Académique Documents
Professionnel Documents
Culture Documents
Abstract This document describes the commands and command syntax options available for the HP A Series products. This document is intended for network planners, field technical support and servicing engineers, and network administrators who work with HP A Series products.
Contents
SNMP configuration commands 1 display snmp-agent community 1 display snmp-agent group 2 display snmp-agent local-engineid 3 display snmp-agent mib-view 4 display snmp-agent statistics 6 display snmp-agent sys-info 7 display snmp-agent trap queue 8 display snmp-agent trap-list 9 display snmp-agent usm-user 10 enable snmp trap updown 11 snmp-agent 12 snmp-agent calculate-password 13 snmp-agent community 14 snmp-agent group 15 snmp-agent local-engineid 17 snmp-agent log 17 snmp-agent mib-view 18 snmp-agent packet max-size 19 snmp-agent sys-info 20 snmp-agent target-host 21 snmp-agent trap enable 22 snmp-agent trap if-mib link extended 25 snmp-agent trap life 26 snmp-agent trap queue-size 26 snmp-agent trap source 27 snmp-agent usm-user { v1 | v2c } 28 snmp-agent usm-user v3 29 RMON configuration commands 33 display rmon alarm 33 display rmon event 34 display rmon eventlog 36 display rmon history 37 display rmon prialarm 40 display rmon statistics 41 rmon alarm 43 rmon event 45 rmon history 46 rmon prialarm 47 rmon statistics 49 NTP configuration commands 51 display ntp-service sessions 51 display ntp-service status 55 display ntp-service trace 57 ntp-service access 58 ntp-service authentication enable 59 ntp-service authentication-keyid 60 ntp-service broadcast-client 60
iii
ntp-service ntp-service ntp-service ntp-service ntp-service ntp-service ntp-service ntp-service ntp-service ntp-service
broadcast-server 61 in-interface disable 62 max-dynamic-sessions 62 multicast-client 63 multicast-server 64 refclock-master 64 reliable authentication-keyid 65 source-interface 66 unicast-peer 66 unicast-server 67
DMC configuration commands 69 display dmc device-type 69 dmc acl 70 dmc device-type detect 71 dmc enable 71 redirect monitor-port 72 Cluster management configuration commands 73 NDP configuration commands 73 display ndp 73 ndp enable 76 ndp timer aging 77 ndp timer hello 78 reset ndp statistics 78 NTDP configuration commands 79 display ntdp 79 display ntdp device-list 80 display ntdp single-device 82 ntdp enable 84 ntdp explore 85 ntdp hop 85 ntdp timer 86 ntdp timer hop-delay 86 ntdp timer port-delay 87 Cluster configuration commands 88 add-member 88 administrator-address 89 auto-build 89 black-list add-mac 91 black-list delete-mac 91 build 92 cluster 93 cluster enable 93 cluster switch-to 94 cluster-local-user 95 cluster-mac 96 cluster-mac syn-interval 96 cluster-snmp-agent community 97 cluster-snmp-agent group v3 98 cluster-snmp-agent mib-view 99 cluster-snmp-agent usm-user v3 100 delete-member 101 display cluster 102 display cluster base-topology 103 display cluster black-list 105
iv
display cluster candidates 106 display cluster current-topology 107 display cluster members 109 ftp-server 112 holdtime 112 ip-pool 113 logging-host 114 management-vlan 114 management-vlan synchronization enable 115 nm-interface vlan-interface 116 reboot member 116 snmp-host 117 tftp-server 118 timer 119 topology accept 119 topology restore-from 120 topology save-to 121
CWMP (TR-069) configuration commands 123 cwmp 123 cwmp acs password 123 cwmp acs url 124 cwmp acs username 124 cwmp cpe connect retry 125 cwmp cpe connect interface 125 cwmp cpe inform interval 126 cwmp cpe inform interval enable 127 cwmp cpe inform time 127 cwmp cpe password 128 cwmp cpe username 128 cwmp cpe wait timeout 129 cwmp enable 130 display cwmp configuration 130 display cwmp status 131 IP accounting configuration commands 134 display ip count 134 display ip count rule 135 ip count enable 136 ip count exterior-threshold 136 ip count firewall-denied 137 ip count inbound-packets 137 ip count interior-threshold 138 ip count outbound-packets 139 ip count rule 139 ip count timeout 140 reset ip count 141 NetStream configuration commands 142 display ip netstream cache 142 display ip netstream export 144 display ip netstream template 146 enable 148 ip netstream 149 ip netstream aggregation 149 ip netstream export host 151
v
ip netstream export rate 152 ip netstream export source 152 ip netstream export v9-template refresh-rate packet 153 ip netstream export v9-template refresh-rate time 154 ip netstream export version 154 ip netstream filter 155 ip netstream max-entry 156 ip netstream mpls 157 ip netstream sampler 157 ip netstream timeout active 158 ip netstream timeout inactive 159 reset ip netstream statistics 159
NQA configuration commands 161 NQA client configuration commands 161 advantage-factor 161 codec-type 161 data-fill 162 data-size 163 description (any NQA test type view) 164 destination ip 164 destination port 165 display nqa history 166 display nqa reaction counters 167 display nqa result 169 display nqa statistics 173 filename 179 frequency 180 history-record enable 181 history-record keep-time 181 history-record number 182 http-version 183 mode 183 next-hop 184 nqa 184 nqa agent enable 185 nqa agent max-concurrent 186 nqa schedule 186 operation (FTP test type view) 187 operation (HTTP test type view) 188 operation interface 188 password (FTP test type view) 189 probe count 190 probe packet-interval 191 probe packet-number 191 probe packet-timeout 192 probe timeout 192 reaction checked-element icpif 193 reaction checked-element { jitter-ds | jitter-sd } 194 reaction checked-element mos 195 reaction checked-element { owd-ds | owd-sd } 196 reaction checked-element packet-loss 197 reaction checked-element probe-duration 198 reaction checked-element probe-fail (for trap) 200 reaction checked-element probe-fail (for trigger) 201
vi
reaction checked-element rtt 202 reaction trap 203 resolve-target 204 route-option bypass-route 205 source interface 205 source ip 206 source port 207 statistics hold-time 207 statistics max-group 208 statistics interval 208 tos 209 ttl 210 type 210 url 211 username (FTP test type view) 212 vpn-instance (ICMP echo test type view) 212 NQA server configuration commands 213 display nqa server status 213 nqa server enable 214 nqa server tcp-connect 214 nqa server udp-echo 215
IP traffic ordering configuration commands 217 display ip flow-ordering statistic 217 ip flow-ordering 218 ip flow-ordering stat-interval 218 sFlow configuration commands 220 display sflow 220 sflow agent 221 sflow collector 222 sflow counter interval 223 sflow counter collector 224 sflow flow collector 224 sflow flow max-header 225 sflow sampling-mode 225 sflow sampling-rate 226 sflow source 226 sflow version 227 Sampler configuration commands 228 display sampler 228 reset sampler statistics 229 sampler 229 PoE configuration commands 231 apply poe-profile 231 apply poe-profile interface 232 display poe device 232 display poe interface 233 display poe interface power 236 display poe power-usage 237 display poe pse 239 display poe pse interface 241 display poe pse interface power 242 display poe-power 243 display poe-profile 245
vii
display poe-profile interface 247 poe disconnect 247 poe enable 248 poe enable pse 249 poe legacy enable 249 poe max-power 250 poe max-power (system view) 250 poe mode 251 poe pd-description 252 poe pd-policy priority 252 poe priority 253 poe priority (system view) 254 poe pse-policy priority 255 poe update 255 poe utilization-threshold 256 poe-profile 257
Port mirroring configuration commands 258 display mirroring-group 258 mirroring-group 259 mirroring-group mirroring-port 260 mirroring-group monitor-port 261 mirroring-port 261 monitor-port 262 Traffic mirroring configuration commands 264 mirror-to 264 Information center configuration commands 265 display channel 265 display info-center 266 display logbuffer 268 display logbuffer summary 270 display logfile buffer 271 display logfile summary 272 display trapbuffer 273 enable log updown 275 info-center channel name 276 info-center console channel 276 info-center enable 277 info-center format unicom 277 info-center logbuffer 278 info-center logfile enable 279 info-center logfile frequency 279 info-center logfile size-quota 280 info-center logfile switch-directory 281 info-center loghost 282 info-center loghost source 283 info-center monitor channel 284 info-center snmp channel 284 info-center source 285 info-center synchronous 287 info-center syslog channel 289 info-center timestamp 289 info-center timestamp loghost 291 info-center trapbuffer 291
viii
logfile save 292 reset logbuffer 293 reset trapbuffer 293 terminal debugging 293 terminal logging 294 terminal monitor 295 terminal trapping 295
System maintenance and debugging commands 297 System maintenance commands 297 ping 297 ping ipv6 301 tracert 303 tracert ipv6 305 System debugging commands 306 debugging 306 display debugging 307 IPv6 NetStream configuration commands 308 display ipv6 netstream cache 308 display ipv6 netstream export 311 display ipv6 netstream template 312 enable 314 ipv6 netstream 315 ipv6 netstream aggregation 315 ipv6 netstream export host 316 ipv6 netstream export rate 317 ipv6 netstream export source 318 ipv6 netstream export v9-template refresh-rate packet 319 ipv6 netstream export v9-template refresh-rate time 319 ipv6 netstream export version 9 320 ipv6 netstream max-entry 321 ipv6 netstream timeout active 321 ipv6 netstream timeout inactive 322 reset ipv6 netstream statistics 323 Support and other resources 324 Contacting HP 324 Subscription service 324 Related information 324 Documents 324 Websites 324 Conventions 325 Index 327
ix
Syntax
display snmp-agent community [ read | write ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
read: Displays information about SNMP read-only communities. write: Displays information about SNMP read and write communities. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display information about all SNMPv1 and SNMPv2c communities.
<Sysname> display snmp-agent community Community name: aa Group name: aa Acl:2001 Storage-type: nonVolatile Community name: bb Group name: bb Storage-type: nonVolatile Community name: userv1 Group name: testv1 Storage-type: nonVolatile
Description
Displays the community name created by using snmp-agent community or the user name created by using snmp-agent usm-user { v1 | v2c }. SNMP group name.
Acl
Storage-type
volatileSettings are lost when the system reboots. nonVolatileSettings remain after the system reboots. permanentSettings remain after the system reboots and can be
modified but not deleted.
Syntax
display snmp-agent group [ group-name ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
group-name: Specifies an SNMP group name, a case-sensitive string of 1 to 32 characters. You can specify an SNMPv1, SNMPv2c, or SNMPv3 group. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression.
2
include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display information about all SNMPv3 groups.
Group name: groupv1 Security model: v1 noAuthnoPriv Readview: ViewDefault Writeview: <no specified> Notifyview: <no specified> Storage-type: nonVolatile Group name: groupv3 Security model: v3 noAuthnoPriv Readview: ViewDefault Writeview: <no specified> Notifyview: <no specified> Storage-type: nonVolatile
Description
SNMPv3 group name. Security model of the SNMPv3 group:
Security model
Syntax
display snmp-agent local-engineid [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the local SNMP engine ID.
<Sysname> display snmp-agent local-engineid SNMP local EngineID: 800007DB7F0000013859
Syntax
display snmp-agent mib-view [ exclude | include | viewname view-name ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
exclude: Displays the subtrees excluded from any MIB view. include: Displays the subtrees included in any MIB view. viewname view-name: Displays information about the specified MIB view. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display all SNMP MIB views of the device.
<Sysname> display snmp-agent mib-view View name:ViewDefault MIB Subtree:iso Subtree mask: Storage-type: nonVolatile View Type:included View status:active View name:ViewDefault MIB Subtree:snmpUsmMIB Subtree mask: Storage-type: nonVolatile View Type:excluded View status:active View name:ViewDefault MIB Subtree:snmpVacmMIB Subtree mask: Storage-type: nonVolatile View Type:excluded View status:active View name:ViewDefault MIB Subtree:snmpModules.18 Subtree mask: Storage-type: nonVolatile View Type:excluded View status:active
The ViewDefault is the default MIB view. The output shows that all MIB objects in the iso subtree are accessible except for the MIB objects in the snmpUsmMIB, snmpVacmMIB, and snmpModules.18 subtrees. Table 3 Output description Field
View name MIB Subtree Subtree mask Storage-type
Description
MIB view name A MIB subtree covered by the MIB view MIB subtree mask Type of the medium where the subtree view is stored Access privilege for the MIB subtree in the MIB view:
Syntax
display snmp-agent statistics [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display statistics for the SNMP agent.
<Sysname> display snmp-agent statistics 1684 Messages delivered to the SNMP entity 5 Messages which were for an unsupported version 0 Messages which used a SNMP community name not known 0 Messages which represented an illegal operation for the community supplied 0 ASN.1 or BER errors in the process of decoding 1679 Messages passed from the SNMP entity 0 SNMP PDUs which had badValue error-status 0 SNMP PDUs which had genErr error-status 0 SNMP PDUs which had noSuchName error-status 0 SNMP PDUs which had tooBig error-status (Maximum packet size 1500) 16544 MIB objects retrieved successfully 2 MIB objects altered successfully 7 GetRequest-PDU accepted and processed 7 GetNextRequest-PDU accepted and processed 1653 GetBulkRequest-PDU accepted and processed 1669 GetResponse-PDU accepted and processed 2 SetRequest-PDU accepted and processed 0 Trap PDUs accepted and processed 0 Alternate Response Class PDUs dropped silently 0 Forwarded Confirmed Class PDUs dropped silently
Description
Number of packets delivered to the SNMP agent Number of packets from a device with an SNMP version that is not supported by the current SNMP agent Number of packets that use an unknown community name Number of packets carrying an operation that the community has no right to perform Number of packets with ASN.1 or BER errors in the process of decoding Number of packets sent by the SNMP agent Number of SNMP PDUs with a badValue error Number of SNMP PDUs with a genErr error Number of PDUs with a noSuchName error Number of PDUs with a tooBig error (the maximum packet size is 1,500 bytes) Number of MIB objects that have been successfully retrieved Number of MIB objects that have been successfully modified Number of get requests that have been received and processed Number of getNext requests that have been received and processed Number of getBulk requests that have been received and processed Number of get responses that have been received and processed Number of set requests that have been received and processed Number of traps that have been received and processed Number of dropped response packets Number of forwarded packets that have been dropped
Syntax
display snmp-agent sys-info [ contact | location | version ] * [ | { begin | exclude | include } regularexpression ]
View
Any view
Default level
1: Monitor level
Parameters
contact: Displays the contact information of the current network administrator. location: Displays the location information of the current device. version: Displays the version of the current SNMP agent. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the current SNMP agent system information.
<Sysname> display snmp-agent sys-info The contact person for this managed node:
Syntax
display snmp-agent trap queue [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the current configuration and usage of the trap queue.
<Sysname> display snmp-agent trap queue Queue name: SNTP Queue size: 100 Message number: 6
Description
Trap queue name Trap queue size Number of traps in the current trap queue
Syntax
display snmp-agent trap-list [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression.
9
include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the modules that can generate traps and their trap status.
<Sysname> display snmp-agent trap-list acfp trap enable bfd trap enable bgp trap enable configuration trap enable flash trap enable fr trap enable isdn trap enable mpls trap enable ospf trap enable standard trap enable system trap enable vrrp trap enable wlan trap enable voice trap disable Enable traps: 14; Disable traps: 1
Syntax
display snmp-agent usm-user [ engineid engineid | username user-name | group group-name ] * [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
engineid engineid: Displays SNMPv3 user information for the SNMP engine ID identified by engineid. When an SNMPv3 user is created, the system records the current local SNMP entity engine ID. The user becomes invalid when the engine ID changes and becomes valid again when the recorded engine ID is restored. username user-name: Displays information about the specified SNMPv3 user. The username is casesensitive. group group-name: Displays SNMPv3 user information for the specified SNMP group name. The group name is case-sensitive. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow.
10
exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display SNMPv3 information for all created users.
<Sysname> display snmp-agent usm-user User name: userv3 Group name: mygroupv3 Engine ID: 800063A203000FE240A1A6 Storage-type: nonVolatile UserStatus: active User name: userv3code Group name: groupv3code Engine ID: 800063A203000FE240A1A6 Storage-type: nonVolatile UserStatus: active
Description
SNMP user name SNMP group name Engine ID for an SNMP entity Storage type, which can be:
Storage-type
11
Syntax
enable snmp trap updown undo enable snmp trap updown
View
Interface view
Default level
2: System level
Parameters
None
Examples
# Enable port Ethernet 1/1 to send linkUp/linkDown SNMP traps in the community public.
<Sysname> system-view [Sysname] snmp-agent trap enable [Sysname] snmp-agent target-host trap address udp-domain 10.1.1.1 params securityname public [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] enable snmp trap updown
snmp-agent
Description
Use snmp-agent to enable SNMP agent. Use undo snmp-agent to disable SNMP agent. By default, SNMP agent is disabled. You can enable the SNMP agent by using any command that begins with snmp-agent except snmpagent calculate-password.
Syntax
snmp-agent undo snmp-agent
View
System view
Default level
3: Manage level
Parameters
None
Examples
# Enable SNMP agent on the device.
<Sysname> system-view [Sysname] snmp-agent
12
snmp-agent calculate-password
Description
Use snmp-agent calculate-password to convert a plain text key to an encrypted key for authentication or encryption. This command helps you calculate encrypted authentication and privacy keys for SNMPv3 users that use encrypted authentication and privacy keys. To create an SNMPv3 user, see snmp-agent usm-user v3. Enable SNMP before you execute snmp-agent calculate-password. The encrypted key converted for SHA authentication is a string of 40 hexadecimal characters. For an authentication key, all of the 40 hexadecimal characters are valid. For a privacy key, only the first 32 hexadecimal characters are valid. The converted key is valid only under the specified engine ID. Related commands: snmp-agent usm-user v3.
Syntax
snmp-agent calculate-password plain-password mode { 3desmd5 | 3dessha | md5 | sha } { localengineid | specified-engineid engineid }
View
System view
Default level
3: Manage level
Parameters
plain-password: Specifies a plain text authentication or privacy key. mode: Specifies authentication and privacy algorithms. Select a mode option, depending on the authentication and privacy algorithm you are configuring with snmp-agent usm-user v3. The three privacy algorithms AES, 3DES, and DES are in descending order of security strength. Higher security means more complex implementation mechanism and lower speed. DES is enough to meet general requirements. The MD5 and SHA-1 are the two authentication algorithms. MD5 is faster than SHA-1, while SHA-1 provides higher security than MD5. 3desmd5: Converts the plain text privacy key to an encrypted key for 3DES encryption used together with MD5 authentication. For more information about MD5 and 3DES, see Security Configuration Guide. 3dessha: Converts the plain text privacy key to an encrypted key for 3DES encryption used together with SHA-1 authentication. For more information about SHA-1 and 3DES, see Security Configuration Guide. md5: Converts the plain text authentication key to an encrypted key for MD5 authentication, or converts the plain text privacy key to an encrypted key for AES or DES encryption used in conjunction with MD5. For more information about AES and DES, see Security Configuration Guide. sha: Converts the plain text authentication key to an encrypted key for SHA-1 authentication, or converts the plain text privacy key to an encrypted key for AES or DES encryption used in conjunction with SHA-1 authentication.
local-engineid: Uses the local engine ID to calculate the encrypted key. For engine ID-related configuration, see snmp-agent local-engineid. specified-engineid: Uses a user-defined engine ID to calculate the encrypted key.
13
engineid: Specifies an SNMP engine ID as a hexadecimal string. It must comprise an even number of hexadecimal characters, which ranges from 10 to 64. All-zero and all-F strings are invalid.
Examples
# Use local engine ID to convert the plain text key authkey to an encrypted key for MD5 authentication.
<Sysname> system-view [Sysname] snmp-agent calculate-password authkey mode md5 local-engineid The secret key is: 09659EC5A9AE91BA189E5845E1DDE0CC
snmp-agent community
Description
Use snmp-agent community to configure an SNMP community. Use undo snmp-agent community to delete a specified community. This command is for SNMPv1 and SNMPv2c. A community comprises NMSs and SNMP agents, and is identified by a community name. When devices in a community communicate with each other, they use the community name for authentication. An NMS and an SNMP agent can access each other only when they are configured with the same community name. Typically, public is used as the read-only community name, and private is used as the read and write community name. To improve security, assign your SNMP communities a name other than public and private. To make sure that the MIB objects are accessible only to a specific NMS, use a basic ACL to identify the source IP address of the NMS. To set the range of the MIB objects available for the community, use a MIB view. Related commands: snmp-agent mib-view.
Syntax
snmp-agent community { read | write } community-name [ acl acl-number | mib-view view-name ] * undo snmp-agent community { read | write } community-name
View
System view
Default level
3: Manage level
Parameters
read: Assigns the specified community the read only access to MIB objects. A read-only community can only inquire MIB information. write: Assigns the specified community the read and write access to MIB objects. A read and write community can configure MIB information. community-name: Sets a community name, which is a string of 1 to 32 characters. acl acl-number: Applies a basic ACL to filter NMSs by source IP address. The acl-number argument represents a basic ACL number in the range of 2,000 to 2,999. mib-view view-name: Specifies the MIB view available for the community. The view-name argument represents a MIB view name, which is a string of 1 to 32 characters. A MIB view represents a set of
14
accessible MIB objects. If no MIB view is specified, the specified community can access the MIB objects in the default MIB view ViewDefault. To create a MIB view, use snmp-agent mib-view.
Examples
# Create a read-only community and name it readaccess.
<Sysname> system-view [Sysname] snmp-agent sys-info version v1 v2c [Sysname] snmp-agent community read readaccess
Set the SNMP version on the NMS to SNMPv1 or SNMPv2c Fill in the read-only community name readaccess Establish a connection, and the NMS can perform read-only operations to the MIB objects in the default MIB view (ViewDefault) on the device
# Create a read and write community and name it writeaccess. Enable only the NMS with the IP address of 1.1.1.1 in this community to update the values of the agent MIB objects.
<Sysname> system-view [Sysname] acl number 2001 [Sysname-acl-basic-2001] rule permit source 1.1.1.1 0.0.0.0 [Sysname-acl-basic-2001] rule deny source any [Sysname-acl-basic-2001] quit [Sysname] snmp-agent sys-info version v2c [Sysname] snmp-agent community write writeaccess acl 2001
Set the IP address of the NMS to 1.1.1.1 Set the SNMP version on the NMS to SNMPv2c Fill in the write community name writeaccess; the NMS can perform read-only operations to the MIB objects in the default MIB view (ViewDefault) on the device
# Create a read and write community and name it wr-sys-acc. The NMS can perform the read and write operations to the MIB objects of the system subtree (with the OID of 1.3.6.1.2.1.1).
<Sysname> system-view [Sysname] snmp-agent sys-info version v1 v2c [Sysname] undo snmp-agent mib-view ViewDefault [Sysname] snmp-agent mib-view included test system [Sysname] snmp-agent community write wr-sys-acc mib-view test
Set the SNMP version on the NMS to SNMPv1 or SNMPv2c Fill in the write community name wr-sys-acc Establish a connection, and the NMS can perform read and write operations to the MIB objects in system view on the device
snmp-agent group
Description
Use snmp-agent group to configure an SNMP group and specify its access right. Use undo snmp-agent group to delete an SNMP group. By default, SNMP groups configured by snmp-agent group v3 use a no-authentication-no-privacy security model. An SNMP group defines security model, access right, and so on. A user in this SNMP group has all these public properties.
15
Syntax
SNMPv1 and SNMP v2c: snmp-agent group { v1 | v2c } group-name [ read-view view-name ] [ write-view view-name ] [ notifyview view-name ] [ acl acl-number ] undo snmp-agent group { v1 | v2c } group-name SNMPv3: snmp-agent group v3 group-name [ authentication | privacy ] [ read-view view-name ] [ write-view viewname ] [ notify-view view-name ] [ acl acl-number ] undo snmp-agent group v3 group-name [ authentication | privacy ]
View
System view
Default level
3: Manage level
Parameters
v1: SNMPv1. v2c: SNMPv2c. v3: SNMPv3. group-name: Group name, which is a string of 1 to 32 characters. authentication: Specifies the security model of the SNMPv3 group to be authentication only (without privacy). privacy: Specifies the security model of the SNMPv3 group to be authentication and privacy. read-view view-name: Specifies a read-only MIB view. The view-name represents a MIB view, which is a string of 1 to 32 characters. The users in the specified group have read only access to the objects included in the MIB view. The default read view is ViewDefault. write-view view-name: Specifies a read and write MIB view. The view-name argument represents a MIB view, which is a string of 1 to 32 characters. The users in the specified group have read and write access to the objects included in the MIB view. By default, no write view is configured, which means the NMS cannot perform the write operations to all MIB objects on the device. notify-view view-name: Specifies a trap MIB view. The view-name argument represents a MIB view, which is a string of 1 to 32 characters. The system sends traps to the users in the specified group for the objects included in the MIB view. By default, no notify view is configured, which means the agent does not send traps to the NMS. acl acl-number: Specifies a basic ACL by its number, which ranges from 2000 to 2999. This ACL filters NMSs by source IP address. In other words, you can configure to allow or prohibit SNMP packets with a specific source IP address to restrict the intercommunication between the NMS and the agent.
Examples
# Create an SNMP group group1 on an SNMPv3 enabled device, no authentication, no privacy.
<Sysname> system-view [Sysname] snmp-agent group v3 group1
16
snmp-agent local-engineid
Description
Use snmp-agent local-engineid to configure the SNMP engine ID of the local SNMP agent. Use undo snmp-agent local-engineid to restore the default local engine ID. By default, the local engine ID is the combination of the company ID and the device ID. Device ID varies by product and could be an IP address, a MAC address, or a user-defined hexadecimal string. An engine ID has two functions: For all devices managed by one NMS, each device needs a unique engine ID to identify the SNMP agent. By default, each device has an engine ID. The network administrator has to make sure that there is no repeated engine ID within an SNMP domain. In SNMPv3, the user name and cipher text password are associated with the engine ID. Therefore, if the engine ID changes, the user name and cipher text password configured under the engine ID become invalid.
