H3C S5500-HI Series Command Reference Manual

H3C S5500-HI Series Command Reference Manual

Network management and monitoring command reference
Hide thumbs Also See for S5500-HI Series:
Table of Contents

Advertisement

H3C S5500-HI Switch Series
Network Management and Monitoring
Command Reference
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Software version: Release 5101
Document version: 6W100-20111031

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the S5500-HI Series and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for H3C S5500-HI Series

  • Page 1 H3C S5500-HI Switch Series Network Management and Monitoring Command Reference Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: Release 5101 Document version: 6W100-20111031...
  • Page 2 SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V G, V G, PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co., Ltd. All other trademarks that may be mentioned in this manual are the property of their respective owners Notice The information in this document is subject to change without notice.
  • Page 3 Preface The H3C S5500-HI documentation set includes 1 1 command references, which describe the commands and command syntax options available for the H3C S5500-HI Switch Series Release 5101. The Network Management and Monitoring Command Reference describes network management and monitoring configuration commands. It covers the commands for viewing system information, collecting...
  • Page 4 Layer 2 forwarding and other Layer 2 features. Port numbering in examples The port numbers in this document are for illustration only and might be unavailable on your device. About the S5500-HI documentation set The H3C S5500-HI documentation set includes: Documents Purposes Product description and specifications Marketing brochure Describe product specifications and benefits.
  • Page 5 Obtaining documentation You can access the most up-to-date H3C product documentation on the World Wide Web at http://www.h3c.com. Click the links on the top navigation bar to obtain different categories of product documentation: [Technical Support &...
  • Page 6 Technical support customer_service@h3c.com http://www.h3c.com Documentation feedback You can e-mail your comments about product documentation to info@h3c.com. We appreciate your comments.
  • Page 7: Table Of Contents

    Contents System maintenance and debugging commands ······································································································ 1 System maintenance commands······································································································································1 ping············································································································································································1 ping ipv6···································································································································································5 ping lsp······································································································································································7 tracert·········································································································································································8 tracert ipv6····························································································································································· 10 tracert lsp································································································································································ 11 System debugging commands······································································································································ 12 debugging······························································································································································ 12 display debugging ················································································································································ 13 NTP configuration commands ···································································································································14 display ntp-service sessions ·································································································································· 14 display ntp-service status ······································································································································...
  • Page 8 info-center loghost ················································································································································· 48 info-center loghost source ····································································································································· 49 info-center monitor channel ·································································································································· 50 info-center security-logfile alarm-threshold ·········································································································· 51 info-center security-logfile enable························································································································· 52 info-center security-logfile frequency ··················································································································· 52 info-center security-logfile size-quota ··················································································································· 53 info-center security-logfile switch-directory·········································································································· 53 info-center snmp channel ······································································································································ 54 info-center source ··················································································································································...
  • Page 9 MIB configuration commands ···································································································································99 display mib-style ···················································································································································· 99 mib-style·································································································································································· 99 RMON configuration commands··························································································································· 101 display rmon alarm ·············································································································································101 display rmon event ··············································································································································102 display rmon eventlog·········································································································································103 display rmon history············································································································································105 display rmon prialarm ········································································································································107 display rmon statistics ·········································································································································109 rmon alarm···························································································································································111 rmon event····························································································································································113 rmon history ·························································································································································114 rmon prialarm ······················································································································································115 rmon statistics·······················································································································································117...
  • Page 10 nqa schedule························································································································································155 operation (FTP test type view) ····························································································································156 operation (HTTP test type view)··························································································································156 operation interface ··············································································································································157 password (FTP test type view) ····························································································································157 probe count··························································································································································158 probe packet-interval ··········································································································································159 probe packet-number ··········································································································································160 probe packet-timeout···········································································································································160 probe timeout·······················································································································································161 reaction checked-element icpif···························································································································161 reaction checked-element { jitter-ds | jitter-sd } ································································································162 reaction checked-element mos ···························································································································164 reaction checked-element { owd-ds | owd-sd }································································································165 reaction checked-element packet-loss················································································································166...
  • Page 11 display ip netstream template ····························································································································197 enable···································································································································································198 ip netstream··························································································································································199 ip netstream aggregation ···································································································································199 ip netstream aggregation advanced ·················································································································200 ip netstream export host ·····································································································································201 ip netstream export rate······································································································································202 ip netstream export source ·································································································································203 ip netstream export v9-template refresh-rate packet ························································································203 ip netstream export v9-template refresh-rate time ····························································································204 ip netstream export version ································································································································205 ip netstream filter ·················································································································································206 ip netstream sampler···········································································································································207...
  • Page 12 NTDP configuration commands··································································································································241 display ntdp ·························································································································································241 display ntdp device-list········································································································································242 display ntdp single-device ··································································································································244 ntdp enable ··························································································································································246 ntdp explore·························································································································································246 ntdp hop ·······························································································································································247 ntdp timer ·····························································································································································247 ntdp timer hop-delay ···········································································································································248 ntdp timer port-delay···········································································································································249 Cluster configuration commands ································································································································249 add-member ·························································································································································249 administrator-address··········································································································································250 auto-build······························································································································································251 black-list add-mac················································································································································253 black-list delete-mac ············································································································································254 build ······································································································································································254 cluster····································································································································································256...
  • Page 13 cwmp cpe connect interface ······························································································································287 cwmp cpe inform interval ···································································································································287 cwmp cpe inform interval enable ······················································································································288 cwmp cpe inform time ········································································································································288 cwmp cpe password ···········································································································································289 cwmp cpe username ···········································································································································289 cwmp cpe wait timeout·······································································································································290 cwmp enable ·······················································································································································291 display cwmp configuration·······························································································································291 display cwmp status ············································································································································292 Index ········································································································································································...
  • Page 14: System Maintenance And Debugging Commands

    System maintenance and debugging commands System maintenance commands ping Syntax ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i interface-type interface-number | -m interval | -n | -p pad | -q | -r | -s packet-size | -t timeout | -tos tos | -v | -vpn-instance vpn-instance-name ] * host View Any view Default level...
  • Page 15 extend it to 8 bits. For example, if pad is configured as 0x2f, then the packets are padded with 0x0000002f repeatedly to make the total length of the packet meet the requirements of the device. By default, the padded value starts from 0x01 up to 0xff, where another round starts again if necessary, like 0x010203…feff01….
  • Page 16: Ping Statistics

    --- 1.1.2.2 ping statistics --- 5 packet(s) transmitted 5 packet(s) received 0.00% packet loss round-trip min/avg/max = 1/41/205 ms The output shows the following: The destination was reachable. • • All ICMP echo requests sent by the source got responses. The minimum time, average time, and maximum time for the packet’s roundtrip time are 1 ms, 41 •...
  • Page 17 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms Record Route: 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms Record Route: 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms Record Route: 1.1.2.1 1.1.2.2...
  • Page 18: Ping Ipv6

    Field Description Received the ICMP reply from the device whose IP address is 1.1.2.2. If no reply is received during the timeout period, “Request time out” will be displayed. • bytes—Indicates the number of data bytes in the ICMP reply. Reply from 1.1.2.2 : bytes=56 •...
  • Page 19 -t timeout: Specifies the timeout value (in milliseconds) of an ICMPv6 echo reply, which is in the range of 0 to 65535 and defaults to 2000. host: Specifies the IPv6 address or host name of the destination, a string of 1 to 46 characters. -i interface-type interface-number: Specifies an outbound interface by its type and number.
  • Page 20: Ping Lsp

    bytes=56 Sequence=2 hop limit=64 time = 26 ms Reply from 2001::1 bytes=56 Sequence=3 hop limit=64 time = 20 ms Reply from 2001::1 bytes=56 Sequence=4 hop limit=64 time = 4 ms Reply from 2001::1 bytes=56 Sequence=5 hop limit=64 time = 16 ms --- 2001::2 ping statistics --- 5 packet(s) transmitted 5 packet(s) received...
  • Page 21: Tracert

    ipv4 dest-addr mask-length: Checks the connectivity of the LSP for a FEC. dest-addr is the destination address of the FEC. The mask-length argument is the length of the FEC destination address mask and is in the range of 0 to 32. destination-ip-addr-header: Specifies the destination address in the IP header of MPLS echo request messages.
  • Page 22 -vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the destination belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option. -w timeout: Specifies the timeout time of the reply packet of a probe packet, which is in the range of 1 to 65535 milliseconds and defaults to 5000 milliseconds.
  • Page 23: Tracert Ipv6

    Field Description During the execution of the command, you can press Ctrl+C to abort press CTRL_C to break the tracert operation. The probe result of the probe packets whose TTL is 1, including the IP address of the first hop and the roundtrip time of three probe packets. 1 1.1.1.2 673 ms 425 ms 30 ms Number of packets that can be sent in each probe can be set through the -q keyword.
  • Page 24: Tracert Lsp

    After having identified network failure with the ping command, you can use the tracert command to determine the failed node(s). Output information of the tracert ipv6 command includes IPv6 addresses of all the Layer 3 devices the packets traverse from source to destination. If a device times out, the asterisk (* * *) will be displayed. To abort the tracert operation during the execution of the command, press Ctrl+C.
  • Page 25: System Debugging Commands

    destination-ip-addr-header: Specifies the destination address in the IP header of the MPLS echo request messages. It can be any address on segment 127.0.0.0/8—any local loopback address. Description Use the tracert lsp ipv4 command to locate errors on the LSPs for a FEC. Examples # Locate an error along the LSP to 3.3.3.9/32.
  • Page 26: Display Debugging

    Output of the debugging information may degrade system efficiency, so you should enable the debugging of the corresponding module for diagnosing network failure, and not to enable debugging of multiple modules at the same time. Default level describes the default level of the debugging all command. Different debugging commands may have different default levels.
  • Page 27: Ntp Configuration Commands

    NTP configuration commands display ntp-service sessions Syntax display ntp-service sessions [ verbose ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters verbose: Displays detailed information about all NTP sessions. If you do not specify this keyword, only the brief information about the NTP sessions is displayed.
  • Page 28 Field Description Reference clock ID of the clock source If the reference clock is the local clock, the value of this field is related to the value of the stra field: • When the value of the stra field is 0 or 1, this field will be “LOCL”;...
  • Page 29 root delay: 0.00 ms, root disper: 10.00 ms reach: 1, sync dist: 0.010, sync state: 2 precision: 2^18, version: 3, peer interface: InLoopBack0 reftime: 10:56:22.442 UTC Jan 7 2011(CE2686D6.71484513) orgtime: 10:56:22.442 UTC Jan 7 2011(CE2686D6.71484513) rcvtime: 10:56:22.442 UTC Jan 7 2011(CE2686D6.7149E881) xmttime: 10:56:22.442 UTC Jan 7 2011(CE2686D6.71464DC2) filter delay : 0.00...
  • Page 30 Field Description Reference clock ID of the clock source If the reference clock is the local clock, the value of this field is related to the stratum level of the clock source: • When the stratum level of the clock source is 0 or 1, this field is reference clock ID “LOCL”;...
  • Page 31: Display Ntp-Service Status

    Field Description Reachability count of the clock source. A value of 0 indicates that reach the clock source is unreachable. The synchronization distance relative to the upper-level clock, in sync dist seconds, and calculated from dispersion and roundtrip delay values. State of the state machine sync state The displayed value is an integer that ranges from 0 to 5.
  • Page 32 include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use the display ntp-service status command to view the NTP service status information. Examples # View the NTP service status information. <Sysname>...
  • Page 33: Display Ntp-Service Trace

    Field Description Reference time Reference timestamp display ntp-service trace Syntax display ntp-service trace [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.
  • Page 34: Ntp-Service Access

    Field Description The synchronization distance relative to the upper-level clock, in synch distance seconds, and calculated from dispersion and roundtrip delay values. Identifier of the primary reference source. When the stratum level of the primary reference clock is 0, it is displayed as “LOCL”. refid Otherwise, it is displayed as the IP address of the primary reference clock.
  • Page 35: Ntp-Service Authentication Enable

    The ntp-service access command provides only a minimum degree of security protection. A more secure method is identity authentication. The related command is ntp-service authentication enable. Before specifying an ACL number in the ntp-service access command, make sure you have already created and configured this ACL.
  • Page 36: Ntp-Service Broadcast-Client

    Default level 3: Manage level Parameters keyid: Authentication key ID, in the range of 1 to 4294967295. authentication-mode md5 value: Specifies the use of the MD5 algorithm for key authentication, where value represents the authentication key and is a string of 1 to 32 characters. Description Use the ntp-service authentication-keyid command to set the NTP authentication key.
  • Page 37: Ntp-Service Broadcast-Server

