 IP Phone on Room 409 for Peter Pan GE1/0/27 15.0 15.3...
  • Page 279 Parameters chassis chassis-number: Displays information about the external PoE power supply for an IRF member device. The chassis-number argument represents the IRF member ID of the device. If no IRF member ID is specified, this command displays information about all PoE power supplies connected to the IRF fabric. (In IRF mode.) |: Filters command output by specifying a regular expression.
  • Page 280 PoE Power 1: Manufacturer : Tyco electronics Com Type : PSE4500-A Status : Normal PoE Power 2: Manufacturer : Tyco electronics Com Type : PSE4500-A Status : Normal Chassis 2 : PoE Current Power : 256 PoE Average Power : 253 PoE Peak Power : 256 PoE Max Power...
  • Page 281: Display Poe-Power Ac-Input State

    Field Description PoE Output-threshold Upper DC output overvoltage threshold. PoE Hardware Version PoE hardware version number. PoE Software Version PoE software version number. PoE Power Number Number of PoE power supplies. PoE Power PoE power supply ID. Manufacturer PoE power supply manufacturer. Type Type of the PoE power supply.
  • Page 282 specified, this command displays the AC input state of all PoE power supplies connected to the IRF fabric. (In IRF mode.) |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow.
  • Page 283: Display Poe-Power Alarm

    Field Description Output three-phase AC voltage state: • Normal—The output voltage is normal. • Under Limit—The voltage is below the lower limit. • Above Limit—The voltage is above the upper limit. Output AC Current A/B/C Alarm • Lack Phase—A phase is lost. •...
  • Page 284: Display Poe-Power Dc-Output State

    PSU 3 State : Normal # In IRF mode, display alarms present on the external PoE power supply connected to member device 2. <Sysname> display poe-power alarm chassis 2 Chassis 2 : PSU Number PSU 1 State : Normal PSU 2 State : Normal PSU 3 State : Normal...
  • Page 285: Display Poe-Power Dc-Output Value

    specified, this command displays the DC output state of all PoE power supplies connected to the IRF fabric. (In IRF mode.) |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow.
  • Page 286: Display Poe-Power Status

    include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Examples # In standalone mode, display DC output values of the external PoE power supply. <Sysname> display poe-power dc-output value DC Output Voltage : 53.91 V DC Output Current...
  • Page 287 <Sysname> display poe-power status Switch Number Switch 1 State : AC Switch High Voltage Switch 2 State : AC Switch Off Switch 3 State : AC Switch Off DC Output State : Normal DC Output Voltage : 53.91 DC Output Current : 4.75 Module Number Output AC Current A Alarm...
  • Page 288: Display Poe-Power Supervision-Module

    Field Description Volt Phase AB/BC/CA Alarm AC voltage input state. See Table display poe-power supervision-module Use display poe-power supervision-module to display PoE supervision module information. Syntax In standalone mode: display poe-power supervision-module [ | { begin | exclude | include } regular-expression ] In IRF mode: display poe-power supervision-module [ chassis chassis-number ] [ | { begin | exclude | include } regular-expression ]...
  • Page 289: Display Poe-Power Switch State

    <Sysname> display poe-power supervision-module Chassis 1 : Supervision Version : 2.7 Supervision Name : Summer Pms PoE Power Type : PSE1500-A PoE Current Power PoE Average Power PoE Peak Power PoE Nominal Power : 3000 PSU Available Number PSU 1: Nominal Output Power : 1500(W)(220V)/750(W)(110V) Hardware Version Info...
  • Page 290 Views Any view Default command level 1: Monitor level Parameters chassis chassis-number: Displays the power switch states of the external PoE power supply for an IRF member device. The chassis-number argument represents the IRF member ID of the device. If no IRF member ID is specified, this command displays the power switch states of all external PoE power supplies connected to the IRF fabric.
  • Page 291: Display Poe-Profile

    display poe-profile Use display poe-profile to display information about the PoE configuration file. Syntax display poe-profile [ index index | name profile-name ] [ | { begin | exclude | include } regular-expression ] Views Any view Default command level 1: Monitor level Parameters index index: Index number of the PoE configuration file, in the range of 1 to 100.
  • Page 292: Display Poe-Profile Interface

    GE1/0/7 GE1/0/8 GE1/0/9 GE1/0/10 6 port(s) applied # Display information about PoE configuration file forIPphone. <Sysname> display poe-profile name forIPphone Poe-profile Index ApplyNum Interface Configuration forIPphone GE1/0/5 poe enable GE1/0/6 poe priority critical GE1/0/7 GE1/0/8 GE1/0/9 GE1/0/10 6 port(s) applied Table 71 Command output Field Description...
  • Page 293: Poe Enable

    Parameters interface-type interface-number: Specifies an interface by its type and number. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression.
  • Page 294: Poe Enable Pse

    [Sysname-GigabitEthernet1/0/1] poe enable # Enable PoE on a PoE interface through a PoE configuration file. <Sysname> system-view [Sysname] poe-profile abc [Sysname-poe-profile-abc-1] poe enable [Sysname-poe-profile-abc-1] quit [Sysname] interface gigabitethernet 1/0/1 [Sysname-GigabitEthernet1/0/1] apply poe-profile name abc poe enable pse Use poe enable pse to enable PoE for the PSE. Use undo poe enable pse to disable PoE for the PSE.
  • Page 295: Poe Max-Power