Typically, the device uses its default engine ID. For ease of remembrance, you can set engine IDs for the devices according to the network planning. For example, if both device 1 and device 2 are on the first floor of building A, you can set the engine ID of device 1 to 000Af0010001, and that of device 2 to 000Af0010002. Related commands: snmp-agent usm-user.
Syntax
snmp-agent local-engineid engineid undo snmp-agent local-engineid
View
System view
Default level
3: Manage level
Parameters
engineid: Specifies an SNMP engine ID as a hexadecimal string. It must comprise an even number of hexadecimal characters, in the range of 10 to 64. All-zero and all-F strings are invalid.
Examples
# Configure the local engine ID as 123456789A.
<Sysname> system-view [Sysname] snmp-agent local-engineid 123456789A
snmp-agent log
Description
Use snmp-agent log to enable SNMP logging. Use undo snmp-agent log to restore the default. By default, SNMP logging is disabled. If specified SNMP logging is enabled, when the NMS performs a specified operation to the SNMP agent, the latter records the operation-related information and saves it to the information center. With parameters
17
for the information center set, output rules of the SNMP logs are decided (that is, whether logs are permitted to output and the output destinations).
Syntax
snmp-agent log { all | get-operation | set-operation } undo snmp-agent log { all | get-operation | set-operation }
View
System view
Default level
3: Manage level
Parameters
all: Enables logging of SNMP GET and SET operations. get-operation: Enables logging of SNMP GET operation. set-operation: Enables logging of SNMP SET operation.
Examples
# Enable logging of SNMP GET operation.
<Sysname> system-view [Sysname] snmp-agent log get-operation
snmp-agent mib-view
Description
Use snmp-agent mib-view to create or update a MIB view. Use undo snmp-agent mib-view to delete a MIB view. By default, the system creates the ViewDefault view when the SNMP agent is enabled. In the default MIB view, all MIB objects in the iso subtree but the snmpUsmMIB, snmpVacmMIB, and snmpModules.18 subtrees are accessible. A MIB view represents a set of MIB objects (or MIB object hierarchies) with certain access privilege. The MIB objects included in the MIB view are accessible while those excluded from the MIB view are inaccessible. Each view-name oid-tree pair represents a view record. If you specify the same record with different MIB subtree masks multiple times, the last configuration takes effect. The system can store entries for up to 20 unique MIB view records. Except the four subtrees in the default MIB view, you can create up to 16 unique MIB view records. After you delete the default view with undo snmp-agent mib-view, you can create up to 20 unique MIB view records. Be cautious with deleting the default MIB view. The operation blocks access to any MIB object on the device from NMSs that use the default view. Related commands: snmp-agent community and snmp-agent group.
18
Syntax
snmp-agent mib-view { excluded | included } view-name oid-tree [ mask mask-value ] undo snmp-agent mib-view view-name
View
System view
Default level
3: Manage level
Parameters
excluded: Denies access to any nodes in the specified MIB subtree. included: Permits access to the nodes in the specified MIB subtree. view-name: Specify a view name, which is a string of 1 to 32 characters. oid-tree: Specifies a MIB subtree by its root nodes OID, such as 1.4.5.3.1, or object name, such as system. An OID is made up of a series of integers. It marks the position of a node in the MIB tree and uniquely identifies a MIB object. mask mask-value: Sets a MIB subtree mask, which is a hexadecimal string. Its length must be an even number in the range of 2 to 32. For example, you can specify 0a, aa, but not 0aa. If no subtree mask is specified, the MIB subtree mask is an all-F hexadecimal string. The MIB subtree and the subtree mask together identify a set of objects to be included or excluded from the view.
Examples
# Include the mib-2 (OID 1.3.6.1) subtree in the mibtest view, exclude the ip subtree from the mibtest view.
<Sysname> system-view [Sysname] snmp-agent mib-view included mibtest 1.3.6.1 [Sysname] snmp-agent mib-view excluded mibtest ip [Sysname] snmp-agent community read public mib-view mibtest
An SNMPv1 NMS in the public community can query the objects in the mib-2 subtree, but not any objects (for example, the ipForwarding or ipDefaultTTL node) in the ip subtree.
Syntax
snmp-agent packet max-size byte-count undo snmp-agent packet max-size
19
View
System view
Default level
3: Manage level
Parameters
byte-count: Maximum number of bytes of an SNMP packet that can be received or sent by an agent, which ranges from 484 to 17,940 and defaults to 1,500 bytes.
Examples
# Set the maximum size of SNMP packets that the SNMP agent can receive or send to 1,024 bytes.
<Sysname> system-view [Sysname] snmp-agent packet max-size 1024
snmp-agent sys-info
Description
Use snmp-agent sys-info to configure system information, including the contact information, the location, and the SNMP version in use. Use undo snmp-agent sys-info contact and undo snmp-agent sys-info location to restore the default. Use undo snmp-agent sys-info version to disable use of the SNMP function of the specified version. The defaults are as follows: null for contact null for location SNMP v3 for version
Successful interaction between an NMS and the agents requires consistency of SNMP versions configured on them. Related commands: display snmp-agent sys-info. NOTE: Network maintenance engineers can use the system contact information to get in touch with the manufacturer in case of network failures. The system location information is a management variable under the system branch as defined in RFC 1213-MIB, identifying the location of the managed object.
Syntax
snmp-agent sys-info { contact sys-contact | location sys-location | version { all | { v1 | v2c | v3 }* } } undo snmp-agent sys-info { contact | location | version { all | { v1 | v2c | v3 }* } }
View
System view
Default level
3: Manage level
Parameters
contact sys-contact: A string of 1 to 200 characters that describes the contact information for system maintenance.
20
location sys-location: A string of 1 to 200 characters that describes the location of the device. version: The SNMP version in use. all: Specifies SNMPv1, SNMPv2c, and SNMPv3. v1: SNMPv1. v2c: SNMPv2c. v3: SNMPv3.
Examples
# Configure the contact information as Dial System Operator at beeper # 27345.
<Sysname> system-view [Sysname] snmp-agent sys-info contact Dial System Operator at beeper # 27345
snmp-agent target-host
Description
Use snmp-agent target-host to configure the related settings for a trap target host. Use undo snmp-agent target-host to remove the current settings. According to the networking requirements, you can use this command for multiple times to configure different settings for a target host, enabling the device to send trap messages to different NMSs. The number of target hosts that can be configured is 20. If udp-port port-number is not specified, port number 162 is used. Port 162 is the SNMP-specified port used for receiving traps on the NMS. Generally (such as using IMC or MIB Browser as the NMS), you can use the default port number. To change this parameter to another value, you need to make sure that the configuration is the same with that on the NMS. If the key words v1, v2 and v3 are not specified, v1 is used. If the key words authentication and privacy are not specified, the authentication mode is no authentication, no privacy.
Related commands: enable snmp trap updown, snmp-agent trap enable, snmp-agent trap life, and snmp-agent trap source.
Syntax
snmp-agent target-host trap address udp-domain { ip-address | ipv6 ipv6-address } [ udp-port portnumber ] [ vpn-instance vpn-instance-name ] params securityname security-string [ v1 | v2c | v3 [ authentication | privacy ] ] undo snmp-agent target-host trap address udp-domain { ip-address | ipv6 ipv6-address } params securityname security-string [ vpn-instance vpn-instance-name ]
View
System view
Default level
3: Manage level
Parameters
trap: Specifies the host to be the target host which receives traps and notifications from the device. address: Specifies the destination IP address in the SNMP messages sent from the device. udp-domain: Indicates that the trap is transmitted using UDP.
21
ip-address: The IPv4 address or name of the trap target host. The host name is a string of 1 to 255 characters. ipv6 ipv6-address: Specifies the IPv6 address of the trap target host. udp-port port-number: Specifies the number of the port on the target host to receive traps. The value defaults to 162. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the target host belongs, where vpninstance-name is a case-sensitive string of 1 to 31 characters. If the target host is on the public network, do not specify this option. This combination is applicable only in a network supporting IPv4. params securityname security-string: Specifies the authentication related parameter, which is an SNMPv1 or SNMPv2c community name or an SNMPv3 user name, a string of 1 to 32 characters. v1: SNMPv1. This keyword must be the same as the SNMP version on the NMS; otherwise, the NMS cannot receive any trap. v2c: SNMPv2c. This keyword must be the same as the SNMP version on the NMS; otherwise, the NMS cannot receive any trap. v3: SNMPv3. This keyword must be the same as the SNMP version on the NMS; otherwise, the NMS cannot receive any trap. authentication: Specifies the security model to be authentication without privacy. Authentication is a process to check whether the packet is integral and whether it has been tampered. When creating an SNMPv3 user, configure the authentication password. privacy: Specifies the security model to be authentication with privacy. Privacy is to encrypt the data part of a packet to prevent it from being intercepted. When creating an SNMPv3 user, configure the authentication password and privacy password.
Examples
# Enable the device to send SNMPv1 traps to 10.1.1.1, using the community name of public.
<Sysname> system-view [Sysname] snmp-agent trap enable standard [Sysname] snmp-agent target-host trap address udp-domain 10.1.1.1 params securityname public
# Enable the device to send SNMPv3 traps to the device with the IP address of 10.1.1.1, using the user name of v3test.
<Sysname> system-view [Sysname] snmp-agent trap enable standard [Sysname] snmp-agent target-host params securityname v3test v3 trap address udp-domain 10.1.1.1 vpn-instance vpn1
To enable an interface to generate Linkup/Linkdown traps when its state changes, enable the linkUp/linkDown trap function on the interface and globally. To enable this function on an interface, use enable snmp trap updown. To enable this function globally, use snmp-agent trap enable [ standard [ linkdown | linkup ] * ]. Related commands: snmp-agent target-host and enable snmp trap updown. The following table shows the command and router compatibility: Command
snmp-agent trap enable
A-MSR900
No
A-MSR201X
Yes
A-MSR20
No
A-MSR30
Yes
A-MSR50
Yes
Syntax
snmp-agent trap enable [ acfp [ client | policy | rule | server ] | bfd | bgp | configuration | flash | | isdn [ call-clear | call-setup | lapd-status ] | mpls | ospf [ process-id ] [ ifauthfail | ifcfgerror ifrxbadpkt | ifstatechange | iftxretransmit | lsdbapproachoverflow | lsdboverflow | maxagelsa nbrstatechange | originatelsa | vifcfgerror | virifauthfail | virifrxbadpkt | virifstatechange viriftxretransmit | virnbrstatechange ] * | posa | standard [ authentication | coldstart | linkdown linkup | warmstart ]* | system | voice dial | vrrp [ authfailure | newmaster ] | wlan ] fr | | | |
undo snmp-agent trap enable [ acfp [ client | policy | rule | server ] | bfd | bgp | configuration | flash | fr | isdn [ call-clear | call-setup | lapd-status ] | mpls | ospf [ process-id ] [ ifauthfail | ifcfgerror | ifrxbadpkt | ifstatechange | iftxretransmit | lsdbapproachoverflow | lsdboverflow | maxagelsa | nbrstatechange | originatelsa | vifcfgerror | virifauthfail | virifrxbadpkt | virifstatechange | viriftxretransmit | virnbrstatechange ] * | posa | standard [ authentication | coldstart | linkdown | linkup | warmstart ]* | system | voice dial | vrrp [ authfailure | newmaster ] | wlan ]
View
System view
Default level
3: Manage level
Parameters
acfp: Enables SNMP traps for the ACFP module. client: ACFP client traps. policy: ACFP policy traps. rule: ACFP rule traps. server: ACFP server traps.
bfd: Enables SNMP traps for the BFD module. bgp: Enables SNMP traps for the BGP module. configuration: Enables configuration traps. flash: Enables Flash-related SNMP traps. fr: Enables SNMP traps for Frame Relay virtual link change events. isdn: Enables SNMP traps for the ISDN module. call-clear: Call clear traps, which are sent when an ISDN call is cleared. call-setup: Call setup traps, which are sent when an ISDN call is set up. lapd-status: ISDN link change traps.
23
mpls: Enables SNMP traps for the MPLS module. ospf: Enables SNMP traps for the OSPF module. process-id: OSPF process ID, in the range 1 to 65535. ifauthfail: Interface authentication failure traps. ifcfgerror: Interface configuration error traps. ifrxbadpkt: Traps for receiving incorrect packets. ifstatechange: Interface state change traps. iftxretransmit: Traps for the interface to receive and forward packets. lsdbapproachoverflow: Traps for LSDB to be overflowed. lsdboverflow: Traps for LSDB overflow. maxagelsa: Traps for LSA max age. nbrstatechange: Traps for neighbor state change. originatelsa: Traps for local LSA generation. vifcfgerror: Traps for virtual interface configuration error. virifauthfail: Traps for virtual interface authentication failure. virifrxbadpkt: Traps for virtual interface receiving error packets. virifstatechange: Traps for virtual interface state changes. viriftxretransmit: Traps for virtual interface receiving and forwarding packets. virnbrstatechange: Traps for neighbor state change of the virtual interface.
posa: Enables traps for the POSA module. standard: Standard traps. authentication: Enables the sending of authentication failure traps in the event of authentication failure. coldstart: Sends coldstart traps when the device restarts. linkdown: Sends linkdown traps when the port is in a linkdown status. It should be configured globally. linkup: Sends linkup traps when the port is in a linkup status. It should be configured globally. warmstart: Sends warmstart traps when the SNMP restarts.
system: Sends HP-SYS-MAN-MIB (a private MIB) traps. voice dial: Enables the sending of traps of the voice module. vrrp: Enables traps for the VRRP module. authfailure: VRRP authentication failure traps. newmaster: VRRP newmaster traps, which are sent when the device becomes the master.
Examples
# Enable the device to send SNMP authentication failure packets to 10.1.1.1, using the community name public.
<Sysname> system-view [Sysname] snmp-agent target-host trap address udp-domain 10.1.1.1 params securityname public
24
#Apr 24 11:43:09:896 2008 Sysname IFNET/4/INTERFACE UPDOWN: Trap 1.3.6.1.6.3.1.1.5.4<linkUp>: Interface 983555 ifOperStatus is 1, ifDescr is Ethernet1/1, ifType is 6
#Apr 24 11:42:54:314 2008 AR29.46 IFNET/4/INTERFACE UPDOWN: Trap 1.3.6.1.6.3.1.1.5.3<linkDown>: Interface 983555 ifOperStatus is 2, ifDescr is Ethernet1/1, ifType is 6
The format of an extended linkup/ linkDown trap is the standard format followed with the ifDescr and ifType information, facilitating problem location. When this command is configured, the device sends extended linkUp/linkDown traps. If the extended messages are not supported on NMS, the device may not be able to resolve the messages.
Syntax
snmp-agent trap if-mib link extended undo snmp-agent trap if-mib link extended
View
System view
Default level
3: Manage level
Parameters
None
Examples
# Extend standard linkUp/linkDown traps defined in RFC.
<Sysname> system-view [Sysname] snmp-agent trap if-mib link extended
25
Syntax
snmp-agent trap life seconds undo snmp-agent trap life
View
System view
Default level
3: Manage level
Parameters
seconds: Timeout time, which ranges from 1 to 2,592,000 seconds.
Examples
# Configure the holding time of traps in the queue as 60 seconds.
<Sysname> system-view [Sysname] snmp-agent trap life 60
Syntax
snmp-agent trap queue-size size undo snmp-agent trap queue-size
26
View
System view
Default level
3: Manage level
Parameters
size: Number of traps that can be stored in the trap sending queue, which ranges from 1 to 1,000.
Examples
# Set the maximum number of traps that can be stored in the trap sending queue to 200.
<Sysname> system-view [Sysname] snmp-agent trap queue-size 200
Syntax
snmp-agent trap source interface-type { interface-number | interface-number.subnumber } undo snmp-agent trap source
View
System view
Default level
3: Manage level
Parameters
interface-type { interface-number | interface-number.subnumber }: Specifies the interface type and interface number. The parameter interface-number represents the main interface number. The parameter subnumber represents the subinterface number and ranges from 1 to 4,094.
Examples
# Configure the IP address for the port Ethernet 1/1 as the source address for traps.
<Sysname> system-view
27
Syntax
snmp-agent usm-user { v1 | v2c } user-name group-name [ acl acl-number ] undo snmp-agent usm-user { v1 | v2c } user-name group-name
View
System view
Default level
3: Manage level
Parameters
v1: The configured user name should be applied in the SNMPv1 networking environment. If the agent and the NMS use SNMPv1 packets to communicate with each other, this keyword is required. v2c: The configured user name should be applied in the SNMPv2c networking environment. If the agent and the NMS use SNMPv2c packets to communicate with each other, this keyword is required. user-name: User name, a case-sensitive string of 1 to 32 characters. group-name: Group name, a case-sensitive string of 1 to 32 characters. acl acl-number: Associates a basic ACL with the user. acl-number ranges from 2000 to 2999. By using a basic ACL, you can restrict the source IP address of SNMP packets, which means you can configure to allow or prohibit SNMP packets with a specific source IP address to allow or prohibit the specified NMS to access the agent by using this user name.
Examples
# Create a v2c user userv2c in group readCom.
<Sysname> system-view [Sysname] snmp-agent sys-info version v2c [Sysname] snmp-agent group v2c readCom [Sysname] snmp-agent usm-user v2c userv2c readCom
Set the SNMP version on the NMS to SNMPv2c Fill in the read community name userv2c, and then the NMS can access the agent
28
# Create a v2c user userv2c in group readCom, allowing only the NMS with the IP address of 1.1.1.1 to access the agent by using this user name; other NMSs are not allowed to access the agent by using this user name.
<Sysname> system-view [Sysname] acl number 2001 [Sysname-acl-basic-2001] rule permit source 1.1.1.1 0.0.0.0 [Sysname-acl-basic-2001] rule deny source any [Sysname-acl-basic-2001] quit [Sysname] snmp-agent sys-info version v2c [Sysname] snmp-agent group v2c readCom [Sysname] snmp-agent usm-user v2c userv2c readCom acl 2001
Set the IP address of the NMS to 1.1.1.1 Set the SNMP version on the NMS to SNMPv2c Fill in both the read community and write community options with userv2c, and then the NMS can access the agent.
snmp-agent usm-user v3
Description
Use snmp-agent usm-user v3 to add an SNMPv3 user to an SNMP group. Use undo snmp-agent usm-user v3 to delete an SNMPv3 user from an SNMP group. This command is for SNMPv3. Create SNMPv3 users, if the agent and the NMS use SNMPv3 packets to communicate with each other. Each SNMP user belongs to an SNMP group. Before creating a user, create an SNMP group first. Otherwise, the user can be created successfully but does not take effect. An SNMP group may contain multiple users. It defines SNMP objects accessible to the group of users in the MIB view and specifies whether to enable authentication and privacy functions. The authentication and encryption algorithms are defined when a user is created. If you specify the cipher keyword, the system considers the arguments auth-password and privpassword as encrypted keys, and does not encrypt them when executing this command. If you do not specify the cipher keyword, the system considers the arguments auth-password and priv-password as plain text keys, and encrypts them when executing this command.
Specify the cipher keyword when you roll back, copy or paste the running configuration. For example, assume that you have created SNMPv3 user A and configured both authentication and privacy keys of this user as xyz. To make the configuration of user A still effective after the configuration is copied, pasted, and re-executed, specify the cipher keyword when you create user A with this command. Otherwise, after you copy, paste, or re-execute the configuration, the device creates user A, but the corresponding keys are not xyz. When you use snmp-agent usm-user v3 cipher, the pri-password argument in this command can be obtained by snmp-agent calculate-password. To make the calculated encrypted key applicable to snmpagent usm-user v3 cipher and have the same effect as that in snmp-agent usm-user v3 cipher, make sure that the same encryption algorithm is specified for the two commands and the local engine ID specified in snmp-agent usm-user v3 cipher is consistent with the SNMP entity engine ID specified in snmp-agent calculate-password. When you execute this command repeatedly to configure the same user (the user names are the same, no limitation to other keywords and arguments), the last configuration takes effect.
29
A plain text password is required when the NMS accesses the device; therefore, remember the user name and the plain text password when you create a user. Related commands: snmp-agent calculate-password, snmp-agent group, and snmp-agent usm-user { v1 | v2c }.
Syntax
snmp-agent usm-user v3 user-name group-name [ cipher ] [ authentication-mode { md5 | sha } authpassword [ privacy-mode { 3des | aes128 | des56 } priv-password ] ] [ acl acl-number ] undo snmp-agent usm-user v3 user-name group-name { local | engineid engineid-string }
View
System view
Default level
3: Manage level
Parameters
user-name: User name, a case-sensitive string of 1 to 32 characters. group-name: Group name, a case-sensitive string of 1 to 32 characters. cipher: Specifies that auth-password and priv-password are encrypted keys, which can be calculated by using snmp-agent calculate-password. authentication-mode: Specifies an authentication algorithm. MD5 is faster than SHA, while SHA provides a higher security than MD5. md5: Specifies the MD5 authentication algorithm. For more information about MD5, see Security Configuration Guide. sha: Specifies the SHA-1 authentication protocol algorithm. For more information about SHA, see Security Configuration Guide.
auth-password: Authentication key. If the cipher keyword is not specified, auth-password represents a plain text key, which is a string of 1 to 64 visible characters. If the cipher keyword is specified, authpassword represents an encrypted key. If the md5 keyword is specified, auth-password is a string of 32 hexadecimal characters. If the sha keyword is specified, auth-password is a string of 40 hexadecimal characters. privacy-mode: Specifies an encryption algorithm for privacy. The three encryption algorithms AES, 3DES, and DES are in descending order in terms of security. Higher security means more complex implementation mechanism and lower speed. DES is enough to meet general requirements. 3des: Specifies the 3DES algorithm. For more information about 3DES, see Security Configuration Guide. des56: Specifies the DES algorithm. For more information about DES, see Security Configuration Guide. aes128: Specifies the AES algorithm. For more information about AES, see Security Configuration Guide.
priv-password: The privacy key. If the cipher keyword is not specified, priv-password represents a plain text key, which is a string of 1 to 64 characters. If the cipher keyword is specified, priv-password represents an encrypted key. If the md5 keyword is specified, priv-password is a string of 32 hexadecimal characters. If the sha keyword is specified, priv-password is a string of 40 hexadecimal characters. acl acl-number: Specifies a basic ACL. The acl-number argument takes an ACL number in the range of 2,000 to 2,999. By using a basic ACL, you can restrict the source IP address of SNMP packets, which
30
means you can configure to allow or prohibit SNMP packets with a specific source IP address to allow or prohibit the specified NMS to access the agent by using this user name. local: Represents a local SNMP entity user. engineid engineid-string: Specifies an SNMP engine ID as a hexadecimal string. The engineid-string argument must comprise an even number of hexadecimal characters, which ranges from 10 to 64. Allzero and all-F strings are invalid.
Examples
# Add a user testUser to the SNMPv3 group testGroup. Configure the security model as authentication without privacy, the authentication algorithm as MD5, the plain-text key as authkey.
<Sysname> system-view [Sysname] snmp-agent group v3 testGroup authentication [Sysname] snmp-agent usm-user v3 testUser testGroup authentication-mode md5 authkey
Set the SNMP version on the NMS to SNMPv3 Fill in the user name testUser Set the authentication algorithm to MD5 Set the authentication encrypted key to authkey Establish a connection, and the NMS can access the MIB objects in the default view (ViewDefault) on the device
# Add a user testUser to the SNMPv3 group testGroup. Configure the security model as authentication and privacy, the authentication algorithm as MD5, the privacy algorithm as DES56, the plain-text authentication key as authkey, and the plain-text privacy key as prikey.
<Sysname> system-view [Sysname] snmp-agent group v3 testGroup privacy [Sysname] snmp-agent usm-user privacy-mode des56 prikey v3 testUser testGroup authentication-mode md5 authkey
Set the SNMP version on the NMS to SNMPv3 Fill in the user name testUser Set the authentication algorithm to MD5 Set the authentication key to authkey Set the privacy algorithm to DES Set the privacy key to prikey Establish a connection, and the NMS can access the MIB objects in the default view (ViewDefault) on the device
# Add a user testUser to the SNMPv3 group testGroup with the cipher keyword specified. Configure the security model as authentication and privacy, the authentication algorithm as MD5, the privacy algorithm as DES56, the plain-text authentication key as authkey, and the plain-text privacy key as prikey.
<Sysname> system-view [Sysname] snmp-agent group v3 testGroup privacy [Sysname] snmp-agent calculate-password authkey mode md5 local-engineid The secret key is: 09659EC5A9AE91BA189E5845E1DDE0CC [Sysname] snmp-agent calculate-password prikey mode md5 local-engineid The secret key is: 800D7F26E786C4BECE61BF01E0A22705 [Sysname] snmp-agent usm-user v3 testUser testGroup cipher authentication-mode 09659EC5A9AE91BA189E5845E1DDE0CC privacy-mode des56 800D7F26E786C4BECE61BF01E0A22705 md5
Fill in the user name testUser, Set the authentication algorithm to MD5 Set the authentication key to authkey Set the privacy algorithm to DES Set the privacy key to prikey Establish a connection, and the NMS can access the MIB objects in the default view(ViewDefault) on the device
32
Syntax
display rmon alarm [ entry-number ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
entry-number: Index of an RMON alarm entry, which ranges from 1 to 65535. If no entry is specified, the configuration of all alarm entries is displayed. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the configuration of all RMON alarm table entries.
<Sysname> display rmon alarm AlarmEntry 1 owned by user1 is VALID. Samples type Variable formula Sampling interval Rising threshold Falling threshold When startup enables Latest value : absolute : 1.3.6.1.2.1.16.1.1.1.4.1<etherStatsOctets.1> : 10(sec) : 50(linked with event 1) : 5(linked with event 2) : risingOrFallingAlarm : 0
33
The sampling type (the value can be absolute or delta), corresponding to the MIB node alarmSampleType. Alarm variable (the monitored MIB node, corresponding to the MIB node alarmVariable). Sampling interval, in seconds, corresponding to the MIB node alarmInterval. Alarm rising threshold (When the sampling value is greater than or equal to this threshold, a rising alarm is triggered.), corresponding to the MIB node alarmRisingThreshold. Alarm falling threshold (When the sampling value is smaller than or equal to this threshold, a falling alarm is triggered.), corresponding to the MIB node alarmFallingThreshold. How an alarm can be triggered, corresponding to the MIB node alarmStartupAlarm. The last sampled value, corresponding to the MIB node alarmValue.
