HP 6125XLG Command Reference Manual

Blade switch network management and monitoring
Table of Contents

Advertisement

HP 6125XLG Blade Switch
Network Management and Monitoring

Command Reference

Part number: 5998-3740
Software version: Release 2306
Document version: 6W100-20130912

Advertisement

Table of Contents
loading

Summary of Contents for HP 6125XLG

  • Page 1: Command Reference

    HP 6125XLG Blade Switch Network Management and Monitoring Command Reference Part number: 5998-3740 Software version: Release 2306 Document version: 6W100-20130912...
  • Page 2 HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
  • Page 3: Table Of Contents

    Contents Ping, tracert, and system debugging commands ······································································································· 5   debugging ································································································································································· 5   display debugging ··················································································································································· 6   ping ············································································································································································ 6   ping ipv6 ··································································································································································· 9   tracert ······································································································································································ 11   tracert ipv6 ····························································································································································· 13   NTP commands ·························································································································································· 15  ...
  • Page 4 display logfile summary ········································································································································ 57   display security-logfile summary ·························································································································· 58   enable log updown ··············································································································································· 58   info-center enable ·················································································································································· 59   info-center logbuffer ·············································································································································· 59   info-center logbuffer size ······································································································································ 60   info-center logfile enable ······································································································································ 61   info-center logfile frequency ·································································································································...
  • Page 5 snmp-agent target-host ········································································································································ 103   snmp-agent trap enable ······································································································································ 105   snmp-agent trap if-mib link extended ················································································································ 108   snmp-agent trap life ············································································································································· 108   snmp-agent trap queue-size ································································································································ 109   snmp-agent usm-user { v1 | v2c } ······················································································································ 110  ...
  • Page 6 Process monitoring and maintenance commands ································································································ 150   display kernel deadloop ····································································································································· 150   display kernel deadloop configuration ············································································································· 153   display kernel exception ····································································································································· 154   display kernel reboot ·········································································································································· 157   display kernel starvation ····································································································································· 159   display kernel starvation configuration ············································································································· 162  ...
  • Page 7: Ping, Tracert, And System Debugging Commands

    Ping, tracert, and system debugging commands debugging Use debugging to enable debugging for a specific module. Use undo debugging to disable debugging for a specific module. Syntax debugging { all [ timeout time ] | module-name [ option ] } undo debugging { all | module-name [ option ] } Default Debugging functions are disabled for all modules.
  • Page 8: Display Debugging

    display debugging Use display debugging to display the enabled debugging functions. Syntax display debugging [ module-name ] Views Any view Predefined user roles network-admin network-operator Parameters module-name: Displays the debugging settings of the specified module. To display the current module name, use the display debugging ? command.
  • Page 9 -h ttl: Specifies the TTL value for an ICMP echo request. The ttl argument is in the range of 1 to 255. The default value is 255. -i interface-type interface-number: Specifies the ICMP echo request sending interface by its type and number.
  • Page 10 56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms --- 1.1.2.2 ping statistics --- 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms # Test whether the device with an IP address of 1.1.2.2 in VPN 1 is reachable. <Sysname>...
  • Page 11: Ping Ipv6

    Table 1 Command output Field Description Test whether the device with IP address 1.1.2.2 is reachable. There are PING 1.1.2.2 (1.1.2.2): 56 data 56 data bytes in each ICMP echo request. Press Ctrl+C to abort the ping bytes, press CTRL_C to break operation.
  • Page 12 -q: Displays only statistics. If this keyword is not specified, all information including the statistics is displayed. -s packet-size: Specifies length (in bytes) of an ICMPv6 echo request (not including the IPv6 packet header and the ICMPv6 packet header). The packet-size argument is in the range of 20 to 8100. The default value is 56.
  • Page 13: Tracert

    PING6(104=40+8+56 bytes) 2001::1 --> 2001::2, press CTRL_C to break 56 bytes from 2001::2, icmp_seq=0 hlim=64 dst=2001::1 idx=3 time=62.000 ms 56 bytes from 2001::2, icmp_seq=1 hlim=64 dst=2001::1 idx=3 time=23.000 ms 56 bytes from 2001::2, icmp_seq=2 hlim=64 dst=2001::1 idx=3 time=20.000 ms 56 bytes from 2001::2, icmp_seq=3 hlim=64 dst=2001::1 idx=3 time=4.000 ms 56 bytes from 2001::2, icmp_seq=4 hlim=64 dst=2001::1 idx=3 time=16.000 ms --- 2001::2 ping6 statistics --- 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss...
  • Page 14 Syntax tracert [ -a source-ip | -f first-ttl | -m max-ttl | -p port | -q packet-number | -vpn-instance vpn-instance-name | -w timeout ] * host Views Any view Predefined user roles network-admin Parameters -a source-ip: Specifies the source IP address of a tracert packet. It must be a valid IP address configured on the device.
  • Page 15: Tracert Ipv6

    # Trace the path to destination (192.168.0.46) over an MPLS network. <Sysname> tracert 192.168.0.46 traceroute to 192.168.0.46(192.168.0.46), 30 hops at most, 40 bytes each packet, press CTRL_C to break 192.0.2.13 (192.0.2.13) 0.661 ms 0.618 ms 0.579 ms 192.0.2.9 (192.0.2.9) 0.861 ms 0.718 ms 0.679 ms MPLS Label=100048 Exp=0 TTL=1 S=1...
  • Page 16 Parameters -f first-hop: Specifies the first hoplimit (the allowed number of hops for the first packet). The first-hop argument is in the range of 1 to 255. The default value is 1. The first hoplimit must be less than the value of the max-hops argument.
  • Page 17: Ntp Commands

    NTP commands display ntp-service ipv6 sessions Use display ntp-service ipv6 sessions to display information about all IPv6 NTP associations. Syntax display ntp-service ipv6 sessions [ verbose ] Views Any view Predefined user roles network-admin network-operator Parameters verbose: Displays detailed information about all IPv6 NTP associations. If you do not specify this keyword, the command displays only brief information about the IPv6 NTP associations.
  • Page 18 Field Description Reference clock ID of the NTP server: • If the reference clock is the local clock, the value of this field is related to the value of the Clock stratum field: When the value of the Clock stratum field is 0 or 1, this field displays Local.
  • Page 19 Rcvtime: 00000000.00000000 Thu, Feb 7 2036 6:28:16.000 Xmttime: 00000000.00000000 Thu, Feb 7 2036 6:28:16.000 Roundtrip delay samples: 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 Offset samples: 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 Filter order: 0 Total sessions: 1 Table 6 Command output Field Description...
  • Page 20 Field Description Operation mode of the local device: • unspec—The mode is unspecified. • sym_active—Active mode. • sym_passive—Passive mode. Local mode • client—Client mode. • server—Server mode. • broadcast—Broadcast or multicast server mode. • bclient—Broadcast or multicast client mode. Polling interval for the local device, in seconds. The value displayed local poll interval is a power of 2.
  • Page 21: Display Ntp-Service Sessions

    Field Description Xmttime Transmit timestamp in the NTP message. Filter order Dispersion information. Status of the local clock. The field is displayed only when you use the ntp-service refclock-master command to set the local clock as a reference clock. Reference clock status When the reach field of the local clock is 255, the field is displayed as working normally.
  • Page 22: Field Description

    Table 7 Command output Field Description • When the reference clock is the local clock, the field displays LOCAL (number), which indicates that the IP address of the local clock is 127.127.1.number, where number represents the NTP process number in the source range of 0 to 3.
  • Page 23 Reference clock ID: 127.127.1.0 VPN instance: Not specified Local mode: client, local poll interval: 6 Peer mode: server, peer poll interval: 6 Offset: 0.2862ms, roundtrip delay: 3.2653ms, dispersion: 4.5166ms Root roundtrip delay: 0.0000ms, root dispersion: 10.910ms Reachabilities:31, sync distance: 0.0194 Precision: 2^18, version: 3, source interface: Not specified Reftime: d17cbba5.1473de1e Tue, May 17 2011...
  • Page 24 Field Description Reference clock ID of the NTP server: • If the reference clock is the local clock, the value of this field is related to the value of the Clock stratum field: When the value of the Clock stratum field is 0 or 1, this field Reference clock ID displays LOCL.
  • Page 25: Display Ntp-Service Status

    Field Description Synchronization distance relative to the upper-level clock, in sync distance seconds, and calculated from dispersion and roundtrip delay values. Precision Accuracy of the system clock. version NTP version in the range of 1 to 4. Source interface. source interface If the source interface is not specified, this field is Not specified.
  • Page 26 Stability: 0.000 pps Clock precision: 2^-10 Root delay: 0.00000 ms Root dispersion: 3.96367 ms Reference time: d0c5fc32.92c70b1e Wed, Dec 29 2010 18:28:02.573 # Display the NTP service status when time is not synchronized. <Sysname> display ntp-service status Clock status: unsynchronized Clock stratum: 16 Reference clock ID: none Clock jitter: 0.000000 s...
  • Page 27: Display Ntp-Service Trace

    Field Description For an IPv4 NTP server: The field represents the IP address of the remote server when the local device is synchronized to a remote NTP server. The field represents the local clock when the local device uses the local clock as a reference source.
  • Page 28: Ntp-Service Acl

    View Any view Predefined user roles network-admin network-operator Examples # Display brief information about each NTP server from the local device back to the primary reference source. <Sysname> display ntp-service trace Server 127.0.0.1 Stratum 3, jitter 0.000, synch distance 0.0000. Server 3000::32 Stratum...
  • Page 29: Ntp-Service Authentication Enable