    Description Use the ntp-service broadcast-client command to configure the device to work in the NTP broadcast client mode and use the current interface to receive NTP broadcast packets. Use the undo ntp-service broadcast-client command to remove the configuration. By default, the device does not work in any NTP operation mode. Examples # Configure the device to work in broadcast client mode and receive NTP broadcast messages on VLAN-interface 1.
  • Page 38: Ntp-Service Max-Dynamic-Sessions

    undo ntp-service in-interface disable View Layer 3 Ethernet port view, VLAN interface view Default level 3: Manage level Parameters None Description Use the ntp-service in-interface disable command to disable an interface from receiving NTP messages. Use the undo ntp-service in-interface disable command to restore the default. By default, all interfaces are enabled to receive NTP messages.
  • Page 39: Ntp-Service Multicast-Client

    passively upon the receipt of a message, rather than creating an association (static or dynamic). In symmetric mode, static associations are created at the symmetric-active peer side, and dynamic associations are created at the symmetric-passive peer side. In broadcast or multicast mode, static associations are created at the server side, and dynamic associations are created at the client side.
  • Page 40: Ntp-Service Reliable Authentication-Keyid

    Parameters ip-address: Multicast IP address, which defaults to 224.0.1.1. authentication-keyid keyid: Specifies the key ID to be used for sending multicast messages to multicast clients, where keyid is in the range of 1 to 4294967295. This parameter is not meaningful if authentication is not required.
  • Page 41: Ntp-Service Source-Interface

    Examples # Enable NTP authentication, specify the use of MD5 encryption algorithm, with the key ID of 37 and key value of BetterKey. <Sysname> system-view [Sysname] ntp-service authentication enable [Sysname] ntp-service authentication-keyid 37 authentication-mode md5 BetterKey # Specify this key as a trusted key. [Sysname] ntp-service reliable authentication-keyid 37 ntp-service source-interface Syntax...
  • Page 42: Ntp-Service Unicast-Server

    Default level 3: Manage level Parameters vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the symmetric-passive peer belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the symmetric-passive peer is on the public network, do not specify this option. peer-name: Host name of the symmetric-passive peer, a string of 1 to 20 characters.
  • Page 43 View System view Default level 3: Manage level Parameters vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the NTP server belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the NTP server is on the public network, do not specify this option.
  • Page 44: Information Center Configuration Commands

    Information center configuration commands display channel Syntax display channel [ channel-number | channel-name ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters channel-number: Displays information about the channel with a specified number, where channel-number represents the channel number, which ranges from 0 to 9.
  • Page 45: Display Info-Center

    Examples # Display information for channel 0. <Sysname> display channel 0 channel number:0, channel name:console MODU_ID NAME ENABLE LOG_LEVEL ENABLE TRAP_LEVEL ENABLE DEBUG_LEVEL ffff0000 default informational debugging debugging The above information indicates to output log information with a severity from 0 to 4, trap information with a severity from 0 to 7 and debugging information with a severity from 0 to 7 to the console.
  • Page 46 begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use the display info-center command to display information about each output destination.
  • Page 47: Display Logbuffer

    Field Description Console: Configurations on the console destination, including the channel number and channel name used channel number : 0, channel name : console Monitor: Configurations on the monitor terminal destination, including the channel number and channel name used channel number : 1, channel name : monitor SNMP Agent: Configurations on the SNMP module destination, including the channel number and channel name used...
  • Page 48 Table 10 Severity description Corresponding Severity Value Description keyword in commands Emergency The system is unusable. emergencies Action must be taken Alert alerts immediately Critical Critical conditions critical Error Error conditions errors Warning Warning conditions warnings Normal but significant Notice notifications condition Informational...
  • Page 49: Display Logbuffer Summary

    Table 11 Output description Field Description Indicates the current state of the log buffer and its Logging buffer configuration and contents contents, which could be enabled or disabled. Allowed max buffer size The maximum buffer size allowed Actual buffer size The actual buffer size The channel number of the log buffer, which defaults Channel number...
  • Page 50: Display Logfile Buffer

    SLOT EMERG ALERT CRIT ERROR WARN NOTIF INFO DEBUG Table 12 Output description Field Description SLOT ID of an IRF member switch EMERG Represents emergency, see Table 10 for details ALERT Represents alert, see Table 10 for details CRIT Represents critical, see Table 10 for details ERROR...
  • Page 51: Display Logfile Summary

    <Sysname> display logfile buffer %@27091414#Aug 7 08:04:02:470 2011 Sysname IFNET/4/INTERFACE UPDOWN: Trap 1.3.6.1.6.3.1.1.5.4<linkUp>: Interface 983040 ifAdminStatus ifOperStatus is 1 The rest is omitted here. display logfile summary Syntax display logfile summary [ | { begin | exclude | include } regular-expression ] View Any view Default level...
  • Page 52: Display Security-Logfile Buffer

    display security-logfile buffer Syntax display security-logfile buffer [ | { begin | exclude | include } regular-expression ] View User view Default level 1: Monitor level Parameters |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.
  • Page 53: Display Trapbuffer

    Default level 1: Monitor level Parameters |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression.
  • Page 54 Default level 1: Monitor level Parameters reverse: Displays trap entries chronologically, with the most recent entry at the top. If this keyword is not specified, trap entries will be displayed chronologically, with the oldest entry at the top. size buffersize: Displays the specified number of the latest trap messages in a trap buffer, where buffersize represents the number of the latest trap messages in a trap buffer, which ranges from 1 to 1,024.
  • Page 55: Enable Log Updown

    Field Description Dropped messages The number of dropped messages The number of overwritten messages (when the buffer size is Overwritten messages not big enough to hold all messages, the latest messages overwrite the old ones). Current messages The number of current messages enable log updown Syntax enable log updown...
  • Page 56: Info-Center Console Channel

    Parameters channel-number: Specifies a channel number, which ranges from 0 to 9. channel-name: Specifies a channel name, a string of 1 to 30 characters. It must be a combination of letters and numbers, and start with a letter. It is case-insensitive. Description Use the info-center channel name command to name a channel with a specified channel number.
  • Page 57: Info-Center Enable

    Use the info-center format unicom command to set the format of the system information sent to a log host to UNICOM. Use the undo info-center format command to restore the default. By default, the format of the system information sent to a log host is H3C.
  • Page 58: Info-Center Logbuffer

    The system information sent to a log host is in two formats: H3C and UNICOM. For more information, see Network Management and Monitoring Configuration Guide. Examples # Set the format of the system information sent to a log host to UNICOM.
  • Page 59: Info-Center Logfile Frequency

    View System view Default level 2: System level Parameters None Description Use the info-center logfile enable command to enable the output of system information to the log file. Use the undo info-center logfile enable command to disable the output of system information to the log file.
  • Page 60: Info-Center Logfile Size-Quota

    info-center logfile size-quota Syntax info-center logfile size-quota size undo info-center logfile size-quota View System view Default level 2: System level Parameters size: The maximum storage space reserved for a log file, in MB. The value is in the range of 1 to 10. Description Use the info-center logfile size-quota command to set the maximum storage space reserved for a log file.
  • Page 61: Info-Center Loghost

    # Set the directory to save the log file to flash:/test. <Sysname> system-view [Sysname] info-center logfile switch-directory flash:/test info-center loghost Syntax info-center loghost [ vpn-instance vpn-instance-name ] { host-ipv4-address | ipv6 host-ipv6-address } [ port port-number ] [ channel { channel-number | channel-name } | facility local-number ] * undo info-center loghost [ vpn-instance vpn-instance-name ] { host-ipv4-address | ipv6 host-ipv6-address } View...
  • Page 62: Info-Center Loghost Source

    NOTE: The info-center loghost command takes effect only after the information center is enabled with the • info-center enable command. Make sure that you input a correct IP address while using the info-center loghost command to configure • the IP address for a log host. The system will prompt an invalid address if you input the loopback address 127.0.0.1.
  • Page 63: Info-Center Monitor Channel

    NOTE: After the source IP address of the log information is specified, no matter which physical interface is used • to output the log information, the source IP address of the log information is the primary IP address of the specified interface.
  • Page 64: Info-Center Security-Logfile Alarm-Threshold

    Description Use the info-center monitor channel command to configure the channel to output system information to the monitor. Use the undo info-center monitor channel command to restore the default channel to output system information to the monitor. By default, output of system information to the monitor is enabled with a default channel name of monitor and a default channel number of 1.
  • Page 65: Info-Center Security-Logfile Enable

    Examples # Set the alarm threshold of the security log file usage to 90%. <Sysname> system-view [Sysname] info-center security-logfile alarm-threshold 90 info-center security-logfile enable Syntax info-center security-logfile enable undo info-center security-logfile enable View System view Default level 2: System level Parameters None Description...
  • Page 66: Info-Center Security-Logfile Size-Quota

    Parameters freq-sec: Frequency with which the system saves the security log file, which ranges from 1 to 86,400 seconds. Description Use the info-center security-logfile frequency command to configure the frequency with which the system saves the security log file. Use the undo info-center security-logfile frequency command to restore the default frequency. By default, the frequency is 600 seconds.
  • Page 67: Info-Center Snmp Channel

    View Any view Default level 2: System level Parameters dir-name: Name of the directory where the security log file is saved, a string of 1 to 64 characters. Description Use the info-center security-logfile switch-directory command to configure the directory where the security log file is saved.
  • Page 68: Info-Center Source

    Use the undo info-center snmp channel command to restore the default channel to output system information to the SNMP module. By default, output of system information to the SNMP module is enabled with a default channel name of snmpagent and a default channel number of 5. For more information, see the display snmp-agent command in the chapter “SNMP configuration commands.”...
  • Page 69 By default, the output rules for the system information are listed in Table This command can be used to set the filter and redirection rules of log, trap and debugging information. For example, the user can set rules to output log information with a severity higher than warning to the log host, and information with a severity higher than informational to the log buffer.
  • Page 70: Info-Center Synchronous

    TRAP DEBUG Output Modules destinatio Enabled/ Enabled/ Enabled/ allowed Severity Severity Severity disabled disabled disabled SNMP default (all Informatio Disabled Debug Enabled Disabled Debug module modules) supported Enabled Debug Enabled Debug Disabled Debug interface modules default (all Log file Enabled Debug Enabled Debug...
  • Page 71: Info-Center Syslog Channel

    Examples # Enable the synchronous information output function, and then input the display current-configuration command to view the current configuration of the device. <Sysname> system-view [Sysname] info-center synchronous % Info-center synchronous output is on [Sysname] display current- At this time, the system receives log messages, and it then displays the log messages first. After the system displays all the log messages, it displays the user’s previous input, which is display current- in this example.
  • Page 72: Info-Center Timestamp

    Description Use the info-center syslog channel command to enable the output of system information to the Web interface. Use the undo info-center syslog channel command to restore the default. By default, system information is output to the Web interface with the default channel of channel 6. Examples # Configure the system to output information to the Web interface through channel 7.
  • Page 73: Info-Center Timestamp Loghost

    Related commands: info-center timestamp loghost. Examples # Configure the time stamp format for log information as boot. <Sysname> system-view [Sysname] info-center timestamp log boot At this time, if you log in to the FTP server using the username ftp, the log information generated is as follows: %0.109391473 Sysname...
  • Page 74: Info-Center Trapbuffer

    By default, the time stamp format for system information sent to the log host is date. Related commands: info-center timestamp. Examples # Configure that the system information output to the log host does not include the year information. <Sysname> system-view [Sysname] info-center timestamp loghost no-year-date info-center trapbuffer Syntax...
  • Page 75: Reset Logbuffer

    View Any view Default level 2: System level Parameters None Description Use the logfile save command to save all the contents in the log file buffer into the log file. By default, the system automatically saves the log file based on a frequency configured by the info-center logfile frequency command into a directory configured by the info-center logfile switch-directory command.
  • Page 76: Security-Logfile Save

    Default level 3: Manage level Parameters None Description Use the reset trapbuffer command to reset the trap buffer contents. Examples # Reset the trap buffer contents. <Sysname> reset trapbuffer security-logfile save Syntax security-logfile save View Any view Default level 2: System level Parameters None Description...
  • Page 77: Terminal Debugging

    terminal debugging Syntax terminal debugging undo terminal debugging View User view Default level 1: Monitor level Parameters None Description Use the terminal debugging command to enable the display of debugging information on the current terminal. Use the undo terminal debugging command to disable the display of debugging information on the current terminal.
  • Page 78: Terminal Monitor

    Description Use the terminal logging command to enable the display of log information on the current terminal. Use the undo terminal logging command to disable the display of log information on the current terminal. By default, the display of log information on the current terminal is disabled. Note that: To display the log information, you need to execute the terminal monitor and terminal logging •...
  • Page 79: Terminal Trapping

    Examples # Enable the monitoring of system information on the current terminal. <Sysname> terminal monitor Info: Current terminal monitor is on. terminal trapping Syntax terminal trapping undo terminal trapping View User view Default level 1: Monitor level Parameters None Description Use the terminal trapping command to enable the display of trap information on the current terminal.
  • Page 80: Snmp Configuration Commands