Rising threshold
Falling threshold
Syntax
display rmon event [ entry-number ] [ | { begin | exclude | include } regular-expression ]
View
Any view
34
Default level
1: Monitor level
Parameters
entry-number: Index of an RMON event entry, which ranges from 1 to 65535. If no entry is specified, the configuration of all event entries is displayed. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the configuration of RMON event table.
<Sysname> display rmon event EventEntry 1 owned by user1 is VALID. Description: null. Will cause log-trap when triggered, last triggered at 0days 00h:02m:27s.
Description
Event entry, corresponding to the MIB node eventIndex. Owner of the entry, corresponding to the MIB node eventOwner. Status of the entry identified by the index (VALID means the entry is valid, and UNDERCREATION means invalid. You can use display rmon to view the invalid entry; while with display current-configuration and display this you cannot view the corresponding rmon commands), corresponding to the MIB node eventStatus. Description for the event, corresponding to the MIB node eventDescription. The actions that the system will take when the event is triggered:
VALID
Description
none: The system will take no action log: The system will log the event snmp-trap: The system will send a trap to the NMS log-and-trap: The system will log the event and send a trap to the NMS
This field corresponds to the MIB node eventType. last triggered at Time when the last event was triggered, corresponding to the MIB node eventLastTimeSent.
35
Syntax
display rmon eventlog [ entry-number ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
entry-number: Index of an event entry, which ranges from 1 to 65535. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the RMON log information for event entry 1.
<Sysname> display rmon eventlog 1 LogEntry 1 owned by null is VALID. Generates eventLog 1.1 at 0day(s) 00h:00m:33s. Description: The alarm formula defined in prialarmEntry 1, uprise 80 with alarm value 85. Alarm sample type is absolute. Generates eventLog 1.2 at 0day(s) 00h:42m:03s. Description: The alarm formula defined in prialarmEntry 2, less than(or =) 5 with alarm value 0. Alarm sample type is delta.
Description
Event log entry, corresponding to the MIB node logIndex. Owner of the entry, corresponding to the MIB node eventOwner.
36
Field
Description
Status of the entry identified by the index (VALID means the entry is valid, and UNDERCREATION means invalid. You can use display rmon to view the invalid entry; while with display current-configuration and display this you cannot view the corresponding rmon commands), corresponding to the MIB node eventStatus. Time when the log was created (Time passed since the device was booted), corresponding to the MIB node logTime. Log description, corresponding to the MIB node logDescription.
VALID
The example shows that event 1 has generated two logs: eventLog 1.1, generated by private alarm entry 1, which is triggered because the alarm value (85) exceeds the rising threshold (80). The sampling type is absolute. eventLog 1.2, generated by private alarm entry 2, which is triggered because the alarm value (0) is lower than the falling threshold (5). The sampling type is delta.
Syntax
display rmon history [ interface-type interface-number ] [ | { begin | exclude | include } regularexpression ]
View
Any view
Default level
1: Monitor level
Parameters
interface-type interface-number: Specifies an interface by its type and number. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Related commands: rmon history.
37
Examples
# Display RMON history control entry and history sampling information for interface Ethernet 1/1.
<Sysname> display rmon history ethernet 1/1 HistoryControlEntry 1 owned by null is VALID Samples interface Sampling interval dropevents packets : Ethernet1/1<ifIndex.1> : 10(sec) with 5 buckets max : 0 : 43 , octets , broadcast packets , oversize packets , jabbers , utilization , octets , broadcast packets , oversize packets , jabbers , utilization , octets , broadcast packets , oversize packets , jabbers , utilization , octets , broadcast packets , oversize packets , jabbers , utilization : 3166 : 3 : 0 : 0 : 0 : 834 : 1 : 0 : 0 : 0 : 1001 : 1 : 0 : 0 : 0 : 766 : 0 : 0 : 0 : 0
Description
History control entry, which corresponds to MIB node etherHistoryIndex. Owner of the entry, which corresponds to MIB node historyControlOwner. Status of the entry identified by the index, which corresponds to MIB node historyControlStatus.
VALID
VALID means the entry is valid, and UNDERCREATION means invalid. You can use display rmon to view the invalid entry; with display current-configuration and display this you cannot view the corresponding rmon commands. 38
Field
Samples Interface Sampling interval
Description
The sampled interface Sampling period, in seconds, which corresponds to MIB node historyControlInterval. The system periodically samples the information of an interface. The maximum number of history table entries that can be saved, corresponding to the MIB node historyControlBucketsGranted.
buckets max
If the specified value of the buckets argument exceeds the history table size supported by the device, the supported history table size is displayed. If the current number of the entries in the table has reached the maximum number, the system will delete the earliest entry to save the latest one.
The (number)th statistics recorded in the system cache. Statistics records are numbered according to the order of time they are saved into the cache. Dropped packets during the sampling period, corresponding to the MIB node etherHistoryDropEvents. Number of octets received during the sampling period, corresponding to the MIB node etherHistoryOctets. Number of packets received during the sampling period, corresponding to the MIB node etherHistoryPkts. Number of broadcasts received during the sampling period, corresponding to the MIB node etherHistoryBroadcastPkts. Number of multicasts received during the sampling period, corresponding to the MIB node etherHistoryMulticastPkts. Number of packets received with CRC alignment errors during the sampling period, corresponding to the MIB node etherHistoryCRCAlignErrors. Number of undersize packets received during the sampling period, corresponding to the MIB node etherHistoryUndersizePkts. Number of oversize packets received during the sampling period, corresponding to the MIB node etherHistoryOversizePkts. Number of fragments received during the sampling period, corresponding to the MIB node etherHistoryFragments. Number of jabbers received during the sampling period, corresponding to the MIB node etherHistoryJabbers. Number of colliding packets received during the sampling period, corresponding to the MIB node etherHistoryCollisions. Bandwidth utilization during the sampling period, corresponding to the MIB node etherHistoryUtilization.
undersize packets
oversize packets
fragments jabbers
collisions
utilization
39
Syntax
display rmon prialarm [ entry-number ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
entry-number: Private alarm entry index, which ranges from 1 to 65535. If no entry is specified, the configuration of all private alarm entries is displayed. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the configuration of all private alarm entries.
<Sysname> display rmon prialarm PrialarmEntry 1 owned by user1 is VALID. Samples type Variable formula Description Sampling interval Rising threshold Falling threshold When startup enables Latest value : absolute : (.1.3.6.1.2.1.16.1.1.1.6.1*100/.1.3.6.1.2.1.16.1.1.1.5.1) : ifUtilization.Ethernet1/1 : 10(sec) : 80(linked with event 1) : 5(linked with event 2) : risingOrFallingAlarm : 85
Description
The entry of the private alarm table Owner of the entry, user1 in this example
40
Field
Description
Status of the entry identified by the index. VALID means the entry is valid, and UNDERCREATION means invalid. You can use display rmon to view the invalid entry; with display current-configuration and display this you cannot view the corresponding rmon commands. Sampling type, whose value can be absolute or delta. Description of the private alarm entry Sampling interval, in seconds. The system performs absolute sample or delta sample to sampling variables according to the sampling interval. Alarm rising threshold. An event is triggered when the sampled value is greater than or equal to this threshold. Alarm falling threshold. An event is triggered when the sampled value is less than or equal to this threshold. Event index associated with the prialarm How can an alarm be triggered The lifetime of the entry, which can be forever or span the specified period The count result of the last sample
VALID
Rising threshold Falling threshold linked with event When startup enables This entry will exist Latest value
Syntax
display rmon statistics [ interface-type interface-number ] [ | { begin | exclude | include } regularexpression ]
View
Any view
Default level
1: Monitor level
Parameters
interface-type interface-number: Specifies an interface by its type and number. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow.
41
exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display RMON statistics for interface Ethernet 1/1.
<Sysname> display rmon statistics ethernet 1/1 EtherStatsEntry 1 owned by null is VALID. Interface : Ethernet1/1<ifIndex.3> etherStatsOctets etherStatsBroadcastPkts etherStatsUndersizePkts etherStatsFragments : 43393306 : 503581 : 0 : 0 , etherStatsPkts , etherStatsOversizePkts , etherStatsJabbers , etherStatsCollisions : 619825 : 0 : 0 : 0 , etherStatsMulticastPkts : 44013
etherStatsCRCAlignErrors : 0
etherStatsDropEvents (insufficient resources): 0 Packets received according to length: 64 : 0 , , 65-127 : 0 , , 128-255 : 0 256-511: 0 512-1023: 0 1024-1518: 0
Description
The entry of the statistics table, which corresponds to MIB node etherStatsIndex. Status of the entry identified by the index, which corresponds to MIB node etherStatsStatus.
VALID
VALID means the entry is valid, and UNDERCREATION means invalid. You can use display rmon to view the invalid entry; with display current-configuration and display this you cannot view the corresponding rmon commands. Interface on which statistics are gathered, which corresponds to the MIB node etherStatsDataSource. Number of octets received by the interface during the statistical period, corresponding to the MIB node etherStatsOctets. Number of packets received by the interface during the statistical period, corresponding to the MIB node etherStatsPkts. Number of broadcast packets received by the interface during the statistical period, corresponding to the MIB node etherStatsBroadcastPkts. Number of multicast packets received by the interface during the statistical period, corresponding to the MIB node etherStatsMulticastPkts. Number of undersize packets received by the interface during the statistical period, corresponding to the MIB node etherStatsUndersizePkts. Number of oversize packets received by the interface during the statistical period, corresponding to the MIB node etherStatsOversizePkts. 42
etherStatsBroadcastPkts
etherStatsMulticastPkts
etherStatsUndersizePkts
etherStatsOversizePkts
Field
etherStatsFragments
Description
Number of undersize packets with CRC errors received by the interface during the statistical period, corresponding to the MIB node etherStatsFragments. Number of oversize packets with CRC errors received by the interface during the statistical period, corresponding to the MIB node etherStatsJabbers. Number of packets with CRC errors received on the interface during the statistical period, corresponding to the MIB node etherStatsCRCAlignErrors. Number of collisions received on the interface during the statistical period, corresponding to the MIB node etherStatsCollisions. Total number of drop events received on the interface during the statistical period, corresponding to the MIB node etherStatsDropEvents. Statistics of packets received according to length during the statistical period (Hardware support is needed for the statistics. If the hardware does not support the function, all statistics are displayed as 0.), in which:
etherStatsJabbers
etherStatsCRCAlignErrors
etherStatsCollisions
etherStatsDropEvents
rmon alarm
Description
Use rmon alarm to create an entry in the RMON alarm table. Use undo rmon alarm to remove a specified entry from the RMON alarm table. This command defines an alarm entry to trigger the specified event when abnormity occurs. The event defines how to deal with the abnormity. If you define an alarm entry, the system obtains the value of the monitored alarm variable at specified interval, and compares the sampled values with the predefined threshold and performs this actions: If the rising threshold is reached, triggers the event specified by the event-entry1 argument. If the falling threshold is reached, triggers the event specified by the event-entry2 argument.
Before creating an alarm entry, define the events to be referenced in the event table with rmon event; otherwise, although the alarm entry can be created, no alarm event is triggered.
43
If the alarm variable is an instance of the leaf node of the Ethernet statistics table etherStatsEntry with the OID of 1.3.6.1.2.1.16.1.1.1, you must create a statistics entry on the monitored Ethernet interface with rmon statistics; if the alarm variable is an instance of the leaf node of the history record table etherHistoryEntry with the OID of 1.3.6.1.2.1.16.2.2.1, you must create a history entry on the monitored Ethernet interface with rmon history. Otherwise, although the alarm entry can be created, no alarm event is triggered. An entry cannot be created if the values of the specified alarm variable (alarm-variable), sampling interval (sampling-interval), sampling type (absolute or delta), rising threshold (threshold-value1) and falling threshold (threshold-value2) are identical to those of the existing alarm entry in the system. You can create up to 60 alarm entries. Related commands: display rmon alarm, rmon event, rmon history, and rmon statistics.
Syntax
rmon alarm entry-number alarm-variable sampling-interval { absolute | delta } rising-threshold thresholdvalue1 event-entry1 falling-threshold threshold-value2 event-entry2 [ owner text ] undo rmon alarm entry-number
View
System view
Default level
2: System level
Parameters
entry-number: Alarm entry index, which ranges from 1 to 65535. alarm-variable: Alarm variable, a string of 1 to 256 characters. It can be in dotted object identifier (OID) format (in the format of entry.integer.instance or leaf node name.instance, for example, 1.3.6.1.2.1.2.1.10.1), or a node name like ifInOctets.1. Only variables that can be parsed into INTEGER (INTEGER, Counter, Gauge, or Time Ticks) in the ASN.1 can be used for the alarm-variable argument, such as the instance of the leaf node (like etherStatsOctets, etherStatsPkts, etherStatsBroadcastPkts, and so on) of the etherStatsEntry entry, the instance of the leaf node (like ifInOctets, ifInUcastPkts, ifInNUcastPkts, and so on) of the ifEntry entry. sampling-interval: Sampling interval, which ranges from 5 to 65,535 seconds. absolute: Sets the sampling type to absolute. In other words, the system obtains the value of the variable when the sampling time is reached. delta: Sets the sampling type to delta. In other words, the system obtains the variation value of the variable during the sampling interval when the sampling time is reached. rising-threshold threshold-value1 event-entry1: Sets the rising threshold, where threshold-value1 represents the rising threshold, in the range 2,147,483,648 to +2,147,483,647, and event-entry1 represents the index of the event triggered when the rising threshold is reached. event-entry1 ranges from 0 to 65,535, with 0 meaning no corresponding event is triggered and no event action is taken when an alarm is triggered. falling-threshold threshold-value2 event-entry2: Sets the falling threshold, where threshold-value2 represents the falling threshold, in the range 2,147,483,648 to +2,147,483,647 and event-entry2 represents the index of the event triggered when the falling threshold is reached. event-entry2 ranges from 1 to 65,535. owner text: Owner of the entry, a case-sensitive string of 1 to 127 characters that can contain spaces.
44
Examples
# Add entry 1 in the alarm table and sample the node 1.3.6.1.2.1.16.1.1.1.4.1 at a sampling interval of 10 seconds in absolute sampling type. Trigger event 1 when the sampled value is greater than or equal to the rising threshold of 5000, and event 2 when the sampled value is less than or equal to the falling threshold of 5. Set the owner of the entry to be user1.
<Sysname> system-view [Sysname] rmon event 1 log [Sysname] rmon event 2 none [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] rmon statistics 1 [Sysname-Ethernet1/1] quit [Sysname] rmon alarm 1 1.3.6.1.2.1.16.1.1.1.4.1 falling-threshold 5 2 owner user1 10 absolute rising-threshold 5000 1
1.3.6.1.2.1.16.1.1.1.4 is the OID of the leaf node etherStatsOctets. It represents the statistics of the received packets on the interface, in bytes. In the example, you can use etherStatsOctets.1 to replace the parameter 1.3.6.1.2.1.16.1.1.1.4.1, where 1 indicates the serial number of the interface statistics entry. Therefore, if you execute rmon statistics 5, you can use etherStatsOctets.5 to replace the parameter. This configuration implements the following: Sampling and monitoring interface Ethernet 1/1 Obtaining the absolute value of the number of received packets. If the total bytes of the received packets reach 5,000, the system will log the event; if the total bytes of the received packets are no more than 5, the system will take no action.
rmon event
Description
Use rmon event to create an entry in the RMON event table. Use undo rmon event to remove a specified entry from the RMON event table. When create an event entry, you can define the actions that the system takes when the event is triggered by its associated alarm in the alarm table. The system can log the event, send a trap, do both, or do neither at all based on your configuration. Related commands: display rmon event, rmon alarm, and rmon prialarm. NOTE: An entry cannot be created if the values of the specified event description (description string), event type (log,
trap, logtrap or none), and community name (trap-community or log-trapcommunity) are identical to those of the existing event entry in the system.
Syntax
rmon event entry-number [ description string ] { log | log-trap log-trapcommunity | none | trap trapcommunity } [ owner text ] undo rmon event entry-number
View
System view
45
Default level
2: System level
Parameters
entry-number: Event entry index, which ranges from 1 to 65,535. description string: Event description, a string of 1 to 127 characters. log: Logs the event when it occurs. log-trap log-trapcommunity: Log and trap events. The system performs both logging and trap sending when the event occurs. log-trapcommunity indicates the community name of the network management station that receives trap messages, a string of 1 to 127 characters. none: Performs no action when the event occurs. trap trap-community: Trap event. The system sends a trap with a community name when the event occurs. trap-community specifies the community name of the network management station that receives trap messages, a string of 1 to 127 characters. owner text: Owner of the entry, a case-sensitive string of 1 to 127 characters that can contain spaces.
Examples
# Create event 10 in the RMON event table.
<Sysname> system-view [Sysname] rmon event 10 log owner user1
rmon history
Description
Use rmon history to create an entry in the RMON history control table. Use undo rmon history to remove a specified entry from the RMON history control table. When an entry is created, the system periodically samples the number of packets received/sent on the current interface, and saves the statistics as an instance under the leaf node of the etherHistoryEntry table. The maximum number of statistics records can be saved for the entry is specified by buckets number. If the maximum number of the statistics records for the entry has been reached, the system deletes the earliest record to save the latest one. The statistics include total number of received packets on the current interface, total number of broadcast packets, total number of multicast packets in a sampling period, and so on. After you create an entry in the history control table, if the specified history table size for the entry exceeds that supported by the device, the entry is created. However, the validated value of the history table size for the entry is that supported by the device. To view the configuration result, use display rmon history. NOTE: An entry cannot be created if the value of the specified sampling interval (interval sampling-interval) is identical
to that of the existing history entry on the same interface.
Up to 100 history entries can be created. Related commands: display rmon history.
46
Syntax
rmon history entry-number buckets number interval sampling-interval [ owner text ] undo rmon history entry-number
View
Ethernet interface view
Default level
2: System level
Parameters
entry-number: History control entry index, which ranges 1 to 65535. buckets number: History table size for the entry, which ranges from 1 to 65,535. The device supports up to 10 history table entries. interval sampling-interval: Sampling period, which ranges from 5 to 3600 seconds. owner text: Owner of the entry, a case-sensitive string of 1 to 127 characters that can contain spaces.
Examples
# Create RMON history control entry 1 for interface Ethernet 1/1.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] rmon history 1 buckets 10 interval 5 owner user1
rmon prialarm
Description
Use rmon prialarm to create an entry in the private alarm table of RMON. Use undo rmon prialarm to remove a private alarm entry from the private alarm table of RMON. The system handles private alarm entries as follows:
1. 2. 3.
Samples the private alarm variables in the private alarm formula at the specified sampling interval. Performs calculation on the sampled values with the formula. Compares the calculation result with the predefined thresholds and performs this actions: If the result is equal to or greater than the rising threshold, triggers the event specified by the evententry1 argument. If the result is equal to or smaller than the falling threshold, triggers the event specified by the evententry2 argument.
NOTE: Before creating an alarm entry, define the events to be referenced in the event table with rmon event . An entry cannot be created if the values of the specified alarm variable formula (prialarm-formula), sampling
type (absolute changeratio or delta), rising threshold (threshold-value1) and falling threshold (threshold-value2) are identical to those of the existing alarm entry in the system.
Up to 50 pri-alarm entries can be created. Related commands: display rmon prialarm, rmon event, rmon history, and rmon statistics.
47
Syntax
rmon prialarm entry-number prialarm-formula prialarm-des sampling-interval { absolute | changeratio | delta } rising-threshold threshold-value1 event-entry1 falling-threshold threshold-value2 event-entry2 entrytype { forever | cycle cycle-period } [ owner text ] undo rmon prialarm entry-number
View
System view
Default level
2: System level
Parameters
entry-number: Index of a private alarm entry, which ranges from 1 to 65535. prialarm-formula: Private alarm variable formula, a string of 1 to 256 characters. The variables in the formula must be represented in OID format that starts with a point ., the formula (.1.3.6.1.2.1.2.1.10.1)*8 for example. You can customize the formula and perform the basic operations of addition, subtraction, multiplication, and division on these variables. The operations should yield a long integer. To prevent errors, make sure that the result of each calculating step falls into the value range for long integers. prialarm-des: Private alarm entry description, a string of 1 to 127 characters. sampling-interval: Sampling interval, which ranges from 10 to 65,535 seconds. absolute | changeratio | delta: Sets the sampling type to absolute, delta, or change ratio. Absolute sampling is to obtain the value of the variable when the sampling time is reached. Delta sampling is to obtain the variation value of the variable during the sampling interval when the sampling time is reached. Change ratio sampling is not supported at present. rising-threshold threshold-value1 event-entry1: Sets the rising threshold, where threshold-value1 represents the rising threshold, in the range 2,147,483,648 to +2,147,483,647, and event-entry1 represents the index of the event triggered when the rising threshold is reached. event-entry1 ranges from 0 to 65,535, where 0 means no corresponding event is triggered and no event action is taken when an alarm is triggered. falling-threshold threshold-value2 event-entry2: Sets the falling threshold, where threshold-value2 represents the falling threshold, in the range 2,147,483,648 to +2,147,483,647 and event-entry2 represents the index of the event triggered when the falling threshold is reached. event-entry2 ranges from 1 to 65,535. forever: Indicates that the lifetime of the private alarm entry is infinite. cycle cycle-period: Sets the lifetime period of the private alarm entry, which ranges from 0 to 2,147,483,647 seconds. owner text: Owner of the entry, a case-sensitive string of 1 to 127 characters that can contain spaces.
Examples
# Monitor the ratio of the broadcast packets received on the interface by using the private alarm. Create entry 5 in the private alarm table. Calculate the private alarm variables with the (1.3.6.1.2.1.16.1.1.1.6.1*100/.1.3.6.1.2.1.16.1.1.1.5.1) formula and sample the corresponding variables at intervals of 10 seconds. Rising threshold of 80 corresponds to event 1 (and record the event into the log table); falling threshold of 5 corresponds to event 2 (but neither log it nor send a trap). Set the lifetime of the entry to forever and owner to user1. (Broadcast packet ratio= total number of broadcast packets
48
received on the interface/total number of packets received on the interface; the formula is customized by users.)
<Sysname> system-view [Sysname] rmon event 1 log [Sysname] rmon event 2 none [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] rmon statistics 1 [Sysname-Ethernet1/1] quit [Sysname] rmon prialarm 1 BroadcastPktsRatioOfEth1/1 10 entrytype forever owner user1 (.1.3.6.1.2.1.16.1.1.1.6.1*100/.1.3.6.1.2.1.16.1.1.1.5.1) absolute rising-threshold 80 1 falling-threshold 5 2
1.3.6.1.2.1.16.1.1.1.6.1 is the OID of the node etherStatsBroadcastPkts.1, and 1.3.6.1.2.1.16.1.1.1.5.1 is the OID of the node etherStatsPkts.1. 1 indicates the serial number of the interface statistics entry. Therefore, if you execute rmon statistics 5, you should use 1.3.6.1.2.1.16.1.1.1.6.5 and 1.3.6.1.2.1.16.1.1.1.5.5. This configuration implements the following: Sampling and monitoring interface Ethernet1/1 If the portion of broadcast packets received in the total packets is greater than or equal to 80%, the system will log the event; if the portion is less than or equal to 5%, the system takes no action.
rmon statistics
Description
Use rmon statistics to create an entry in the RMON statistics table. Use undo rmon statistics to remove a specified entry from the RMON statistics table. When an entry is created, the system continuously calculates the information of the interface. Statistics include number of collisions, CRC alignment errors, number of undersize or oversize packets, number of broadcasts, number of multicasts, number of bytes received, number of packets received. The statistics are cleared after the device reboots. To display information for the RMON statistics table, use display rmon statistics. NOTE: Only one statistics entry can be created on one interface. Up to 100 statistics entries can be created.
Syntax
rmon statistics entry-number [ owner text ] undo rmon statistics entry-number
View
Ethernet interface view
Default level
2: System level
49
Parameters
entry-number: Index of statistics entry, which ranges from 1 to 65535. owner text: Owner of the entry, a string of case-sensitive 1 to 127 characters that can contain spaces.
Examples
# Create an entry with an index 20 and the owner user1 in the RMON statistics table for interface Ethernet 1/1.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] rmon statistics 20 owner user1
50
Syntax
display ntp-service sessions [ verbose ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
verbose: Displays detailed information about all NTP sessions. If you do not specify this keyword, only the brief information about the NTP sessions is displayed. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# View the brief information of all NTP sessions.
<Sysname> display ntp-service sessions source [12345]127.127.1.0 Total associations : reference 127.127.1.0 1 stra reach poll 3 1 64 now offset 33 0.0 delay disper 0.0 0.0 ******************************************************************************** note: 1 source(master),2 source(peer),3 selected,4 candidate,5 configured
Description
IP address of the clock source
51
Field
Description
Reference clock ID of the clock source 1. If the reference clock is the local clock, the value of this field is related to the value of the stra field:
reference
When the value of the stra field is 0 or 1, this field will be LOCL; address of the local clock.
When the stra field has another value, this field will be the IP
2. If the reference clock is the clock of another device on the network, the value of this field will be the IP address of that device. Stratum level of the clock source, which determines the clock precision. The value ranges from 1 to 16. The clock precision decreases from stratum 1 to stratum 16. A stratum 1 clock has the highest precision, and a stratum 16 clock is not synchronized and cannot be used as a reference clock. Reachability count of the clock source. 0 indicates that the clock source in unreachable. Poll interval in seconds (the maximum interval between successive NTP messages). The length of time from when the last NTP message was received or when the local clock was last updated to the current time
stra
reach poll
now
The time is in second by default. If the time length is greater than 2048 seconds, it is displayed in minute; if greater than 300 minutes, in hour; if greater than 96 hours, in day. The offset of the system clock relative to the reference clock, in milliseconds The roundtrip delay from the local device to the clock source, in milliseconds The maximum error of the system clock relative to the reference source.
2: Stratum level of the clock source is less than or equal to 15. 3: This clock source has survived the clock selection algorithm. 4: This clock source is a candidate clock source. 5: This clock source was created by a configuration command.