    Predefined user roles network-admin Parameters peer: Allows time requests and NTP control queries (such as alarms, authentication status, and time server information) from a peer device and allows the local device to synchronize itself to a peer device. query: Allows only NTP control queries from a peer device to the local device. server: Allows time requests and NTP control queries from a peer device, but does not allow the local device to synchronize itself to a peer device.
  • Page 30: Ntp-Service Authentication-Keyid

    undo ntp-service authentication enable Default NTP authentication is disabled. Views System view Predefined user roles network-admin Usage guidelines Enable NTP authentication in networks that require time synchronization security to make sure NTP clients are only synchronized to authenticated NTP servers. To authenticate an NTP server, set an authentication key and specify it as a trusted key.
  • Page 31: Ntp-Service Broadcast-Client

    value: Specifies the MD5 authentication key string. If simple is specified, it is a string of 1 to 32 characters. If cipher is specified, it is a string of 1 to 73 characters. Usage guidelines In a network where there is a high security demand, the NTP authentication feature must be enabled for a system running NTP.
  • Page 32: Ntp-Service Broadcast-Server

    Examples # Configure the device to operate in broadcast client mode and receive NTP broadcast messages on VLAN-interface 1. <Sysname> system-view [Sysname] interface vlan-interface 1 [Sysname-Vlan-interface1] ntp-service broadcast-client Related commands ntp-service broadcast-server ntp-service broadcast-server Use ntp-service broadcast-server to configure the device to operate in NTP broadcast server mode and use the current interface to send NTP broadcast packets.
  • Page 33: Ntp-Service Enable

    Related commands ntp-service broadcast-client ntp-service enable Use ntp-service enable to enable the NTP service. Use undo ntp-service enable to disable the NTP service. Syntax ntp-service enable undo ntp-service enable Default The NTP service is not enabled. Views System view Predefined user roles network-admin Examples # Enable the NTP service.
  • Page 34: Ntp-Service Ipv6 Acl

    Examples # Disable VLAN-interface 1 from receiving NTP messages. <Sysname> system-view [Sysname] interface vlan-interface 1 [Sysname-Vlan-interface1] ntp-service inbound disable ntp-service ipv6 acl Use ntp-service ipv6 acl to configure the access-control right for the peer devices to access the IPv6 NTP services of the local device.
  • Page 35: Ntp-Service Ipv6 Inbound Disable

    The ntp-service ipv6 acl command provides a minimum security method. NTP authentication is more secure. Examples # Configure the peer devices on subnet 2001::1 to have full access to the local device. <Sysname> system-view [Sysname] acl ipv6 number 2001 [Sysname-acl6-basic-2001] rule permit source 2001::1 64 [Sysname-acl6-basic-2001] quit [Sysname] ntp-service ipv6 peer acl 2001 Related commands...
  • Page 36: Ntp-Service Ipv6 Multicast-Server

    Use undo ntp-service ipv6 multicast-client to remove the configuration. Syntax ntp-service ipv6 multicast-client ipv6-multicast-address undo ntp-service ipv6 multicast-client ipv6-multicast-address Default The device does not operate in any NTP association mode. View VLAN interface view Predefined user roles network-admin Parameters ipv6-multicast-address: Specifies an IPv6 multicast IP address. An IPv6 broadcast client and an IPv6 broadcast server must be configured with the same multicast address.
  • Page 37: Ntp-Service Ipv6 Source

    Predefined user roles network-admin Parameters ipv6-multicast-address: Specifies an IPv6 multicast IP address. An IPv6 multicast client and server must be configured with the same multicast address. authentication-keyid keyid: Specifies the key ID to be used for sending multicast messages to multicast clients, where keyid is in the range of 1 to 4294967295.
  • Page 38: Ntp-Service Ipv6 Unicast-Peer

    Usage guidelines If you specify the source interface for IPv6 NTP messages, the device sets the source IP address of the IPv6 NTP messages as the primary IP address of the specified interface when sending the IPv6 NTP messages. When the device responds to an IPv6 NTP request, the source IPv6 address of the NTP response is always the IPv6 address of the interface that has received the IPv6 NTP request.
  • Page 39: Ntp-Service Ipv6 Unicast-Server

    vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the symmetric-passive peer belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the symmetric-passive peer is on the public network, do not specify this option. authentication-keyid keyid: Specifies the key ID to be used for sending NTP messages to the peer, where keyid is in the range of 1 to 4294967295.
  • Page 40 Default No IPv6 NTP server is specified for the device. Views System view Predefined user roles network-admin Parameters ipv6-address: Specifies an IPv6 address of the NTP server. It must be a unicast address, rather than a multicast address. server-name: Specifies a host name of the NTP server, a case-insensitive string of 1 to 253 characters. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the NTP server belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters.
  • Page 41: Ntp-Service Max-Dynamic-Sessions

    ntp-service authentication-keyid • • ntp-service reliable authentication-keyid ntp-service max-dynamic-sessions Use ntp-service max-dynamic-sessions to set the maximum number of dynamic NTP sessions allowed to be established locally. Use undo ntp-service max-dynamic-sessions to restore the default. Syntax ntp-service max-dynamic-sessions number undo ntp-service max-dynamic-sessions Default The maximum number of dynamic NTP sessions is 100.
  • Page 42: Ntp-Service Multicast-Server

    Default The device does not operate in any NTP association mode. View VLAN interface view Predefined user roles network-admin Parameters ip-address: Specifies a multicast IP address, and the default is 224.0.1.1. A multicast server and client must be configured with the same multicast IP address. Usage guidelines After you configure this command, the device listens to NTP messages with the destination address as the specified multicast address.
  • Page 43: Ntp-Service Refclock-Master

    Parameters ip-address: Specifies a multicast IP address, and the default is 224.0.1.1. A multicast server and client must be configured with the same multicast IP address. authentication-keyid keyid: Specifies the key ID to be used for sending multicast messages to multicast clients, where keyid is in the range of 1 to 4294967295.
  • Page 44: Ntp-Service Reliable Authentication-Keyid

    Parameters ip-address: IP address of the local clock, which is 127.127.1.u, where u is the NTP process ID in the range of 0 to 3. If you do not specify ip-address, it defaults to 127.127.1.0. stratum: Stratum level of the local clock, in the range of 1 to 15. The default value is 8. A lower stratum level represents a higher clock accuracy.
  • Page 45: Ntp-Service Source

    Before you use the command, make sure NTP authentication is enabled and an authentication key is configured. The key automatically changes to untrusted after you delete the key. In this case, you do not need to execute the undo ntp-service reliable authentication-keyid command. You can set up to 128 keys by executing the command.
  • Page 46: Ntp-Service Unicast-Peer

    If you have specified the source interface for NTP messages in the ntp-service unicast-server or • ntp-service unicast-peer command, the interface specified in the ntp-service unicast-server or ntp-service unicast-peer command serves as the source interface for NTP messages. • If you have configured the ntp-service broadcast-server or ntp-service multicast-server command, the source interface for the broadcast or multicast NTP messages is the interface configured with the respective command.
  • Page 47: Ntp-Service Unicast-Server

    source interface-type interface-number: Specifies the source interface for NTP messages. In an NTP message the local device sends to its peer, the source IP address is the primary IP address of this interface. The interface-type interface-number argument represents the interface type and number. version number: Specifies the NTP version, where number is in the range of 1 to 4.
  • Page 48 Parameters ip-address: Specifies an IP address of the NTP server. It must be a unicast address, rather than a broadcast address, a multicast address or the IP address of the local clock. server-name: Specifies a host name of the NTP server, a case-insensitive string of 1 to 253 characters. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the NTP server belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters.
  • Page 49: Sntp Commands

    SNTP commands display sntp ipv6 sessions Use display sntp ipv6 sessions to display information about all IPv6 SNTP associations. Syntax display sntp ipv6 sessions Views Any view Predefined user roles network-admin network-operator Examples # Display information about all IPv6 SNTP associations. <Sysname>...
  • Page 50: Sntp Authentication Enable

    Syntax display sntp sessions Views Any view Predefined user roles network-admin network-operator Examples # Display information about all SNTP associations. <Sysname> display sntp sessions SNTP server Stratum Version Last receive time 1.0.1.11 Tue, May 17 2011 9:11:20.833 (Synced) Table 12 Command output Field Description SNTP server...
  • Page 51: Sntp Authentication-Keyid

    Examples # Enable SNTP authentication. <Sysname> system-view [Sysname] sntp authentication enable Related commands sntp authentication-keyid • sntp reliable authentication-keyid • sntp authentication-keyid Use sntp authentication-keyid to set an SNTP authentication key. Use undo sntp authentication-keyid to remove the SNTP authentication key. Syntax sntp authentication-keyid keyid authentication-mode md5 { cipher | simple } value undo sntp authentication-keyid keyid...
  • Page 52: Sntp Enable

    Examples # Set an MD5 authentication key, with the key ID of 10 and key value of BetterKey. Input the key in plain text. <Sysname> system-view [Sysname] sntp authentication enable [Sysname] sntp authentication-keyid 10 authentication-mode md5 simple BetterKey Related commands sntp authentication enable •...
  • Page 53: Sntp Reliable Authentication-Keyid