    SNMP configuration commands display snmp-agent community Syntax display snmp-agent community [ read | write ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters read: Displays information about SNMP read-only communities. write: Displays information about SNMP read and write communities.
  • Page 81: Display Snmp-Agent Group

    Storage-type: nonVolatile Table 17 Output description Field Description Displays the community name created by using the snmp-agent Community name community command or the user name created by using the snmp-agent usm-user { v1 | v2c } command. SNMP group name. •...
  • Page 82: Display Snmp-Agent Local-Engineid

    Description Use the display snmp-agent group command to display information about an SNMP group, including the group name, security model, MIB view, and storage type. If no group is specified, the command displays information about all SNMP groups. Examples # Display information about all SNMP groups. <Sysname>...
  • Page 83: Display Snmp-Agent Mib-View

    exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use the display snmp-agent local-engineid command to display the local SNMP engine ID. The local SNMP engine ID uniquely identifies the SNMP engine of the SNMP agent in an SNMP domain.
  • Page 84 MIB Subtree:iso Subtree mask: Storage-type: nonVolatile View Type:included View status:active View name:ViewDefault MIB Subtree:snmpUsmMIB Subtree mask: Storage-type: nonVolatile View Type:excluded View status:active View name:ViewDefault MIB Subtree:snmpVacmMIB Subtree mask: Storage-type: nonVolatile View Type:excluded View status:active View name:ViewDefault MIB Subtree:snmpModules.18 Subtree mask: Storage-type: nonVolatile View Type:excluded View status:active...
  • Page 85: Display Snmp-Agent Statistics

    display snmp-agent statistics Syntax display snmp-agent statistics [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.
  • Page 86: Display Snmp-Agent Sys-Info

    Table 20 Output description Field Description Number of messages that the SNMP agent has Messages delivered to the SNMP entity received. Number of messages that had an SNMP version not Messages which were for an unsupported version configured on the SNMP agent. Messages which used a SNMP community name not Number of messages that has a community name not known...
  • Page 87: Display Snmp-Agent Trap Queue

    Examples # Display the current SNMP agent system information. <Sysname> display snmp-agent sys-info The contact person for this managed node: Hangzhou H3C Technologies Co., Ltd. The physical location of this node: Hangzhou, China SNMP version running in the system: SNMPv3...
  • Page 88: Display Snmp-Agent Trap-List

    include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use the display snmp-agent trap queue command to display basic information of the trap queue, including trap queue name, queue length and the number of traps in the queue currently. Related commands: snmp-agent trap life and snmp-agent trap queue-size.
  • Page 89: Display Snmp-Agent Usm-User

    Related commands: snmp-agent trap enable. Examples # Display the modules that can generate traps and their trap status. <Sysname> display snmp-agent trap-list arp trap enable bfd trap enable bgp trap enable configuration trap enable flash trap enable mpls trap enable ospf trap enable pim trap enable standard trap enable...
  • Page 90: Enable Snmp Trap Updown

    Description Use the display snmp-agent usm-user command to display SNMPv3 user information. Examples # Display SNMPv3 information for all created users. <Sysname> display snmp-agent usm-user User name: userv3 Group name: mygroupv3 Engine ID: 800063A203000FE240A1A6 Storage-type: nonVolatile UserStatus: active User name: userv3code Group name: groupv3code Engine ID: 800063A203000FE240A1A6 Storage-type: nonVolatile...
  • Page 91: Snmp-Agent

    Description Use the enable snmp trap updown command to enable the trap function for interface state changes on an interface. Use the undo enable snmp trap updown command to disable the trap function for interface state changes on an interface. By default, the trap function for interface state changes is enabled.
  • Page 92: Snmp-Agent Calculate-Password

    [Sysname] snmp-agent snmp-agent calculate-password Syntax snmp-agent calculate-password plain-password mode { 3desmd5 | 3dessha | md5 | sha } { local-engineid | specified-engineid engineid } View System view Default level 3: Manage level Parameters plain-password: Specifies a plain text authentication or privacy key. mode: Specifies authentication and privacy algorithms.
  • Page 93: Snmp-Agent Community

    The cipher text password converted with the sha keyword specified in this command is a string of 40 hexadecimal characters. For an authentication password, all of the 40 hexadecimal characters are valid. For a privacy password, only the first 32 hexadecimal characters are valid. The converted password is associated with the engine ID, which means the password is valid only under the specified engine ID based on which the password was configured.
  • Page 94: Snmp-Agent Group

    read and write community name. To improve security, assign your SNMP communities a name other than public and private. To make sure that the MIB objects are accessible only to a specific NMS, use a basic ACL to identify the source IP address of the NMS.
  • Page 95 snmp-agent group { v1 | v2c } group-name [ read-view view-name ] [ write-view view-name ] [ notify-view view-name ] [ acl acl-number ] undo snmp-agent group { v1 | v2c } group-name SNMPv3: snmp-agent group v3 group-name [ authentication | privacy ] [ read-view view-name ] [ write-view view-name ] [ notify-view view-name ] [ acl acl-number ] undo snmp-agent group v3 group-name [ authentication | privacy ] View...
  • Page 96: Snmp-Agent Local-Engineid

    Related commands: snmp-agent mib-view and snmp-agent usm-user. Examples # Create an SNMP group group1 on an SNMPv3 enabled device, no authentication, no privacy. <Sysname> system-view [Sysname] snmp-agent group v3 group1 snmp-agent local-engineid Syntax snmp-agent local-engineid engineid undo snmp-agent local-engineid View System view Default level 3: Manage level...
  • Page 97: Snmp-Agent Log

    snmp-agent log Syntax snmp-agent log { all | get-operation | set-operation } undo snmp-agent log { all | get-operation | set-operation } View System view Default level 3: Manage level Parameters all: Enables logging of SNMP Get and Set operations. get-operation: Enables logging of the SNMP Get operation.
  • Page 98: Snmp-Agent Mib-View

    Description Use the snmp-agent ifmib long-ifindex enable command to switch the format of an NM-specific ifindex from 16-bit to 32-bit. Use the undo snmp-agent ifmib long-ifindex enable command to restore the default. By default, an NM-specific ifindex is in 16-bit format. Some configurations use parameters relating to NM-specific ifindex;...
  • Page 99: Snmp-Agent Packet Max-Size

    By default, the system creates the ViewDefault view when the SNMP agent is enabled. In the default MIB view, all MIB objects in the iso subtree but the snmpUsmMIB, snmpVacmMIB, and snmpModules.18 subtrees are accessible. A MIB view represents a set of MIB objects (or MIB object hierarchies) with certain access privilege. The MIB objects included in the MIB view are accessible while those excluded from the MIB view are inaccessible.
  • Page 100: Snmp-Agent Sys-Info

    Use the undo snmp-agent sys-info version command to disable use of the SNMP function of the specified version. By default, the location information is Hangzhou, China, version is SNMPv3, and the contact is Hangzhou H3C Tech. Co., Ltd.. Successful interaction between an NMS and the agents requires consistency of SNMP versions configured on them.
  • Page 101: Snmp-Agent Target-Host

    Examples # Configure the contact information as Dial System Operator at beeper # 27345. <Sysname> system-view [Sysname] snmp-agent sys-info contact Dial System Operator at beeper # 27345 snmp-agent target-host Syntax snmp-agent target-host trap address udp-domain { ip-address | ipv6 ipv6-address } [ udp-port port-number ] [ vpn-instance vpn-instance-name ] params securityname security-string [ v1 | v2c | v3 [ authentication | privacy ] ] undo snmp-agent target-host trap address udp-domain { ip-address | ipv6 ipv6-address } params...
  • Page 102: Snmp-Agent Trap Enable

    privacy: Specifies the security model to be authentication with privacy. Privacy is to encrypt the data • part of a packet to prevent it from being intercepted. When creating an SNMPv3 user, configure the authentication password and privacy password. Description Use the snmp-agent target-host command to configure the related settings for a trap target host.
  • Page 103 lsdbapproachoverflow | lsdboverflow | maxagelsa | nbrstatechange | originatelsa | vifcfgerror | virifauthfail | virifrxbadpkt | virifstatechange | viriftxretransmit | virnbrstatechange ] * | pim [ candidatebsrwinelection | electedbsrlostelection | interfaceelection | invalidjoinprune | invalidregister | neighborloss | rpmappingchange ] * | standard [ authentication | coldstart | linkdown | linkup | warmstart ]* | system | vrrp [ authfailure | newmaster ] ] View System view...
  • Page 104: Snmp-Agent Trap If-Mib Link Extended

    Sends linkup traps when the port is in a linkup status. It should be configured globally. • warmstart: Sends warmstart traps when the SNMP restarts. • system: Sends H3C-SYS-MAN-MIB (a private MIB) traps. vrrp: Enables traps for the VRRP module. authfailure: VRRP authentication failure traps. •...
  • Page 105: Snmp-Agent Trap Life

    Default level 3: Manage level Parameters None Description Use the snmp-agent trap if-mib link extended command to extend the standard linkUp/linkDown traps defined in RFC. An extended linkUp/linkDown trap is the standard linkUp/linkDown trap defined in RFC appended with the interface description and interface type information. Use the undo snmp-agent trap if-mib link extended command to restore the default.
  • Page 106: Snmp-Agent Trap Queue-Size

    Default level 3: Manage level Parameters seconds: Specifies the timeout time, in the range of 1 to 2,592,000 seconds. Description Use the snmp-agent trap life command to configure the holding time of the traps in the queue. Traps are discarded when the holding time expires. Use the undo snmp-agent trap life command to restore the default holding time of traps in the queue.
  • Page 107: Snmp-Agent Trap Source

    Examples # Set the maximum number of traps that can be stored in the trap sending queue to 200. <Sysname> system-view [Sysname] snmp-agent trap queue-size 200 snmp-agent trap source Syntax snmp-agent trap source interface-type interface-number undo snmp-agent trap source View System view Default level 3: Manage level...
  • Page 108 Default level 3: Manage level Parameters v1: Specifies that the configured user name should be applied in the SNMPv1 networking environment. If the agent and the NMS use SNMPv1 packets to communicate with each other, this keyword is required. v2c: Specifies that the configured user name should be applied in the SNMPv2c networking environment. If the agent and the NMS use SNMPv2c packets to communicate with each other, this keyword is required.
  • Page 109: Snmp-Agent Usm-User V3

    [Sysname] snmp-agent sys-info version v2c [Sysname] snmp-agent group v2c readCom [Sysname] snmp-agent usm-user v2c userv2c readCom acl 2001 Set the IP address of the NMS to 1.1.1.1 • Set the SNMP version on the NMS to SNMPv2c • Fill in both the read community and write community options with userv2c, and then the NMS can •...
  • Page 110 acl acl-number: Specifies a basic ACL. The acl-number argument takes an ACL number in the range of 2,000 to 2,999. By using a basic ACL, you can restrict the source IP address of SNMP packets, which means you can configure to allow or prohibit SNMP packets with a specific source IP address to allow or prohibit the specified NMS to access the agent by using this user name.
  • Page 111 [Sysname] snmp-agent usm-user v3 testUser testGroup authentication-mode md5 authkey • Set the SNMP version on the NMS to SNMPv3. Fill in the user name testUser. • Set the authentication algorithm to MD5. • Set the authentication encrypted key to authkey. •...
  • Page 112: Mib Configuration Commands

    Related commands: mib-style. Examples # After getting the device ID from node sysObjectID, you find that it is an H3C device, and hope to know the current MIB style or the MIB style after next boot of the device. <Sysname> display mib-style...
  • Page 113 H3C enterprise ID 25506, and private MIB is located under the enterprise ID 201 1. new: Specifies the MIB style of the device as H3C new, which means both sysOID and private MIB of the device are located under the H3C enterprise ID 25506.
  • Page 114: Rmon Configuration Commands

    RMON configuration commands display rmon alarm Syntax display rmon alarm [ entry-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters entry-number: Specifies the index of an RMON alarm entry, which ranges from 1 to 65535. If no entry is specified, the configuration of all alarm entries is displayed.
  • Page 115: Display Rmon Event

    Table 23 Output description Field Description The status of the alarm entry entry-number created by the owner is status. • entry-number: Alarm entry, corresponding to the management information base (MIB) node alarmIndex. • owner: Owner of the entry, corresponding to the MIB node alarmOwner. AlarmEntry entry-number •...
  • Page 116: Display Rmon Eventlog

    regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use the display rmon event command to display the configuration of the specified RMON event entry or all RMON event entries. Displayed information includes event index, event owner, event description, action triggered by the event (such as sending log or trap messages), and last time the event occurred (the elapsed time since system initialization/startup) in seconds.
  • Page 117 Default level 1: Monitor level Parameters entry-number: Specifies the index of an event entry, which is in the range of 1 to 65535. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow.
  • Page 118: Display Rmon History

    eventLog 1.1, generated by private alarm entry 1, which is triggered because the alarm value (85) • exceeds the rising threshold (80). The sampling type is absolute. • eventLog 1.2, generated by private alarm entry 2, which is triggered because the alarm value (0) is lower than the falling threshold (5).
  • Page 119 undersize packets : 0 , oversize packets fragments , jabbers collisions , utilization Sampled values of record 2 : dropevents , octets : 834 packets , broadcast packets multicast packets : 6 , CRC alignment errors : 0 undersize packets : 0 , oversize packets fragments , jabbers...
  • Page 120: Display Rmon Prialarm