Total associations
52
peer mode: server, peer poll: 6 offset: 0.0000 ms,delay: 0.00 ms, disper: 0.02 ms root delay: 0.00 ms, root disper: 10.00 ms reach: 1, sync dist: 0.010, sync state: 2 precision: 2^18, version: 3, peer interface: InLoopBack0 reftime: 10:56:22.442 UTC Aug 7 2009(CE2686D6.71484513) orgtime: 10:56:22.442 UTC Aug 7 2009(CE2686D6.71484513) rcvtime: 10:56:22.442 UTC Aug 7 2009(CE2686D6.7149E881) xmttime: 10:56:22.442 UTC Aug 7 2009(CE2686D6.71464DC2) filter delay : filter offset: filter disper: timecode: Total associations : 1 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00
Description
IP address of the clock source Stratum level of the clock source, which determines the clock precision. The value ranges from 1 to 16. The clock precision decreases from stratum 1 to stratum 16. A stratum 1 clock has the highest precision, and a stratum 16 clock is not synchronized and cannot be used as a reference clock. Status of the clock source corresponding to this session, including
clock stratum
dynamic: This session is established dynamically. master: The clock source is the primary reference source of the
current system.
candidate: The clock source is the candidate reference source. sane: The clock source has passed the sane authentication. insane: The clock source has failed the sane authentication. valid: The clock source is valid, which means the clock source meet these requirements: it has passed the authentication and is being synchronized; its stratum level is valid; its root delay and root dispersion values are within their ranges.
invalid: The clock source is invalid. unsynced: The clock source has not been synchronized or the
value of the stratum level is invalid.
53
Field
Description
Reference clock ID of the clock source 3. If the reference clock is the local clock, the value of this field is related to the stratum level of the clock source:
reference clock ID
When the stratum level of the clock source is 0 or 1, this field is LOCL; this field is the IP address of the local clock.
When the stratum level of the clock source has another value,
4. If the reference clock is the clock of another device on the network, the value of this field is the IP address of that device. Operation mode of the local device, including
local mode
unspec: The mode is unspecified. active: Active mode. passive: Passive mode. client: Client mode. server: Server mode. bdcast: Broadcast server mode. control: Control query mode. private: Private message mode.
local poll
Poll interval of the local device, in seconds. The value displayed is a power of 2. For example, if the displayed value is 6, the poll interval of the local device is 26, or 64 seconds. Operation mode of the peer device, including
peer mode
unspec: The mode is unspecified. active: Active mode. passive: Passive mode. client: Client mode. server: Server mode. bdcast: Broadcast server mode. control: Control query mode. private: Private message mode.
peer poll
Poll interval of the peer device, in seconds. The value displayed is a power of 2. For example, if the displayed value is 6, the poll interval of the local device is 26, or 64 seconds. The offset of the system clock relative to the reference clock, in milliseconds The roundtrip delay from the local device to the clock source, in milliseconds The maximum error of the system clock relative to the reference clock The roundtrip delay from the local device to the primary reference source, in milliseconds The maximum error of the system clock relative to the primary reference clock, in milliseconds
54
Field
reach
Description
Reachability count of the clock source. 0 indicates that the clock source is unreachable. The synchronization distance relative to the upper-level clock, in seconds, and calculated from dispersion and roundtrip delay values. State of the state machine The displayed value is an integer that ranges from 0 to 5. Precision of the system clock NTP version The displayed value is an integer that ranges from 1 to 3. Source interface If the source interface is not specified, this field is wildcard. Reference timestamp in the NTP message Originate timestamp in the NTP message Receive timestamp in the NTP message Transmit timestamp in the NTP message Delay information Offset information Dispersion information Status of the reference clock, including
sync dist
peer interface reftime orgtime rcvtime xmttime filter delay filter offset filter disper reference clock status timecode Total associations
NOTE: When a device is working in NTP broadcast/multicast server mode, using display ntp-service sessions on the device does not display the NTP session information corresponding to the broadcast/multicast server, but the sessions are counted in the total number of associations.
Syntax
display ntp-service status [ | { begin | exclude | include } regular-expression ]
View
Any view
55
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# View the NTP service status information.
<Sysname> display ntp-service status Clock status: unsynchronized Clock stratum: 16 Reference clock ID: none Nominal frequency: 100.0000 Hz Actual frequency: 100.0000 Hz Clock precision: 2^17 Clock offset: 0.0000 ms Root delay: 0.00 ms Root dispersion: 0.00 ms Peer dispersion: 0.00 ms Reference time: 00:00:00.000 UTC Jan 1 1900(00000000.00000000)
Synchronized: The system clock has been synchronized. Unsynchronized: The system clock has not been
synchronized. Stratum level of the system clock When the system clock is synchronized to a remote time server, this field indicates the address of the remote time server. When the system clock is synchronized to a local reference source, this field indicates the address of the local clock source:
Clock stratum
Reference clock ID
When the stratum of the local clock has another value, the
value of this field is the IP address of the local clock. Nominal frequency Actual frequency Clock precision The nominal frequency of the local system hardware clock, in Hz The actual frequency of the local system hardware clock, in Hz The precision of the system clock
56
Field
Clock offset Root delay Root dispersion Peer dispersion Reference time
Description
The offset of the system clock relative to the reference source, in milliseconds The roundtrip delay from the local device to the primary reference source, in milliseconds The maximum error of the system clock relative to the primary reference source, in milliseconds The maximum error of the system clock relative to the reference source, in milliseconds Reference timestamp
Syntax
display ntp-service trace [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# View the brief information of each NTP server from the local device back to the primary reference source.
<Sysname> display ntp-service trace server 127.0.0.1,stratum 2, offset -0.013500, synch distance 0.03154 server 133.1.1.1,stratum 1, offset -0.506500, synch distance 0.03429 refid LOCL
57
The output information shows an NTP server chain for server 127.0.0.1: Server 127.0.0.1 is synchronized to server 133.1.1.1, and server 133.1.1.1 is synchronized to the local clock source. Table 16 Output description Field
server stratum offset synch distance
Description
IP address of the NTP server The stratum level of the corresponding system clock The clock offset relative to the upper-level clock, in seconds The synchronization distance relative to the upper-level clock, in seconds, and calculated from dispersion and roundtrip delay values. Identifier of the primary reference source. When the stratum level of the primary reference clock is 0, it is displayed as LOCL; otherwise, it is displayed as the IP address of the primary reference clock.
refid
ntp-service access
Description
Use ntp-service access to configure the access-control right for the peer devices to access the NTP services of the local device. Use undo ntp-service access to remove the configured NTP service access-control right to the local device. By default, the access-control right for the peer devices to access the NTP services of the local device is set to peer. From the highest NTP service access-control right to the lowest one are peer, server, synchronization, and query. When a device receives an NTP request, it matches against the access-control right in this order and uses the first matched right. ntp-service access provides only a minimum degree of security protection. A more secure method is identity authentication. The related command is ntp-service authentication enable. Before specifying an ACL number in ntp-service access, make sure you have already created and configured this ACL.
Syntax
ntp-service access { peer | query | server | synchronization } acl-number undo ntp-service access { peer | query | server | synchronization }
View
System view
Default level
3: Manage level
Parameters
peer: Permits full access. This level of right permits the peer devices to perform synchronization and control query to the local device and also permits the local device to synchronize its clock to that of a
58
peer device. Control query refers to query of NTP status information, such as alarm information, authentication status, and clock source information. query: Permits control query. This level of right permits the peer devices to perform control query to the NTP service on the local device but does not permit a peer device to synchronize its clock to that of the local device. server: Permits server access and query. This level of right permits the peer devices to perform synchronization and control query to the local device but does not permit the local device to synchronize its clock to that of a peer device. synchronization: Permits server access only. This level of right permits a peer device to synchronize its clock to that of the local device but does not permit the peer devices to perform control query. acl-number: Basic ACL number, which ranges from 2000 to 2999.
Examples
# Configure the peer devices on subnet 10.10.0.0/16 to have the full access right to the local device.
<Sysname> system-view [Sysname] acl number 2001 [Sysname-acl-basic-2001] rule permit source 10.10.0.0 0.0.255.255 [Sysname-acl-basic-2001] quit [Sysname] ntp-service access peer 2001
Syntax
ntp-service authentication enable undo ntp-service authentication enable
View
System view
Default level
3: Manage level
Parameters
None
Examples
# Enable NTP authentication.
<Sysname> system-view [Sysname] ntp-service authentication enable
59
ntp-service authentication-keyid
CAUTION: Presently the system supports only the MD5 algorithm for key authentication. A maximum of 1,024 keys can be set for each device. If an NTP authentication key is specified as a trusted key, the key automatically changes to untrusted after you delete the key. In this case, you do not need to execute undo ntp-service reliable authentication-keyid.
Description
Use ntp-service authentication-keyid to set the NTP authentication key. Use undo ntp-service authentication-keyid to remove the set NTP authentication key. By default, no NTP authentication key is set. In a network where there is a high security demand, the NTP authentication feature should be enabled for a system running NTP. This feature enhances the network security by means of the client-server key authentication, which prohibits a client from synchronizing with a device that has failed authentication. When the NTP authentication key is configured, configure the key as a trusted key by using ntp-service reliable authentication-keyid. Related commands: ntp-service reliable authentication-keyid.
Syntax
ntp-service authentication-keyid keyid authentication-mode md5 value undo ntp-service authentication-keyid keyid
View
System view
Default level
3: Manage level
Parameters
keyid: Authentication key ID, which ranges from 1 to 4294967295. authentication-mode md5 value: Specifies to use the MD5 algorithm for key authentication, where value represents authentication key and is a string of 1 to 32 characters.
Examples
# Set an MD5 authentication key, with the key ID of 10 and key value of BetterKey.
<Sysname> system-view [Sysname] ntp-service authentication enable [Sysname] ntp-service authentication-keyid 10 authentication-mode md5 BetterKey
ntp-service broadcast-client
Description
Use ntp-service broadcast-client to configure the device to work in the NTP broadcast client mode and use the current interface to receive NTP broadcast packets.
60
Use undo ntp-service broadcast-client to remove the configuration. By default, the device does not work in any NTP operation mode.
Syntax
ntp-service broadcast-client undo ntp-service broadcast-client
View
Interface view
Default level
3: Manage level
Parameters
None
Examples
# Configure the device to work in broadcast client mode and receive NTP broadcast messages on Ethernet 1/1.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] ntp-service broadcast-client
ntp-service broadcast-server
Description
Use ntp-service broadcast-server to configure the device to work in the NTP broadcast server mode and use the current interface to send NTP broadcast packets. Use undo ntp-service broadcast-server to remove the configuration. By default, the device does not work in any NTP operation mode.
Syntax
ntp-service broadcast-server [ authentication-keyid keyid | version number ] * undo ntp-service broadcast-server
View
Interface view
Default level
3: Manage level
Parameters
authentication-keyid keyid: Specifies the key ID to be used for sending broadcast messages to broadcast clients, where keyid ranges from 1 to 4294967295. This parameter is not meaningful if authentication is not required. version number: Specifies the NTP version, where number ranges from 1 to 3 and defaults to 3.
61
Examples
# Configure the device to work in broadcast server mode and send NTP broadcast messages on Ethernet 1/1, using key 4 for encryption, and set the NTP version to 3.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] ntp-service broadcast-server authentication-keyid 4 version 3
Syntax
ntp-service in-interface disable undo ntp-service in-interface disable
View
Interface view
Default level
3: Manage level
Parameters
None
Examples
# Disable interface Ethernet 1/1 from receiving NTP messages.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] ntp-service in-interface disable
ntp-service max-dynamic-sessions
Description
Use ntp-service max-dynamic-sessions to set the maximum number of dynamic NTP sessions that are allowed to be established locally. Use undo ntp-service max-dynamic-sessions to restore the maximum number of dynamic NTP sessions to the system default. By default, the number is 100. A single device can have a maximum of 128 concurrent associations, including static associations and dynamic associations. A static association refers to an association that a user has manually created by using an NTP command, while a dynamic association is a temporary association created by the system during operation. A dynamic association is removed if the system fails to receive messages from it over a specific long time. In client/server mode, for example, when you carry out a command to synchronize the time to a server, the system creates a static association, and the server just responds passively upon the
62
receipt of a message, rather than creating an association (static or dynamic). In symmetric mode, static associations are created at the symmetric-active peer side, and dynamic associations are created at the symmetric-passive peer side. In broadcast or multicast mode, static associations are created at the server side, and dynamic associations are created at the client side.
Syntax
ntp-service max-dynamic-sessions number undo ntp-service max-dynamic-sessions
View
System view
Default level
3: Manage level
Parameters
number: Maximum number of dynamic NTP sessions that are allowed to be established, which ranges from 0 to 100.
Examples
# Set the maximum number of dynamic NTP sessions allowed to be established to 50.
<Sysname> system-view [Sysname] ntp-service max-dynamic-sessions 50
ntp-service multicast-client
Description
Use ntp-service multicast-client to configure the device to work in the NTP multicast client mode and use the current interface to receive NTP multicast packets. Use undo ntp-service multicast-client to remove the configuration. By default, the device does not work in any NTP operation mode.
Syntax
ntp-service multicast-client [ ip-address ] undo ntp-service multicast-client [ ip-address ]
View
Interface view
Default level
3: Manage level
Parameters
ip-address: Multicast IP address. The value is in the range 224.0.1.0 to 239.255.255.255 and defaults to 224.0.1.1.
Examples
# Configure the device to work in the multicast client mode and receive NTP multicast messages on Ethernet 1/1, and set the multicast address to 224.0.1.1.
<Sysname> system-view
63
ntp-service multicast-server
Description
Use ntp-service multicast-server to configure the device to work in the NTP multicast server mode and use the current interface to send NTP multicast packets. Use undo ntp-service multicast-server to remove the configuration. By default, the device does not work in any NTP operation mode.
Syntax
ntp-service multicast-server [ ip-address ] [ authentication-keyid keyid | ttl ttl-number | version number ] * undo ntp-service multicast-server [ ip-address ]
View
Interface view
Default level
3: Manage level
Parameters
ip-address: Multicast IP address. The value is in the range 224.0.1.0 to 239.255.255.255 and defaults to 224.0.1.1. authentication-keyid keyid: Specifies the key ID to be used for sending multicast messages to multicast clients, where keyid ranges from 1 to 4294967295. This parameter is not meaningful if authentication is not required. ttl ttl-number: Specifies the TTL of NTP multicast messages, where ttl-number ranges from 1 to 255 and defaults to 16. version number: Specifies the NTP version, where number ranges from 1 to 3 and defaults to 3.
Examples
# Configure the device to work in the multicast server mode and send NTP multicast messages on Ethernet 1/1 to the multicast address 224.0.1.1, using key 4 for encryption, and set the NTP version to 3.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] ntp-service multicast-server 224.0.1.1 version 3 authenticationkeyid 4
ntp-service refclock-master
Description
Use ntp-service refclock-master to configure the local clock as a reference source for other devices. Use undo ntp-service refclock-master to remove the configuration.
64
NOTE: The stratum level of a clock defines the clock precision. The value ranges from 1 to 16. The clock precision decreases from stratum 1 to stratum 16. A stratum 1 clock has the highest precision, and a stratum 16 clock is not synchronized and cannot be used as a reference clock.
Syntax
ntp-service refclock-master [ ip-address ] [ stratum ] undo ntp-service refclock-master [ ip-address ]
View
System view
Default level
3: Manage level
Parameters
ip-address: IP address of the local clock, which is 127.127.1.u, where u is the NTP process ID that ranges from 0 to 3. If you do not specify ip-address, it defaults to 127.127.1.0. stratum: Stratum level of the local clock, which ranges from 1 to 15 and defaults to 8.
Examples
# Specify the local clock as the reference source, with the stratum level of 3.
<Sysname> system-view [Sysname] ntp-service refclock-master 3
Syntax
ntp-service reliable authentication-keyid keyid undo ntp-service reliable authentication-keyid keyid
View
System view
Default level
3: Manage level
Parameters
keyid: Authentication key number, which ranges from 1 to 4294967295.
65
Examples
# Enable NTP authentication, specify to use MD5 encryption algorithm, with the key ID of 37 and key value of BetterKey.
<Sysname> system-view [Sysname] ntp-service authentication enable [Sysname] ntp-service authentication-keyid 37 authentication-mode md5 BetterKey
ntp-service source-interface
Description
Use ntp-service source-interface to specify the source interface for NTP messages. Use undo ntp-service source-interface to restore the default. By default, no source interface is specified for NTP messages, and the system uses the IP address of the interface determined by the matched route as the source IP address of NTP messages. If you do not want the IP address of a certain interface on the local device to become the destination address of response messages, use this command to specify the source interface for NTP messages so that the source IP address in NTP messages is the primary IP address of this interface.
Syntax
ntp-service source-interface interface-type interface-number undo ntp-service source-interface
View
System view
Default level
3: Manage level
Parameters
interface-type interface-number: Specifies an interface by its interface type and interface number.
Examples
# Specify the source interface of NTP messages as Ethernet 1/1.
<Sysname> system-view [Sysname] ntp-service source-interface ethernet 1/1
ntp-service unicast-peer
Description
Use ntp-service unicast-peer to designate a symmetric-passive peer for the device. Use undo ntp-service unicast-peer to remove the symmetric-passive peer designated for the device. By default, no symmetric-passive peer is designated for the device.
66
NOTE: To synchronize the PE to a PE or CE in a VPN, provide vpn-instance vpn-instance-name in your command. If you include vpn-instance vpn-instance-name in the undo ntp-service unicast-peer command, the command
removes the symmetric-passive peer with the IP address of ip-address in the specified VPN. If you do not include vpn-instance vpn-instance-name in this command, the command removes the symmetric-passive peer with the IP address of ip-address in the public network.
Syntax
ntp-service unicast-peer [ vpn-instance vpn-instance-name ] { ip-address | peer-name } [ authenticationkeyid keyid | priority | source-interface interface-type interface-number | version number ] * undo ntp-service unicast-peer [ vpn-instance vpn-instance-name ] { ip-address | peer-name }
View
System view
Default level
3: Manage level
Parameters
vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the symmetric-passive peer belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the symmetric-passive peer is on the public network, do not specify this option. peer-name: Host name of the symmetric-passive peer, which is a string of 1 to 20 characters. authentication-keyid keyid: Specifies the key ID to be used for sending NTP messages to the peer, where keyid ranges from 1 to 4294967295. priority: Specifies the peer designated by ip-address or peer-name as the first choice under the same condition. source-interface interface-type interface-number: Specifies the source interface for NTP messages. In an NTP message the local device sends to its peer, the source IP address is the primary IP address of this interface. interface-type interface-number represents the interface type and number. version number: Specifies the NTP version, where number ranges from 1 to 3 and defaults to 3.
Examples
# Designate the device with the IP address of 10.1.1.1 as the symmetric-passive peer of the local device, configure the local device to run NTP version 3, and specify the source interface of NTP messages as Ethernet 1/1.
<Sysname> system-view [Sysname] ntp-service unicast-peer 10.1.1.1 version 3 source-interface ethernet 1/1
ntp-service unicast-server
Description
Use ntp-service unicast-server to designate an NTP server for the device. Use undo ntp-service unicast-server to remove an NTP server designated for the device. By default, no NTP server is designated for the device.
67
NOTE: To synchronize the PE to a PE or CE in a VPN, provide vpn-instance vpn-instance-name in your command. If you include vpn-instance vpn-instance-name in the undo ntp-service unicast-server command, the command
removes the NTP server with the IP address of ip-address in the specified VPN. If you do not include vpninstance vpn-instance-name in this command, the command removes the NTP server with the IP address of ipaddress in the public network.
Syntax
ntp-service unicast-server [ vpn-instance vpn-instance-name ] { ip-address | server-name } [ authentication-keyid keyid | priority | source-interface interface-type interface-number | version number ]* undo ntp-service unicast-server [ vpn-instance vpn-instance-name ] { ip-address | server-name }
View
System view
Default level
3: Manage level
Parameters
vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the NTP server belongs, where vpninstance-name is a case-sensitive string of 1 to 31 characters. If the NTP server is on the public network, do not specify this option. server-name: Host name of the NTP server, which is a string of 1 to 20 characters. authentication-keyid keyid: Specifies the key ID to be used for sending NTP messages to the NTP server, where keyid ranges from 1 to 4294967295. priority: Specifies this NTP server as the first choice under the same condition. source-interface interface-type interface-number: Specifies the source interface for NTP messages. In an NTP message the local device sends to the NTP server, the source IP address is the primary IP address of this interface. interface-type interface-number represents the interface type and number. version number: Specifies the NTP version, where number ranges from 1 to 3 and defaults to 3.
Examples
# Designate NTP server 10.1.1.1 for the device, and configure the device to run NTP version 3.
<Sysname> system-view [Sysname] ntp-service unicast-server 10.1.1.1 version 3
68
Syntax
display dmc device-type [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
2: System level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the types of the experimental devices connected to the DMC through asynchronous serial interfaces.
<Sysname> display dmc device-type Index 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 Interface Async7/0 Async7/1 Async7/2 Async7/3 Async7/4 Async7/5 Async7/6 Async7/7 Async7/8 Async7/9 Async7/10 Async7/11 Async7/12 Async7/13 Async7/14 A-MSR20-40 DeviceName State Down Idle Down Down Down Down Down Down Down Down Down Down Down Down Down Port 0 2116 0 0 0 0 0 0 0 0 0 0 0 0 0
69
130
Async7/15
Down
Description
Absolute number of the TTY user interface connected to the experimental device Name of the synchronous serial interface connected to the experimental device Type of the experimental device Status of the experimental device: Down: The experimental device is disconnected. Idle: The experimental device is not occupied. Busy: The experimental device is occupied.
State
Port
dmc acl
Description
Use dmc acl to use an ACL to control the users' access to the DMC web interface. Use undo dmc acl to restore the default. By default, no ACL is used to control the users' access to the DMC web interface. If no ACL is configured for the DMC, no access control is performed. If an ACL is configured for the DMC, there are two situations: if a user matches the ACL criterion, the access of the user to the DMC web interface is permitted or denied according to the ACL rule; if a user does not match the ACL criterion, the access of the user to the DMC web interface is denied. If an ACL is configured for the DMC, only users matching a permit statement can access the DMC web interface, and users matching a deny statement or matching no statement cannot access the DMC web interface.
This command is available only when the DMC function is enabled. Related commands: dmc enable.
Syntax
dmc acl acl-number undo dmc acl
View
System view
Default level
2: System level
Parameters
acl-number: ACL number, which ranges from 2000 to 2999.
70
Examples
# Use ACL 2008 to control the users' access to the DMC web interface, that is, only the users on the network segment 192.168.1.0/24 are permitted to access the web interface.
<Sysname>system-view [Sysname] acl number 2008 [Sysname-acl-basic-2008] rule permit source 192.168.1.1 0.0.0.255 [Sysname-acl-basic-2008] quit [Sysname] dmc acl 2008
Syntax
dmc device-type detect
View
System view
Default level
2: System level
Parameters
None
Examples
# Enable detection of experimental devices.
<Sysname> system-view [Sysname] dmc device-type detect
dmc enable
Description
Use dmc enable to enable the DMC function. Use undo dmc enable to restore the default. By default, the DMC function is disabled. When the DMC function is enabled, the system automatically detects the experimental devices to enable the DMC to discover the currently connected experimental devices.
71
Syntax
dmc enable undo dmc enable
View
System view
Default level
2: System level
Parameters
None
Examples
# Enable the DMC function.
<Sysname> system-view [Sysname] dmc enable
redirect monitor-port
Description
Use redirect monitor-port to set the number of a DMC monitoring port. By default, when the administrator uses the monitoring function through the web interface, the system automatically allocates a monitoring port number for establishing the monitoring connection. The allocated port number is usually 3000 plus the absolute number of the TTY user interface corresponding to the experimental device. NOTE: Execute redirect enable before using this command.
Syntax
redirect monitor-port port-number
View
AUX user interface view, TTY user interface view
Default level
2: System level
Parameters
port-number: Specify DMC monitoring port number, which ranges from 3000 to 50000.
Examples
# Set the number for the DMC monitoring port to 3017.
<Sysname> system-view [Sysname] user-interface tty 17 [Sysname-ui-tty17] redirect monitor-port 3017
72
Syntax
display ndp [ interface interface-list ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
interface interface-list: Specifies an Ethernet port list, which can contain multiple Ethernet ports. The interface-list argument is in the format of interface-list = { interface-type interface-number [ to interfacetype interface-number ] } & <1-10>,where, interface-type is port type and interface-number is port number, and &<1-10> means that you can provide up to 10 port indexes/port index lists for this argument. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display NDP configuration information.
<Sysname> display ndp Neighbor Discovery Protocol is enabled. Neighbor Discovery Protocol Ver: 1, Hello Timer: 60(s), Aging Timer: 180(s) Interface: Ethernet1/1 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/2 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0
73
Interface: Ethernet1/3 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/4 Status: Enabled, Pkts Snd: 28440, Pkts Rvd: 27347, Pkts Err: 0 Neighbor 1: Host Name Port Name Aging Time: 122(s) : Sysname : Ethernet1/4 MAC Address : 00e0-fc00-2579
Software Ver: V100R001B01D013 Device Name : S3126C Port Duplex : AUTO Product Ver : 005 BootROM Ver : 137
Interface: Ethernet1/5 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/6 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/7 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/8 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/9 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/10 Status: Enabled, Pkts Snd: 28450, Pkts Rvd: 26520, Pkts Err: 0 Neighbor 1: Host Name Port Name Aging Time: 134(s) : Sysname : Ethernet1/11 MAC Address : 00e0-fc00-3133
Software Ver: V100R001B01D013 Device Name : S3126T Port Duplex : AUTO Product Ver : 005
Interface: Ethernet1/11 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/12 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0
74
Interface: Ethernet1/13 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/14 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/15 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/16 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/17 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/18 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/19 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/20 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/21 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/22 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/23 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: Ethernet1/24 Status: Enabled, Pkts Snd: 0, Pkts Rvd: 0, Pkts Err: 0 Interface: GigabitEthernet1/1 Status: Enabled, Pkts Snd: 28438, Pkts Rvd: 54160, Pkts Err: 0 Neighbor 1: Host Name Port Name Aging Time: 176(s) : Sysname : GigabitEthernet1/2 MAC Address : 000f-cbb8-9528
Software Ver: V100R002B01D011SP1 Device Name : Sysname S5648P Port Duplex : AUTO Product Ver : 005
75
Interface: GigabitEthernet1/2 Status: Enabled, Pkts Snd: 1, Pkts Rvd: 1, Pkts Err: 0
Description
NDP is enabled globally on the current device. Version of NDP Interval to send NDP packets The time for the receiving device to hold NDP information A specified port NDP state of a port Number of the NDP packets sent through the port Number of the NDP packets received on the port Number of the error NDP packets received on the port Aging time of the NDP information of a neighbor device MAC address of a neighbor device System name of a neighbor device Port name of a neighbor device Software version of the neighbor device Device model of a neighbor device Port duplex mode of a neighbor device Product version of a neighbor device Boot ROM version of a neighbor device
ndp enable
Description
Use ndp enable to enable NDP globally or for specified port(s). Use undo ndp enable to disable this feature globally or for specified port(s). By default, NDP is enabled globally and also on all ports. Executed in system view, ndp enable enables NDP for the specified port(s); otherwise, the command enables NDP globally if you provide the interface interface-list parameter. Executed in interface view, this command enables NDP for the current port only. Configured in Layer 2 aggregate interface view, the configuration does not take effect on the member ports of the aggregation group that corresponds to the aggregate interface; configured on a member port of an aggregation group, the configuration takes effect only after the member port
76
quit the aggregation group. For more information about link aggregation, see Layer 2LAN Switching Configuration Guide.