    Predefined user roles network-admin Parameters ipv6-address: Specifies an IPv6 address of the NTP server. server-name: Specifies a host name of the NTP server, a case-insensitive string of 1 to 253 characters. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the NTP server belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters.
  • Page 54: Sntp Unicast-Server

    Syntax sntp reliable authentication-keyid keyid undo sntp reliable authentication-keyid keyid Default No trust key is specified. Views System view Predefined user roles network-admin Parameters keyid: Specifies an authentication key number in the range of 1 to 4294967295. Usage guidelines If SNTP is enabled, the SNTP client is only synchronized to an NTP server that provides a trusted key. Before you use the command, make sure SNTP authentication is enabled and an authentication key is configured.
  • Page 55 Views System view Predefined user roles network-admin Parameters ip-address: Specifies an IP address of the NTP server. It must be a unicast address, rather than a broadcast address, a multicast address, or the IP address of the local clock. server-name: Specifies a host name of the NTP server, a case-insensitive string of 1 to 253 characters. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the NTP server belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters.
  • Page 56: Information Center Commands

    Information center commands display info-center Use display info-center to display information center configuration information. Syntax display info-center Views Any view Predefined user roles network-admin network-operator Examples # Display information center configuration information. <Sysname> display info-center Information Center: Enabled Console: Enabled Monitor: Enabled Log host: Enabled IP address: 192.168.0.1, port number: 5000, host facility: local7...
  • Page 57 Parameters reverse: Displays log entries chronologically, with the most recent entry at the top. Without this keyword, the command displays log entries chronologically, with the oldest entry at the top. level severity: Specifies a severity level in the range of 0 to 7. Without this keyword, the command displays log information for all levels.
  • Page 58: Display Logbuffer Summary

    Field Description Maximum number of logs that can be stored in the log Max buffer size buffer. Actual number of logs that can be stored in the log Actual buffer size buffer. (This value is specified with the info-center logbuffer size command.) Dropped messages Number of dropped messages.
  • Page 59: Display Logfile Summary

    Table 15 Command output Field Description SLOT Device ID. EMERG Represents emergency. For more information, see Table ALERT Represents alert. For more information, see Table CRIT Represents critical. For more information, see Table ERROR Represents error. For more information, see Table WARN Represents warning.
  • Page 60: Display Security-Logfile Summary

    display security-logfile summary Use display security-logfile summary to display the summary of the security log file. Syntax display security-logfile summary Views Any view Predefined user roles security-audit Usage guidelines A local user can use this command only after being authorized as the security log administrator by the system administrator through the authorization-attribute user-role security-audit command.
  • Page 61: Info-Center Enable

    undo enable log updown Default All ports are allowed to generate port link up and link down logs. Views Interface view Predefined user roles network-admin network-operator Examples # Disable port Ten-GigabitEthernet 1/1/5 from generating link up and link down logs. <Sysname>...
  • Page 62: Info-Center Logbuffer Size

    undo info-center logbuffer Default Logs are allowed to be output to the log buffer. Views System view Predefined user roles network-admin Examples # Configure output of log information to the log buffer. <Sysname> system-view [Sysname] info-center logbuffer Related commands • display logbuffer info-center enable •...
  • Page 63: Info-Center Logfile Enable

    Related commands display logbuffer • info-center enable • info-center logfile enable Use info-center logfile enable to enable the log file feature. Use undo info-center logfile enable to disable the log file feature. Syntax info-center logfile enable undo info-center logfile enable Default The log file feature is enabled.
  • Page 64: Info-Center Logfile Overwrite-Protection

    Usage guidelines With this command executed, the system saves logs in the log file buffer to the log file at the specified interval. Examples # Configure the interval for saving logs to the log file as 60000 seconds. <Sysname> system-view [Sysname] info-center logfile frequency 60000 Related commands info-center logfile enable...
  • Page 65: Info-Center Logfile Size-Quota

    info-center logfile size-quota Use info-center logfile size-quota to set the maximum storage space reserved for the log file. Use undo info-center logfile size-quota to restore the default maximum storage space reserved for the log file. Syntax info-center logfile size-quota size undo info-center logfile size-quota Default The storage space reserved for the log file is 10 MB.
  • Page 66: Info-Center Logging Suppress Duplicates

    Parameters dir-name: Specifies a directory by its name, a string of 1 to 64 characters. Usage guidelines The specified directory must have been created. The suffix of the log file is .log. When the default directory has no enough space for storing the file, you can specify a new directory for the log file.
  • Page 67: Info-Center Loghost

    After the suppression period expires, if the same log continues to appear, the system outputs the • suppressed logs and the log number and starts another suppression period. The suppression period is 30 seconds the first time, 2 minutes the second time, and 10 minutes for subsequent times. •...
  • Page 68: Info-Center Loghost Source

    Syntax info-center loghost [ vpn-instance vpn-instance-name ] { ipv4-address | ipv6 ipv6-address } [ port port-number ] [ facility local-number ] undo info-center loghost [ vpn-instance vpn-instance-name ] { ipv4-address | ipv6 ipv6-address } Default No log host is specified. Views System view Predefined user roles...
  • Page 69: Info-Center Security-Logfile Alarm-Threshold

    Views System view Predefined user roles network-admin Parameters interface-type interface-number: Specifies the egress interface for logs by the interface type and interface number. Usage guidelines The system uses the primary IP address of the specified egress interface as the source IP address of log information no matter which physical interface is used to output the logs.
  • Page 70: Info-Center Security-Logfile Enable

    Usage guidelines When the size of the security log file reaches the upper limit, the system deletes the oldest logs and then writes new logs into the security log file. This feature helps avoid security log loss by setting an alarm threshold for the security log file usage.
  • Page 71: Info-Center Security-Logfile Size-Quota

    Default The default saving interval is 86400 seconds. Views System view Predefined user roles network-admin Parameters freq-sec: Specifies a saving interval in the range of 10 to 86400 seconds. Usage guidelines The system first outputs the security logs to the security log file buffer, and then saves the logs in the buffer into the security log file at the specified interval.
  • Page 72: Info-Center Security-Logfile Switch-Directory

    info-center security-logfile switch-directory Use info-center security-logfile switch-directory to configure the directory where the security log file is saved. Syntax info-center security-logfile switch-directory dir-name Default The security log file is saved in the seclog directory under the root directory of the storage media. Views System view Predefined user roles...
  • Page 73 Table 18 Default output rules Destination Source modules Enabled/disabled Level Console All supported modules Enabled Debug Monitor terminal All supported modules Enabled Debug Log host All supported modules Enabled Informational Log buffer All supported modules Enabled Informational Log file All supported modules Enabled Informational Views...
  • Page 74: Info-Center Synchronous

    [Sysname] info-center source default console deny [Sysname] info-center source vlan console level emergency # Based on the previous configuration, disable the output of VLAN module's information to the console. <Sysname> system-view [Sysname] undo info-center source vlan console info-center synchronous Use info-center synchronous to enable synchronous information output. Use undo info-center synchronous to disable synchronous information output.
  • Page 75: Info-Center Timestamp

    [Sysname] save The current configuration will be written to the device. Are you sure? [Y/N]: At this time, the system receives the log information. It displays the log information first and then displays [Y/N]. %May 21 14:33:19:425 2007 Sysname SHELL/4/LOGIN: VTY login from 192.168.1.44 [Y/N]: Enter Y or N to complete your input.
  • Page 76: Info-Center Timestamp Loghost

    info-center timestamp loghost Use info-center timestamp loghost to configure the timestamp format for logs sent to the log host. Use undo info-center timestamp loghost to restore the default. Syntax info-center timestamp loghost { date | iso | no-year-date | none } undo info-center timestamp loghost Default The timestamp format for logs sent to the log host is date.
  • Page 77: Reset Logbuffer

    The system clears the log file buffer after saving logs from the buffer to the log file automatically or manually. Examples # Save logs from the log file buffer into the log file. <Sysname> logfile save The contents in the log file buffer have been saved to the file flash:/logfile/logfile.log. Related commands •...
  • Page 78: Terminal Debugging

    A local user can use this command only after being authorized as the security log administrator by the system administrator. For more information about security log administrator, see Security Configuration Guide. Examples # Manually save the security logs in the security log file buffer into the security log file. <Sysname>...
  • Page 79: Terminal Logging Level

    terminal logging level Use terminal logging level to set the lowest level of the logs that can be output to the current terminal. Use undo terminal logging level to restore the default. Syntax terminal logging level severity undo terminal logging level Default The lowest level of the logs that can be output to the console is 7 (Debug), and that can be output to the monitor terminal is 6 (Informational).
  • Page 80 Predefined user roles network-admin Usage guidelines The configuration of this command is valid for only the current connection between the terminal and the device. If a new connection is established, the monitoring of system information on the terminal restores the default. Examples # Enable the monitoring of logs on the current terminal.
  • Page 81: Snmp Commands

    SNMP commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. The SNMP agent sends notifications (traps and informs) to inform the NMS of significant events, such as link state changes and user logins or logouts.
  • Page 82: Display Snmp-Agent Group

    Community name: userv1 Group name: testv1 Storage-type: nonVolatile Table 19 Command output Field Description Displays the community name created by using the snmp-agent community command Community name or the username created by using the snmp-agent usm-user { v1 | v2c } command. SNMP group name.
  • Page 83: Display Snmp-Agent Local-Engineid

    Usage guidelines If no group is specified, this command displays information about all SNMP groups. Examples # Display information about all SNMP groups. <Sysname> display snmp-agent group Group name: groupv3 Security model: v3 noAuthnoPriv Readview: ViewDefault Writeview: <no specified> Notifyview: <no specified> Storage-type: nonVolatile Table 20 Command output Field...
  • Page 84: Display Snmp-Agent Mib-View