    Default command level 2: System level Parameters pse pse-id: Specifies a PSE ID. Examples # Enable PSE 7 to detect nonstandard PDs. <Sysname> system-view [Sysname] poe legacy enable pse 7 poe max-power Use poe max-power to configure the maximum power for a PoE interface. Use undo poe max-power to restore the default.
  • Page 296: Poe Max-Power (System View)

    poe max-power (system view) Use poe max-power to configure the maximum power for the PSE. Use undo poe max-power to restore the default maximum power of the PSE. Syntax poe max-power max-power pse pse-id undo poe max-power pse pse-id Default The maximum power of the PSE is 37 W.
  • Page 297: Poe Pd-Policy Priority

    Views PoE interface view Default command level 2: System level Parameters text: Description of the PD connected to a PoE interface, a string of 1 to 80 characters. Examples # Configure the description for the PD connected to GigabitEthernet 1/0/1 as IP Phone for Room 101. <Sysname>...
  • Page 298: Poe Priority

    Syntax In standalone mode: poe power max-value max-power undo poe power max-value In IRF mode: poe power chassis chassis-number max-value max-power undo poe power chassis chassis-number max-value Default The maximum PoE power that the PoE-supported power supply can provide. The value varies with power supply models.
  • Page 299: Poe Priority (System View)

    Parameters critical: Sets the power priority of a PoE interface to critical. The PoE interface whose power priority level is critical works in guaranteed mode. In other words, power is first supplied to the PD connected to this critical PoE interface. high: Sets the power priority of a PoE interface to high.
  • Page 300: Poe Pse-Policy Priority

    Parameters critical: Sets the power priority level of the PSE to critical. The PSE whose power priority level is critical works in guaranteed mode, that is, power is first supplied to the PSE. high: Sets the power priority of the PSE to high. low: Sets the power priority of the PSE to low.
  • Page 301: Poe Update

    [Sysname] poe pse-policy priority poe update Use poe update to upgrade the PSE processing software online. Syntax poe update { full | refresh } filename [ pse pse-id ] Views System view Default command level 2: System level Parameters full: Specifies to upgrade the PSE processing software in full mode when the software is unavailable. refresh: Specifies to upgrade the PSE processing software in refresh mode when the software is available.
  • Page 302: Poe-Power Input-Threshold

    Default The power alarm threshold for the PSE is 80%. Views System view Default command level 2: System level Parameters utilization-threshold-value: Power alarm threshold in percentage, in the range of 1 to 99. pse pse-id: Specifies a PSE ID. Usage guidelines The system sends a trap message when the power utilization exceeds the alarm threshold.
  • Page 303: Poe-Power Output-Threshold

    Parameters chassis chassis-number: Specifies the ID of an IRF member device. (In IRF mode.) lower value: Specifies an undervoltage threshold in volts. The value range varies with external PoE power supply models. upper value: Specifies an overvoltage threshold in volts. The value range varies with external PoE power supply models.
  • Page 304: Poe-Profile

    upper value: Specifies an overvoltage threshold in volts. The value range varies with external PoE power supply models. Examples # In standalone mode, set the DC output undervoltage threshold to 45 V. <Sysname> system-view [Sysname] poe-power output-threshold lower 45 # In standalone mode, set the DC output overvoltage threshold to 57 V. <Sysname>...
  • Page 305: Index

    Index A C D E F H I L M N O P R S T U V display nqa result,74 display nqa server status,1 18 advantage-factor,66 display nqa statistics,78 apply poe-profile,175 display ntp-service sessions,13 apply poe-profile interface,175 display ntp-service status,17 display ntp-service trace,18...
  • Page 306 display snmp-agent trap queue,9 ip netstream export v9-template refresh-rate packet,142 display snmp-agent trap-list,9 ip netstream export v9-template refresh-rate time,143 display snmp-agent usm-user,10 ip netstream export version,144 display trapbuffer,59 ip netstream filter,145 ip netstream sampler,145 enable,137 ip netstream timeout active,146 enable,155 ip netstream timeout inactive,147 enable log...
  • Page 307 nqa server udp-echo,120 probe timeout,96 ntp-service access,19 ptp active force-state,35 ntp-service authentication enable,20 announce-interval,35 ntp-service authentication-keyid,21 announce-timeout,36 ntp-service broadcast-client,22 asym-correction,37 ntp-service broadcast-server,22 clock-source,37 ntp-service dscp,23 clock-step,40 ntp-service in-interface disable,24 delay-mechanism,40 ntp-service max-dynamic-sessions,24 destination-mac,41 ntp-service multicast-client,25 enable,42 ntp-service multicast-server,25 force-state,43 ntp-service refclock-master,26 min-delayreq-interval,43 ntp-service reliable...
  • Page 308 snmp-agent trap source,29 snmp-agent usm-user { v1 | v2c },30 sampler,165 snmp-agent usm-user v3,31 sflow agent,125 source interface,1 10 sflow collector,125 source ip,1 1 1 sflow counter collector,127 source port,1 1 1 sflow counter interval,126 statistics hold-time,1 12 sflow flow collector,127 statistics interval,1 13...

Table of Contents