Syntax
In Ethernet interface view or Layer 2 aggregate interface view: ndp enable undo ndp enable In system view: ndp enable [ interface interface-list ] undo ndp enable [ interface interface-list ]
View
System view, Ethernet interface view, Layer 2 aggregate interface view
Default level
2: System level
Parameters
interface interface-list: Specifies an Ethernet port list, which can contain multiple Ethernet ports. The interface-list argument is in the format of interface-list = { interface-type interface-number [ to interfacetype interface-number ] } & <1-10>, where interface-type represents the port type, interface-number represents the port number, and & <1-10> means that you can provide up to 10 port indexes/port index lists for this argument.
Examples
# Enable NDP globally.
<Sysname> system-view [Sysname] ndp enable
Syntax
ndp timer aging aging-time
77
View
System view
Default level
2: System level
Parameters
aging-time: Time for a device to keep the NDP packets it receives, which ranges from 5 to 255 seconds.
Examples
# Configure the time that a receiving device should keep the NDP packets as 100 seconds.
<Sysname> system-view [Sysname] ndp timer aging 100
Syntax
ndp timer hello hello-time undo ndp timer hello
View
System view
Default level
2: System level
Parameters
hello-time: Interval to send NDP packets, which ranges from 5 to 254 seconds.
Examples
# Set the interval to send NDP packets to 80 seconds.
<Sysname> system-view [Sysname] ndp timer hello 80
Syntax
reset ndp statistics [ interface interface-list ]
View
User view
Default level
1: Monitor level
Parameters
interface interface-list: Specifies an Ethernet port list, which can contain multiple Ethernet ports. The interface-list argument is in the format of interface-list = { interface-type interface-number [ to interfacetype interface-number ] } & <1-10>, where interface-type represents the port type, interface-number represents the port number, and & <1-10> means that you can provide up to 10 port indexes/port index lists for this argument. If you provide this keyword, NDP statistics of the specified port will be cleared; otherwise, NDP statistics of all ports will be cleared.
Examples
# Clear NDP statistics of all ports.
<Sysname> reset ndp statistics
Syntax
display ntdp [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display NTDP configuration information.
<Sysname> display ntdp
79
Hop Delay : 100 ms Port Delay: 10 ms Last collection total time: 92ms
Description
NTDP is enabled globally on the local device. Hop count for topology collection Interval to collect topology information (after the cluster is created) Indicates the device is not a management device and unable to perform periodical topology collection Delay time for the device to forward topology collection requests Delay time for a topology-collection request to be forwarded through a port Time cost during the last topology collection
Syntax
display ntdp device-list [ verbose ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
verbose: Displays the detailed device information collected through NTDP. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
80
Examples
# Display the device information collected through NTDP.
<Sysname> display ntdp device-list MAC 00e0-fc00-3133 000f-e20f-c415 00e0-fc00-2579 00e0-fc00-1751 00e0-fd00-0043 00e0-fc00-3199 HOP 2 2 1 0 2 3 31.31.31.1/24 31.31.31.5/24 IP Device MSR20-20 MSR20-20 MSR20-20 MSR20-20 MSR20-20 MSR20-20
Description
MAC address of a device Hops to the collecting device IP address and mask length of the management VLAN interface on the device Device model
HP Comware Platform Software Comware Software Version 5.20 Release 2207P02, Standard Copyright (c) 2010-2011 Hewlett-Packard Development Company, L.P. HP A-MSR20-21 V100R001B01D007SP01 -------------------------------------------------------------------Hop Cluster : 0 : Administrator device of cluster WiNet : aaa_0.hp : 00e0-fc00-5175 : Ethernet1/1 : 100 : FULL
81
Description
System name of the device MAC address of the device Device model IP address and subnet mask length of the management VLAN interface on the device Version information Hops from the current device to the device that collects topology information Role of the device in the cluster:
Syntax
display ntdp single-device mac-address mac-address [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
82
Parameters
mac-address: MAC address of the device, in the format of H-H-H. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the detailed NTDP information of the device with a MAC address of 00E0-FC00-51 1. 1
<Sysname> display ntdp single-device mac-address 000f-e243-1160 Hostname MAC Device IP Version : WiNet_1.HP A-MSR20-21-B : 000f-e243-1160 : HP A-MSR20-21 : 192.168.1.20/24 :
HP Comware Platform Software Comware Software Version 5.20 Release 2207P02, Standard Copyright (c) 2010-2011 Hewlett-Packard Development Company, L.P. HP A-MSR20-21 V100R001B01D007SP01 -------------------------------------------------------------------Hop Cluster : 1 : Member device of cluster WiNet , Administrator MAC: 000f-e23a-ff75 : WiNet_0.HP : 000f-e23a-ff75 : Ethernet0/3 : 100 : FULL
Description
System name of the device MAC address of the device Device model IP address and subnet mask length of the management VLAN interface on the device Version information
83
Field
Hop
Description
Hops from the current device to the device that collects topology information Role of the device in the cluster:
ntdp enable
Description
Use ntdp enable to enable NTDP globally or for specified port(s). Use undo ntdp enable to disable NTDP globally or for specified port(s). By default, NTDP is enabled globally and on all ports. Executed in system view, the command enables the global NTDP; executed in interface view, the command enables NTDP of the current port. Configured in Layer 2 aggregate interface view, the configuration does not take effect on the member ports of the aggregation group that corresponds to the aggregate interface; configured on a member port of an aggregation group, the configuration takes effect only after the member port quit the aggregation group. For more information about link aggregation, see Layer 2LAN Switching Configuration Guide.
Syntax
ntdp enable undo ntdp enable
View
System view, Ethernet interface view, Layer 2 aggregate interface view
84
Default level
2: System level
Parameters
None
Examples
# Enable NTDP globally.
<Sysname> system-view [Sysname] ntdp enable
ntdp explore
Description
Use ntdp explore to start topology information collection manually.
Syntax
ntdp explore
View
User view
Default level
2: System level
Parameters
None
Examples
# Start topology information collection manually.
<Sysname> ntdp explore
ntdp hop
Description
Use ntdp hop to set maximum hop count for collecting topology information. Use undo ntdp hop to restore the default. By default, the maximum hop count is 3. This command is only applicable to the topology-collecting device. A bigger number of hops requires more memory of the topology-collecting device.
Syntax
ntdp hop hop-value undo ntdp hop
85
View
System view
Default level
2: System level
Parameters
hop-value: Maximum hop count for collecting topology information, which ranges from 1 to 16.
Examples
# Set the hop count for topology information collection to 5.
<Sysname> system-view [Sysname] ntdp hop 5
ntdp timer
Description
Use ntdp timer to configure the interval to collect topology information. Use undo ntdp timer to restore the default. By default, the interval to collect topology information is 1 minute. The management device can start to collect the topology information only after the cluster is set up.
Syntax
ntdp timer interval undo ntdp timer
View
System view
Default level
2: System level
Parameters
interval: Interval (in minutes) to collect topology information, which ranges from 0 to 65,535. A value of 0 means not to collect topology information.
Examples
# Set the interval to collect the topology information to 30 minutes.
<Sysname> system-view [Sysname] ntdp timer 30
86
By default, the delay time for the device to forward topology-collection requests through the first port is 200 ms.
Syntax
ntdp timer hop-delay delay-time undo ntdp timer hop-delay
View
System view
Default level
2: System level
Parameters
delay-time: Delay time (in milliseconds) for a device receiving topology-collection requests to forward them through its first port. This argument ranges from 1 to 1,000.
Examples
# Set the delay time for the device to forward topology-collection requests through the first port to 300 ms.
<Sysname> system-view [Sysname] ntdp timer hop-delay 300
Syntax
ntdp timer port-delay delay-time undo ntdp timer port-delay
View
System view
Default level
2: System level
Parameters
delay-time: Delay time (in milliseconds) for a device to forward a topology-collection request through its successive ports, which ranges from 1 to 100.
Examples
# Set the delay time for the device to forward topology-collection requests through the successive ports to 40 ms.
<Sysname> system-view
87
A-MSR50
add-member
Syntax
add-member [ member-number ] mac-address mac-address [ password password ]
View
Cluster view
Default level
2: System level
Parameters
member-number: A number assigned to the candidate device to be added to a cluster. mac-address: MAC address of the candidate device (in hexadecimal form of H-H-H). password: Password of the candidate device, which is a string of 1 to 16 characters. The password is required when you add a candidate device to a cluster. However, this argument is not needed if the candidate device is not configured with a super password.
88
Examples
# Add a candidate device to the cluster on the management device, setting the number to 6. (Assume that the MAC address and user password of the candidate device are 00E0-FC00-35E7 and 123456 respectively.)
<aaa_0.Sysname> system-view [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] add-member 6 mac-address 00e0-fc00-35e7 password 123456
administrator-address
Description
Use administrator-address to add a candidate device to a cluster. Use undo administrator-address to remove a member device from the cluster. By default, a device belongs to no cluster. administrator-address is applicable on candidate devices only, while undo administrator-address is applicable on member devices only. To remove a cluster member from a cluster, use delete-member on the management device.
Syntax
administrator-address mac-address name cluster-name undo administrator-address
View
Cluster view
Default level
2: System level
Parameters
mac-address: MAC address of the management device (in hexadecimal form of H-H-H). cluster-name: Name of an existing cluster. It is a string of 1 to 8 characters, which can only be letters, numbers, subtraction sign (-), and underline (_).
Examples
# Remove a member device from the cluster on the member device.
<aaa_1.Sysname> system-view [aaa_1.Sysname] cluster [aaa_1.Sysname-cluster] undo administrator-address
auto-build
Description
Use auto-build to establish a cluster automatically. This command can be executed on a candidate device or the management device. If you execute this command on a candidate device, you will be required to enter the cluster name to build a cluster. Then the system will collect candidates and add the collected candidates into the cluster automatically.
89
If you execute this command on the management device, the system will collect candidates directly and add them into the cluster automatically. The recover keyword is used to recover a cluster. Using auto-build recover, you can find the members that are currently not in the member list and add them to the cluster again. Make sure that NTDP is enabled, because it is the basis of candidate and member collection. The collection range is also decided through NTDP. You can use ntdp hop in system view to modify the collection range. If a member is configured with a super password different from the super password of the management device, it cannot be automatically added to the cluster.
Syntax
auto-build [ recover ]
View
Cluster view
Default level
2: System level
Parameters
recover: Automatically reestablishes communication with all the member devices.
Examples
# Establish a cluster automatically on the management device.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] auto-build There is no base topology, if set up from local flash file?(Y/N) y Begin get base topology file from local flash...... Get file error, can not finish base topology recover Please input cluster name:aaa Collecting candidate list, please wait... #Jul 22 14:35:18:841 2006 Sysname CLST/5/Cluster_Trap: OID:1.3.6.1.4.1.2011.6.7.1.0.3: member 0.0.0.0.0.224.252.0.0.0 role change, NTDP Index:0.0.0.0.0.0.224.252.0.0.0, Role:1 Candidate list: Name Processing...please wait Cluster auto-build Finish! 0 member(s) added successfully. Hops MAC Address Device
90
black-list add-mac
Description
Use black-list add-mac to add a device to the blacklist. This command can be executed on the management device only.
Syntax
black-list add-mac mac-address
View
Cluster view
Default level
2: System level
Parameters
mac-address: MAC address of the device to be added into the blacklist, in the form of H-H-H.
Examples
# Add a device with the MAC address of 0EC0-FC00-0001 to the blacklist on the management device.
<aaa_0.Sysname> system-view [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] black-list add-mac 0ec0-fc00-0001
black-list delete-mac
Description
Use black-list delete-mac to delete a device from the blacklist. This command can be executed on the management device only.
Syntax
black-list delete-mac { all | mac-address }
View
Cluster view
Default level
2: System level
Parameters
all: Deletes all devices from the blacklist. mac-address: MAC address of the device to be deleted from the blacklist, which is in the form of H-H-H.
Examples
# Delete a device with the MAC address of 0EC0-FC00-0001 from the blacklist on the management device.
<aaa_0.Sysname> system-view [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] black-list delete-mac 0ec0-fc00-0001
91
build
Description
Use build to configure the current device as the management device and specify a cluster name for it. Use undo build to configure the current management device as a candidate device. By default, the device is not a management device. When executing this command, you will be asked whether to create a standard topology map or not. This command can only be applied to devices that are capable of being a management device and are not members of other clusters. The command takes no effect if you execute the command on a device which is already a member of another cluster. If you execute this command on a management device, you will replace the cluster name with the one you specify (suppose the new cluster name differs from the original one). The number of the management device in the cluster is 0.
Syntax
build cluster-name undo build
View
Cluster view
Default level
2: System level
Parameters
cluster-name: Cluster name. It is a string of 1 to 8 characters, which can only be letters, numbers, subtraction sign (-), and underline (_).
Examples
# Configure the current device as a management device and specify the cluster name as aaa.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] build aaa [Sysname-cluster] ip-pool 172.16.0.1 255.255.255.248 Restore topology from local flash file,for there is no base topology. (Please confirm in 30 seconds, default No). (Y/N) Y Begin get base topology file from local flash...... Get file error, can not finish base topology recover #Sep 18 19:56:03:804 2006 Sysname IFNET/4/INTERFACE UPDOWN: Trap 1.3.6.1.6.3.1.1.5.4: Interface 3276899 is Up, ifAdminStatus is 1, ifOperSt atus is 1 #Sep 18 19:56:03:804 2006 Sysname CLST/4/Cluster_Trap:
92
OID:1.3.6.1.4.1.2011.6.7.1.0.3: member 0.0.0.0.0.224.252.0.29.0 role change, NTD PIndex:0.0.0.0.0.0.224.252.0.29.0, Role:1 %Sep 18 19:56:03:804 2006 Sysname IFNET/4/UPDOWN: Line protocol on the interface Vlan-interface100 is UP [aaa_0.Sysname-cluster] %Sep 18 19:56:18:782 2006 Sysname CLST/4/LOG: Member 00e0-fc00-1e00 is joined in cluster aaa. [aaa_0.Sysname-cluster]
cluster
Description
Use cluster to enter cluster view.
Syntax
cluster
View
System view
Default level
2: System level
Parameters
None
Examples
# Enter cluster view
<Sysname> system-view [Sysname] cluster [Sysname-cluster]
cluster enable
Description
Use cluster enable to enable the cluster function. Use undo cluster enable to disable the cluster function. By default, the cluster function is enabled. When you execute undo cluster enable cmmand on a management device, you remove the cluster and its members, prevent the device from functioning as a management device, and disable the cluster function on the device When you execute undo cluster enable on a member device, you disable the cluster function on the device, and the device leaves the cluster. When you execute undo cluster enable on a device that belongs to no cluster, you disable the cluster function on the device.
Syntax
cluster enable
93
View
System view
Default level
2: System level
Parameters
None
Examples
# Enable the cluster function.
<Sysname> system-view [Sysname] cluster enable
cluster switch-to
Description
Use cluster switch-to to switch between the management device and member devices. The following table shows the command and router compatibility: Command A-MSR900 A-MSR201X A-MSR20 A-MSR30 Value range for
member-number for the AMSR30-1 301E, 1 30-20, 301F, 40, and 30-60: 1 to 40
A-MSR50
cluster switchto
Syntax
cluster switch-to { member-number | mac-address mac-address | administrator | sysname membersysname }
View
User view
Default level
0: Visit level
Parameters
member-number: Number of a member device in a cluster. mac-address mac-address: MAC address of a member device, which is in the format of H-H-H. administrator: Switches from a member device to the management device.
94
Examples
# Switch from the operation interface of the management device to that of the member device numbered 6 and then switch back to the operation interface of the management device.
<aaa_0.Sysname> cluster switch-to 6 <aaa_6.Sysname> quit <aaa_0.Sysname>
# Enter the member device numbered 5 with the system name of devicea.
<aaa_0.Sysname> cluster switch-to sysname devicea SN 5 6 Device MSR20-20 MSR20-20 MAC Address 00e0-fc00-5101 00e0-fc00-5102 UP UP 5 Status Name test_5. router test_6. router
cluster-local-user
Description
Use cluster-local-user to configure Web user accounts in batches. Use undo cluster-local-user to remove the configuration. The command can be configured once on the management device only.
Syntax
cluster-local-user user-name password { cipher | simple } password undo cluster-local-user user-name
View
Cluster view
Default level
1: Monitor level
Parameters
cipher: Indicates that the password is in cipher text. simple: Indicates that the password is in plain text. user-name: Username used for logging onto the devices within a cluster through Web, which is a string of 1 to 55 characters. password: Password used for logging onto the devices within a cluster through Web. This password is a string of 1 to 63 characters when the simple keyword is specified, and can be in either plain text or cipher text when the cipher keyword is specified. A plain text password must be a string of 1 to 63 characters. The cipher text password must have a fixed length of 24 or 88 characters. The password is case-sensitive.
Examples
# On the management device, configure Web user accounts for the devices within a cluster, with username being abc, password being 123456 and displayed in plain text.
<aaa_0.Sysname> system-view
95
cluster-mac
Description
Use cluster-mac to configure the destination MAC address for cluster management protocol packets. Use undo cluster-mac to restore the default. By default, the destination MAC address for cluster management protocol packets is 0180-C200-000A. This command can be executed on the management device only.
Syntax
cluster-mac mac-address undo cluster-mac
View
Cluster view
Default level
2: System level
Parameters
mac-address: Multicast MAC address (in hexadecimal in the format of H-H-H), which can be 0180-C2000000, 0180-C200-000A, 0180-C200-0020 through 0180-C200-002F, or 010F-E200-0002.
Examples
# Set the destination MAC address of the cluster management protocol packets to 0180-C200-0000 on the management device.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] ip-pool 10.1.1.1 24 [Sysname-cluster] build aaa [aaa_0.Sysname-cluster] cluster-mac 0180-C200-0000
cluster-mac syn-interval
Description
Use cluster-mac syn-interval to set the interval for a management device to send MAC address negotiation broadcast packets for cluster management. By default, the interval is set to one minute. This command can be executed on the management device only.
Syntax
cluster-mac syn-interval interval
View
Cluster view
96
Default level
2: System level
Parameters
interval: Interval (in minutes) to send MAC address negotiation broadcast packets, which ranges from 0 to 30. If the interval is set to 0, the management device does not send broadcast packets to the member devices.
Examples
# Set the interval for the management device to send MAC address negotiation broadcast packets for cluster management to two minutes on the management device.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] ip-pool 10.1.1.1 24 [Sysname-cluster] build aaa [aaa_0.Sysname-cluster] cluster-mac syn-interval 2
cluster-snmp-agent community
Description
Use cluster-snmp-agent community to configure an SNMP community shared by a cluster and set its access authority. Use undo cluster-snmp-agent community to remove a specified community name. The command used to configure the SNMP community with read-only or read-and-write authority can only be executed once on the management device. This configuration will be synchronized to the member devices in the whitelist, which is equal to configuring multiple member devices at one time. An SNMP community name is retained when a cluster is dismissed or a member device is removed from the whitelist. If the same community name as the current one has been configured on a member device, the current community name will replace the original one.
Syntax
cluster-snmp-agent community { read | write } community-name [ mib-view view-name ] undo cluster-snmp-agent community community-name
View
Cluster view
Default level
1: Monitor level
Parameters
read: Indicates to allow the communitys read-only access to MIB objects. The community with read-only authority can only query the device information. write: Indicates to allow the communitys read-write access to MIB objects. The community with read-write authority can configure the device information. community-name: Community name, which is a string of 1 to 26 characters.
97
Examples
# Configure the SNMP community name shared by a cluster as comaccess and allow the communitys read-only access to MIB objects.
<aaa_0.Sysname> system-view [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] cluster-snmp-agent community read comaccess
# Configure the SNMP community name shared by a cluster as comaccesswr and allow the communitys read-write access to MIB objects.
[aaa_0.Sysname-cluster] cluster-snmp-agent community write comacceswr
cluster-snmp-agent group v3
Description
Use cluster-snmp-agent group to configure the SNMPv3 group shared by a cluster and set its access rights. Use undo cluster-snmp-agent group to remove the SNMPv3 group shared by a cluster. The command can be executed once on the management device only. This configuration will be synchronized to the member devices in the whitelist, which is equal to configuring multiple member devices at one time. An SNMPv3 group name is retained when a cluster is dismissed or a member device is deleted from the whitelist. If the same group name as the current one has been configured on a member device, the current group name will replace the original one.
Syntax
cluster-snmp-agent group v3 group-name [ authentication | privacy ] [ read-view read-view ] [ writeview write-view ] [ notify-view notify-view ] undo cluster-snmp-agent group v3 group-name [ authentication | privacy ]
View
Cluster view
Default level
1: Monitor level
Parameters
group-name: Group name, which is a string of 1 to 32 characters. authentication: Specifies to authenticate a packet but not to encrypt it. privacy: Specifies to authenticate and encrypt a packet. read-view: Read-only view name, which is a string of 1 to 32 characters. write-view: Read-write view name, which is a string of 1 to 32 characters. notify-view: View name in which trap messages can be sent. It is a string of 1 to 32 characters.
98
Examples
# Create an SNMP group snmpgroup.
<aaa_0.Sysname> system-view [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] cluster-snmp-agent group v3 snmpgroup
cluster-snmp-agent mib-view
Description
Use cluster-snmp-agent mib-view to create or update the MIB view information shared by a cluster. Use undo cluster-snmp-agent mib-view to delete the MIB view information shared by a cluster. By default, the MIB view name shared by a cluster is ViewDefault, in which the cluster can access ISO subtree. This command can be executed once on the management device only. This configuration will be synchronized to member devices on the whitelist, which is equal to configuring multiple member devices at one time. The MIB view is retained when a cluster is dismissed or a member device is deleted from the whitelist. If the same view name as the current one has been configured on a member device, the current view will replace the original one on the member device.
Syntax
cluster-snmp-agent mib-view included view-name oid-tree undo cluster-snmp-agent mib-view view-name
View
Cluster view
Default level
1: Monitor level
Parameters
included: Includes MIB view. view-name: MIB view name, which is a string of 1 to 32 characters. oid-tree: MIB subtree. It is a string of 1 to 255 characters, which can only be a variable OID string or variable name string. OID is composed of a series of integers, indicating where a node is in the MIB tree. It can uniquely identify an object in a MIB.
Examples
# Create a view including all objects of mib2.
<aaa_0.Sysname> system-view [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] cluster-snmp-agent mib-view included mib2 1.3.6.1.2.1
99
cluster-snmp-agent usm-user v3
Description
Use cluster-snmp-agent usm-user v3 to add a new user to the SNMP v3 group shared by a cluster. Use undo cluster-snmp-agent usm-user v3 to delete the SNMP v3 group user shared by the cluster. The command can be executed once on the management device only. This configuration will be synchronized to member devices on the whitelist, which is equal to configuring multiple member devices at one time. The SNMPv3 group user is retained when a cluster is dismissed or a member device is deleted from the whitelist. If the same username as the current one has been configured on a member device, the current username will replace the original one on the member device.
Syntax
cluster-snmp-agent usm-user v3 user-name group-name [ authentication-mode { md5 | sha } authpassword ] [ privacy-mode des56 priv-password ] undo cluster-snmp-agent usm-user v3 user-name group-name
View
Cluster view
Default level
1: Monitor level
Parameters
user-name: User name, which is a string of 1 to 32 characters. group-name: Group name, which is a string of 1 to 32 characters. authentication-mode: Specifies the security level to be authentication needed. md5: Specifies the authentication protocol to be HMAC-MD5-96. sha: Specifies the authentication protocol to be HMAC-SHA-96. auth-password: Authentication password, which is a string of 1 to 16 characters if in plain text; it can only be a string of 24 characters if in cipher text. privacy-mode: Specifies the security level to be encrypted. des56: Specifies the encryption protocol to be DES. priv-password: Encryption password, which is a string of 1 to 16 characters in plain text; it can only be a string of 24 characters in cipher text.
Examples
# Add a user wang to the SNMP group snmpgroup, set the security level to authentication-needed and specify the authentication protocol as HMAC-MD5-96 and authentication password as pass.
<aaa_0.Sysname> system-view [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] cluster-snmp-agent usm-user v3 wang snmpgroup authentication-mode md5 pass
100
delete-member
Description
Use delete-member to remove a member device from the cluster. This command can be executed only on the management device. If you only remove a member device from the cluster without adding it to the blacklist, the device will be automatically added to the cluster again. The following table shows the command and router compatibility: Command A-MSR900 A-MSR201X A-MSR20 A-MSR30 Value range for
member-number for the AMSR30-1 301E, 1 30-20, 301F, 40, and 30-60: 1 to 40
A-MSR50
Delete-member
Syntax
delete-member member-number [ to-black-list ]
View
Cluster view
Default level
2: System level
Parameters
member-number: Number of a member device in a cluster. to-black-list: Adds the device removed from a cluster to the blacklist to prevent it from being added to the cluster again.