    Usage guidelines Every SNMP agent has one SNMP engine to provide services for sending and receiving messages, authenticating and encrypting messages, and controlling access to managed objects. The local SNMP engine ID uniquely identifies the SNMP engine of the SNMP agent in an SNMP domain. Examples # Display the local engine ID.
  • Page 85: Display Snmp-Agent Remote

    View Type: excluded View status: active View name: ViewDefault MIB Subtree: snmpVacmMIB Subtree mask: Storage-type: nonVolatile View Type: excluded View status: active View name: ViewDefault MIB Subtree: snmpModules.18 Subtree mask: Storage-type: nonVolatile View Type: excluded View status: active ViewDefault is the default MIB view. The output shows that except for the MIB objects in the snmpUsmMIB, snmpVacmMIB, and snmpModules.18 subtrees, all the MIB objects in the iso subtree are accessible.
  • Page 86: Display Snmp-Agent Statistics

    Views Any view Predefined user roles network-admin network-operator Parameters ip-address: Specifies the IP address of a remote SNMP entity to display its SNMP engine ID. ipv6 ipv6-address: Specifies the IPv6 address of a remote SNMP entity to display its SNMP engine ID. vpn-instance vpn-instance-name: Specifies the VPN for a remote SNMP entity.
  • Page 87 Predefined user roles network-admin network-operator Examples # Display SNMP message statistics. <Sysname> display snmp-agent statistics 1684 messages delivered to the SNMP entity. 5 messages were for an unsupported version. 0 messages used an unknown SNMP community name. 0 messages represented an illegal operation for the community supplied. 0 ASN.1 or BER errors in the process of decoding.
  • Page 88: Display Snmp-Agent Sys-Info

    Field Description Number of PDUs with a TooBig error (the SNMP PDUs had tooBig error-status maximum packet size is 1500 bytes). Number of MIB objects that have been MIB objects retrieved successfully successfully retrieved. Number of MIB objects that have been MIB objects altered successfully successfully modified.
  • Page 89: Display Snmp-Agent Trap Queue

    Examples # Display all SNMP agent system information. <Sysname> display snmp-agent sys-info The contact information of the agent: The location information of the agent: The SNMP version of the agent: SNMPv1 SNMPv2c SNMPv3 Related commands snmp-agent sys-info display snmp-agent trap queue Use display snmp-agent trap queue to display basic information about the trap queue, including the trap queue name, queue size, and number of traps in the queue.
  • Page 90: Display Snmp-Agent Usm-User

    Usage guidelines You can use the snmp-agent trap enable command to enable or disable the notification function of a module. For a module that has sub-modules, the notification function status is enable if the trap function of any of its sub-modules is enabled. Examples # Display the modules that can generate notification and their notification function status.
  • Page 91: Enable Snmp Trap Updown

    Group name: mygroupv3 Engine ID: 800063A203000FE240A1A6 Storage-type: nonVolatile UserStatus: active Username: userv3code Group name: groupv3code Engine ID: 800063A203000FE240A1A6 Storage-type: nonVolatile UserStatus: active Table 24 Command output Field Description Username SNMP username. Group name SNMP group name. Engine ID Engine ID that the SNMP agent used when the SNMP user was created. Storage type: •...
  • Page 92: Snmp-Agent

    undo enable snmp trap updown Default Link state notifications are enabled. Views Interface view Predefined user roles network-admin network-operator Usage guidelines For an interface to generate linkUp/linkDown notifications when its state changes, you must also enable the linkUp/linkDown notification function globally using the snmp-agent trap enable standard [ linkdown | linkup ] * command.
  • Page 93: Snmp-Agent Calculate-Password

    Usage guidelines The snmp-agent command is optional for an SNMP configuration task. The SNMP agent is automatically enabled when you execute any command that begins with snmp-agent except for the snmp-agent calculate-password command. Examples # Enable the SNMP agent. <Sysname> system-view [Sysname] snmp-agent snmp-agent calculate-password Use snmp-agent calculate-password to convert a plaintext key to a ciphertext key for authentication or...
  • Page 94: Snmp-Agent Community

    Use this command to calculate ciphertext authentication and privacy keys when you create SNMPv3 users by using the snmp-agent usm-user v3 command. The converted key is valid only under the engine ID specified for key conversion. Examples # Use the local engine and the SHA- 1 algorithm to convert the plaintext key authkey to a ciphertext key. <Sysname>...
  • Page 95 acl acl-number: Specifies a basic IPv4 ACL to filter NMSs by source IPv4 address. The acl-number argument represents an ACL number in the range of 2000 to 2999. In the specified community, only NMSs with an IP address permitted in the ACL can access the SNMP agent. If no ACL is specified, the specified ACL does not exist, or the specified ACL does not have any rules, any NMS in the SNMP community can access the SNMP agent.
  • Page 96: Snmp-Agent Group

    Related commands display snmp-agent community • snmp-agent mib-view • snmp-agent group Use snmp-agent group to create an SNMP group and specify its access right. Use undo snmp-agent group to delete an SNMP group. Syntax In non-FIPS mode (SNMPv1 and SNMP v2c): snmp-agent group { v1 | v2c } group-name [ read-view view-name ] [ write-view view-name ] [ notify-view view-name ] [ acl acl-number | acl ipv6 ipv6-acl-number ] * undo snmp-agent group { v1 | v2c } group-name...
  • Page 97 write-view view-name: Specifies a read and write MIB view. The view-name represents a MIB view name, a string of 1 to 32 characters. If no read and write view is specified, the SNMP group cannot set any MIB object on the SNMP agent. notify-view view-name: Specifies a notify MIB view.
  • Page 98: Snmp-Agent Local-Engineid

    <Sysname> system-view [Sysname] snmp-agent group v3 group1 Related commands display snmp-agent group • snmp-agent mib-view • snmp-agent usm-user • snmp-agent local-engineid Use snmp-agent local-engineid to change the SNMP engine ID of the local SNMP agent. Use undo snmp-agent local-engineid to restore the default local SNMP engine ID. Syntax snmp-agent local-engineid engineid undo snmp-agent local-engineid...
  • Page 99: Snmp-Agent Log

    snmp-agent log Use snmp-agent log to enable logging SNMP operations. Use undo snmp-agent log to disable logging SNMP operations. Syntax snmp-agent log { all | get-operation | set-operation } undo snmp-agent log { all | get-operation | set-operation } Default SNMP logging is disabled.
  • Page 100 Default The system creates the ViewDefault view when the SNMP agent is enabled. In this default MIB view, all MIB objects in the iso subtree but the snmpUsmMIB, snmpVacmMIB, and snmpModules.18 subtrees are accessible. Views System view Predefined user roles network-admin Parameters excluded: Denies access to any node in the specified MIB subtree.
  • Page 101: Snmp-Agent Packet Max-Size

    snmp-agent packet max-size Use snmp-agent packet max-size to set the maximum size (in bytes) of SNMP packets that the SNMP agent can receive or send. Use undo snmp-agent packet max-size to restore the default packet size. Syntax snmp-agent packet max-size byte-count undo snmp-agent packet max-size Default The SNMP agent can receive and send SNMP messages that are up to 1500 bytes long.
  • Page 102: Snmp-Agent Source

    Parameters ip-address: Specifies the IP address of a remote SNMP entity. ipv6 ipv6-address: Specifies the IPv6 address of a remote SNMP entity. vpn-instance vpn-instance-name: Specifies the VPN for a remote SNMP entity. The vpn-instance-name argument specifies the name of the MPLS L3VPN, a case-sensitive string of 1 to 31 characters. If this parameter is not specified, the remote SNMP entity is in public network.
  • Page 103: Snmp-Agent Sys-Info Contact

    Usage guidelines The snmp-agent source command enables the SNMP agent to use the primary IP address of an interface as the source IP address in all its SNMP informs or traps, regardless of their outgoing interfaces. An NMS can use this IP address to filter all the informs or traps sent by the SNMP agent. Make sure the specified interface has been created and assigned a valid IP address.
  • Page 104: Snmp-Agent Sys-Info Location

    [Sysname] snmp-agent sys-info contact Dial System Operator # 27345 Related commands display snmp-agent sys-info snmp-agent sys-info location Use snmp-agent sys-info location to configure the system location. Use undo snmp-agent sys-info location to restore the default location. Syntax snmp-agent sys-info location sys-location undo snmp-agent sys-info location Default No system location is configured.
  • Page 105: Snmp-Agent Target-Host

    undo snmp-agent sys-info version v3 Default If the device starts up with the initial settings (or empty configuration), SNMPv3 is enabled. • If the device starts up with the default configuration file (or factory defaults): • In non-FIPS mode, SNMPv1, SNMPv2c, and SNMPv3 are enabled. In FIPS mode, SNMPv3 is enabled.
  • Page 106 undo snmp-agent target-host { trap | inform } address udp-domain { ip-address | ipv6 ipv6-address } params securityname security-string [ vpn-instance vpn-instance-name ] In FIPS mode: snmp-agent target-host inform address udp-domain { ip-address | ipv6 ipv6-address } [ udp-port port-number ] [ vpn-instance vpn-instance-name ] params securityname security-string v3 { authentication | privacy } snmp-agent target-host trap address udp-domain { ip-address | ipv6 ipv6-address } [ udp-port port-number ] [ vpn-instance vpn-instance-name ] params securityname security-string v3...
  • Page 107: Snmp-Agent Trap Enable