    Field Description Dropped packets during the sampling period, corresponding to the MIB node dropevents etherHistoryDropEvents. Number of octets received during the sampling period, corresponding to the MIB octets node etherHistoryOctets. Number of packets received during the sampling period, corresponding to the packets MIB node etherHistoryPkts.
  • Page 121 regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use the display rmon prialarm command to display the configuration of the specified private alarm entry or all private alarm entries. Related commands: rmon prialarm. Examples # Display the configuration of all private alarm entries.
  • Page 122: Display Rmon Statistics

    display rmon statistics Syntax display rmon statistics [ interface-type interface-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters interface-type interface-number: Specifies an interface by its type and number. |: Filters command output by specifying a regular expression.
  • Page 123 Field Description Status of the entry identified by the index, which corresponds to MIB node etherStatsStatus. VALID means the entry is valid, and UNDERCREATION means invalid. VALID You can use the display rmon command to view the invalid entry; while with the display current-configuration and display this commands you cannot view the corresponding rmon commands.
  • Page 124: Rmon Alarm

    Field Description Statistics of packets received according to length during the statistical period (Hardware support is needed for the statistics. If the hardware does not support the function, all statistics are displayed as 0.), in which: • Information of the field 64 corresponds to the MIB node etherStatsPkts64Octets Packets received according to length: •...
  • Page 125 0 to 65,535, with 0 meaning no corresponding event is triggered and no event action is taken when an alarm is triggered. falling-threshold threshold-value2 event-entry2: Sets the falling threshold, where threshold-value2 represents the falling threshold, in the range –2,147,483,648 to +2,147,483,647 and event-entry2 represents the index of the event triggered when the falling threshold is reached.
  • Page 126: Rmon Event

    parameter 1.3.6.1.2.1.16.1.1.1.4.1, where 1 indicates the serial number of the interface statistics entry. Therefore, if you execute the rmon statistics 5 command, you can use etherStatsOctets.5 to replace the parameter. The above configuration implements the following: Sampling and monitoring interface GigabitEthernet1/0/1 •...
  • Page 127: Rmon History

    NOTE: string An entry cannot be created if the values of the specified event description (description ), event type • trap community trapcommunity) (log, trap, logtrap or none), and community name ( to be identical to those of the existing event entry in the system. Up to 60 event entries can be created.
  • Page 128: Rmon Prialarm

    NOTE: sampling interval An entry cannot be created if the value of the specified sampling interval (interval ) is • identical to that of the existing history entry on the same interface. You can create up to 1000 history entries for the switch. •...
  • Page 129 falling-threshold threshold-value2 event-entry2: Sets the falling threshold, where threshold-value2 represents the falling threshold, in the range –2,147,483,648 to +2,147,483,647 and event-entry2 represents the index of the event triggered when the falling threshold is reached. event-entry2 ranges from 1 to 65,535. forever: Indicates that the lifetime of the private alarm entry is infinite.
  • Page 130: Rmon Statistics

    [Sysname-GigabitEthernet1/0/1] quit [Sysname] rmon prialarm 1 (.1.3.6.1.2.1.16.1.1.1.6.1*100/.1.3.6.1.2.1.16.1.1.1.5.1) BroadcastPktsRatioOfEth1/1 10 absolute rising-threshold 80 1 falling-threshold 5 2 entrytype forever owner user1 1.3.6.1.2.1.16.1.1.1.6.1 is the OID of the node etherStatsBroadcastPkts.1, and 1.3.6.1.2.1.16.1.1.1.5.1 is the OID of the node etherStatsPkts.1. 1 indicates the serial number of the interface statistics entry. Therefore, if you execute the rmon statistics 5 command, you should use 1.3.6.1.2.1.16.1.1.1.6.5 and 1.3.6.1.2.1.16.1.1.1.5.5.
  • Page 131 <Sysname> system-view [Sysname] interface gigabitethernet 1/0/1 [Sysname-GigabitEthernet1/0/1] rmon statistics 20 owner user1...
  • Page 132: Port Mirroring Configuration Commands

    Port mirroring configuration commands NOTE: Both bridge mode (Layer 2) and route mode (Layer 3) Ethernet ports support port mirroring. The term interface in this chapter collectively refers to these two types of ports. You can use the port link-mode Layer 2—LAN Switching command to set an Ethernet port to operate in bridge or route mode (see Configuration Guide...
  • Page 133: Mirroring-Group

    type: local status: active mirroring port: GigabitEthernet1/0/11 inbound GigabitEthernet1/0/12 both mirroring CPU: monitor port: GigabitEthernet1/0/13 mirroring-group 2: type: remote-source status: active mirroring port: GigabitEthernet1/0/14 both mirroring CPU: reflector port: monitor egress port: GigabitEthernet1/0/15 remote-probe VLAN: 2 mirroring-group 3: type: remote-destination status: active monitor port: GigabitEthernet1/0/16 remote-probe VLAN: 3...
  • Page 134: Mirroring-Group Mirroring-Cpu

    local: Creates a local mirroring group or removes all local mirroring groups with the undo command. remote-destination: Creates a remote destination group or removes all remote destination groups with the undo command. remote-source: Creates a remote source group or removes all remote source groups with the undo command.
  • Page 135: Mirroring-Group Mirroring-Port

    Description Use the mirroring-group mirroring-cpu command to assign CPUs to a local or remote source group as source CPUs. Use the undo mirroring-group mirroring-cpu command to remove source CPUs from the mirroring group. By default, no source CPU is configured for any mirroring group. You cannot configure source CPUs for a remote destination group.
  • Page 136: Mirroring-Group Monitor-Egress

    inbound: Mirrors only inbound packets on the specified ports. outbound: Mirrors only outbound packets on the specified ports. Description Use the mirroring-group mirroring-port command to assign ports to a local or remote source group as source ports. Use the undo mirroring-group mirroring-port command to remove source ports from the mirroring group. By default, no source port is configured for any mirroring group.
  • Page 137: Mirroring-Group Monitor-Port

    monitor-egress-port: Port to be configured as the egress port. It takes the form of interface-type interface-number, where interface-type specifies the port type and interface-number specifies the port number. Description Use the mirroring-group monitor-egress command to configure a port as the egress port of a remote source group.
  • Page 138: Mirroring-Group Reflector-Port

    Use the undo mirroring-group monitor-port command to remove the monitor port from the local or remote destination group. By default, no monitor port is configured for a mirroring group. You cannot configure a monitor port for a remote source group. You cannot assign a source port in an existing mirroring group to another mirroring group as the monitor port.
  • Page 139: Mirroring-Group Remote-Probe Vlan

    By default, no reflector port is configured for a mirroring group, and a port does not serve as the reflector port of any mirroring group. You can configure a reflector port for a remote source group only, not for other types of mirroring groups. Related commands: mirroring-group.
  • Page 140: Mirroring-Port

    To delete a VLAN that is configured as a remote probe VLAN, remove the remote probe VLAN configuration first. Related commands: mirroring-group. Examples # Create remote source group 1, and configure VLAN 10 as its remote probe VLAN. <Sysname> system-view [Sysname] mirroring-group 1 remote-source [Sysname] mirroring-group 1 remote-probe vlan 10 # Create remote destination group 2, and configure VLAN 20 as its remote probe VLAN.
  • Page 141: Monitor-Port

    [Sysname] mirroring-group 1 local [Sysname] interface GigabitEthernet 1/0/1 [Sysname-GigabitEthernet1/0/1] mirroring-group 1 mirroring-port both # Create remote source group 2, configure GigabitEthernet 1/0/2 as a source port of the mirroring group, and specify that the mirroring group monitor the bidirectional traffic of the port. <Sysname>...
  • Page 142: Traffic Mirroring Configuration Commands

    Traffic mirroring configuration commands NOTE: The traffic mirroring and remote traffic mirroring functions on the switch are implemented through the cooperation of a QoS policy and remote port mirroring. For the configuration commands about a QoS ACL and QoS Command Reference policy, see mirror-to Syntax...
  • Page 143: Nqa Configuration Commands

    NQA configuration commands NQA client configuration commands advantage-factor Syntax advantage-factor factor undo advantage-factor View Voice test type view Default level 2: System level Parameters factor: Specifies the advantage factor, used to count Mean Opinion Scores (MOS) and Calculated Planning Impairment Factor (ICPIF) values. The value is in the range of 0 to 20. Description Use the advantage-factor command to configure the advantage factor that is used to count MOS and ICPIF values.
  • Page 144: Data-Fill

    View Voice test type view Default level 2: System level Parameters g71 1a: Specifies a G.71 1 A-law codec type. g71 1u: Specifies a G.71 1 μ-law codec type g729a: Specifies a G.729 A-law codec type. Description Use the codec-type command to configure the codec type for a voice test. Use the undo codec-type command to restore the default.
  • Page 145: Data-Size

    How the string is filled varies with test types: • For ICMP echo tests, the string fills the whole data field of ICMP echo requests. For UDP echo tests, the first five bytes of the data field of a UDP packet are for special purpose, so •...
  • Page 146: Description (Any Nqa Test Type View)

    Examples # Configure the size of the data field in an ICMP echo request as 80 bytes. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] data-size 80 description (any NQA test type view) Syntax description text undo description View Any NQA test type view Default level...
  • Page 147: Destination Port

    Description Use the destination ip command to configure a destination IP address for a test operation. Use the undo destination ip command to remove the configured destination IP address. By default, no destination IP address is configured for a test operation. Examples # Configure the destination IP address of an ICMP echo test operation as 10.1.1.1.
  • Page 148 Default level 1: Monitor level Parameters admin-name operation-tag: Displays history records of an NQA test group. If these two arguments are not specified, history records of all test groups are displayed. admin-name represents the name of the NQA test group administrator who creates the NQA operation. It is a case-insensitive string of 1 to 32 characters.
  • Page 149: Display Nqa Reaction Counters

    Field Description Status value of test results, which can be one of the following values: • Succeeded • Status Unknown error • Internal error • Timeout Time Time when the test is completed display nqa reaction counters Syntax display nqa reaction counters [ admin-name operation-tag [ item-number ] ] [ | { begin | exclude | include } regular-expression ] View Any view...
  • Page 150 Examples # Display the monitoring results of all reaction entries in an ICMP echo test group, in which the administrator name is admin, and the operation tag is test. <Sysname> display nqa reaction counters admin test NQA entry (admin admin, tag test) reaction counters: Index Checked Element Threshold Type...
  • Page 151: Display Nqa Result

    Monitored Threshold Collect data in Checked Num Over-threshold Num element type Number of packets of Number of packets which the one-way Packets sent since the accumulate sent since the test delay jitter exceeds the test group starts jitter-DS/jitter-SD group starts threshold since the test group starts average...
  • Page 152 Examples # Display the results of the last UDP jitter test. <Sysname> display nqa result admin test NQA entry (admin admin, tag test) test results: Destination IP address: 192.168.1.42 Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 15/46/26 Square-Sum of round trip time: 8103 Last succeeded probe time: 2011-01-23 10:56:38.7 Extended results:...
  • Page 153 Extended results: Packet loss in test: 100% Failures due to timeout: 1000 Failures due to disconnect: 0 Failures due to no connection: 0 Failures due to sequence error: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packet(s) arrived late: 0 Voice results: RTT number: 0...
  • Page 154 Field Description Failures due to no connection Number of failures to connect with the peer Failures due to sequence error Number of failures due to out-of-sequence packets Failures due to internal error Number of failures due to internal errors Failures due to other errors Failures due to other errors Packet(s) arrived late Number of packets that arrived late...
  • Page 155: Display Nqa Statistics