Examples
# On the management device, remove the member device numbered 2 from the cluster and add it to the blacklist.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] ip-pool 10.1.1.1 24 [Sysname-cluster] build aaa [aaa_0.Sysname-cluster] delete-member 2 to-black-list
101
display cluster
Description
Use display cluster to display the information of the cluster to which the current device belongs. This command can be executed on the management device and member devices only.
Syntax
display cluster [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the information of the cluster to which the current device belongs on the management device.
<aaa_0.Sysname> display cluster Cluster name:"aaa" Role:Administrator Management-vlan:100 Handshake timer:10 sec Handshake hold-time:60 sec IP-Pool:1.1.1.1/16 cluster-mac:0180-c200-000a No logging host configured No SNMP host configured No FTP server configured No TFTP server configured 2 member(s) in the cluster, and 0 of them down.
# Display the information of the cluster to which the current device belongs on a member device.
<aaa_1.Sysname> display cluster Cluster name:"aaa" Role:Member Member number:1 Management-vlan:100 cluster-mac:0180-c200-000a Handshake timer:10 sec
102
Description
Name of the cluster Role of the switch in the cluster:
Administrator: The current device is a management device. Member: The current device is a member device.
Number of the device in the cluster Management VLAN of the cluster Interval to send handshake packets Value of handshake timer Private IP addresses of the member devices in the cluster Multicast MAC address of cluster management packets IP address of the management device MAC address of the management device State of the management device
Syntax
display cluster base-topology [ mac-address mac-address | member-id member-number ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
2: System level
Parameters
mac-address: Specifies a device by its MAC address. The system displays the standard topology with the device as the root.
103
member-number: Specifies a device by its number. The system displays the standard topology with the device as the root. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the standard topology of a cluster.
<aaa_0.Sysname> display cluster base-topology -------------------------------------------------------------------(PeerPort) ConnectFlag (NativePort) [SysName:DeviceMac] -------------------------------------------------------------------[aaa_0.Sysname:00e0-fc00-1400] | -(P_4/1)<-->(P_1/7)[Sysname:00e0-fc00-3333] | | | | | | | | | | | | | | | | | | | | | | | | | -(P_4/1)<-->(P_4/1)[aaa_3.Sysname:00e0-fc00-0000] | | | -(P_4/1)<-->(P_1/9)[Sysname:00e0-fc00-5500] | -(P_1/7)<-->(P_4/1)[aaa_3.Sysname:00e0-fc00-0000] | | | | | | | -(P_1/7)<-->(P_1/9)[Sysname:00e0-fc00-5500] | | | | | -(P_1/7)<-->(P_1/11)[Sysname:00e0-fc00-7000] | -(P_1/3)<-->(P_1/2)[aaa_2.Sysname:00e0-fd00-5500] | -(P_1/10)<-->(P_4/1)[Sysname:00e0-fc05-4300] | -(P_1/11)<-->(P_4/1)[aaa_0.Sysname:00e0-fc00-1400] | -(P_1/8)<-->(P_1/12)[aaa_1.Sysname:00e0-fc00-7016] | -(P_1/9)<-->(P_4/1)[aaa_0.HP:00e0-fc00-1400] | -(P_1/9)<-->(P_1/11)[Sysname:00e0-fc00-7000] | -(P_4/1)<-->(P_4/1)[aaa_0.Sysname:00e0-fc00-1400] | -(P_4/1)<-->(P_1/9)[Sysname:00e0-fc00-5500] | -(P_4/1)<-->(P_1/11)[Sysname:00e0-fc00-7000]
104
| | |
| -(P_4/1)<-->(P_1/11)[Sysname:00e0-fc00-7000]
Description
Peer port Connection flag: <--> Local port System name of the peer device MAC address of the peer device
Syntax
display cluster black-list [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
2: System level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
105
Examples
# View the current blacklist of the cluster.
<aaa_0.Sysname> display cluster black-list Device ID 00e0-fc00-0010 Access Device ID 00e0-fc00-3550 Access port Ethernet1/1
Description
ID of the blacklist device, indicated by its MAC address. ID of the device connected to the blacklist device, indicated by its MAC address. Port connected to the blacklist device.
Syntax
display cluster candidates [ mac-address mac-address | verbose ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
mac-address mac-address: Specifies the MAC address of a candidate device, which is in the format of HH-H. verbose: Displays the detailed information about a candidate device. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the information about all the candidate devices.
<aaa_0.Sysname> display cluster candidates MAC 00e0-fc00-3199 HOP 3 IP Device MSR20-20
106
000f-cbb8-9528
31.31.31.56/24
MSR20-20
Description
System name of a candidate device MAC address of a candidate device Hops from a candidate device to the management device IP address of a candidate device Model of a candidate device
107
Syntax
display cluster current-topology [ mac-address mac-address [ to-mac-address mac-address ] | member-id member-number [ to-member-id member-number ] ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
2: System level
Parameters
member-number: Number of the devices in a cluster (including the management device and member devices). mac-address: MAC addresses of the devices in a cluster (including the management device and member devices). |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the information of the current topology of a cluster.
<aaa_0.Sysname> display cluster current-topology -------------------------------------------------------------------(PeerPort) ConnectFlag (NativePort) [SysName:DeviceMac] -------------------------------------------------------------------ConnectFlag: <--> normal connect ???? lost device ---> odd connect ++++ new device **** in blacklist -||- STP discarding
108
Description
Peer port Connection flag Local port System name of the device Indicates a normal connection between the device and the management device Indicates a unidirectional connection between the device and the management device Indicates the device is in the blacklist Indicates a lost connection between the device and the management device Indicates this is a new device, whose identity is to be recognized by the administrator STP is blocked
NOTE: A new device in the topology information is identified based on the standard topology. After you add a device into a cluster, if you do not use topology accept to confirm the current topology and save it as the standard topology, this device is still regarded as a new device.
A-MSR50
109
Syntax
display cluster members [ member-number | verbose ] [ | { begin | exclude | include } regularexpression ]
View
Any view
Default level
1: Monitor level
Parameters
member-number: Number of the member device. verbose: Displays the detailed information about all the devices in a cluster. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the information about all the devices in a cluster.
<aaa_0.Sysname> display cluster members SN 0 2 3 4 5 Device MSR20-20 MSR20-20 MSR20-20 MSR20-20 MSR20-20 MAC Address 00e0-fc00-1751 00e0-fc00-3199 00e0-fd00-0043 00e0-fc00-2579 000f-e20f-c415 Status Name Admin Up Up Up Up aaa_0.Sysname aaa_2. MSR20-20 _4 aaa_3. MSR20-20 aaa_4. MSR20-20_2 aaa_5. MSR20-20_5
Description
Number of the cluster member Device model MAC address of a device State of a device:
Status
up: The member device which is up down: The member which is down deleting: The member which is being deleted admin: The management device
Name
# Display the detailed information about the management device and all member devices.
<aaa_0.Sysname> display cluster members verbose Member number:0
110
Name:WiNet_0.HP Device:HP A-MSR20-21 MAC Address:000f-e23a-ff75 Member status:Admin Hops to administrator device:0 IP: Version: HP Comware Platform Software Comware Software Version 5.20 Release 2207P02, Standard Copyright (c) 2010-2011 Hewlett-Packard Development Company, L.P. HP A-MSR20-21 V100R001B01D007SP01 Member number:1 Name:WiNet_1.HP A-MSR20-21-B Device:HP A-MSR20-21 MAC Address:000f-e243-1160 Member status:Up Hops to administrator device:1 IP: 192.168.1.20/24 Version: HP Comware Platform Software Comware Software Version 5.20 Release 2207P02, Standard Copyright (c) 2010-2011 Hewlett-Packard Development Company, L.P. HP A-MSR20-21 V100R001B01D007SP01
Description
Number of the cluster member Name of a member device, composed of the cluster name and the system name of the member device, in the format of cluster name.systemname
Name
When the management device type is not consistent with the member device type, if a user modifies the cluster name on the management device continuously, the cluster name may appear twice in the cluster member name, for example, clustername.clustername.systemname. This abnormal case can restore in a period of time. Device model MAC address of a device State of a device Hops from the current member device to the management device IP address of a member device Software version of the current member device
111
ftp-server
Description
Use ftp-server to configure a public FTP server (by setting its IP address, username, and password) on the management device for the member devices in the cluster. Use undo ftp-server to remove the FTP server configured for the member devices in the cluster. By default, a cluster is not configured with a public FTP server. The command can be executed on the management device only.
Syntax
ftp-server ip-address [ user-name username password { simple | cipher } password ] undo ftp-server
View
Cluster view
Default level
3: Manage level
Parameters
ip-address: IP address of the FTP server. username: Username used to log in to the FTP server, which is a string of 1 to 32 characters. simple: Indicates that the password is in plain text. cipher: Indicates that the password is in cipher text. password: Password used to log onto the FTP server. This password must be in plain text when the simple keyword is specified, and can be in either plain text or cipher text when the cipher keyword is specified. A plain text password must be a string of no more than 16 characters, such as aabbcc. The cipher text password must have a fixed length of 24 characters, such as _(TT8F]Y\5SQ=^Q`MAF4<1!!.
Examples
# Set the IP address, username and password of an FTP server shared by the cluster on the management device to be 1.0.0.9, ftp, and ftp in plain text respectively.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] ip-pool 10.1.1.1 24 [Sysname-cluster] build aaa [aaa_0.Sysname-cluster] ftp-server 1.0.0.9 user-name ftp password simple ftp
holdtime
Description
Use holdtime to configure the holdtime of a device. Use undo holdtime to restore the default. By default, the holdtime of a device is 60 seconds. This command can be executed on the management device only.
112
Syntax
holdtime hold-time undo holdtime
View
Cluster view
Default level
2: System level
Parameters
hold-time: Holdtime in seconds, which ranges from 1 to 255.
Examples
# Set the holdtime to 30 seconds on the management device.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] ip-pool 10.1.1.1 24 [Sysname-cluster] build aaa [aaa_0.Sysname-cluster] holdtime 30
ip-pool
Description
Use ip-pool to configure a private IP address range for cluster members. Use undo ip-pool to remove the IP address range configuration. By default, no private IP address range is configured for cluster members. You must configure the IP address range on the management device only and before establishing a cluster. If a cluster has already been established, you are not allowed to change the IP address range. For a cluster to work normally, the IP addresses of the VLAN interfaces of the management device and member devices must not be in the same network segment as that of the cluster address pool.
Syntax
ip-pool ip-address { mask | mask-length } undo ip-pool
View
Cluster view
Default level
2: System level
Parameters
ip-address: Private IP address of the management device in a cluster. { mask | mask-length }: Mask of the IP address pool of a cluster. It is an integer or in dotted decimal notation. When it is an integer, it ranges from 1 to 30. A network address can be obtained by ANDing
113
this mask with the private IP address of the administrator device. The private IP addresses of all member devices in a cluster belong to this network segment.
Examples
# Configure the IP address range of a cluster.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] ip-pool 10.200.0.1 20
logging-host
Description
Use logging-host to configure a logging host shared by a cluster. Use undo logging-host to remove the logging host configuration. By default, no logging host is configured for a cluster. This command can be executed on the management device only. You have to execute info-center loghost in system view first for the logging host you configured to take effect. For more information about info-center loghost, see the chapter Information center commands.
Syntax
logging-host ip-address undo logging-host
View
Cluster view
Default level
2: System level
Parameters
ip-address: IP address of the logging host.
Examples
# Configure the IP address of the logging host shared by a cluster on the management device as 10.10.10.9.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] ip-pool 10.1.1.1 24 [Sysname-cluster] build aaa [aaa_0.Sysname-cluster] logging-host 10.10.10.9
management-vlan
Description
Use management-vlan to specify the management VLAN. Use undo management-vlan to restore the default.
114
By default, VLAN 1 is the management VLAN. The management VLAN must be specified before a cluster is created. Once a member device is added to a cluster, the management VLAN configuration cannot be modified. To modify the management VLAN for a device belonging to a cluster, you need to cancel the cluster-related configurations on the device, specify the desired VLAN to be the management VLAN, and then re-create the cluster. For the purpose of security, HP recommends that you configure the management VLAN as the default VLAN ID of the port connecting the management device and the member devices. Only when the default VLAN ID of all cascade ports and the port connecting the management device and the member device is the management VLAN, can the packets in the management VLAN packets be passed without a tag. Otherwise, you must configure the packets from a management VLAN to pass these ports. For the configuration procedure, see Layer 2LAN Switching Configuration Guide.
Syntax
management-vlan vlan-id undo management-vlan
View
System view
Default level
2: System level
Parameters
vlan-id: ID of the management VLAN, which ranges from 1 to 4094.
Examples
# Specify VLAN 2 as the management VLAN.
<Sysname> system-view [Sysname] management-vlan 2
Syntax
management-vlan synchronization enable undo management-vlan synchronization enable
View
Cluster view
Default level
1: Monitor level
115
Parameters
None
Examples
# Enable the management VLAN auto-negotiation function on the management device.
<aaa_0.Sysname> system-view [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] management-vlan synchronization enable
nm-interface vlan-interface
Description
Use nm-interface vlan-interface to configure the VLAN interface of the access management device (including FTP/TFTP server, management host and log host) as the network management interface of the management device.
Syntax
nm-interface vlan-interface interface-name
View
Cluster view
Default level
2: System level
Parameters
interface-name: ID of the VLAN interface. The value range is the same as that of the existing VLAN interface ID.
Examples
# Configure VLAN-interface 2 as the network management interface.
<aaa_0.Sysname> system-view [aaa_0.Sysname] cluster [aaa_0.Sysname-cluster] nm-interface vlan-interface 2
reboot member
Description
Use reboot member to reboot a specified member device. This command can be executed only on the management device. The following table shows the command and router compatibility:
116
Command
A-MSR900
A-MSR201X
A-MSR20
A-MSR50
reboot member
Syntax
reboot member { member-number | mac-address mac-address } [ eraseflash ]
View
Cluster view
Default level
2: System level
Parameters
member-number: Number of the member device. mac-address mac-address: MAC address of the member device to be rebooted, which is in the format of H-H-H. eraseflash: Deletes the configuration file when the member device reboots.
Examples
# Reboot the member device numbered 2 on the management device.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] ip-pool 10.1.1.1 24 [Sysname-cluster] build aaa [aaa_0.Sysname-cluster] reboot member 2
snmp-host
Description
Use snmp-host to configure a shared SNMP host for a cluster. Use undo snmp-host to cancel the SNMP host configuration. By default, no SNMP host is configured for a cluster. This command can be executed on the management device only.
Syntax
snmp-host ip-address [ community-string read string1 write string2 ]
117
undo snmp-host
View
Cluster view
Default level
3: Manage level
Parameters
ip-address: IP address of an SNMP host. string1: Community name of read-only access, which is a string of 1 to 26 characters. string2: Community name of read-write access, which is a string of 1 to 26 characters.
Examples
# Configure a shared SNMP host for the cluster on the management device.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] ip-pool 10.1.1.1 24 [Sysname-cluster] build aaa [aaa_0.Sysname-cluster] snmp-host 1.0.0.9 community-string read 123 write 456
tftp-server
Description
Use tftp-server to configure a shared TFTP server for a cluster. Use undo tftp-server to cancel the TFTP server of the cluster. By default, no TFTP server is configured. This command can be executed on the management device only.
Syntax
tftp-server ip-address undo tftp-server
View
Cluster view
Default level
2: System level
Parameters
ip-address: IP address of a TFTP server.
Examples
# Configure a shared TFTP server on the management device as 1.0.0.9.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] ip-pool 10.1.1.1 24 [Sysname-cluster] build aaa [aaa_0.Sysname-cluster] tftp-server 1.0.0.9
118
timer
Description
Use timer to set the interval to send handshake packets. Use undo timer to restore the default. By default, the interval to send handshake packets is 10 seconds. This command can be executed on the management device only. This configuration is valid for all member devices in a cluster.
Syntax
timer interval undo timer
View
Cluster view
Default level
2: System level
Parameters
interval: Interval (in seconds) to send handshake packets. This argument ranges from 1 to 255.
Examples
# Configure the interval to send handshake packets as 3 seconds on the management device.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] ip-pool 10.1.1.1 24 [Sysname-cluster] build aaa [aaa_0.Sysname-cluster] timer 3
topology accept
Description
Use topology accept to confirm the current topology information and save it as the standard topology. Use undo topology accept to delete the standard topology information. This command can be executed on the management device only. The file used to save standard topology on the FTP server or the local flash is named topology.top, which includes both the information of blacklist and whitelist. A blacklist contains the devices that are prohibited to be added to a cluster. A whitelist contains devices that can be added to a cluster. The following table shows the command and router compatibility:
119
Command
A-MSR900
A-MSR201X
A-MSR20
A-MSR50
topology accept
Syntax
topology accept { all [ save-to { ftp-server | local-flash } ] | mac-address mac-address | member-id member-number } undo topology accept { all | mac-address mac-address | member-id member-number }
View
Cluster view
Default level
2: System level
Parameters
all: Accepts the current cluster topology information as the standard topology information. mac-address mac-address: Specifies a device by its MAC address. The device will be accepted to join the standard topology of the cluster. member-id member-number: Specifies a device by its number. The device will be accepted to join the standard topology of the cluster. The member-number argument represents the number of a cluster member. save-to: Confirms the current topology as the standard topology, and backs up the standard topology on the FTP server or local flash in a file named topology.top.
Examples
# Take the current topology as the standard topology on the management device.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] ip-pool 10.1.1.1 24 [Sysname-cluster] build aaa [aaa_0.Sysname-cluster] topology accept all
topology restore-from
Description
Use topology restore-from to restore the standard topology information in case the cluster topology information is incorrect.
120
This command can be executed on the management device only. If the stored standard topology is not correct, the device cannot be aware of if. Therefore, you must make sure that the standard topology is correct.
Syntax
topology restore-from { ftp-server | local-flash }
View
Cluster view
Default level
2: System level
Parameters
ftp-server: Restores the standard topology information from the FTP server. local-flash: Restores the standard topology information from the local flash.
Examples
# Restore the standard topology on the management device.
<Sysname> system-view [Sysname] cluster [Sysname-cluster] ip-pool 10.1.1.1 24 [Sysname-cluster] build aaa [aaa_0.Sysname-cluster] topology restore-from local-flash
topology save-to
Description
Use topology save-to to save the standard topology information to the FTP server or the local flash. The file used to save standard topology on the FTP server or the local flash is named topology.top, which includes both the information of blacklist and whitelist. A blacklist contains the devices that are prohibited to be added to a cluster. A whitelist contains devices that can be added to a cluster. This command can be executed on the management device only.
Syntax
topology save-to { ftp-server | local-flash }
View
Cluster view
Default level
2: System level
Parameters
ftp-server: Saves the standard topology information to the FTP server. local-flash: Saves the standard topology information to the local flash.
Examples
# Save the standard topology information to the local flash on the management device.
121
<Sysname> system-view [Sysname] cluster [Sysname-cluster] ip-pool 10.1.1.1 24 [Sysname-cluster] build aaa [aaa_0.Sysname-cluster] topology save-to local-flash
122
Syntax
cwmp
View
System view
Default level
2: System level
Parameters
None
Examples
# Enter CWMP view.
<Sysname> system-view [Sysname] cwmp
Syntax
cwmp acs password passowrd undo cwmp acs password
View
CWMP view
Default level
2: System level
Parameters
password: Password used for authentication when the CPE connects to the ACS, which is a case-sensitive string of 1 to 255 characters.
123
Examples
# Configure the password used for connection to the ACS as newpsw.
<Sysname> system [Sysname] cwmp [Sysname-cwmp] cwmp acs password newpsw
Syntax
cwmp acs url url undo cwmp acs url
View
CWMP view
Default level
2: System level
Parameters
url: URL of the ACS, which is a string of 8 to 255 characters. An URL must be in the format of http://host[:port]/path, where host cannot exceed 20 characters.
Examples
Configure the ACS URL as http://www.acs.com:80/acs.
<Sysname> system [Sysname] cwmp [Sysname-cwmp] cwmp acs url http://www.acs.com:80/acs
Syntax
cwmp acs username username undo cwmp acs username
124
View
CWMP view
Default level
2: System level
Parameters
username: Username used for authentication when the CPE connects to the ACS, which is a case-sensitive string of 1 to 255 characters.
Examples
# Configure the username used for connection to the ACS as newname.
<Sysname> system [Sysname] cwmp [Sysname-cwmp] cwmp acs username newname
Syntax
cwmp cpe connect retry times undo cwmp cpe connect retry
View
CWMP view
Default level
2: System level
Parameters
times: Number of attempts that will be made to retry a connection, which ranges from 0 to 100. 0 indicates that no attempt will be made to retry a connection.
Examples
# Configure that the CPE can retry a connection for up to 5 times.
<Sysname> system [Sysname] cwmp [Sysname-cwmp] cwmp cpe connect retry 5
Syntax
cwmp cpe connect interface interface-type interface-number undo cwmp cpe connect interface
View
CWMP view
Default level
2: System level
Parameters
interface-type interface-number: Type and number of the interface used for WAN connection.
Examples
# Set the interface connecting to the ACS on the CPE to Ethernet 1/0.
<Sysname> system [Sysname] cwmp [Sysname-cwmp] cwmp cpe connect interface ethernet 1/0
Syntax
cwmp cpe inform interval seconds undo cwmp cpe inform interval
View
CWMP view
Default level
2: System level
Parameters
seconds: Interval between sending the Inform messages, which ranges from 60 to 86400 seconds.
Examples
# Configure the CPE to send an Inform message every 3600 seconds.
<Sysname> system [Sysname] cwmp [Sysname-cwmp] cwmp cpe inform interval 3600
126
Syntax
cwmp cpe inform interval enable undo cwmp cpe inform interval enable
View
CWMP view
Default level
2: System level
Parameters
None
Examples
# Enable periodical sending of Inform messages.
<Sysname> system [Sysname] cwmp [Sysname-cwmp] cwmp cpe inform interval enable
Syntax
cwmp cpe inform time time undo cwmp cpe inform time
View
CWMP view
Default level
2: System level
Parameters
time: Time at which the CPE sends an Inform message. The specified time must be in the format of yyyymm-ddThh:mm:ss, and in the range of 1970-01-01T00:00:00 to 2105-12-31T23:59:59. The specified time must be greater than the current system time.
127
Examples
# Configure the CPE to send an Inform message at 2007-12-01T20:00:00.
<Sysname> system [Sysname] cwmp [Sysname-cwmp] cwmp cpe inform time 2007-12-01T20:00:00
Syntax
cwmp cpe password password undo cwmp cpe password
View
CWMP view
Default level
2: System level
Parameters
password: Password used for authentication when the ACS connects to the CPE, which is a case-sensitive string of 1 to 255 characters.
Examples
# Configure the password used for connection to the CPE as newpsw.
<Sysname> system [Sysname] cwmp [Sysname-cwmp] cwmp cpe password newpsw
128
Syntax
cwmp cpe username username undo cwmp cpe username
View
CWMP view
Default level
2: System level
Parameters
username: Username used for authentication when the ACS connects to the CPE, which is a case-sensitive string of 1 to 255 characters.
Examples
# Configure the username used for connection to the CPE as newname.
<Sysname> system [Sysname] cwmp [Sysname-cwmp] cwmp cpe username newname
Syntax
cwmp cpe wait timeout seconds undo cwmp cpe wait timeout
View
CWMP view
Default level
2: System level
Parameters
seconds: Timeout value of the CPE close-wait timer, which ranges from 30 to 1800 seconds.
Examples
# Configure the CPE close-wait timeout as 60 seconds.
<Sysname> system [Sysname] cwmp [Sysname-cwmp] cwmp cpe wait timeout 60
129
cwmp enable
Description
Use cwmp enable to enable CWMP. Use undo cwmp enable to disable CWMP. By default, CWMP is enabled. CWMP cannot be disabled when it is performing upload or download operations.
Syntax
cwmp enable undo cwmp enable
View
CWMP view
Default level
2: System level
Parameters
None
Examples
# Disable CWMP when there is no upload or download operations.
<Sysname> system [Sysname] cwmp [Sysname-cwmp] undo cwmp enable
Syntax
display cwmp configuration [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
2: System level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
130
Examples
# CWMP is enabled. Display the configuration information of CWMP.
<Sysname> display cwmp configuration TR-069 is enabled. ACS URL ACS username ACS password Inform enable status Inform interval Inform time Wait timeout Reconnection times Source IP interface :http://www.acs.com:80/acs :newname :newpsw3 :disabled :600s :none :30s :Unlimited :none
Description
The status of CWMP (TR-069), including enabled and disabled. URL of the ACS. It is displayed as null if not configured. Authentication username for connection to the ACS. It is displayed as null if not configured. Authentication password for connection to the ACS. It is displayed as null if not configured. Enabled/disabled status of periodical sending of Inform messages Interval between sending Inform messages Date and time at which an Inform message will be sent. It is displayed as null if not configured. Timeout value for the CPE to wait for a response Number of attempts the CPE can make to retry a connection Interface connecting to the ACS on the CPE. You can set this interface with cwmp cpe connect interface.
Syntax
display cwmp status [ | { begin | exclude | include } regular-expression ]
View
Any view
131
Default level
2: System level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# CWMP is disabled. Display the status information of CWMP.
<Sysname> display cwmp status CWMP is disabled.
Description
URL of the ACS. It is displayed as null if not configured. The mode through which CWMP gets the ACS URL. It is displayed as null if ACS URL is not configured.
132
Field
Description
Connection status, includes:
uploading: The device is uploading data. downloading: The device is downloading data. none: The device is not transferring data.
Time at which the last successful connection was established. If there is no successful connection, it is displayed as none. Period of time after which the device will initiate a connection. If no interval or time is configured for Inform message sending, it is displayed as null.