    Usage guidelines SNMPv1 and SNMPv2c settings are supported only in non-FIPS mode. You can specify multiple SNMP notification target hosts. Make sure the SNMP agent uses the same UDP port for SNMP notifications as the target host. Typically, NMSs, for example, IMC and MIB Browser, use port 162 for SNMP notifications as defined in the SNMP protocols.
  • Page 108 Predefined user roles network-admin Parameters bgp: Specifies SNMP notifications for the BGP module. If the BGP neighbor status changes, notifications are triggered as defined in RFC 4273. The notification includes a neighbor address, the current neighbor status, the latest error code and error subcode. configuration: Specifies configuration notifications.
  • Page 109 Notifications for authentication virt-authentication-failure ospfVirtIfAuthFailure failures on OSPF virtual interfaces. Notifications for OSPF packets virt-bad-packet ospfVirtIfRxBadPacket received on a virtual interface. Virtual interface configuration virt-config-error ospfVirtIfConfigError error notifications. Notifications generated if OSPF virt-retransmit ospfVirtIfTxRetransmit packets are received or forwarded on a virtual interface. Notifications for neighbor GR virtgrhelper-status-change ospfVirtNbrRestartHelperStatusChange...
  • Page 110: Snmp-Agent Trap If-Mib Link Extended

    Related commands snmp-agent target-host snmp-agent trap if-mib link extended Use snmp-agent trap if-mib link extended to configure the SNMP agent to send extended linkUp/linkDown notifications. Use undo snmp-agent trap if-mib link extended to restore the default. Syntax snmp-agent trap if-mib link extended undo snmp-agent trap if-mib link extended Default The SNMP agent sends standard linkUp/linkDown notifications.
  • Page 111: Snmp-Agent Trap Queue-Size

    Predefined user roles network-admin Parameters seconds: Sets a lifetime in seconds, in the range of 1 to 2592000. Usage guidelines When congestion occurs, the SNMP agent buffers notifications in a queue. The notification lifetime sets how long a notification can stay in the queue. A trap is deleted when its lifetime expires. Examples # Set the SNMP notification lifetime to 60 seconds.
  • Page 112: Snmp-Agent Usm-User { V1 | V2C

    Related commands snmp-agent target-host • snmp-agent trap enable • • snmp-agent trap life snmp-agent usm-user { v1 | v2c } Use snmp-agent usm-user { v1 | v2c } to add a user to an SNMPv1 or SNMPv2c group. Use undo snmp-agent usm-user { v1 | v2c } to delete a user from an SNMPv1 or SNMPv2c group. Syntax snmp-agent usm-user { v1 | v2c } user-name group-name [ acl acl-number | acl ipv6 ipv6-acl-number ] undo snmp-agent usm-user { v1 | v2c } user-name group-name...
  • Page 113: Snmp-Agent Usm-User V3

    SNMPv1 or SNMPv2c group. To display the SNMPv1 and SNMPv2c communities created in this way, use the display snmp-agent community command. To change the access right of the SNMPv1 or SNMPv2c user, use the snmp-agent community command or the snmp-agent group { v1 | v2c } command. If the snmp-agent community command is used, the SNMPv1 or SNMPv2c is removed from the SNMP group.
  • Page 114 snmp-agent usm-user v3 user-name group-name [ remote { ip-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ] ] { cipher | simple } authentication-mode sha auth-password [ privacy-mode aes128 priv-password ] [ acl acl-number | acl ipv6 ipv6-acl-number ] * undo snmp-agent usm-user v3 user-name group-name { local | engineid engineid-string | remote { ip-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ] } Default...
  • Page 115 des56: Specifies the DES (Data Encryption Standard) algorithm. • priv-password: Specifies a case-sensitive plaintext or encrypted privacy key. In non-FIPS mode, a plaintext key is a string of 1 to 64 characters. In FIPS mode, a plaintext key is a string of 15 to 64 visible characters, which must contain numbers, upper-case letters, lower-case letters, and special characters.
  • Page 116 <Sysname> system-view [Sysname] snmp-agent group v3 testGroup authentication [Sysname] snmp-agent usm-user v3 testUser testGroup simple authentication-mode sha authkey An NMS can use the same SNMPv3 username, SNMP protocol version, and authentication algorithm and key as the SNMP agent to access the MIB objects in the default view ViewDefault. # Add the user testUser to the SNMPv3 group testGroup, enable the authentication and privacy security model for the group, and specify the authentication algorithm sha, the privacy algorithm aes128, the plaintext authentication key authkey, and the plaintext privacy key prikey for the user.
  • Page 117: Nqa Commands

    NQA commands data-fill Use data-fill to configure the string to be filled in the payload of each probe packet. Use undo data-fill to restore the default. Syntax data-fill string undo data-fill Default The string is the hexadecimal number 00010203040506070809. Views ICMP echo operation view, UDP echo operation view Predefined user roles network-admin...
  • Page 118: Description (Any Nqa Operation Type View)

    Use undo data-size to restore the default. Syntax data-size size undo data-size Default The payload size is 100 bytes. Views ICMP echo operation view, UDP echo operation view Predefined user roles network-admin Parameters size: Specifies the size of the payload in each probe packet in bytes. The value range for the size argument is 20 to 8100.
  • Page 119: Destination Ip

    [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] description icmp-probe destination ip Use destination ip to configure the destination IP address for the operation. Use undo destination ip to remove the destination IP address. Syntax destination ip ip-address undo destination ip Default No destination IP address is configured for the operation. Views ICMP echo operation view, UDP echo operation view Predefined user roles...
  • Page 120: Display Nqa History

    Parameters port-number: Specifies the destination port number of the operation, in the range of 1 to 65535. Examples # Configure the destination port number of the UDP echo operation as 9000. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-echo [Sysname-nqa-admin-test-udp-echo] destination port 9000 display nqa history Use display nqa history to display the history records of NQA operations.
  • Page 121: Display Nqa Reaction Counters

    Succeeded 2007-04-29 20:54:23.8 Succeeded 2007-04-29 20:54:23.4 Table 30 Command output Field Description Index History record ID. Round-trip time if the operation succeeds, timeout time upon timeout, or 0 if the Response operation cannot be completed, in milliseconds. Status of the operation result: •...
  • Page 122: Display Nqa Result

    <Sysname> display nqa reaction counters admin test NQA entry (admin admin, tag test) reaction counters: Index Checked Element Threshold Type Checked Num Over-threshold Num probe-duration accumulate probe-duration average probe-duration consecutive probe-fail accumulate probe-fail consecutive Table 31 Command output Field Description Index ID of a reaction entry.
  • Page 123: Display Nqa Statistics

    network-operator Parameters admin-name operation-tag: Displays the result of an NQA operation. The admin-name argument represents the name of the administrator who creates the NQA operation, and is a case-insensitive string of 1 to 32 characters. The operation-tag argument represents the operation tag, and is a case-insensitive string of 1 to 32 characters.
  • Page 124 Predefined user roles network-admin network-operator Parameters admin-name operation-tag: Displays the statistics for an NQA operation. The admin-name argument represents the name of the administrator who creates the NQA operation, and is a case-insensitive string of 1 to 32 characters. The operation-tag argument represents the operation tag, and is a case-insensitive string of 1 to 32 characters.
  • Page 125: Frequency

    Field Description Square-Sum of round trip time Square sum of round-trip time. Packet loss ratio Average packet loss ratio. Failures due to timeout Number of timeout occurrences in an operation. Failures due to internal error Number of failures due to internal errors. Failures due to other errors Failures due to other errors.
  • Page 126: History-Record Enable

    Default The interval between two consecutive operations of other types is 0 milliseconds. That is, only one operation is performed. Views Any NQA operation view Predefined user roles network-admin Parameters interval: Specifies the interval in milliseconds between two consecutive operations, in the range of 0 to 604800000.
  • Page 127: History-Record Keep-Time

    [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] history-record enable Related commands display nqa history history-record keep-time Use history-record keep-time to set the lifetime of history records for an NQA operation. Use undo history-record keep-time to restore the default. Syntax history-record keep-time keep-time undo history-record keep-time...
  • Page 128: Next-Hop

    Default A maximum of 50 records can be saved for an NQA operation. Views ICMP echo operation view, UDP echo operation view Predefined user roles network-admin Parameters number: Specifies the maximum number of history records that can be saved for an NQA operation. The value is in the range of 0 to 50.
  • Page 129: Nqa

    Use nqa to create an NQA operation and enter its view. Use undo nqa to remove the operation. Syntax nqa entry admin-name operation-tag undo nqa { all | entry admin-name operation-tag } Default No NQA operation is created. Views System view Predefined user roles network-admin Parameters...
  • Page 130: Nqa Schedule

    Default The NQA client is enabled. Views System view Predefined user roles network-admin Examples # Enable the NQA client. <Sysname> system-view [Sysname] nqa agent enable Related commands nqa server enable nqa schedule Use nqa schedule to configure the scheduling parameters for an NQA operation. Use undo nqa schedule to stop the operation.
  • Page 131: Probe Count

    lifetime: Specifies the duration of an operation. lifetime: Specifies the duration of an operation in seconds, in the range of 1 to 2147483647. forever: Performs the operation until you stop it with the undo nqa schedule command. recurring: Run the operation automatically at the start time and for the specified duration Usage guidelines You cannot enter the operation view or operation type view of a scheduled NQA operation.
  • Page 132: Probe Timeout