    Field Description Average absolute value of negative delay jitters from destination to Negative DS average source Negative SD square sum Square sum of negative delay jitters from source to destination Negative DS square sum Square sum of negative delay jitters from destination to source One way results Uni-direction delay test result, displayed in a UDP jitter or voice test Max SD delay...
  • Page 156 begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use the display nqa statistics command to display test result statistics for the specified or all test groups.
  • Page 157 Negative SD average: 6 Negative DS average: 2 Negative SD square sum: 4292 Negative DS square sum: 967 One way results: Max SD delay: 5 Max DS delay: 5 Min SD delay: 1 Min DS delay: 1 Number of SD delay: 550 Number of DS delay: 550 Sum of SD delay: 1475 Sum of DS delay: 1201...
  • Page 158 Negative SD sum: 25 Negative DS sum: 2 Negative SD average: 6 Negative DS average: 1 Negative SD square sum: 187 Negative DS square sum: 2 One way results: Max SD delay: 0 Max DS delay: 0 Min SD delay: 0 Min DS delay: 0 Number of SD delay: 0 Number of DS delay: 0...
  • Page 159 Field Description Min positive DS Minimum positive delay jitter from destination to source Max positive SD Maximum positive delay jitter from source to destination Max positive DS Maximum positive delay jitter from destination to source Positive SD number Number of positive delay jitters from source to destination Positive DS number Number of positive delay jitters from destination to source Positive SD sum...
  • Page 160 Field Description Square sum of DS delay Square sum of delays from destination to source SD lost packet(s) Number of lost packets from the source to the destination DS lost packet(s) Number of lost packets from the destination to the source Lost packet(s) for unknown Number of lost packets for unknown reasons reason...
  • Page 161: Filename

    Threshold Monitored element Collect data in Checked Num Over-threshold Num type Number of packets of Packets sent in Number of which the one-way delay accumulate the counting packets sent in the jitter exceeds the jitter-DS/jitter-SD interval counting interval threshold in the counting interval average —...
  • Page 162: Frequency

    frequency Syntax frequency interval undo frequency View Any NQA test type view Default level 2: System level Parameters interval: Specifies the interval in milliseconds between two consecutive tests, in the range of 0 to 604800000. The value 0 sets the test group to perform only one test, and not to collect any statistics. Description Use the frequency command to configure the interval between two consecutive tests for a test group.
  • Page 163: History-Record Keep-Time

    By default, history records of an NQA test group are not saved. If the history records saving function is enabled, the system saves the history records. To view the history records of the NQA test group, use the display nqa history command. If the history records saving function is disabled, the system does not save the history records of the NQA test group and the existing history records are also removed.
  • Page 164: History-Record Number

    history-record number Syntax history-record number number undo history-record number View Any NQA test type view Default level 2: System level Parameters number: Specifies the maximum number of history records that can be saved in a test group. The value is in the range of 0 to 50. Description Use the history-record number command to configure the maximum number of history records that can be saved in a test group.
  • Page 165: Mode

    By default, HTTP 1.0 is used in an HTTP test. Examples # Configure the HTTP version as 1.0 in an HTTP test. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] http-version v1.0 mode Syntax mode { active | passive } undo mode View FTP test type view...
  • Page 166: Nqa

    Default level 2: System level Parameters ip-address: Specifies the IP address of the next hop. Description Use the next-hop command to configure the next hop IP address for ICMP echo requests of a test group. Use the undo next-hop command to remove the configured next hop IP address. By default, no next hop IP address is configured.
  • Page 167: Nqa Agent Enable

    [Sysname-nqa-admin-test] nqa agent enable Syntax nqa agent enable undo nqa agent enable View System view Default level 2: System level Parameters None Description Use the nqa agent enable command to enable the NQA client. Use the undo nqa agent enable command to disable the NQA client and stop all the tests being performed.
  • Page 168: Nqa Schedule

    By default, the maximum number is 2. From the beginning to the end of a test, the NQA test is in test status; from the end of a test to the beginning of the next test, the NQA test is in waiting status. Examples # Configure the maximum number of tests that the NQA client can simultaneously perform as 5.
  • Page 169: Operation (Ftp Test Type View)

    Examples # Start the tests for the test group with the administrator name admin and operation tag test. The start time and duration of the test group are 08:08:08 201 1/01/08 and 1000 seconds respectively. <Sysname> system-view [Sysname] nqa schedule admin test start-time 08:08:08 2011/01/08 lifetime 1000 operation (FTP test type view) Syntax operation { get | put }...
  • Page 170: Operation Interface

    post: Transfers data to the HTTP server. Description Use the operation command to configure the HTTP operation type. Use the undo operation command to restore the default. By default, the HTTP operation type is get. Examples # Configure the HTTP operation type as post. <Sysname>...
  • Page 171: Probe Count

    View FTP test type view Default level 2: System level Parameters password: Specifies the password used to log in to the FTP server. The password is a case-sensitive string of 1 to 32 characters. Description Use the password command to configure a password used to log onto the FTP server. Use the undo password command to remove the configured password.
  • Page 172: Probe Packet-Interval

    During an FTP, HTTP, DHCP, or DNS test, one probe operation means uploading or downloading • a file, obtaining a web page, obtaining an IP address through DHCP, or translating a domain name to an IP address. • During an ICMP echo or UDP echo test, one probe operation means sending an ICMP echo request or a UDP packet.
  • Page 173: Probe Packet-Number

    probe packet-number Syntax probe packet-number packet-number undo probe packet-number View UDP jitter, voice test type view Default level 2: System level Parameters packet-number: Specifies the number of packets to be sent per probe operation. The value is in the range of 10 to 1000 for each probe operation in one UDP jitter test, and 10 to 60000 for each probe operation in one voice test.
  • Page 174: Probe Timeout

    Use the undo probe packet-timeout command to restore the default. By default, the timeout time in a UDP jitter test is 3000 milliseconds, the timeout time in a voice test is 5000 milliseconds. Examples # Configure the timeout time for waiting for a response in a UDP jitter test as 100 milliseconds. <Sysname>...
  • Page 175: Reaction Checked-Element { Jitter-Ds | Jitter

    View Voice test type view Default level 2: System level Parameters item-number: Specifies a reaction entry ID, in the range of 1 to 10. threshold-value: Specifies threshold values. upper-threshold: Specifies an upper threshold, in the range of 1 to 100. lower-threshold: Specifies a lower threshold, in the range of 1 to 100.
  • Page 176 Default level 2: System level Parameters item-number: Specifies a reaction entry ID, in the range of 1 to 10. jitter-ds: Specifies destination-to-source delay jitter of each probe packet as the monitored element. jitter-sd: Specifies source-to-destination delay jitter of each probe packet as the monitored element. threshold-type: Specifies a threshold type.
  • Page 177: Reaction Checked-Element Mos

    (included), the state of the entry is set to over-threshold; otherwise, the state of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server. <Sysname>...
  • Page 178: Reaction Checked-Element { Owd-Ds | Owd

    is set to over-threshold; otherwise, the state is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type voice [Sysname-nqa-admin-test-voice] reaction 1 checked-element mos threshold-value 200 100 action-type trap-only reaction checked-element { owd-ds | owd-sd }...
  • Page 179: Reaction Checked-Element Packet-Loss

    reaction entry is set to over-threshold; otherwise, the state is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element owd-ds threshold-value 50 reaction checked-element packet-loss...
  • Page 180: Reaction Checked-Element Probe-Duration

    [Sysname-nqa-admin-test-udp-jitter] reaction checked-element packet-loss threshold-type accumulate 100 action-type trap-only reaction checked-element probe-duration Syntax reaction item-number checked-element probe-duration threshold-type accumulate accumulate-occurrences | average | consecutive consecutive-occurrences } threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number View DHCP, DLSw, DNS, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo test type view Default level...
  • Page 181: Reaction Checked-Element Probe-Fail (For Trap)

    starts, the initial state of the reaction entry is invalid. After each test, the average probe duration is checked. If it is out of the threshold range, the state is set to over-threshold; otherwise, the state of the reaction entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server.
  • Page 182: Reaction Checked-Element Probe-Fail (For Trigger)

    accumulate accumulate-occurrences: Specifies the total number of probe failures in a test. The value is in the range of 1 to 15. consecutive consecutive-occurrences: Specifies the number of consecutive probe failures since the NQA test group starts. The value is in the range of 1 to 16. action-type: Specifies what action to be triggered to react to certain measurement conditions and it defaults to none.
  • Page 183: Reaction Checked-Element Rtt

    View DHCP, DNS, DLSw, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo test type view Default level 2: System level Parameters item-number: Specifies a reaction entry ID, in the range of 1 to 10. threshold-type: Specifies a threshold type. consecutive consecutive-occurrences: Specifies the number of consecutive probe failures since the test group starts.
  • Page 184 Parameters item-number: Specifies a reaction entry ID, in the range of 1 to 10. threshold-type: Specifies a threshold type. accumulate accumulate-occurrences: Specifies the total number of threshold violations in a test. The value is in the range of 1 to 15000 for UDP jitter tests and 1 to 60000 for voice tests. average: Specifies to check the packet average round-trip time in a test.
  • Page 185: Reaction Trap

    [Sysname-nqa-admin-test-udp-jitter] reaction checked-element threshold-type accumulate 100 threshold-value 50 5 action-type trap-only reaction trap Syntax reaction trap probe-failure consecutive-probe-failures test-complete test-failure cumulate-probe-failures } undo reaction trap { probe-failure | test-complete | test-failure } View Any NQA test type view Default level 2: System level Parameters probe-failure consecutive-probe-failures: Sends a trap to the network management server if the number...
  • Page 186: Route-Option Bypass-Route

    View DNS test type view Default level 2: System level Parameters domain-name: Specifies the domain name to be resolved. It is a case-insensitive string separated by dots (.), each part consisting of 1 to 63 characters. The total length must be within 255 characters, Valid characters in a part include letters, digits, hyphens (-), and underscores (_).
  • Page 187: Source Interface

    [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] route-option bypass-route source interface Syntax source interface interface-type interface-number undo source interface View ICMP echo test type view Default level 2: System level Parameters interface-type interface-number: Specifies an interface by its type and number. Description Use the source interface command to configure the source interface for ICMP echo request packets.
  • Page 188: Source Port

    Parameters ip-address: Specifies the source IP address of a test operation. Description Use the source ip command to configure the source IP address of probe packets. The specified source IP address must be the IP address of a local interface. The local interface must be up; otherwise, no probe packets can be sent out.
  • Page 189: Statistics Hold-Time

    statistics hold-time Syntax statistics hold-time hold-time undo statistics hold-time View DLSw, DNS, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo, UDP jitter, voice test type view Default level 2: System level Parameters hold-time: Specifies the hold time of a statistics group in minutes, in the range of 1 to 1440. Description Use the statistics hold-time command to configure the hold time of statistics groups for a test group.
  • Page 190: Statistics Interval

    By default, 2 statistics groups at most can be kept. When the number of statistics groups kept reaches the upper limit and a new statistics group is to be saved, the earliest statistics group is deleted. This command is not supported by DHCP tests. Examples # Configure the NQA to save up to 5 statistics groups for the ICMP test group.
  • Page 191: Tos

    Syntax tos value undo tos View DLSw, DNS, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo, UDP jitter, voice test type view Default level 2: System level Parameters value: Specifies the value of the ToS field in the IP header in an NQA probe packet, in the range of 0 to 255.
  • Page 192: Type

    After you configure the route-option bypass-route command, the maximum number of hops that a probe packet traverses in the network is 1, and the ttl command does not take effect. Examples # Configure the maximum number of hops that a probe packet can traverse in a network as 16. <Sysname>...
  • Page 193: Url

    Syntax url url undo url View HTTP test type view Default level 2: System level Parameters url: Specifies the website that an HTTP test visits, a case-sensitive string of 1 to 185 characters. Description Use the url command to configure the website that an HTTP test visits. Use the undo url command to remove the configured website that an HTTP test visits.
  • Page 194: Vpn-Instance (Icmp Echo Test Type View)

    Examples # Configure the login username as administrator. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] username administrator vpn-instance (ICMP echo test type view) Syntax vpn-instance vpn-instance-name undo vpn-instance View ICMP echo test type view Default level 2: System level Parameters vpn-instance-name: Specifies the MPLS L3VPN, a case-sensitive string of 1 to 31 characters.
  • Page 195: Nqa Server Enable

    Default level 1: Monitor level Parameters |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression.
  • Page 196: Nqa Server Tcp-Connect

    Default level 2: System level Parameters None Description Use the nqa server enable command to enable the NQA server. Use the undo nqa server enable command to disable the NQA server. By default, the NQA server is disabled. Related commands: nqa server tcp-connect, nqa server udp-echo, and display nqa server status. Examples # Enable the NQA server.
  • Page 197: Nqa Server Udp-Echo

    [Sysname] nqa server tcp-connect 169.254.10.2 9000 nqa server udp-echo Syntax nqa server udp-echo ip-address port-number undo nqa server udp-echo ip-address port-number View System view Default level 2: System level Parameters ip-address: Specifies the IP address specified for the UDP listening service on the NQA server. port-number: Specifies the port number specified for the UDP listening service on the NQA server, in the range of 1 to 50000.
  • Page 198: Sflow Configuration Commands

    sFlow configuration commands NOTE: interface Both bridge mode (Layer 2) and route mode (Layer 3) Ethernet ports support sFlow. The term this document collectively refers to these two types of ports. You can use the port link-mode command to Layer 2—LAN Switching Configuration set an Ethernet port to operate in bridge or route mode (see Guide).
  • Page 199 6343 1400 6343 1400 6343 1400 6343 1400 6343 1400 6343 1400 6343 1400 sFlow Port Information: Interface CID Interval(s) FID MaxHLen Rate Mode Status GE1/0/1 1000 Random Active GE1/0/2 1000 Random Active Table 38 Output description Field Description sFlow Version Currently, sFlow has the following versions, 5: sFlow version 5 sFlow Global Information sFlow global configuration information...
  • Page 200: Sflow Agent