133
Syntax
display ip count { inbound-packets | outbound-packets } { exterior | firewall-denied | interior } [ | { begin | exclude | include } regular-expression ]
View
Any view
Default Level
1: Monitor level
Parameters
inbound-packets: Displays information about incoming IP packets. outbound-packets: Displays information about outgoing IP packets. exterior: Displays the exterior table, which records valid rule-incompliant packets. firewall-denied: Displays information about IP packets denied by the firewall. interior: Displays the interior table, which records valid rule-compliant packets. NOTE: If no firewall is configured on the interface, valid packets refer to all incoming and outgoing IP packets. If a firewall is configured, valid packets refer to only those passing the firewall. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display information about valid rule-incompliant incoming IP packets.
<Sysname> display ip count inbound-packets exterior 6 Inbound streams information in exterior list: SrcIP 0.0.0.0 10.153.72.181 10.153.72.137 DstIP 255.255.255.255 10.153.73.255 239.255.255.250 Protocol UDP UDP UDP Pkts 28 174 4 Bytes 9502 38034 644
134
4 4 4
Description
Source IP address of a packet Destination IP address of a packet Protocol carried in a packet Number of packets Number of bytes
Syntax
display ip count rule [ | { begin | exclude | include } regular-expression ]
View
Any view
Default Level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display IP accounting rules.
<Sysname> display ip count rule IP Count rule list: IP address 1.1.1.0 2.0.0.0 Total: 2 rules address mask 255.255.255.0 255.0.0.0
------------------------------------
135
Description
Subnet address Subnet mask
ip count enable
Description
Use ip count enable to enable IP accounting. Use undo ip count enable to disable IP accounting. By default, IP accounting is disabled.
Syntax
ip count enable undo ip count enable
View
System view
Default Level
2: System level
Parameters
None
Examples
# Enable IP accounting.
<Sysname> system-view [Sysname] ip count enable
ip count exterior-threshold
Description
Use ip count exterior-threshold to configure the maximum number of flow records in the exterior table. Use undo ip count exterior-threshold to restore the default. When doing this, you are prompted to clear the table first if any flow records already exist in the table. By default, the maximum number of flow records in the exterior table is 0. Rule-incompliant packets are not to be counted.
Syntax
ip count exterior-threshold number undo ip count exterior-threshold
View
System view
136
Default Level
2: System level
Parameters
number: Maximum number of flow records in the exterior table, in the range of 0 to 8192.
Examples
# Set the maximum number of flow records in the exterior table to 100.
<Sysname> system-view [Sysname] ip count exterior-threshold 100
ip count firewall-denied
Description
Use ip count firewall-denied to capture the IP packets denied by the firewall on the current interface and store packet information in the firewall-denied table. Use undo ip count firewall-denied to restore the default. By default, IP packets denied by the firewall are not captured or stored.
Syntax
ip count firewall-denied { inbound-packets | outbound-packets } undo ip count firewall-denied { inbound-packets | outbound-packets }
View
Interface view
Default Level
2: System level
Parameters
inbound-packets: Captures the incoming IP packets denied by the firewall on the current interface. outbound-packets: Captures the outgoing IP packets denied by the firewall on the current interface.
Examples
# Capture the outgoing IP packets denied by the firewall on Ethernet 1/1 and store packet information.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] ip count firewall-denied outbound-packets
# Specify not to capture or store the outgoing IP packets denied by the firewall on Ethernet 1/1.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] undo ip count firewall-denied outbound-packets
ip count inbound-packets
Description
Use ip count inbound-packets to capture valid incoming IP packets on the current interface and store packet information in the exterior table or interior table.
137
Use undo ip count inbound-packets to restore the default. By default, valid incoming IP packets on the interface are not captured or stored. Note that the exterior table stores rule-incompliant packet information, whereas the interior table stores rule-compliant packet information. NOTE: If no firewall is configured on the interface, valid packets refer to all incoming and outgoing IP packets. If a firewall is configured, valid packets refer to only those passing the firewall.
Syntax
ip count inbound-packets undo ip count inbound-packets
View
Interface view
Default Level
2: System level
Parameters
None
Examples
# Capture valid incoming IP packets on Ethernet 1/1 and store packet information.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] ip count inbound-packets
ip count interior-threshold
Description
Use ip count interior-threshold to configure the maximum number of flow records in the interior table. Use undo ip count interior-threshold to restore the default. When doing this, you are prompted to clear the table first if the number of flow records in the table is greater than the default. By default, the maximum number of flow records in the interior table is 512.
Syntax
ip count interior-threshold number undo ip count interior-threshold
View
System view
138
Default Level
2: System level
Parameters
number: Maximum number of flow records in the interior table, in the range of 0 to 16,384.
Examples
# Set the maximum number of flow records in the interior table to 1000.
<Sysname> system-view [Sysname] ip count interior-threshold 1000
ip count outbound-packets
Description
Use ip count outbound-packets to capture valid outgoing IP packets on the current interface and store packet information in the exterior table or interior table. Use undo ip count outbound-packets to restore the default. By default, valid outgoing IP packets on the interface are not captured or stored. Note that the exterior table stores rule-incompliant packet information, whereas the interior table stores rule-compliant packet information.
Syntax
ip count outbound-packets undo ip count outbound-packets
View
Interface view
Default Level
2: System level
Parameters
None
Examples
# Capture valid outgoing IP packets on Ethernet 1/1 and store the packet information.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] ip count outbound-packets
ip count rule
Description
Use ip count rule to create an IP accounting rule. Use undo ip count rule to remove the specified IP accounting rule or all IP accounting rules. Each IP accounting rule consists of an IP address and its mask (a network address), which is the result of ANDing the IP address with its mask. IP packets are sorted as follows:
139
If incoming and outgoing IP packets are denied by the firewall configured on an interface, the packet information is in the firewall-denied table. If the source or destination IP address of the IP packets passing the interface (in this case, a firewall may be configured or not) matches a network address in the rule, the packet information is stored in the interior table. Otherwise, the packet information is stored in the exterior table. You can configure up to 32 rules. If no rule is configured, the current packets are not concerned and the packet information is stored in the exterior table.
Note that:
Syntax
ip count rule ip-address { mask | mask-length } undo ip count rule [ ip-address { mask | mask-length } ]
View
System view
Default Level
2: System level
Parameters
ip-address: IP address. mask: Subnet mask. mask-length: Length of a subnet mask, in the range of 0 to 32.
Examples
# Create an IP accounting rule.
<Sysname> system-view [Sysname] ip count rule 169.254.10.1 255.255.0.0
ip count timeout
Description
Use ip count timeout to configure aging time for flow records in the IP accounting table. Use undo ip count timeout to restore the default. By default, the aging time for a flow record is 720 minutes, or 12 hours. If a flow record does not update before the aging time expires, the record is considered expired and then deleted.
Syntax
ip count timeout minutes undo ip count timeout
View
System view
140
Default Level
2: System level
Parameters
minutes: Aging time in minutes for flow records in the accounting table, in the range of 60 to 10,080.
Examples
# Set the aging time for flow records to 100 minutes.
<Sysname> system-view [Sysname] ip count timeout 100
reset ip count
Description
Use reset ip count to clear all IP packet information.
Syntax
reset ip count { all | exterior | firewall | interior }
View
User view
Default Level
2: System level
Parameters
all: Clears all IP packet information. firewall: Clears the firewall-denied table. exterior: Clears the exterior table. interior: Clears the interior table.
Examples
# Clear all IP packet information.
<Sysname> reset ip count all
141
Syntax
display ip netstream cache [ verbose ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
verbose: Displays the detailed information of the NetStream entries in the cache. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the NetStream entry information in the cache.
<Sysname> display ip netstream cache IP netstream cache information: Stream active timeout (in minutes) Stream max entry number IP active stream entry number MPLS active stream entry number L2 active stream entry number IPL2 active stream entry number IP stream entry been counted MPLS stream entry been counted L2 stream entry been counted IPL2 stream entry been counted Last statistics reset time 1-32 64 96 128 160 192 224 : 30 : 10000 : 0 : 0 : 0 : 0 : 0 : 0 : 0 : 0 : Never 256 288 320 352 384 416 448 480 Stream inactive timeout (in seconds): 30
IP packet size distribution (63 total packets): .000 .857 .142 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000
142
512
544
576 1024 1536 2048 2560 3072 3584 4096 4608 >4608 Total Streams Packets /Sec 0 0 SrcIP(Port) SrcMAC(VLAN) Lbl-Exp-S-List 5.5.5.1(0) 5.5.5.1(179) 5.5.5.1(179) 89 6 6 192 Eth2/1(I) 0 Eth2/1(I) 192 Eth2/1(I) 32 7 14 Stream /Sec 0 0 Packets Active(sec) Idle(sec) /stream 5 2 /stream 0 0 /stream 31 31 Pkts
.000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 Protocol
---------------------------------------------------------------------------
Description
Information of NetStream entries in the cache Active aging timer in minutes for NetStream entries Inactive aging timer in seconds for NetStream entries Maximum number of flow entries allowed in the cache Number of active IP flows in the cache Number of active MPLS flows in the cache Number of active Layer 2 flows in the cache Number of active IP and Layer 2 flows in the cache Number of IP flows that are counted Number of MPLS flows that are counted Number of Layer 2 flows that are counted Number of IP and Layer 2 flows that are counted This field is an absolute time and will not change with the system time. This field is displayed only when reset ip netstream statistics is executed; otherwise, the value for this field is Never. Distribution of IP packets by packet size, and the bracketed number is the total number of IP packets The value is displayed in the proportion of number of IP packets to the total IP packets, and is displayed with 3 decimal places.
143
Field
1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480 512 544 576 1024 1536 2048 2560 3072 3584 4096 4608 >4084
Description
Range of IP packet length (excluding data link layer header), in bytes. In the range 1 to 576, the range increments in the step of 32. For example, "1-32" shows the number of packets in size of 1 to 32 bytes, and "64" shows the number of packets in size of 33 to 64 bytes. For the value greater than 1024, the range increments in the step of 512. For example, "1536" shows the number of packets in size of 1025 to 1536 bytes. Packets in size of 577 to 1024 are recorded in the 1024 entry. Statistics of packet by protocol type in the following counting criteria: protocol number, total number of flows, number of packets per second, number of flows per second, number of packets per flow, active time of each flow, inactive time of each flow Statistics of the active flows in the current cache including flow type, destination IP address (destination port), source IP address (source port), protocol, ToS, interface type and name (direction), and the number of packets
Flows are classified into the following types: IP flows, L2 flows, IPL2 flows, MPLS flows with no IP options, and MPLS flows with IP options ICMP packets do not contain port number fields, so the type and code fields are captured. The value for the destination port represents these two fields. More specifically, the highest 8 bits represent the type field and the lowest 8 bits represent the code field. The value for the source port is set to 0 and does not indicate any statistics. Layer 2 information of the active flows in the current cache, including destination MAC address, destination VLAN ID, source MAC address, and source VLAN ID Information of the active MPLS flows in the current cache, including type of the labels at the top of the label stack (IP address and mask associated with the label), and label list. A label consists of three fields:
DstMAC(VLAN)
SrcMAC(VLAN)
TopLblType(IP/MASK)
Lbl-Exp-S-List
Label field, 20 bits in length. Exp field, for QoS, three bits in length. S field, one bit in length. The value of 1 indicates that the
label is at the bottom of the label stack. At most three labels can be listed in one label list.
Syntax
display ip netstream export [ | { begin | exclude | include } regular-expression ]
144
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display statistics about NetStream data export.
<Sysname> display ip netstream export IP export information: Stream source interface Stream destination VPN-instance Stream destination IP (UDP) Version 5 exported stream number Version 9 exported stream number : Ethernet1/0 : VPN1 : 10.10.0.10 (30000) : 16 : 20
Version 5 exported UDP datagram number (failed) : 16 (0) Version 9 exported UDP datagram number (failed) : 2 (0) MPLS export information: Stream source interface Stream destination VPN-instance Stream destination IP (UDP) Version 9 exported stream number : Ethernet1/0 : VPN1 : 10.10.0.10 (30000) : 20
Version 9 exported UDP datagram number (failed) : 2 (0) as aggregation export information: Stream source interface Stream destination VPN-instance Stream destination IP (UDP) Version 8 exported stream number Version 9 exported stream number : Ethernet1/0 : VPN1 : 10.10.0.10 (30000) : 16 : 16
Version 8 exported UDP datagram number (failed) : 2 (0) Version 9 exported UDP datagram number (failed) : 2 (0)
Description
Statistics about NetStream data export in version 5 and version 9 Source interface from which the NetStream data are exported 145
Field
Stream destination vpn-instance Stream destination IP(UDP) Version 5 exported stream number Version 5 exported UDP datagram number (failed) Version 9 exported stream number Version 9 exported UDP datagram number (failed) as aggregation export information MPLS export information Version 8 exported stream number Version 8 exported UDP datagram number (failed)
Description
VPN to which the destination address of the NetStream data export belongs Destination address and port number of NetStream data export (UDP) Number of flows that are exported in version 5 format Number of UDP packets that are sent in version 5 format (number of packets not successfully sent) Number of flows that are exported in version 9 format Number of UDP packets that are sent in version 9 format (number of packets not successfully sent) Statistics about NetStream AS aggregation in version 8 format. Displayed only when NetStream AS aggregation is enabled. Statistics about MPLS-aware NetStream data export in version 9 Number of flows that are exported in version 8 format Number of UDP packets that are sent in version 8 format (number of packets not successfully sent)
Syntax
display ip netstream template [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# The NetStream aggregation mode of AS is enabled. Display information about the NetStream flow record template .
Stream template refresh-rate packet : 20
146
Stream template refresh-rate time(in minute) : 30 Active stream templates Added stream templates as outbound template: Template ID Packets Last template export time Field count Field type Flows Out packets Out bytes First switched Last switched Source AS Destination AS Input SNMP Output SNMP Direction Sampling algorithm PAD PAD Sampling interval as inbound template: Template ID Packets Last template export time Field count Field type Flows In packets In bytes First switched Last switched Source AS Destination AS Input SNMP Output SNMP Direction Sampling algorithm PAD PAD Sampling interval : 3257 : 0 : Never : 14 Field length (byte) 4 8 8 4 4 4 4 4 4 1 1 1 1 4 : 3258 : 0 : Never : 14 Field length (byte) 4 8 8 4 4 4 4 4 4 1 1 1 1 4 : 2 : 2
---------------------------------------------------------------------------
---------------------------------------------------------------------------
147
Description
Refresh frequency with which the template is sent Refresh interval in minutes at which the template is sent Number of templates that have been created
The output varies depending on the aggregation mode. The following only describes the template fields of AS aggregation mode. as outbound template as inbound template Packets Last template export time Field count Field type Field length (byte) Flows First switched Last switched Input SNMP Output SNMP Sampling interval Information of the AS template in the outbound direction Information of the AS template in the inbound direction Number of packets sent using the template. A packet may contain multiple flows and different flows may use different templates; therefore, the number of packets is in fact the number of flows. Time when the last flow record template was exported Total number of fields in a template Type of the fields contained in the flow record template Length of the field in byte Number of aggregation flows System time when the first packet was switched, in millisecond System time when the last packet was switched, in millisecond SNMP index of the input interface SNMP index of the output interface Sampling rate
enable
Description
Use enable to enable current NetStream aggregation. Use undo enable to disable current NetStream aggregation. By default, no NetStream aggregation is enabled. Related commands: ip netstream aggregation.
Syntax
enable undo enable
View
NetStream aggregation view
Default level
3: Manage level
148
Parameters
None
Examples
# Enable NetStream AS aggregation.
<Sysname> system-view [Sysname] ip netstream aggregation as [Sysname-ns-aggregation-as] enable
ip netstream
Description
Use ip netstream to enable NetStream on a specified interface. Use undo ip netstream to disable Netstream on a specified interface. By default, NetStream is disabled on an interface.
Syntax
ip netstream { inbound | outbound } undo ip netstream { inbound | outbound }
View
Interface view
Default level
3: Manage level
Parameters
inbound: Enables NetStream for incoming traffic. outbound: Enables NetStream for outgoing traffic.
Examples
# Enable NetStream for incoming traffic on interface Ethernet 1/0.
<Sysname> system-view [Sysname] interface ethernet 1/0 [Sysname-Ethernet1/0] ip netstream inbound
ip netstream aggregation
Description
Use ip netstream aggregation to set a NetStream aggregation mode and enter the NetStream aggregation view. Then in the NetStream aggregation view, you can perform the following tasks: Enable or disable the specific NetStream aggregation. Configure source interface, destination IP address, and destination port for export of NetStream data.
Related commands: enable, ip netstream export host, and ip netstream export source.
149
Syntax
ip netstream aggregation { as | destination-prefix | prefix | prefix-port | protocol-port | source-prefix | tos-as | tos-bgp-nexthop | tos-destination-prefix | tos-prefix | tos-protocol-port | tos-source-prefix }
View
System view
Default level
3: Manage level
Parameters
as: AS aggregation by source AS number, destination AS number, inbound interface index, and outbound interface index. destination-prefix: Destination-prefix aggregation by destination AS number, destination address mask length, destination prefix, and outbound interface index. prefix: Source and destination prefix aggregation by source AS number, destination AS number, source address mask length, destination address mask length, source prefix, destination prefix, inbound interface index, and outbound interface index. prefix-port: Prefix-port aggregation by source prefix, destination prefix, source address mask length, destination address mask length, ToS, protocol number, source port, destination port, inbound interface index, and outbound interface index. protocol-port: Protocol-port aggregation by protocol number, source port, and destination port. source-prefix: Source-prefix aggregation by source AS number, source address mask length, source prefix, and inbound interface index. tos-as: ToS-AS aggregation by ToS, source AS number, destination AS number, inbound interface index, and outbound interface index. tos-bgp-nexthop: ToS-BGP nexthop aggregation by ToS, BGP next hop address, and outbound interface index. ToS-BGP next hop aggregation is supported by a version 9 template. tos-destination-prefix: ToS-destination-prefix aggregation by ToS, destination AS number, destination address mask length, destination prefix, and outbound interface index. tos-prefix: ToS-prefix aggregation by ToS, source AS number, source prefix, source address mask length, destination AS number, destination address mask length, destination prefix, inbound interface index, and outbound interface index. tos-protocol-port: ToS-protocol-port aggregation by ToS, protocol number, source port, destination port, inbound interface index, and outbound interface index. tos-source-prefix: ToS-source-prefix aggregation by ToS, source AS number, source prefix, source address mask length, and inbound interface index.
Examples
# Set the NetStream aggregation mode as AS and enter the NetStream AS aggregation view.
<Sysname> system-view [Sysname] ip netstream aggregation as [Sysname-ns-aggregation-as]
150
Syntax
ip netstream export host ip-address udp-port [ vpn-instance vpn-instance-name ] undo ip netstream export host [ ip-address [ vpn-instance vpn-instance-name ] ]
View
System view, NetStream aggregation view
Default level
3: Manage level
Parameters
ip-address: Destination IP address for NetStream data export. udp-port: Destination UDP port number for NetStream data export, which ranges from 0 to 65535. vpn-instance vpn-instance-name: Specifies an MPLS L3VPN that the NetStream data export destination belongs to. The vpn-instance-name argument is a case sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this keyword and argument combination.
Examples
# Configure the destination address for NetStream data export as 172.16.105.48 with port 5000, and query routes in VPN vpn1.
<Sysname> system-view [Sysname] ip netstream export host 172.16.105.48 5000 vpn-instance vpn1
151
Syntax
ip netstream export rate rate undo ip netstream export rate
View
System view
Default level
3: Manage level
Parameters
rate: Maximum rate for exporting NetStream data, in the unit of the maximum number of packets per second. It ranges from 1 to 1000.
Examples
# Allow 10 packets at most to be exported per second.
<Sysname> system-view [Sysname] ip netstream export rate 10
Syntax
ip netstream export source interface interface-type interface-number undo ip netstream export source
View
System view, NetStream aggregation view
152
Default level
3: Manage level
Parameters
interface-type interface-number: Specifies a source interface for NetStream data export by its type and number.
Examples
# Configure the source interface for NetStream data export as Ethernet 1/0.
<Sysname> system-view [Sysname] ip netstream export source interface ethernet 1/0
Syntax
ip netstream export v9-template refresh-rate packet packets undo ip netstream export v9-template refresh-rate packet
View
System view
Default level
3: Manage level
Parameters
packets: Specifies the number of packets that are sent before version 9 templates are sent to the NetStream server for an update. It ranges from 1 to 600.
Examples
# Configure the device to wait until 100 packets are sent before sending NetStream version 9 templates again to the NetStream server.
<Sysname> system-view [Sysname] ip netstream export v9-template refresh-rate packet 100
153
Syntax
ip netstream export v9-template refresh-rate time minutes undo ip netstream export v9-template refresh-rate time
View
System view
Default level
3: Manage level
Parameters
minutes: Specifies the refresh interval in minutes that the device waits after NetStream version 9 templates are sent to the NetStream server. It ranges from 1 to 3600.
Examples
# Configure the device to wait for 60 minutes before sending NetStream version 9 templates again to the NetStream server.
<Sysname> system-view [Sysname] ip netstream export v9-template refresh-rate time 60
By default, NetStream traditional data export uses version 5 format; NetStream aggregation data export uses version 8 format; MPLS flow data are not exported; the peer AS numbers are exported; the BGP next hop is not exported.
Syntax
ip netstream export version 5 [ origin-as | peer-as ] ip netstream export version 9 [ origin-as | peer-as ] [ bgp-nexthop ] undo ip netstream export version
View
System view
Default level
3: Manage level
Parameters
origin-as: Exports statistics of the source AS originating the route for the source address, and the destination AS for the destination address. peer-as: Exports statistics of the peer ASs for the source and destination address . bgp-nexthop: Exports statistics about BGP next hops.
Examples
# Configure the device to export NetStream data in version 5 format and specify the NetStream data to include the source AS and destination AS.
<Sysname> system-view [Sysname] ip netstream export version 5 origin-as
ip netstream filter
Description
Use ip netstream filter to enable ACL-based NetStream filtering in the inbound or outbound direction of an interface. Use undo ip netstream filter to disable the function. By default, NetStream filtering is disabled. NetStream collects statistics about all IPv4 packets passing through the interface. NOTE: The NetStream filtering function is not effective to MPLS packets. If NetStream filtering and sampling are both configured, packets are filtered first and then the permitted packets
are sampled.
An ACL must be created and contain rules before being referenced by NetStream filtering. An ACL that is
referenced by NetStream filtering cannot be deleted or modified. For more information about ACLs, see ACL and QoS Configuration Guide.
Syntax
ip netstream filter acl acl-number { inbound | outbound } undo ip netstream filter acl acl-number { inbound | outbound }
155
View
Interface view
Default level
3: Manage level
Parameters
acl acl-number: ACL number, which ranges from 2000 to 3999. inbound: Enables NetStream filtering in the inbound direction. outbound: Enables NetStream filtering in the outbound direction.
Examples
# Reference ACL 2003 to enable NetStream filtering in the outbound direction of Ethernet 1/0.
<Sysname> system-view [Sysname] interface ethernet 1/0 [Sysname-Ethernet1/0] ip netstream outbound [Sysname-Ethernet1/0] ip netstream filter acl 2003 outbound
ip netstream max-entry
Description
Use ip netstream max-entry to configure the maximum number of NetStream entries that the cache can accommodate. Use undo ip netstream max-entry to restore the default. By default, the maximum number of NetStream entries in the cache is 10000.
Syntax
ip netstream max-entry max-entries undo ip netstream max-entry
View
System view
Default level
3: Manage level
Parameters
max-entries: Specifies maximum number of entries that the cache can save. The value ranges from 1000 to 100000.
Examples
# Set the maximum entries in the cache to 5000.
<Sysname> system-view [Sysname] ip netstream max-entry 5000
156
ip netstream mpls
Description
Use ip netstream mpls to collect and export statistics on MPLS packets. If you do not provide any arguments, the top label and IP fields are also counted. If the no-ip-fields keyword is provided, the command exports data about MPLS packet only. Use undo ip netstream mpls to disable counting and exporting of MPLS packets. By default, counting and exporting of MPLS packets are disabled. The ip netstream mpls enables statistics collection of MPLS packets for both IPv4 and IPv6 NetStream.
Syntax
ip netstream mpls [ label-positions label-position1 [ label-position2 [ label-position3 ] ] ] [ no-ip-fields ] undo ip netstream mpls
View
System view
Default level
3: Manage level
Parameters
label-positions: Specifies position of the labels to be counted. no-ip-fields: Specifies not to count IP fields. label-position1: Specifies the position of the first label in the label stack, which ranges from 1 to 6. label-position2: Specifies the position of the second label in the label stack, which ranges from 1 to 6. label-position3: Specifies the position of the third label in the label stack, which ranges from 1 to 6. NOTE: Do not assign the label positions the same value.
Examples
# Enable NetStream of MPLS packets with top label counted and exported, but without IP fields.
<Sysname> system-view [Sysname] ip netstream mpls no-ip-fields
ip netstream sampler
Description
Use ip netstream sampler to enable NetStream sampling. Use undo ip netstream sampler to disable NetStream sampling. By default, NetStream sampling is disabled.
Syntax
ip netstream sampler sampler-name { inbound | outbound } undo ip netstream sampler sampler-name { inbound | outbound }
157
View
Interface view
Default level
3: Manage level
Parameters
sampler sampler-name: Sampler name, which is a string of up to 32 characters. inbound: Enables NetStream sampling in the inbound direction. outbound: Enables NetStream sampling in the outbound direction.
Examples
# Enable NetStream sampling in the inbound direction of Ethernet 1/0 by referencing sampler abc.
<Sysname> system-view [Sysname] interface ethernet 1/0 [Sysname-Ethernet1/0] ip netstream inbound [Sysname-Ethernet1/0] ip netstream sampler abc inbound
Syntax
ip netstream timeout active minutes undo ip netstream timeout active
View
System view
Default level
3: Manage level
Parameters
minutes: Sets the aging timer for active flows in minutes. It ranges from 1 to 60.
Examples
# Set the aging timer to 60 minutes for active flows.
<Sysname> system-view
158
Syntax
ip netstream timeout inactive seconds undo ip netstream timeout inactive
View
System view
Default level
3: Manage level
Parameters
seconds: Sets the aging timer for inactive flows, in seconds. It ranges from 10 to 600.