    [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] probe count 10 probe timeout Use probe timeout to specify the probe timeout time. Use undo probe timeout to restore the default. Syntax probe timeout timeout undo probe timeout Default The timeout time of a probe is 3000 milliseconds. Views ICMP echo operation view, UDP echo operation view Predefined user roles...
  • Page 133 Views ICMP echo operation view, UDP echo operation view Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. threshold-type: Specifies a threshold type. accumulate accumulate-occurrences: Checks the maximum number of threshold violations, in the range of 1 to 15.
  • Page 134: Reaction Checked-Element Probe-Fail

    [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction 2 checked-element probe-duration threshold-type accumulate 10 threshold-value 50 5 action-type none # Create reaction entry 3 for monitoring the probe duration time of ICMP echo operation, setting the upper limit to 50 milliseconds and the lower limit to 5 milliseconds. Before the NQA operation starts, the initial state of the reaction entry is invalid.
  • Page 135: Reaction Checked-Element Probe-Fail (For Trigger)

    Examples # Create reaction entry 1 for monitoring the probe failures in ICMP echo operation. Before the NQA operation starts, the initial state of the reaction entry is invalid. If the total number of probe failures exceeds 10 (included), the state of the entry is set to over-threshold. If it is below the threshold, the state of the entry is set to below-threshold.
  • Page 136: Route-Option Bypass-Route

    Usage guidelines You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use undo reaction to delete the entry first and reconfigure a new one. Examples # Create reaction entry 1. If the number of consecutive probe failures reaches 3, collaboration is triggered.
  • Page 137: Source Ip

    Use undo source interface to restore the default. Syntax source interface interface-type interface-number undo source interface Default No source interface is configured for ICMP echo request packets. Views ICMP echo operation view Predefined user roles network-admin Parameters interface-type interface-number: Specifies an interface by its type and number. Usage guidelines If you configure both the source interface command and the source ip command, the source ip command takes effect.
  • Page 138: Source Port

    Predefined user roles network-admin Parameters ip-address: Specifies the source IP address of the operation. Usage guidelines If you configure both the source interface command and the source ip command, the source ip command takes effect. If you configure the source interface command but not the source ip command for the ICMP echo operation, the IP address of the source interface serves as the source IP address of the probe packet.
  • Page 139: Statistics Hold-Time

    [Sysname-nqa-admin-test-udp-echo] source port 8000 statistics hold-time Use statistics hold-time to configure the hold time of statistics groups for an NQA operation. Use undo statistics hold-time to restore the default. Syntax statistics hold-time hold-time undo statistics hold-time Default The hold time of statistics groups is 120 minutes. Views ICMP echo operation view, UDP echo operation view Predefined user roles...
  • Page 140: Statistics Max-Group

    Parameters interval: Specifies the interval in minutes, in the range of 1 to 35791394. Usage guidelines NQA collects statistics for operations completed within a specific period. The statistics form a statistics group. To view information about the statistics groups, use the display nqa statistics command. Examples # Configure the system to collect the ICMP echo operation statistics at 2-minute intervals.
  • Page 141: Ttl

    Use undo tos to restore the default. Syntax tos value undo tos Default The ToS value in the IP packet header of probe packets is 0. Views ICMP echo operation view, UDP echo operation view Predefined user roles network-admin Parameters value: Specifies the ToS value in the IP packet header, in the range of 0 to 255.
  • Page 142: Type

    Examples # Configure the TTL for probe packets as 16. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] ttl 16 type Use type to specify the operation type of the NQA operation and enter operation type view. Syntax type { icmp-echo | udp-echo } Default...
  • Page 143 Predefined user roles network-admin Parameters vpn-instance-name: Specifies the name of the MPLS L3VPN, a case-sensitive string of 1 to 31 characters. Usage guidelines After you specify the VPN, the NQA operation tests the connectivity in the specified VPN. Examples # Apply the ICMP echo operation to vpn1. <Sysname>...
  • Page 144: Sflow Commands

    sFlow commands display sflow Use display sflow to display sFlow configuration and operation information. Syntax display sflow Views Any view Predefined user roles network-admin network-operator Examples # Display sFlow configuration and operation information. <Sysname> display sflow sFlow datagram version: 5 Global information: Agent IP: 10.10.10.1(CLI) Source address: 10.0.0.1 2001::1...
  • Page 145: Sflow Agent

    Field Description Port sFlow collector port. Remaining lifetime of the sFlow collector. If this field displays N/A, the sFlow Aging collector never ages out. Size Maximum length of the sFlow data portion in an sFlow packet. VPN-instance Name of the VPN bound with the sFlow collector. Description Description of the sFlow collector.
  • Page 146: Sflow Collector

    Usage guidelines HP recommends that you manually configure an IP address for the sFlow agent. Only one IP address can be specified for the sFlow agent on the device, and a newly configured IP address overwrites the existing one. Examples # Specify IP address 10.10.10.1 for the sFlow agent.
  • Page 147: Sflow Counter Interval

    Examples # Configure parameters for an sFlow collector: specify the ID as 2, VPN name as vpn1, IP address as 3.3.3.1, port number as the default, description as netserver, aging timer as 1200 seconds, and maximum length of the sFlow data portion in the sFlow packet as 1000 bytes. <Sysname>...
  • Page 148: Sflow Flow Collector

    Views Ethernet interface view Predefined user roles network-admin Parameters collector-id: Specifies an sFlow collector by its ID in the range of 1 to 10. Examples # Specify sFlow collector 2 on Ten-GigabitEthernet 1/1/5 for counter sampling. <Sysname> system-view [Sysname] interface ten-gigabitethernet1/1/5 [Sysname-Ten-GigabitEthernet1/1/5] sflow counter collector 2 sflow flow collector Use sflow flow collector to specify an sFlow collector for flow sampling.
  • Page 149: Sflow Sampling-Mode

    undo sflow flow max-header Default Flow sampling can copy up to 128 bytes of a packet. Views Ethernet interface view Predefined user roles network-admin Parameters length: Specifies the maximum number of bytes that can be copied, in the range of 18 to 512. HP recommends that you use the default.
  • Page 150: Sflow Sampling-Rate

    <Sysname> system-view [Sysname] interface ten-gigabitethernet1/1/5 [Sysname-Ten-GigabitEthernet1/1/5] sflow sampling-mode determine Related commands sflow sampling-rate sflow sampling-rate Use sflow sampling-rate to specify the number of packets out of which flow sampling will sample a packet on an interface. Use undo sflow sampling-rate to disable flow sampling. Syntax sflow sampling-rate rate undo sflow sampling-rate...
  • Page 151 Views System view Predefined user roles network-admin Parameters ip ip-address: Specifies the source IPv4 address of sFlow packets. ipv6 ipv6-address: Specifies the source IPv6 address of sFlow packets. Examples # Specify the source IPv4 address of sFlow packets as 10.0.0.1. <Sysname>...
  • Page 152: Process Monitoring And Maintenance Commands

    Process monitoring and maintenance commands The display memory, display process, display process cpu, monitor process and monitor thread commands display information about both user processes and kernel threads. In these commands, "process" refers to both user processes and kernel threads. display kernel deadloop Use display kernel deadloop to display kernel thread deadloop information.
  • Page 153 <Sysname> display kernel deadloop 1 verbose ----------------- Deadloop record 1 ----------------- Description : BUG: soft lockup - CPU#0 stuck for 61! [comsh: 16306] Recorded at : 2011-09-01 11:16:00.823018 Occurred at : 2011-09-01 11:16:00.823018 Instruction address : 0x4004158c Thread : comsh (TID: 16306) Context : thread context Chassis...
  • Page 154 0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5ef0: 95 47 73 35 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f00: a0 e1 64 21 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f10: 00 00 00 00 00 00 00 00 00 00 00 00 01 e9 00 00 0xe2be5f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f30: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0...
  • Page 155: Display Kernel Deadloop Configuration

    Field Description Time when the kernel thread deadloop was recorded in the system, with Recorded at microsecond precision. Occurred at Time when the kernel thread deadloop occurred, with microsecond precision. Instruction address Instruction address for the kernel thread deadloop. Thread Name and number of the kernel thread deadloop.
  • Page 156: Display Kernel Exception

    Examples # Display kernel thread deadloop detection configuration. <Sysname> display kernel deadloop configuration Thread dead loop detection: Enabled Dead loop timer (in seconds): 60 Threads excluded from monitoring: 1 TID: Name: co0 Table 38 Command output Field Description Time interval (in seconds) to identify a kernel thread deadloop. A kernel Dead loop timer (in seconds): n thread deadloop occurs if a kernel thread runs more than n seconds.
  • Page 157 <Sysname> display kernel exception 1 ----------------- Exception record 1 ----------------- Description : Oops[#0] Recorded at : 2011-09-01 11:16:00.823018 Occurred at : 2011-09-01 11:16:00.823018 Instruction address : 0x4004158c Thread : comsh (TID: 16306) Context : thread context Chassis Slot CPU ID Kernel module info : module name (mrpnc) module address (0xe332a000) module name (test_12500) module address (0xe00bd000)
  • Page 158 Reg: r26, Val = 0x00000000 ; Reg: r27, Val = 0x057d9484 ; Reg: r28, Val = 0x0000002c ; Reg: r29, Val = 0x00000000 ; Reg: r30, Val = 0x0000002c ; Reg: r31, Val = 0x00000000 ; Reg: cr, Val = 0x84000028 ; Reg: nip, Val = 0x057d9550 ;...
  • Page 159: Display Kernel Reboot