    If the sFlow agent has no IP address configured, the device automatically selects an interface IP address for the sFlow agent but does not save the selected IP address. NOTE: H3C recommends that you configure an IP address manually for the sFlow agent. • •...
  • Page 201: Sflow Counter Interval

    ipv6 ipv6-address: Specifies the IPv6 address of the sFlow collector. description text: Specifies a description for the sFlow collector. The default description is "CLI Collector." datagram-size size: Specifies the maximum length of the sFlow data portion in every sFlow packet that is sent out.
  • Page 202: Sflow Counter Collector

    <Sysname> system-view [Sysname] interface GigabitEthernet1/0/1 [Sysname-GigabitEthernet1/0/1] sflow counter interval 120 sflow counter collector Syntax sflow counter collector collector-id undo sflow counter collector View Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Default level 2: System level Parameters collector-id: Specifies the ID of the sFlow collector. Description Use the sflow counter collector command to specify the sFlow collector for counter sampling.
  • Page 203: Sflow Flow Max-Header

    (starting from the header). Use the undo sflow flow max-header command to restore the default. By default, up to 128 bytes of a sampled packet that can be copied. H3C recommends you use the default value. This command is supported only on physical Ethernet interfaces, but not on logical interfaces (such as VLAN interfaces) and management interfaces.
  • Page 204: Sflow Sampling-Rate

    View Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Default level 2: System level Parameters determine: Specifies the fixed sampling mode. For example, if the flow sampling interval is set to 4000 (by using the sflow sampling-rate command), the device randomly samples a packet, like the tenth packet, from the first 4000 packets.
  • Page 205: Sflow Source

    Parameters interval: Specifies the number of packets out of which the interface will sample a packet, ranging from 1000 to 500000. Description Use the sflow sampling-rate command to specify the number of packets out of which the interface will sample a packet. Use the undo sflow sampling-rate command to disable sampling.
  • Page 206: Netstream Configuration Commands

    NetStream configuration commands display ip netstream cache Syntax display ip netstream cache [ verbose ] [ slot slot-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters verbose: Displays the detailed information of the NetStream entries in the cache. slot slot-number: Displays the NetStream entry information in the cache of an IRF member switch.
  • Page 207 IP packet size distribution (0 total packets): 1-32 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 576 1024 1536 2048 2560 3072 3584 4096 4608 >4608 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 Protocol Total Packets...
  • Page 208: Display Ip Netstream Export

    Field Description Statistics of packet by protocol type in the following counting Protocol Total Streams Packets/Sec criteria: protocol number, total number of flows, number of Stream/Sec Packets/stream Active(sec) packets per second, number of flows per second, number of /stream Idle(sec)/stream packets per flow, active time of each flow, inactive time of each flow Statistics of the active flows in the current cache including flow...
  • Page 209 include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use the display ip netstream export command to view statistics about NetStream data export. Examples # Display statistics about NetStream data export. <Sysname>...
  • Page 210: Display Ip Netstream Template

    display ip netstream template Syntax display ip netstream template [ slot slot-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters slot slot-number Displays the NetStream entry information in the cache of an IRF member switch. The slot-number argument refers to the ID of the IRF member switch.
  • Page 211: Enable

    Input SNMP Sampling algorithm Sampling interval Table 41 Output description Field Description Stream template refresh-rate packet Refresh frequency with which the template is sent Stream template refresh-rate time(in Refresh interval in minutes at which the template is sent minute) Added stream templates Number of templates that have been created source-prefix outbound template Information of the source-prefix template in the outbound direction...
  • Page 212: Ip Netstream

    Description Use the enable command to enable current NetStream aggregation. Use the undo enable command to disable current NetStream aggregation. By default, no NetStream aggregation is enabled. Related commands: ip netstream aggregation. Examples # Enable NetStream destination-prefix aggregation. <Sysname> system-view [Sysname] ip netstream aggregation destination-prefix [Sysname-ns-aggregation-dstpr] enable ip netstream...
  • Page 213: Ip Netstream Aggregation Advanced

    Default level 3: Manage level Parameters destination-prefix: Destination-prefix aggregation by destination AS number, destination address mask length, destination prefix, and outbound interface index. prefix: Source and destination prefix aggregation by source AS number, destination AS number, source address mask length, destination address mask length, source prefix, destination prefix, inbound interface index, and outbound interface index.
  • Page 214: Ip Netstream Export Host

    undo ip netstream aggregation advanced View System view Default level 3: Manage level Parameters None Description Use the ip netstream aggregation advanced command to enable NetStream hardware aggregation. Use the undo ip netstream aggregation advanced command to disable NetStream hardware aggregation.
  • Page 215: Ip Netstream Export Rate

    vpn-instance vpn-instance-name: Specifies an MPLS L3VPN that the NetStream data export destination belongs to. The vpn-instance-name argument is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option. Description Use the ip netstream export host command to set the destination address for NetStream data export.
  • Page 216: Ip Netstream Export Source

    If no source interface is configured in aggregation view, the source interface configured in system view is used. H3C recommends you connect the network management interface to the NetStream server and configure it as the source interface. Related commands: ip netstream aggregation.
  • Page 217: Ip Netstream Export V9-Template Refresh-Rate Time

    Default level 3: Manage level Parameters packets: Specifies the number of packets that are sent before version 9 templates are sent to the NetStream server for an update. The value is in the range of 1 to 600. Description Use the ip netstream export v9-template refresh-rate packet command to configure the refresh frequency for NetStream version 9 templates so that the templates are sent after the specified number of packets are sent.
  • Page 218: Ip Netstream Export Version

    By default, version 9 templates are resent every 30 minutes. Version 9 is template-based and supports user-defined formats, so the NetStream-enabled device needs to send the new template to the NetStream server for an update. If the version 9 format is changed on the NetStream-enabled device and not updated on the NetStream server, the server is unable to associate the received statistics with its proper fields.
  • Page 219: Ip Netstream Filter

    Examples # Configure the device to export NetStream data in version 5 format and specify the NetStream data to include the source AS and destination AS. <Sysname> system-view [Sysname] ip netstream export version 5 origin-as ip netstream filter Syntax ip netstream filter acl acl-number { inbound | outbound } undo ip netstream filter acl acl-number { inbound | outbound } View Layer 2 Ethernet interface view, Layer 3 Ethernet interface view...
  • Page 220: Ip Netstream Sampler

    ip netstream sampler Syntax ip netstream sampler sampler-name { inbound | outbound } undo ip netstream sampler sampler-name { inbound | outbound } View Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Default level 3: Manage level Parameters sampler sampler-name: Specifies a sampler name, a string of up to 32 characters.
  • Page 221: Ip Netstream Timeout Inactive

    By default, the aging timer is 5 minutes for active flows. Related commands: ip netstream timeout inactive. NOTE: • The aging timers for active flows and inactive flows apply to NetStream traditional data flows. You can configure both the aging timer for active flows and the aging timer for inactive flows. When •...
  • Page 222: Netstream Filter

    netstream filter Syntax netstream filter { deny | permit } undo netstream filter View Traffic behavior view Default level 2: System level Parameters deny: Specifies to forward packets without NetStream processing. permit: Specifies to perform NetStream processing for packets. Description Use the netstream filter command to configure the NetStream filtering action for a traffic behavior.
  • Page 223 Netstream statistic function is disabled during this process.
  • Page 224: Ipv6 Netstream Configuration Commands

    IPv6 NetStream configuration commands display ipv6 netstream cache Syntax display ipv6 netstream cache [ verbose ] [ slot slot-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters verbose: Displays the detailed information of the IPv6 NetStream entries in the cache.
  • Page 225 1-32 .249 .694 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 576 1024 1536 2048 2560 3072 3584 4096 4608 >4608 .000 .000 .027 .000 .027 .000 .000 .000 .000 .000 .000 .000 Protocol Total Packets Stream Packets Active(sec) Idle(sec)
  • Page 226: Display Ipv6 Netstream Export

    Field Description Range of IP packet size (excluding data link layer header), in bytes. In 1-32 64 96 128 160 192 224 the range of 1 to 576, the range increments in the step of 32. For 256 288 example, "1-32" shows the number of packets in size of 1 to 32 bytes, 320 352 384 416 448 480 512 and "64"...
  • Page 227: Display Ipv6 Netstream Template

    |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression.
  • Page 228 Default level 1: Monitor level Parameters slot slot-number: Displays the IPv6 NetStream entry information in the cache of an IRF member switch. The slot-number argument refers to the ID of the IRF member switch. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.
  • Page 229 Last template export time : Never Field count : 13 Field type Field length (byte) --------------------------------------------------------------------------- Flows In packets In bytes First switched Last switched IPv6 destination address IPv6 destination mask IP protocol version Destination AS Output SNMP Direction Sampling algorithm Sampling interval Table 44 Output description Field...
  • Page 230: Enable

    enable Syntax enable undo enable View NetStream aggregation view Default level 3: Manage level Parameters None Description Use the enable command to enable current IPv6 NetStream aggregation. Use the undo enable command to disable current IPv6 NetStream aggregation. By default, no IPv6 NetStream aggregation is enabled. Related commands: ipv6 netstream aggregation.
  • Page 231: Ipv6 Netstream Aggregation

    Examples # Enable IPv6 NetStream for incoming traffic on interface GigabitEthernet1/0/1. <Sysname> system-view [Sysname] interface GigabitEthernet1/0/1 [Sysname-GigabitEthernet1/0/1] ipv6 netstream inbound ipv6 netstream aggregation Syntax ipv6 netstream aggregation { destination-prefix | prefix | protocol-port | source-prefix } View System view Default level 3: Manage level Parameters destination-prefix: Destination-prefix aggregation by destination AS number, destination address mask...
  • Page 232: Ipv6 Netstream Export Host

    undo ipv6 netstream aggregation advanced View System view Default level 3: Manage level Parameters None Description Use the ipv6 netstream aggregation advanced command to enable IPv6 NetStream hardware aggregation. Use the undo ipv6 netstream aggregation advanced command to disable IPv6 NetStream hardware aggregation.
  • Page 233: Ipv6 Netstream Export Rate

    vpn-instance vpn-instance-name: Specifies an MPLS L3VPN that the IPv6 NetStream data export destination belongs to. The vpn-instance-name argument is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify the option. Description Use the ipv6 netstream export host command to set the destination address for IPv6 NetStream data export.
  • Page 234: Ipv6 Netstream Export Source

    If no source interface is configured in NetStream aggregation view, the source interface configured in system view is used. H3C recommends you connect the network management interface to the NSC and configure it as the source interface. Related commands: ipv6 netstream aggregation.
  • Page 235: Ipv6 Netstream Export V9-Template Refresh-Rate Time

    View System view Default level 3: Manage level Parameters packets: Specifies the number of packets that are sent before version 9 templates are sent to the NetStream server for an update. It is in the range of 1 to 600. Description Use the ipv6 netstream export v9-template refresh-rate packet command to configure the refresh frequency for IPv6 NetStream version 9 templates so that the templates are sent after the specified...
  • Page 236: Ipv6 Netstream Export Version 9

    Use the ipv6 netstream export v9-template refresh-rate time command to configure the refresh interval for IPv6 NetStream version 9 templates so that the templates are sent after the specified time period. Use the undo ipv6 netstream export version command to restore the default. By default, IPv6 NetStream version 9 templates are sent every 30 minutes.
  • Page 237: Reset Ipv6 Netstream Statistics

    Examples # Configure the device to export IPv6 NetStream data in version 9 format and record the number of AS that originates the BGP route. <Sysname> system-view [Sysname] ipv6 netstream export version 9 origin-as reset ipv6 netstream statistics Syntax reset ipv6 netstream statistics View User view Default level...
  • Page 238: Sampler Configuration Commands

    Sampler configuration commands display sampler Syntax display sampler [ sampler-name ] [ slot slot-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters sampler-name: Specifies the sampler name, a case-insensitive string of 1 to 32 characters. slot slot-number: Displays the sampler configuration and running information of an IRF member switch.
  • Page 239: Sampler

    sampler Syntax sampler sampler-name mode fixed packet-interval rate undo sampler sampler-name View System view Default level 2: System level Parameters sampler-name: Assigns the name to the sampler, a case-insensitive string of 1 to 32 characters. fixed: Specifies the fixed sampling mode, in which the first packet is selected per sampling. packet-interval rate: Specifies the sampling rate, which equals the 2 to the power of rate.
  • Page 240: Ipc Configuration Commands