    Function Address = 0x8012d734 Function Address = 0x80100a00 Function Address = 0xe0071004 Function Address = 0x8016ce0c Function Address = 0x801223a0 Instruction dump: 41a2fe9c 812300ec 800200ec 7f890000 409efe8c 80010014 540b07b9 40a2fe80 4bfffe6c 80780290 7f64db78 4804ea35 <807f002c> 38800000 38a00080 3863000c For detailed information about the command output, see Table Related commands reset kernel exception...
  • Page 160 # Display detailed information about the latest kernel thread reboot. <Sysname> display kernel reboot 1 verbose ----------------- Reboot record 1 ----------------- Recorded at : 2011-09-01 11:16:00.823018 Occurred at : 2011-09-01 11:16:00.823018 Reason : 0x31 Thread : comsh (TID: 16306) Context : thread context Chassis Slot...
  • Page 161: Display Kernel Starvation

    0xe2be6050: 00 00 00 04 02 21 00 00 00 00 00 00 01 e9 00 00 0xe2be6060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be6070: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0 0xe2be6080: 02 be 61 e0 00 00 00 02 00 00 00 00 02 be 61 70 0xe2be6090: 00 00 00 00 02 21 00 00 05 8d 34 c4 05 7d 92 44 Call trace:...
  • Page 162 Syntax display kernel starvation show-number [ offset ] [ verbose ] [ slot slot-number ] Views Any view Predefined user roles network-admin Parameters show-number: Specifies the number of thread starvations to display, in the range of 1 to 20. offset: Specifies the offset between the starting starvation and the latest starvation, in the range of 0 to 19. The default value is 0.
  • Page 163 swapper (11:16:00.833018)--> kthreadd (11:16:00.833518)--> swapper (11:16:00.833550)--> test_12500 (11:16:00.833560) Register content: Reg: r0, Val = 0x00000000 ; Reg: r1, Val = 0xe2be5ea0 ; Reg: r2, Val = 0x00000000 ; Reg: r3, Val = 0x77777777 ; Reg: r4, Val = 0x00000000 ; Reg: r5, Val = 0x00001492 ;...
  • Page 164: Display Kernel Starvation Configuration

    0xe2be5fd0: 02 be 5f f0 00 e8 93 7e 02 be 5f f8 02 be 5f fc 0xe2be5fe0: 00 00 00 00 00 00 00 00 00 00 00 00 02 be 60 18 0xe2be5ff0: 02 be 60 10 00 e9 65 98 00 00 00 58 00 00 2a 4f 0xe2be6000: 02 be 60 10 00 00 00 00 00 00 00 00 02 be 60 68 0xe2be6010: 02 be 60 40 00 e8 c6 a0 00 00 11 17 00 00 00 00 0xe2be6020: 02 be 60 40 00 00 00 00 00 00 00 00 02 be 60 98...
  • Page 165: Display Process

    Examples # Display kernel thread starvation detection configuration. <Sysname> display kernel starvation configuration Thread starvation detection: Enabled Starvation timer (in seconds): 10 Threads excluded from monitoring: 1 TID: Name: co0 Table 40 Command output Field Description Time interval (in seconds) to identify a kernel thread starvation. A Starvation timer (in seconds): n kernel thread starvation occurs if a kernel thread does not run within n seconds.
  • Page 166 Examples # Display state information for process scmd. <Sysname> display process name scmd Job ID: 1 PID: 1 Parent JID: 0 Parent PID: 0 Executable path: - Instance: 0 Respawn: OFF Respawn count: 1 Max. spawns per minute: 0 Last started: Wed Jun 1 14:45:46 2011 Process state: sleeping Max.
  • Page 167 Field Description Maximum number of core files that the process can create. 0 indicates that the process never creates a core file. A process creates a core file after it abnormally Max. core restarts. If the number of core files reaches the maximum value, no more core files are created.
  • Page 168: Display Process Cpu

    Table 42 Command output Field Description Job ID of a process. It never changes. Number of a process. %CPU CPU usage in percentage (%). %MEM Memory usage in percentage (%). State of a process: • R—Running. • S—Sleeping. STAT • T—Traced or stopped.
  • Page 169: Display Process Log

    0.0% 0.0% 0.0% [events/0] 0.0% 0.0% 0.0% [khelper] 0.0% 0.0% 0.0% [kblockd/0] 0.0% 0.0% 0.0% [vzmond] 0.0% 0.0% 0.0% [pdflush] 0.0% 0.0% 0.0% [pdflush] 0.0% 0.0% 0.0% [kswapd0] 0.0% 0.0% 0.0% [aio/0] 0.0% 0.0% 0.0% [mtdblockd] 0.0% 0.0% 0.0% [TNetJob] 0.0% 0.0% 0.0%...
  • Page 170: Display Process Memory

    Examples # Display log information for all user processes. <Sysname> display process log Name Abort Core Start-time End-time mdcd 2012-06-11 09:31:00 2012-06-11 09:31:00 knotify 2012-06-11 09:31:02 2012-06-11 09:31:02 knotify 2012-06-11 09:31:02 2012-06-11 09:31:02 knotify 2012-06-11 09:31:03 2012-06-11 09:31:03 pkg_update 2012-06-11 09:31:06 2012-06-11 09:31:06 autocfgd 2012-06-11 09:31:13 2012-06-11 09:31:13 comsh...
  • Page 171: Display Process Memory Heap

    Text memory—Stores code for the user process. • • Data memory—Stores data for the user process. Stack memory—Stores temporary data. • Dynamic memory—Heap memory dynamically assigned and released by the system according to • the needs of the user process. To view dynamic memory information, execute the display process memory heap command.
  • Page 172 Predefined user roles network-admin network-operator Parameters job job-id: Specifies a user process by its job ID, in the range of 1 to 2147483647. verbose: Displays detailed information. Without this keyword, the command displays brief information. slot slot-number: Specifies an IRF member device by its ID. Without this option, the command displays heap memory usage for the user process on the master device.
  • Page 173: Display Process Memory Heap Address

    Field Description Total Total number of memory blocks. Free Ratio Ratio of free memory to total memory. It helps identify fragment information. Related commands display process memory • display process memory heap address • display process memory heap size • display process memory heap address Use display process memory heap address to display memory content starting from a specified memory block for a process.
  • Page 174: Display Process Memory Heap Size

    Related commands display process memory heap • display process memory heap size • display process memory heap size Use display process memory heap size to display the addresses of memory blocks with a specified size used by a process. Syntax display process memory heap job job-id size memory-size [ offset offset-size ] [ slot slot-number ] Views Any view...
  • Page 175: Monitor Kernel Deadloop Enable

    0xb7e30200 0xb7e30210 0xb7e30220 0xb7e30230 Related commands • display process memory heap display process memory heap address • monitor kernel deadloop enable Use monitor kernel deadloop enable to enable kernel thread deadloop detection. Use undo monitor kernel deadloop enable to disable kernel thread deadloop detection. Syntax monitor kernel deadloop enable [ slot slot-number ] undo monitor kernel deadloop enable [ slot slot-number ]...
  • Page 176: Monitor Kernel Deadloop Exclude-Thread

    monitor kernel deadloop exclude-thread Use monitor kernel deadloop exclude-thread to disable kernel thread deadloop detection for a kernel thread. Use undo monitor kernel deadloop exclude-thread to enable kernel thread deadloop detection for a kernel thread. Syntax monitor kernel deadloop exclude-thread tid [ slot slot-number ] undo monitor kernel deadloop exclude-thread [ tid ] [ slot slot-number ] Default Kernel thread deadloop detection monitors all kernel threads.
  • Page 177: Monitor Kernel Starvation Enable

    Syntax monitor kernel deadloop time interval [ slot slot-number ] undo monitor kernel deadloop time [ slot slot-number ] Default The interval for identifying a kernel thread deadloop is 60 seconds. Views System view Predefined user roles network-admin Parameters time interval: Specifies the interval for identifying a kernel thread deadloop, in the range of 1 to 65535 seconds.
  • Page 178: Monitor Kernel Starvation Exclude-Thread

    Views System view Predefined user roles network-admin Parameters slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the master device is specified. Usage guidelines Starvation occurs when a thread is unable to access shared resources. This command enables the system to detect and report thread starvation.
  • Page 179: Monitor Kernel Starvation Time

    Predefined user roles network-admin Parameters tid: Specifies a kernel thread by its ID, in the range of 1 to 2147483647. If no kernel thread is specified for the undo command, the default is restored. slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the master device is specified.
  • Page 180: Monitor Process

    Usage guidelines If a thread is not executed within the specified interval, the system considers that a starvation has occurred, and outputs a starvation message. Inappropriate use of this command can cause service problems or system breakdown. Make sure you understand the impact of this command on your network before you use it.
  • Page 181: Commands Description

    Table 47 Interactive commands Commands Description ? or h Displays help information that includes available interactive commands. Sorts processes by CPU usage in descending order, which is the default setting. Sets the interval for refreshing process statistics, in the range of 1 to 2147483647 seconds. The default value is 5 seconds.
  • Page 182 76 processes; 103 threads; 687 fds Thread states: 1 running, 102 sleeping, 0 stopped, 0 zombie CPU states: 44.84% idle, 0.51% user, 39.17% kernel, 15.46% interrupt Memory: 496M total, 341M available, page size 4K State HH:MM:SS Name 1047 1047 1420K 00:02:30 37.11% diagd...
  • Page 183 76 processes; 103 threads; 687 fds Thread states: 1 running, 102 sleeping, 0 stopped, 0 zombie CPU states: 78.98% idle, 0.16% user, 14.57% kernel, 6.27% interrupt Memory: 496M total, 341M available, page size 4K State HH:MM:SS Name 1047 1047 1420K 00:02:39 14.13% diagd...
  • Page 184 Enter f to sort processes by FDs in descending order. (You can also enter command c, m, or t to sort • processes.) 87 processes; 113 threads; 735 fds Thread states: 1 running, 112 sleeping, 0 stopped, 0 zombie CPU states: 90.66% idle, 0.88% user, 5.77% kernel, 2.66% interrupt Memory: 755M total, 414M available, page size 4K State HH:MM:SS...
  • Page 185: Monitor Thread

    Field Description Name of a process. If square brackets ([ ]) exist in a process name, the process is Name a kernel thread. monitor thread Use monitor thread to display thread statistics. Syntax monitor thread [ dumbtty ] [ iteration number ] [ slot slot-number ] Views Any view Predefined user roles...
  • Page 186 Commands Description > Moves sort field to the next right column. Examples # Display thread statistics in dumbtty mode. <Sysname> monitor thread dumbtty 84 processes; 107 threads Thread states: 1 running, 106 sleeping, 0 stopped, 0 zombie CPU states: 83.19% idle, 1.68% user, 10.08% kernel, 5.04% interrupt Memory: 755M total, 417M available, page size 4K LAST_CPU State...
  • Page 187 Refresh the screen Set the maximum number of threads to display Quit the interactive display Sort by run time of threads since last restart < Move sort field to the next left column > Move sort field to the next right column Press any key to continue Enter d, and then enter a number to modify the refresh interval.
  • Page 188: Reset Kernel Deadloop

    Field Description State of a thread: • R—Running. • S—Sleeping. State • T—Traced or stopped. • D—Uninterruptible sleep. • Z—Zombie. HH:MM:SS Running time of a thread since last restart. Longest time that a single thread scheduling occupies the CPU, in milliseconds. CPU usage of a thread.
  • Page 189: Reset Kernel Reboot

    Predefined user roles network-admin Parameters slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the command clears kernel thread exception information for the master device. Examples # Clear kernel thread exception information. <Sysname>...
  • Page 190 Parameters slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the command clears kernel thread starvation information for the master device. Examples # Clear kernel thread starvation information. <Sysname> reset kernel starvation Related commands display kernel starvation...
  • Page 191: Port Mirroring Commands

    Port mirroring commands display mirroring-group Use display mirroring-group to display mirroring group information. Syntax display mirroring-group { group-id | all | local | remote-destination | remote-source } Views Any view Predefined user roles network-admin network-operator Parameters group-id: Number of the mirroring group, in the range of 1 to 4. all: Displays information about all mirroring groups.
  • Page 192: Mirroring-Group

    Table 51 Command output Field Description Mirroring group Number of the mirroring group. Type of the mirroring group: • Local. Type • Remote source. • Remote destination. Status of the mirroring group: • Active. Status • Incomplete—The mirroring group is not configured completely and cannot take effect.
  • Page 193: Mirroring-Group Mirroring-Port (Interface View)

    mirroring-group mirroring-port (interface view) Use mirroring-group mirroring-port to configure a source port for a mirroring port. Use undo mirroring-group mirroring-port to remove a source port from the mirroring group. Syntax mirroring-group group-id mirroring-port { both | inbound | outbound } undo mirroring-group group-id mirroring-port Default No source port is configured for any mirroring group.
  • Page 194: Mirroring-Group Mirroring-Port (System View)

    mirroring-group mirroring-port (system view) Use mirroring-group mirroring-port to configure source ports for a mirroring group. Use undo mirroring-group mirroring-port to remove source ports from a mirroring group. Syntax mirroring-group group-id mirroring-port interface-list { both | inbound | outbound } undo mirroring-group group-id mirroring-port interface-list Default No source port is configured for a mirroring group.
  • Page 195: Mirroring-Group Monitor-Egress

    [Sysname] mirroring-group 2 mirroring-port ten-gigabitethernet 1/1/6 both Related commands mirroring-group mirroring-group monitor-egress Use mirroring-group monitor-egress to configure an egress port for a remote source group. Use undo mirroring-group monitor-egress to remove the egress port of a remote source group. Syntax In system view: mirroring-group group-id monitor-egress interface-type interface-number undo mirroring-group group-id monitor-egress interface-type interface-number...
  • Page 196: Mirroring-Group Monitor-Port (Interface View)

    <Sysname> system-view [Sysname] mirroring-group 2 remote-source [Sysname] interface ten-gigabitethernet 1/1/6 [Sysname-Ten-GigabitEthernet1/1/6] mirroring-group 2 monitor-egress Related commands mirroring-group mirroring-group monitor-port (interface view) Use mirroring-group monitor-port to configure the port as the monitor port for a mirroring group. Use undo mirroring-group monitor-port to remove the monitor port of a mirroring group. Syntax mirroring-group group-id monitor-port undo mirroring-group group-id monitor-port...
  • Page 197: Mirroring-Group Monitor-Port (System View)

    [Sysname] interface ten-gigabitethernet 1/1/6 [Sysname-Ten-GigabitEthernet1/1/6] mirroring-group 2 monitor-port Related commands mirroring-group mirroring-group monitor-port (system view) Use mirroring-group monitor-port to configure a port as the monitor port for a mirroring group. Use undo mirroring-group monitor-port to remove the monitor port from a mirroring group. Syntax mirroring-group group-id monitor-port interface-type interface-number undo mirroring-group group-id monitor-port interface-type interface-number...
  • Page 198: Mirroring-Group Reflector-Port

    [Sysname] mirroring-group 2 monitor-port ten-gigabitethernet 1/1/6 Related commands mirroring-group mirroring-group reflector-port Use mirroring-group reflector-port to configure the reflector port for a remote source group. Use undo mirroring-group reflector-port to remove the reflector port of a remote source group. Syntax In system view: mirroring-group group-id reflector-port interface-type interface-number undo mirroring-group group-id reflector-port interface-type interface-number In interface view:...
  • Page 199: Mirroring-Group Remote-Probe Vlan

    This operation may delete all settings made on the interface. Continue? [Y/N]:y # Create remote source group 2, and configure port Ten-GigabitEthernet 1/1/6 as its reflector port in interface view. <Sysname> system-view [Sysname] mirroring-group 2 remote-source [Sysname] interface ten-gigabitethernet 1/1/6 [Sysname-Ten-GigabitEthernet1/1/6] mirroring-group 2 reflector-port This operation may delete all settings made on the interface.
  • Page 200 Examples # Create remote source group 1, and configure VLAN 10 as its remote probe VLAN. <Sysname> system-view [Sysname] mirroring-group 1 remote-source [Sysname] mirroring-group 1 remote-probe vlan 10 # Create remote destination group 2, and configure VLAN 20 as its remote probe VLAN. <Sysname>...
  • Page 201: Traffic Mirroring Commands

    Traffic mirroring commands mirror-to Use mirror-to to specify the mirroring destination for a traffic behavior. Use undo mirror-to to cancel the configuration. Syntax mirror-to { cpu | interface interface-type interface-number } undo mirror-to { cpu | interface interface-type interface-number } Default No mirroring destination is configured for a traffic behavior.
  • Page 202: Support And Other Resources

    Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.com/support Before contacting HP, collect the following information: Product model names and numbers • Technical support registration number (if applicable) • • Product serial numbers Error messages •...
  • Page 203: Conventions

    Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown. Italic Italic text represents arguments that you replace with actual values. Square brackets enclose syntax choices (keywords or arguments) that are optional. Braces enclose a set of required syntax choices separated by vertical bars, from which { x | y | ...
  • Page 204 Network topology icons Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features.
  • Page 205: Index

    Index D E F H I L M N P R S T V W display snmp-agent local-engineid,81 display snmp-agent mib-view,82 data-fill,1 15 display snmp-agent remote,83 data-size,1 15 display snmp-agent statistics,84 debugging,5 display snmp-agent sys-info,86 description (any NQA operation type view),1 16 display snmp-agent trap queue,87...
  • Page 206 info-center security-logfile switch-directory,70 ntp-service ipv6 unicast-server,37 info-center source,70 ntp-service max-dynamic-sessions,39 info-center synchronous,72 ntp-service multicast-client,39 info-center timestamp,73 ntp-service multicast-server,40 info-center timestamp loghost,74 ntp-service refclock-master,41 ntp-service reliable authentication-keyid,42 ntp-service source,43 logfile save,74 ntp-service unicast-peer,44 ntp-service unicast-server,45 mirroring-group,190 mirroring-group mirroring-port (interface view),191 ping,6 mirroring-group mirroring-port (system view),192 ping...
  • Page 207 snmp-agent remote,99 source port,136 snmp-agent source,100 statistics hold-time,137 snmp-agent sys-info contact,101 statistics interval,137 snmp-agent sys-info location,102 statistics max-group,138 snmp-agent sys-info version,102 Subscription service,200 snmp-agent target-host,103 snmp-agent trap enable,105 terminal debugging,76 snmp-agent trap if-mib link extended,108 terminal logging level,77 snmp-agent trap life,108 terminal monitor,77...

Table of Contents