    IPC configuration commands NOTE: The display commands in this document display only information about active nodes. display ipc channel Syntax display ipc channel { node node-id | self-node } [ | { begin | exclude | include } regular-expression ] View Any view Default level...
  • Page 241: Display Ipc Link

    Table 46 Output description Field Description Channel number, which has been predefined and assigned by the ChannelID system. One channel number corresponds to one module. The display ipc channel command displays the numbers of the current active modules. Description information, which is generated by the internal software of the device, is used to describe the functions of a channel.
  • Page 242: Display Ipc Multicast-Group

    Table 47 Output description Field Description Dst-NodeID Number of the peer node Link status, which may take the following values: LinkStatus UP—A connection is established. DOWN—A connection is terminated. display ipc multicast-group Syntax display ipc multicast-group { node node-id | self-node } [ | { begin | exclude | include } regular-expression ] View Any view...
  • Page 243: Display Ipc Node

    Field Description Link status, which may take the following values: Status INUSE—The multicast group is in use. DELETE—The multicast group is to be deleted. ChannelID Channel number display ipc node Syntax display ipc node [ | { begin | exclude | include } regular-expression ] View Any view Default level...
  • Page 244 View Any view Default level 1: Monitor level Parameters node node-id: Displays the packet statistics of the specified node, where node-id represents the number of the specified node. The value is in the range of 0 to 20. self-node: Displays the packet statistics of the local node. |: Filters command output by specifying a regular expression.
  • Page 245: Display Ipc Performance

    display ipc performance Syntax display ipc performance { node node-id | self-node } [ channel channel-id ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters node node-id: Displays the IPC performance statistics information of the specified node, where node-id represents the number of the specified node.
  • Page 246: Display Ipc Queue

    Statistics for packets recieved successfully: Peak 10Sec 1Min 5Min Total-Data ------------------------------------------------------------ Statistics for packets acknowledged: Peak 10Sec 1Min 5Min Total-Data ------------------------------------------------------------ Table 51 Output description Field Description Peak rate (average rate is counted every 10 seconds, the Peak greatest value of which is taken as the peak rate), in pps. 10Sec Average rate in the past 10 seconds, in pps.
  • Page 247: Ipc Performance Enable

    Examples # Display the sending queue information of the local node. <Sysname> display ipc queue self-node QueueType QueueID Dst-NodeID Length FullTimes Packet ------------------------------------------------------------ UNICAST 4096 UNICAST 4096 UNICAST 4096 UNICAST 4096 UNICAST 4096 UNICAST 4096 UNICAST 4096 UNICAST 4096 MULTICAST 4096 MULTICAST 4096...
  • Page 248: Reset Ipc Performance

    Default level 1: Monitor level Parameters node node-id: Enables IPC performance statistics of the specified node, where node-id represents the number of the specified node. The value is in the range of 0 to 20. self-node: Enables IPC performance statistics of the local node. channel channel-id: Enables IPC performance statistics information of the specified channel, where channel-id represents the channel number.
  • Page 249: Cluster Management Configuration Commands

    Cluster management configuration commands NDP configuration commands display ndp Syntax display ndp [ interface interface-list ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters interface interface-list: Specifies an Ethernet port list, which can contain multiple Ethernet ports. The interface-list argument is in the format interface-list = { interface-type interface-number [ to interface-type interface-number ] } &...
  • Page 250 Host Name : H3C Port Name : GigabitEthernet1/0/32 Software Ver: ESS 1101 Device Name : H3C S5810-50S Port Duplex : AUTO Product Ver : S5810-ESS1101 BootROM Ver : 104 Interface: GigabitEthernet1/0/10 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0...
  • Page 251: Ndp Enable

    Table 53 Output description Field Description Neighbor Discovery Protocol is enabled NDP is enabled globally on the current switch. Neighbor Discovery Protocol Ver Version of NDP Hello Timer Interval to send NDP packets The time for the receiving switch to hold NDP Aging Timer information Interface...
  • Page 252: Ndp Timer Aging

    Parameters interface interface-list: Specifies an Ethernet port list, which can contain multiple Ethernet ports. The interface-list argument is in the format interface-list = { interface-type interface-number [ to interface-type interface-number ] } & <1- 1 0>, where interface-type represents the port type, interface-number represents the port number, and &...
  • Page 253: Ndp Timer Hello

    Description Use the ndp timer aging command to specify the time that a switch should keep the NDP packets it received from the adjacent switch. Use the undo timer aging command to restore the default. By default, the time that a receiving switch should keep the NDP packets is 180 seconds. The time for the receiving switch to hold NDP packets cannot be shorter than the interval to send NDP packets;...
  • Page 254: Ntdp Configuration Commands

    View User view Default level 1: Monitor level Parameters interface interface-list: Specifies an Ethernet port list, which can contain multiple Ethernet ports. The interface-list argument is in the format interface-list = { interface-type interface-number [ to interface-type interface-number ] } & <1- 1 0>, where interface-type represents the port type, interface-number represents the port number, and &...
  • Page 255: Display Ntdp Device-List

    Hops Timer : 1 min Hop Delay : 100 ms Port Delay: 10 ms Last collection total time: 92ms Table 54 Output description Field Description NTDP is running NTDP is enabled globally on the local switch. Hops Hop count for topology collection Timer Interval to collect topology information (after the cluster is created) Indicates that the switch is not a management switch and unable to perform...
  • Page 256 Device : H3C S3610-28F : 192.168.1.5/24 Version H3C Comware Platform Software Comware Software Version 5.20 Release 0001 Copyright (c) 2004-2009 Hangzhou H3C Tech. Co., Ltd. All rights reserved. H3C S3610-28F V500R003B05D008 -------------------------------------------------------------------- Cluster Administrator switch of cluster aaa Peer Hostname : aaa_0.h3c...
  • Page 257: Display Ntdp Single-Device

    Field Description IP address and subnet mask length of the management VLAN interface on the switch Version Version information Hops from the current switch to the switch that collects topology information Role of the switch in the cluster: • Member switch of cluster aaa: The switch is a member switch of the cluster aaa. •...
  • Page 258 : S3100 : 16.168.1.2/24 Version H3C Comware Platform Software Comware Software Version 5.20 Release 0001 Copyright (c) 2004-2009 Hangzhou H3C Tech. Co., Ltd. All rights reserved. H3C S3610-28F V500R003B05D008 -------------------------------------------------------------------- Cluster Member switch of cluster aaa , Administrator MAC: 00e0-fc00-5175 Peer Hostname : aaa_0.h3c...
  • Page 259: Ntdp Enable

    Field Description Speed Speed of the local port to which a neighbor switch is connected Duplex Duplex mode of the local port to which a neighbor switch is connected ntdp enable Syntax ntdp enable undo ntdp enable View System view, Layer 2 Ethernet port view, Layer 2 aggregate interface view Default level 2: System level Parameters...
  • Page 260: Ntdp Hop

    Default level 2: System level Parameters None Description Use the ntdp explore command to start topology information collection manually. Examples # Start topology information collection manually. <Sysname> ntdp explore ntdp hop Syntax ntdp hop hop-value undo ntdp hop View System view Default level 2: System level Parameters...
  • Page 261: Ntdp Timer Hop-Delay

    Default level 2: System level Parameters interval: Specifies the interval (in minutes) to collect topology information, which ranges from 0 to 65,535. A value of 0 means not to collect topology information. Description Use the ntdp timer command to configure the interval to collect topology information. Use the undo ntdp timer command to restore the default.
  • Page 262: Ntdp Timer Port-Delay

    ntdp timer port-delay Syntax ntdp timer port-delay delay-time undo ntdp timer port-delay View System view Default level 2: System level Parameters delay-time: Specifies the delay time (in milliseconds) for a switch to forward a topology-collection request through its successive ports, which ranges from 1 to 100. Description Use the ntdp timer port-delay command to set the delay time for a switch to forward a received topology-collection request through its successive ports.
  • Page 263: Administrator-Address

    password: Specifies the password of the candidate switch, which is a string of 1 to 16 characters. The password is required when you add a candidate switch to a cluster. However, this argument is not needed if the candidate switch is not configured with a super password. Description Use the add-member command to add a candidate switch to a cluster.
  • Page 264: Auto-Build

    (Please confirm in 30 seconds, default No). (Y/N) Please input cluster name:test Collecting candidate list, please wait... #Jul 15 10:49:01:921 2009 Sysname CLST/4/RoleChange: OID:1.3.6.1.4.1.25506.8.7.1.0.3<hh3chgmpMemberStatusChange>: member 00.00.00.00. 00.22.57.ad.2c.f3 role change, NTDPIndex:0.00.00.00.00.00.22.57.ad.2c.f3, Role:1 Candidate list: Name Hops MAC Address Device 000f-e200-a0b0 H3C S5820X-28S...
  • Page 265 00e0-faaa-0000 H3C S5800-56C 000f-e200-7000 H3C S5500-28C-PWR-EI 3030-3000-0001 H3C S5800-32C Processing...please wait %Jul 15 10:49:03:451 2009 Sysname CLST/4/LOG: Member 3030-3000-0001 is joined in cluster test. %Jul 15 10:49:03:572 2009 Sysname CLST/4/LOG: Member 00e0-faaa-0000 is joined in cluster test. %Jul 15 10:49:03:692 2009 Sysname CLST/4/LOG: Member 000f-e200-a0b0 is joined in cluster test.
  • Page 266: Black-List Add-Mac

    00.22.57.ad.2c.f3 role change, NTDPIndex:0.00.00.00.00.00.22.57.ad.2c.f3, Role:1 Candidate list: Name Hops MAC Address Device 000f-e200-a0b0 H3C S5820X-28S 00e0-faaa-0000 H3C S5800-56C 000f-e200-7000 H3C S5500-28C-PWR-EI 3030-3000-0001 H3C S5800-32C Processing...please wait %Jul 15 10:54:31:626 2009 Sysname CLST/4/LOG: Member 000f-e200-a0b0 is joined in cluster test. %Jul 15 10:54:31:747 2009 Sysname CLST/4/LOG: Member 3030-3000-0001 is joined in cluster test.
  • Page 267: Black-List Delete-Mac

    Description Use the black-list add-mac command to add a switch to the blacklist. This command can be executed only on the management switch. Examples # Add a switch with the MAC address of 0EC0-FC00-0001 to the blacklist on the management switch. <aaa_0.Sysname>...
  • Page 268 Default level 2: System level Parameters cluster-name: Specifies the cluster name. It is a string of 1 to 8 characters, which can only be letters, numbers, hyphen (-), and underline (_). Description Use the build command to configure the current switch as the management switch and specify a cluster name for it.
  • Page 269: Cluster

    Table 60 Output description Field Description Whether to restore the topology information of the cluster from the Flash of the current switch. If there was once a cluster on your network and the Restore topology from local flash file,for there is no standard topology information has been saved to the base topology.
  • Page 270: Cluster Switch

    undo cluster enable View System view Default level 2: System level Parameters None Description Use the cluster enable command to enable the cluster function. Use the undo cluster enable command to disable the cluster function. By default, the cluster function is enabled. When you execute the undo cluster enable command on a management switch, you remove the •...
  • Page 271: Cluster-Local-User

    Please select a member-number to input: 2 Trying ... Press CTRL+K to abort Connected ... ****************************************************************************** * Copyright (c) 2004-2009 Hangzhou H3C Tech. Co., Ltd. All rights reserved. * Without the owner's prior written consent, * no decompiling or reverse-engineering shall be allowed. ****************************************************************************** <aaa_2.5800-2>...
  • Page 272: Cluster-Mac

    Use the undo cluster-local-user command to remove the configuration. The command can be configured once only on the management switch. Examples # On the management switch, configure web user accounts for the switches within a cluster, with username being abc, password being 123456 and displayed in plain text. <aaa_0.Sysname>...
  • Page 273: Cluster-Snmp-Agent Community

    View Cluster view Default level 2: System level Parameters interval: Specifies the interval (in minutes) to send MAC address negotiation broadcast packets, which ranges from 0 to 30. If the interval is set to 0, the management switch does not send broadcast packets to the member switches.
  • Page 274: Cluster-Snmp-Agent Group V3

    Use the undo cluster-snmp-agent community command to remove a specified community name. The command used to configure the SNMP community with read-only or read-and-write authority can only be executed once on the management switch. This configuration will be synchronized to the member switches in the whitelist, which is equivalent to configuring multiple member switches at one time.
  • Page 275: Cluster-Snmp-Agent Mib-View

    The command can be executed once only on the management switch. This configuration will be synchronized to the member switches in the whitelist, which is equivalent to configuring multiple member switches at one time. The SNMPv3 group name is retained when a cluster is dismissed or a member switch is deleted from the whitelist.
  • Page 276: Cluster-Snmp-Agent Usm-User V3

    Examples # Create a view including all objects of mib2. <aaa_0.Sysname> system-view [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] cluster-snmp-agent mib-view included mib2 1.3.6.1.2.1 cluster-snmp-agent usm-user v3 Syntax cluster-snmp-agent usm-user v3 user-name group-name [ authentication-mode { md5 | sha } auth-password ] [ privacy-mode des56 priv-password ] undo cluster-snmp-agent usm-user v3 user-name group-name View Cluster view...
  • Page 277: Delete-Member

    Examples # Add a user wang to the SNMP group snmpgroup, set the security level to authentication-needed and specify the authentication protocol as HMAC-MD5-96, and specify the authentication password as pass. <aaa_0.Sysname> system-view [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] cluster-snmp-agent usm-user wang snmpgroup authentication-mode md5 pass delete-member Syntax...
  • Page 278 Parameters |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression.
  • Page 279: Display Cluster Base-Topology

    Field Description Role of the switch in the cluster: • Role Administrator—The current switch is a management switch. • Member—The current switch is a member switch. Member number Number of the switch in the cluster Management-vlan Management VLAN of the cluster Handshake timer Interval to send handshake packets Handshake hold-time...
  • Page 280: Display Cluster Black-List

    Examples # Display the standard topology of a cluster. <aaa_0.Sysname> display cluster base-topology -------------------------------------------------------------------- (PeerPort) ConnectFlag (NativePort) [SysName:DeviceMac] -------------------------------------------------------------------- [aaa_0.Sysname:0022-57ad-2cf3] └-(P_2)<-->(P_2)[aaa_1.5820:000f-e200-a0b0] ├-(P_2/0/25)<-->(P_3/0/1)[aaa_4.5800-2:3030-3000-0001] ├-(P_3/0/5)<-->(P_1/0/1)[aaa_3.55EI-2:000f-e200-7000] └-(P_3/0/3)<-->(P_5/0/3)[aaa_2.5800-3:00e0-faaa-0000] └-(P_3/0/15)<-->(P_5/0/1)[aaa_2.5800-3:00e0-faaa-0000] Table 62 Output description Field Description PeerPort Peer port ConnectFlag Connection flag: <--> NativePort Local port SysName System name of the peer switch DeviceMac...
  • Page 281: Display Cluster Candidates

    Description Use the display cluster black-list command to display the current blacklist of a cluster. This command can be executed only on the management switch. Examples # View the current blacklist of the cluster. <aaa_0.Sysname> display cluster black-list Device ID Access Device ID Access port 00e0-fc00-0010...
  • Page 282: Display Cluster Current-Topology

    # Display the information about a specified candidate switch. <aaa_0.Sysname> display cluster candidates mac-address 3030-3000-0001 Hostname : 5800-2 : 3030-3000-0001 Device : H3C S5800-32C # Display the detailed information about all the candidate switches. <aaa_0.Sysname> display cluster candidates verbose Hostname : 5800-2 : 3030-3000-0001...
  • Page 283 Parameters member-number: Specifies the number of the switches in a cluster (including the management switch and member switches). mac-address: Specifies the MAC addresses of the switches in a cluster (including the management switch and member switches). |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.
  • Page 284: Display Cluster Members

    └-(P_3/0/15)-┤├-(P_5/0/1)[aaa_2.5800-3:00e0-faaa-0000] Table 65 Output description Field Description PeerPort Peer port ConnectFlag Connection flag NativePort Local port SysName:DeviceMac System name of the switch Indicates a normal connection between the switch and the <--> normal connect management switch Indicates a unidirectional connection between the switch and the --->...
  • Page 285 MAC Address: 0022-57ad-2cf3 Member status:Admin Hops to administrator device:0 Version: H3C Comware Platform Software Comware Software Version 5.20 Test 5101 Copyright (c) 2004-2011 Hangzhou H3C Tech. Co., Ltd. All rights reserved. H3C S5500-58C-HI V500R001B06D013 Member number:0 Name:aaa_0.Sysname Device:H3C S3600V2-28TP-PWR-EI MAC Address:000f-e2aa-0800...
  • Page 286 Hops to administrator device:0 IP: 192.168.0.80/24 Version: H3C Comware Platform Software Comware Software Version 5.20 Alpha 0006 Copyright (c) 2004-2011 Hangzhou H3C Tech. Co., Ltd. All rights reserved. H3C S3600V2-28TP-PWR-EI V200R001B01D008 Member number:1 Name:aaa_1.5820 Device:H3C S5820X-28S MAC Address:000f-e200-a0b0 Member status:Up Hops to administrator device:1 IP: 121.1.1.2/16...
  • Page 287: Ftp-Server

    Field Description Name of a member switch, composed of the cluster name and the system name of the member switch, in the format cluster name.systemname When the management switch type is not consistent with the member switch type, if Name a user modifies the cluster name on the management switch continuously, the cluster name may appear twice in the cluster member name, for example, “clustername.clustername.systemname”.
  • Page 288: Holdtime

    The command can be executed only on the management switch. Examples # Set the IP address, username and password of an FTP server shared by the cluster on the management switch to be 1.0.0.9, ftp, and ftp in plain text respectively. <Sysname>...
  • Page 289: Logging-Host

    View Cluster view Default level 2: System level Parameters ip-address: Specifies the private IP address of the management switch in a cluster. { mask | mask-length }: Specifies the mask of the IP address pool of a cluster. It is an integer or in dotted decimal notation.
  • Page 290: Management-Vlan

    You have to execute the info-center loghost command in system view first for the logging host you configured to take effect. For more information about the info-center loghost command, see the chapter “Information center commands.” Examples # Configure the IP address of the logging host shared by a cluster on the management switch as 10.10.10.9.
  • Page 291: Management-Vlan Synchronization Enable

    [Sysname] management-vlan 2 management-vlan synchronization enable Syntax management-vlan synchronization enable undo management-vlan synchronization enable View Cluster view Default level 1: Monitor level Parameters None Description Use the management-vlan synchronization enable command to enable the management VLAN auto-negotiation function. Use the undo management-vlan synchronization enable command to disable the management VLAN auto-negotiation function.
  • Page 292: Reboot Member

    Examples # Configure VLAN-interface 2 as the network management interface. <aaa_0.Sysname> system-view [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] nm-interface vlan-interface 2 reboot member Syntax reboot member { member-number | mac-address mac-address } [ eraseflash ] View Cluster view Default level 2: System level Parameters member-number: Specifies the number of the member switch, which ranges from 1 to 255.
  • Page 293: Tftp-Server

    string1: Specifies the community name of read-only access, a string of 1 to 26 characters. string2: Specifies the community name of read-write access, a string of 1 to 26 characters. Description Use the snmp-host command to configure a shared SNMP host for a cluster. Use the undo snmp-host command to cancel the SNMP host configuration.
  • Page 294: Timer

    timer Syntax timer interval undo timer View Cluster view Default level 2: System level Parameters interval: Specifies the interval (in seconds) to send handshake packets. This argument ranges from 1 to 255. Description Use the timer command to set the interval to send handshake packets. Use the undo timer command to restore the default.
  • Page 295: Topology Restore-From

    member-id member-number: Specifies a switch by its number. The switch will be accepted to join the standard topology of the cluster. The member-number argument represents the number of a cluster member and ranges from 0 to 255. save-to: Confirms the current topology as the standard topology, and backs up the standard topology on the FTP server or local flash in a file named “topology.top”.
  • Page 296: Topology Save

    [Sysname] cluster [Sysname-cluster] ip-pool 10.1.1.1 24 [Sysname-cluster] build aaa [aaa_0.Sysname-cluster] topology restore-from local-flash topology save-to Syntax topology save-to { ftp-server | local-flash } View Cluster view Default level 2: System level Parameters ftp-server: Saves the standard topology information to the FTP server. local-flash: Saves the standard topology information to the local flash.
  • Page 297: Cwmp Configuration Commands

    CWMP configuration commands cwmp Syntax cwmp View System view Default level 2: System level Parameters None Description Use the cwmp command to enter CWMP view. Examples # Enter CWMP view. <Sysname> system-view [Sysname] cwmp cwmp acs password Syntax cwmp acs password passowrd undo cwmp acs password View CWMP view...
  • Page 298: Cwmp Acs Url

    To delete both the username and password for connecting to the ACS, use the undo cwmp acs username command. Related commands: cwmp acs username. Examples # Configure the password used for connecting to the ACS as newpsw. <Sysname> system [Sysname] cwmp [Sysname-cwmp] cwmp acs password newpsw cwmp acs url Syntax...
  • Page 299: Cwmp Cpe Connect Retry

    Parameters username: Username used for authentication when the CPE connects to the ACS, which is a case-sensitive string of 1 to 255 characters. Description Use the cwmp acs username command to configure the username used for connecting to the ACS. Use the undo cwmp acs username command to restore the default.
  • Page 300: Cwmp Cpe Connect Interface

    cwmp cpe connect interface Syntax cwmp cpe connect interface interface-type interface-number undo cwmp cpe connect interface View CWMP view Default level 2: System level Parameters interface-type interface-number: Type and number of the interface that connects the CPE to the ACS. Description Use the cwmp cpe connect interface command to set the interface that connects the CPE to the ACS.
  • Page 301: Cwmp Cpe Inform Interval Enable

    <Sysname> system [Sysname] cwmp [Sysname-cwmp] cwmp cpe inform interval 3600 cwmp cpe inform interval enable Syntax cwmp cpe inform interval enable undo cwmp cpe inform interval enable View CWMP view Default level 2: System level Parameters None Description Use the cwmp cpe inform interval enable command to enable periodical sending of Inform messages. Use the undo cwmp cpe inform interval enable command to restore the default.
  • Page 302: Cwmp Cpe Password

    Use the undo cwmp cpe inform time command to restore the default. By default, the CPE is not configured to send an Inform message at a specific time. Examples # Configure the CPE to send an Inform message at 2007- 1 2-01T20:00:00. <Sysname>...
  • Page 303: Cwmp Cpe Wait Timeout

    View CWMP view Default level 2: System level Parameters username: Username used for authentication when the ACS connects to the CPE, which is a case-sensitive string of 1 to 255 characters. Description Use the cwmp cpe username command to configure the username used for authentication when the ACS connects to the CPE.
  • Page 304: Cwmp Enable

    <Sysname> system [Sysname] cwmp [Sysname-cwmp] cwmp cpe wait timeout 60 cwmp enable Syntax cwmp enable undo cwmp enable View CWMP view Default level 2: System level Parameters None Description Use the cwmp enable command to enable CWMP. Use the undo cwmp enable command to disable CWMP. By default, CWMP is enabled.
  • Page 305: Display Cwmp Status

    regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use the display cwmp configuration command to display the current CWMP configuration. Examples # Display the CWMP configuration when CWMP is enabled. <Sysname> display cwmp configuration TR-069 is enabled.
  • Page 306 Default level 2: System level Parameters |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression.
  • Page 307 Field Description Authentication username for connecting to the ACS. It ACS username is displayed as null if not configured. Authentication password for connecting to the ACS. It ACS password is displayed as null if not configured. Connection status, includes: • connected: Indicates that the connection is established.
  • Page 308: Index

    Index A B C D E F H I L M N O P R S T U V data-size,132 debugging,12 add-member,249 delete-member,264 administrator-address,250 description (any NQA test type view),133 advantage-factor,130 destination ip,133 auto-build,251 destination port,134 display channel,31 display cluster,264 black-list add-mac,253 display cluster...
  • Page 309 display nqa reaction counters,136 holdtime,275 display nqa result,138 http-version,151 display nqa server status,181 display nqa statistics,142 info-center channel name,42 display ntdp,241 info-center console channel,43 display ntdp device-list,242 info-center enable,44 display ntdp single-device,244 info-center format unicom,44 display ntp-service sessions,14 info-center logbuffer,45 display ntp-service status,18 info-center logfile...
  • Page 310 ipv6 netstream aggregation,218 ntdp explore,246 ipv6 netstream aggregation advanced,218 ntdp hop,247 ipv6 netstream export host,219 ntdp timer,247 ipv6 netstream export rate,220 ntdp timer hop-delay,248 ipv6 netstream export source,221 ntdp timer port-delay,249 ipv6 netstream export v9-template refresh-rate ntp-service access,21 packet,221 ntp-service authentication enable,22 ipv6 netstream export v9-template refresh-rate ntp-service...
  • Page 311 reboot member,279 snmp-agent trap enable,89 reset ip netstream statistics,209 snmp-agent trap if-mib link extended,91 reset ipc performance,235 snmp-agent trap life,92 reset ipv6 netstream statistics,224 snmp-agent trap queue-size,93 reset logbuffer,62 snmp-agent trap source,94 reset ndp statistics,240 snmp-agent usm-user { v1 | v2c },94 reset trapbuffer,62...

Table of Contents