Examples
# Set the aging timer to 60 seconds for inactive flows.
<Sysname> system-view [Sysname] ip netstream timeout inactive 60
Syntax
reset ip netstream statistics
View
User view
Default level
2: System level
159
Parameters
None
Examples
# Age out and export all NetStream data and clear the cache.
<Sysname> reset ip netstream statistics This process may take a few minutes. Netstream statistic function is disabled during this process.
160
Syntax
advantage-factor factor undo advantage-factor
View
Voice test type view
Default level
2: System level
Parameters
factor: Advantage factor, used to count MOS and ICPIF values. It ranges from 0 to 20.
Examples
# Configure the advantage factor for a voice test as 10.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type voice [Sysname-nqa-admin-test-voice] advantage-factor 10
codec-type
Description
Use codec-type to configure the codec type for a voice test. Use undo codec-type to restore the default. By default, the codec type for a voice test is G.71 A-law. 1
161
Syntax
codec-type { g71 | g71 | g729a } 1a 1u undo codec-type
View
Voice test type view
Default level
2: System level
Parameters
g71 1a: G.71 A-law codec type. 1 g71 1u: G.71 -law codec type 1 g729a: G.729 A-law codec type.
Examples
# Configure the codec type for a voice test as g729a.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type voice [Sysname-nqa-admin-test-voice] codec-type g729a
data-fill
Description
Use data-fill to configure the string to be filled in the data field of a probe packet. Use undo data-fill to restore the default. By default, the string is the hexadecimal number 00010203040506070809. If the data field length is smaller than the string length, only the first part of the string is filled. For example, if you configure the string as abcd and the data field size as 3 bytes, abc is filled. If the data field length is greater than the string length, the system fills the data field with the string cyclically until the data field is full. For example, if you configure the string as abcd and the data field size as 6 bytes, abcdab is filled. For ICMP echo tests, the string fills the whole data field of ICMP echo requests. For UDP echo tests, the first five bytes of the data field of a UDP packet are for special purpose, so the string fills the remaining part of data field. For UDP jitter tests, the first 68 bytes of the data field of a UDP packet are for special purpose, so the string fills the remaining part of the data field. For voice tests, the first 16 bytes of the data field of a UDP packet are for special purpose, so the string fills the remaining part of the data field.
Syntax
data-fill string undo data-fill
162
View
ICMP echo, UDP echo, UDP jitter, voice test type view
Default level
2: System level
Parameters
string: A case-sensitive string of 1 to 200 characters.
Examples
# Configure string abcd to be filled in the data field of an ICMP echo request.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] data-fill abcd
data-size
Description
Use data-size to configure the size of the data field in each ICMP echo request of the ICMP echo tests or in each UDP packet of UDP echo, UDP jitter, or voice tests. Use undo data-size to restore the default. Table 37 Default values of the size of a probe packet Test type
ICMP echo UDP echo UDP jitter Voice Voice Voice
Codec type
G.711 A-law G.711 -law G.729 A-law
Syntax
data-size size undo data-size
View
ICMP echo, UDP echo, UDP jitter, voice test type view
Default level
2: System level
Parameters
size: Size of the data field in a probe packet in bytes. It ranges from 20 to 8100 for probe packets of ICMP echo or UDP echo tests, from 68 to 8100 for probe packets of UDP jitter tests, and from 16 to 1500 for probe packets of voice tests.
163
Examples
# Configure the size of the data field in an ICMP echo request as 80 bytes.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] data-size 80
Syntax
description text undo description
View
Any NQA test type view
Default level
2: System level
Parameters
text: A case-sensitive string of 1 to 200 characters, used to describe a test group.
Examples
# Configure the descriptive string for a test group as icmp-probe.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] description icmp-probe
destination ip
Description
Use destination ip to configure a destination IP address for a test operation. Use undo destination ip to remove the configured destination IP address. By default, no destination IP address is configured for a test operation.
Syntax
destination ip ip-address undo destination ip
164
View
DLSw, FTP, DNS, HTTP, ICMP echo, SNMP, TCP, UDP echo, UDP jitter, voice test type view
Default level
2: System level
Parameters
ip-address: Destination IP address of a test operation.
Examples
# Configure the destination IP address of an ICMP echo test operation as 10.1.1.1.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] destination ip 10.1.1.1
destination port
Description
Use destination port to configure a destination port number for a test operation. Use undo destination port to remove the configured destination port number. By default, no destination port number is configured for a test operation. Do not perform a UDP jitter test and a voice test on ports from 1 to 1023 (known ports). Otherwise, the NQA test fails or the corresponding services of this port are unavailable.
Syntax
destination port port-number undo destination port
View
TCP, UDP echo, UDP jitter, voice test type view
Default level
2: System level
Parameters
port-number: Destination port number of a test operation, which ranges from 1 to 65535.
Examples
# Configure the destination port number of a test operation as 9000.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-echo [Sysname-nqa-admin-test-udp-echo] destination port 9000
165
Syntax
display nqa history [ admin-name operation-tag ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
admin-name operation-tag: Displays history records of an NQA test group. If these two arguments are not specified, history records of all test groups are displayed. admin-name represents the name of the NQA test group administrator who creates the NQA operation. It is a case-insensitive string of 1 to 32 characters. operation-tag represents the test operation tag. It is a case-insensitive string of 1 to 32 characters. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the history records of the NQA test group in which the administrator name is administrator, and the operation tag is test.
<Sysname> display nqa history administrator test NQA entry (admin administrator, tag test) history record(s): Index 10 9 8 7 6 5 4 3 2 1 Response 329 344 328 328 328 328 328 328 328 328 Status Succeeded Succeeded Succeeded Succeeded Succeeded Succeeded Succeeded Succeeded Succeeded Succeeded Time 2007-04-29 20:54:26.5 2007-04-29 20:54:26.2 2007-04-29 20:54:25.8 2007-04-29 20:54:25.5 2007-04-29 20:54:25.1 2007-04-29 20:54:24.8 2007-04-29 20:54:24.5 2007-04-29 20:54:24.1 2007-04-29 20:54:23.8 2007-04-29 20:54:23.4
166
Description
History record number Round-trip delay of a test packet in the case of a successful test, timeout time in the case of timeout, or 0 in the case that a test cannot be completed (in milliseconds) Status value of test results, which can be one of the following values:
Status
Time
Syntax
display nqa reaction counters [ admin-name operation-tag [ item-number ] ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
admin-name operation-tag: Displays current monitoring results of reaction entries in a test group. If these two arguments are not specified, monitoring results of all reaction entries of all test groups are displayed. admin-name represents the name of the NQA test group administrator who creates the NQA operation. It is a case-insensitive string of 1 to 32 characters. operation-tag represents the test operation tag. It is a case-insensitive string of 1 to 32 characters. item-number: Displays current monitoring results of a specified reaction entry. If this argument is not provided, results of all reaction entries are displayed. item-number represents the ID of the reaction entry, in the range of 1 to 10. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression.
167
include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the monitoring results of all reaction entries in an ICMP echo test group, in which the administrator name is admin, and the operation tag is test.
<Sysname> display nqa reaction counters admin test NQA entry (admin admin, tag test) reaction counters: Index 1 2 3 4 5 Checked Element probe-duration probe-duration probe-duration probe-fail probe-fail Threshold Type accumulate average consecutive accumulate consecutive Checked Num 12 160 12 162 Over-threshold Num 4 56 0 2
Description
ID of a reaction entry Monitored element Threshold type Number of targets that have been monitored for data collection Number of threshold violations
Table 40 Description on the threshold monitoring fields of the display nqa reaction counters command Monitored element Threshold type Collect data in Checked Num
Number of finished probes since the test group starts Number of finished probes since the test group starts Number of finished probes since the test group starts Number of finished probes since the test group starts
Over-threshold Num
Number of probes of which the duration exceeds the threshold since the test group starts Number of probes of which the duration exceeds the threshold since the test group starts Number of probe failures since the test group starts Number of probe failures since the test group starts
accumulate
probe-duration
average
consecutive
Probes since the test group starts Probes since the test group starts
168
Monitored element
Threshold type
Collect data in
Checked Num
Number of packets sent since the test group starts Number of packets sent since the test group starts Number of packets sent since the test group starts Number of packets sent since the test group starts
Over-threshold Num
Number of packets of which the round-trip time exceeds the threshold since the test group starts Number of packets of which the one-way delay jitter exceeds the threshold since the test group starts Number of packets of which the one-way delay exceeds the threshold since the test group starts Total packet loss since the test group starts
RTT
accumulate
average
jitter-DS/jitter-SD
accumulate
average
OWD-DS/OWDSD
accumulate
Syntax
display nqa result [ admin-name operation-tag ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
admin-name operation-tag: Displays results of the last test of a test group. If these two arguments are not specified, results of the last tests of all test groups are displayed. admin-name represents the name of the NQA test group administrator who creates the NQA operation. It is a case-insensitive string of 1 to 32 characters. operation-tag represents the test operation tag. It is a case-insensitive string of 1 to 32 characters. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.
169
begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the results of the last UDP jitter test.
<Sysname> display nqa result admin test NQA entry (admin admin, tag test) test results: Destination IP address: 192.168.1.42 Send operation times: 10 Square-Sum of round trip time: 8103 Last succeeded probe time: 2008-05-29 10:56:38.7 Extended results: Packet loss in test: 0% Failures due to timeout: 0 Failures due to disconnect: 0 Failures due to no connection: 0 Failures due to sequence error: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packet(s) arrived late: 0 UDP-jitter results: RTT number: 10 Min positive SD: 8 Max positive SD: 18 Positive SD number: 5 Positive SD sum: 75 Positive SD average: 15 Positive SD square sum: 1189 Min negative SD: 8 Max negative SD: 24 Negative SD number: 4 Negative SD sum: 56 Negative SD average: 14 Negative SD square sum: 946 One way results: Max SD delay: 22 Min SD delay: 7 Number of SD delay: 10 Sum of SD delay: 125 Square sum of SD delay: 1805 SD lost packet(s): 0 Lost packet(s) for unknown reason: 0 Max DS delay: 23 Min DS delay: 7 Number of DS delay: 10 Sum of DS delay: 132 Square sum of DS delay: 1988 DS lost packet(s): 0 Min positive DS: 8 Max positive DS: 8 Positive DS number: 2 Positive DS sum: 32 Positive DS average: 16 Positive DS square sum: 640 Min negative DS: 1 Max negative DS: 30 Negative DS number: 7 Negative DS sum: 99 Negative DS average: 14 Negative DS square sum: 1495 Receive response times: 10 Min/Max/Average round trip time: 15/46/26
170
NQA entry (admin admin, tag test) test results: Destination IP address: 192.168.1.42 Send operation times: 1000 Square-Sum of round trip time: 0 Last succeeded probe time: 0-00-00 00:00:00.0 Extended results: Packet loss in test: 100% Failures due to timeout: 1000 Failures due to disconnect: 0 Failures due to no connection: 0 Failures due to sequence error: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packet(s) arrived late: 0 Voice results: RTT number: 0 Min positive SD: 0 Max positive SD: 0 Positive SD number: 0 Positive SD sum: 0 Positive SD average: 0 Positive SD square sum: 0 Min negative SD: 0 Max negative SD: 0 Negative SD number: 0 Negative SD sum: 0 Negative SD average: 0 Negative SD square sum: 0 One way results: Max SD delay: 0 Min SD delay: 0 Number of SD delay: 0 Sum of SD delay: 0 Square sum of SD delay: 0 SD lost packet(s): 0 Voice scores: MOS value: 0.99 ICPIF value: 87 Max DS delay: 0 Min DS delay: 0 Number of DS delay: 0 Sum of DS delay: 0 Square sum of DS delay: 0 DS lost packet(s): 0 Min positive DS: 0 Max positive DS: 0 Positive DS number: 0 Positive DS sum: 0 Positive DS average: 0 Positive DS square sum: 0 Min negative DS: 0 Max negative DS: 0 Negative DS number: 0 Negative DS sum: 0 Negative DS average: 0 Negative DS square sum: 0 Receive response times: 0 Min/Max/Average round trip time: 0/0/0
Description
IP address of the destination Number of probe packets sent Number of response packets received
171
Field
Min/Max/Average round trip time Square-Sum of round trip time Last succeeded probe time Packet loss in test Failures due to timeout Failures due to disconnect Failures due to no connection Failures due to sequence error Failures due to internal error Failures due to other errors Packet(s) arrived late UDP-jitter results Voice results RTT number Min positive SD Min positive DS Max positive SD Max positive DS Positive SD number Positive DS number Positive SD sum Positive DS sum Positive SD average Positive DS average Positive SD square sum Positive DS square sum Min negative SD Min negative DS Max negative SD Max negative DS Negative SD number Negative DS number
Description
Minimum/maximum/average round-trip time in the unit of millisecond Square sum of round-trip time Time when the last successful probe was finished Average packet loss ratio Number of timeout occurrences in a test Number of disconnections by the peer Number of failures to connect with the peer Number of failures owing to out-of-sequence packets Number of failures owing to internal errors Failures due to other errors Number of packets that arrived late UDP jitter test results, available only in UDP jitter tests. Voice test results, available only in voice tests. Number of response packets received Minimum positive delay jitters from source to destination Minimum positive delay jitters from destination to source Maximum positive delay jitters from source to destination Maximum positive delay jitters from destination to source Number of positive delay jitters from source to destination Number of positive delay jitters from destination to source Sum of positive delay jitter from source to destination Sum of positive delay jitters from destination to source Average of positive delay jitter from source to destination Average of positive delay jitter from destination to source Square sum of positive delay jitters from source to destination Square sum of positive delay jitters from destination to source Minimum absolute value among negative delay jitters from source to destination Minimum absolute value among negative delay jitters from destination to source Maximum absolute value among negative delay jitters from source to destination Maximum absolute value among negative delay jitters from destination to source Number of negative delay jitters from source to destination Number of negative delay jitters from destination to source 172
Field
Negative SD sum Negative DS sum Negative SD average Negative DS average Negative SD square sum Negative DS square sum One way results Max SD delay Max DS delay Min SD delay Min DS delay Number of SD delay Number of DS delay Sum of SD delay Sum of DS delay Square sum of SD delay Square sum of DS delay SD lost packet(s) DS lost packet(s) Lost packet(s) for unknown reason Voice scores MOS value ICPIF value
Description
Sum of absolute values of negative delay jitters from source to destination Sum of absolute values of negative delay jitters from destination to source Average absolute value of negative delay jitters from source to destination Average absolute value of negative delay jitters from destination to source Square sum of negative delay jitters from source to destination Square sum of negative delay jitters from destination to source Uni-direction delay test result, displayed in a UDP jitter or voice test Maximum delay from source to destination Maximum delay from destination to source Minimum delay from source to destination Minimum delay from destination to source Number of delays from source to destination Number of delays from destination to source Sum of delays from source to destination Sum of delays from destination to source Square sum of delays from source to destination Square sum of delays from destination to source Number of lost packets from the source to the destination Number of lost packets from the destination to the source Number of lost packets for unknown reasons Voice parameters, displayed only in a voice test MOS value calculated for a voice test ICPIF value calculated for a voice test
Syntax
display nqa statistics [ admin-name operation-tag ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
admin-name operation-tag: Displays statistics of the specified test group. If these two arguments are not specified, statistics of all test groups are displayed. admin-name represents the name of the NQA test group administrator who creates the NQA operation. It is a case-insensitive string of 1 to 32 characters. operation-tag represents the test operation tag. It is a case-insensitive string of 1 to 32 characters. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display statistics of UDP jitter tests.
<Sysname> display nqa statistics admin test NQA entry (admin admin, tag test) test statistics: NO. : 1 Destination IP address: 1.1.1.2 Start time: 2007-01-01 09:33:22.3 Life time: 23 seconds Send operation times: 100 Square-Sum of round trip time: 24360 Extended results: Packet loss in test: 0% Failures due to timeout: 0 Failures due to disconnect: 0 Failures due to no connection: 0 Failures due to sequence error: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packet(s) arrived late: 0 UDP-jitter results: RTT number: 550 Min positive SD: 1 Max positive SD: 7 Positive SD number: 220 Min positive DS: 1 Max positive DS: 1 Positive DS number: 97 Receive response times: 100 Min/Max/Average round trip time: 1/11/5
174
Positive SD sum: 283 Positive SD average: 1 Positive SD square sum: 709 Min negative SD: 2 Max negative SD: 10 Negative SD number: 81 Negative SD sum: 556 Negative SD average: 6 Negative SD square sum: 4292 One way results: Max SD delay: 5 Min SD delay: 1 Number of SD delay: 550 Sum of SD delay: 1475 Square sum of SD delay: 5407 SD lost packet(s): 0 Lost packet(s) for unknown reason: 0 Reaction statistics: Index 1 2 3 4 5 6 Checked Element jitter-DS jitter-SD OWD-DS OWD-SD packet-loss RTT Threshold Type accumulate average accumulate accumulate
Positive DS sum: 287 Positive DS average: 2 Positive DS square sum: 1937 Min negative DS: 1 Max negative DS: 1 Negative DS number: 94 Negative DS sum: 191 Negative DS average: 2 Negative DS square sum: 967 Max DS delay: 5 Min DS delay: 1 Number of DS delay: 550 Sum of DS delay: 1201 Square sum of DS delay: 3959 DS lost packet(s): 0
Over-threshold Num 25 24 13 0 52
175
Max positive SD: 10 Positive SD number: 3 Positive SD sum: 18 Positive SD average: 6 Positive SD square sum: 134 Min negative SD: 3 Max negative SD: 9 Negative SD number: 4 Negative SD sum: 25 Negative SD average: 6 Negative SD square sum: 187 One way results: Max SD delay: 0 Min SD delay: 0 Number of SD delay: 0 Sum of SD delay: 0 Square sum of SD delay: 0 SD lost packet(s): 0 Lost packet(s) for unknown reason: 0 Voice scores: Max MOS value: 4.40 Max ICPIF value: 0 Reaction statistics: Index 1 2 Checked Element ICPIF MOS Threshold Type -
Max positive DS: 1 Positive DS number: 2 Positive DS sum: 2 Positive DS average: 1 Positive DS square sum: 2 Min negative DS: 1 Max negative DS: 1 Negative DS number: 2 Negative DS sum: 2 Negative DS average: 1 Negative DS square sum: 2 Max DS delay: 0 Min DS delay: 0 Number of DS delay: 0 Sum of DS delay: 0 Square sum of DS delay: 0 DS lost packet(s): 0
Min MOS value: 4.40 Min ICPIF value: 0 Checked Num Over-threshold Num -
Description
Statistics group number IP address of the destination Time when the test group starts Duration of the test, in seconds Number of probe packets sent Number of response packets received Minimum/maximum/average round-trip time in the unit of millisecond Square sum of round-trip time Average packet loss ratio Number of timeout occurrences in a test Number of disconnections by the peer Number of failures to connect with the peer Number of failures owing to out-of-sequence packets
176
Field
Failures due to internal error Failures due to other errors Packet(s) arrived late UDP-jitter results Voice results RTT number Min positive SD Min positive DS Max positive SD Max positive DS Positive SD number Positive DS number Positive SD sum Positive DS sum Positive SD average Positive DS average Positive SD square sum Positive DS square sum Min negative SD Min negative DS Max negative SD Max negative DS Negative SD number Negative DS number Negative SD sum Negative DS sum Negative SD average Negative DS average Negative SD square sum Negative DS square sum One way results Max SD delay
Description
Number of failures owing to internal errors Failures due to other errors Number of response packets received after a probe times out UDP jitter test results, available only in UDP jitter tests. Voice test results, available only in voice tests. Number of response packets received Minimum positive delay jitter from source to destination Minimum positive delay jitter from destination to source Maximum positive delay jitter from source to destination Maximum positive delay jitter from destination to source Number of positive delay jitters from source to destination Number of positive delay jitters from destination to source Sum of positive delay jitters from source to destination Sum of positive delay jitters from destination to source Average of positive delay jitters from source to destination Average of positive delay jitters from destination to source Square sum of positive delay jitters from source to destination Square sum of positive delay jitters from destination to source Minimum absolute value among negative delay jitters from source to destination Minimum absolute value among negative delay jitters from destination to source Maximum absolute value among negative delay jitters from source to destination Maximum absolute value among negative delay jitters from destination to source Number of negative delay jitters from source to destination Number of negative delay jitters from destination to source Sum of absolute values of negative delay jitters from source to destination Sum of absolute values of negative delay jitters from destination to source Average absolute value of negative delay jitters from source to destination Average absolute value of negative delay jitters from destination to source Square sum of negative delay jitters from source to destination Square sum of negative delay jitters from destination to source Uni-direction delay test result, displayed on in a UDP-Jitter or voice test Maximum delay from source to destination
177
Field
Max DS delay Min SD delay Min DS delay Number of SD delay Number of DS delay Sum of SD delay Sum of DS delay Square sum of SD delay Square sum of DS delay SD lost packet(s) DS lost packet(s) Lost packet(s) for unknown reason Voice scores Max MOS value Min MOS value Max ICPIF value Min ICPIF value Reaction statistics Index Checked Element Threshold Type Checked Num Over-threshold Num
Description
Maximum delay from destination to source Minimum delay from source to destination Minimum delay from destination to source Number of delays from source to destination Number of delays from destination to source Sum of delays from source to destination Sum of delays from destination to source Square sum of delays from source to destination Square sum of delays from destination to source Number of lost packets from the source to the destination Number of lost packets from the destination to the source Number of lost packets for unknown reasons Voice parameters, displayed only in a voice test Maximum MOS value Minimum MOS value Maximum ICPIF value Minimum ICPIF value Statistics about the reaction entry in the counting interval ID of a reaction entry Monitored element Threshold type Number of targets that have been monitored for data collection Number of threshold violations
Table 43 Description on the threshold monitoring fields of the display nqa statistics command Monitored element Threshold type
accumulate
Collect data in
Probes in the counting interval Probes in the counting interval
Checked Num
Number of finished probes in the counting interval Number of finished probes in the counting interval
Over-threshold Num
Number of probes of which the duration exceeds the threshold in the counting interval Number of probes of which the duration exceeds the threshold in the counting interval
probe-duration
average
consecutive
178
Monitored element
Threshold type
accumulate
Collect data in
Probes in the counting interval Probes in the counting interval
Checked Num
Number of finished probes in the counting interval Number of finished probes in the counting interval Number of packets sent in the counting interval Number of packets sent in the counting interval Number of packets sent in the counting interval Number of packets sent in the counting interval
Over-threshold Num
Number of probe failures in the counting interval Number of probe failures in the counting interval Number of packets of which the round-trip time exceeds the threshold in the counting interval Number of packets of which the one-way delay jitter exceeds the threshold in the counting interval Number of packets of which the one-way delay exceeds the threshold in the counting interval Number of packet loss in the counting interval
probe-fail consecutive
RTT
accumulate
Packets sent in the counting interval Packets sent in the counting interval Packets sent in the counting interval Packets sent in the counting interval
average
jitter-DS/jitter-SD
accumulate
average
OWD-DS/OWD-SD
accumulate
filename
Description
Use filename to specify a file to be transferred between the FTP server and the FTP client. Use undo filename to restore the default. By default, no file is specified.
Syntax
filename filename undo filename
View
FTP test type view
179
Default level
2: System level
Parameters
filename: Name of the file transferred between the FTP server and the FTP client. The file name is a casesensitive string of 1 to 200 characters.
Examples
# Specify the file to be transferred between the FTP server and the FTP client as config.txt.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] filename config.txt
frequency
Description
Use frequency to configure the interval between two consecutive tests for a test group. When a test group starts, it performs tests one by one at the specified interval. However, if a test is not completed when the interval is reached, no new test starts. Use undo frequency to restore the default. By default, the interval between two consecutive voice tests is 60000 milliseconds, and the interval between two consecutive tests of other types is 0 milliseconds.
Syntax
frequency interval undo frequency
View
Any NQA test type view
Default level
2: System level
Parameters
interval: Interval between two consecutive tests, in the range of 0 to 604800000 milliseconds. The interval of 0 specifies the test group to perform only one test, and no statistics group information is collected.
Examples
# Configure the ICMP echo test group starts tests one by one at an interval of 1000 milliseconds.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] frequency 1000
180
history-record enable
Description
Use history-record enable to enable the saving of history records of an NQA test group. Use undo history-record enable to disable the history records saving function. By default, history records of an NQA test group are not saved. If the history records saving function is enabled, the system saves the history records. To view the history records of the NQA test group, use the display nqa history command. If the history records saving function is disabled, the system does not save the history records of the NQA test group and the existing history records are also removed. Related commands: display nqa history.
Syntax
history-record enable undo history-record enable
View
Any NQA test type view
Default level
2: System level
Parameters
None
Examples
# Enable the history records saving function of an NQA test group.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] history-record enable
history-record keep-time
Description
Use history-record keep-time to set the lifetime of the history records in an NQA test group. Use undo history-record keep-time to restore the default. By default, the history records in an NQA test group are kept for 120 minutes. When an NQA test completes, the timing starts. All the records are removed when the lifetime is reached.
Syntax
history-record keep-time keep-time undo history-record keep-time
181
View
Any NQA test type view
Default level
2: System level
Parameters
keep-time: Specifies how long the history records can be saved. The time ranges from 1 to 1440 minutes.
Examples
# Configure the lifetime of the history records in an NQA test group as 100 minutes.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] history-record keep-time 100
history-record number
Description
Use history-record number to configure the maximum number of history records that can be saved in a test group. Use undo history-record number to restore the default. By default, the maximum number of records that can be saved in a test group is 50. If the number of history records in a test group exceeds the maximum number, the earliest history record is removed.
Syntax
history-record number number undo history-record number
View
Any NQA test type view
Default level
2: System level
Parameters
number: Maximum number of history records that can be saved in a test group, which ranges from 0 to 50.
Examples
# Configure the maximum number of history records that can be saved in a test group as 10.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] history-record number 10
182
http-version
Description
Use http-version to configure the HTTP version used in an HTTP test. Use undo http-version to restore the default. By default, HTTP 1.0 is used in an HTTP test.
Syntax
http-version v1.0 undo http-version
View
HTTP test type view
Default level
2: System level
Parameters
v1.0: The HTTP version is 1.0 in an HTTP test.
Examples
# Configure the HTTP version as 1.0 in an HTTP test.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] http-version v1.0
mode
Description
Use mode to set the data transmission mode for FTP tests. Use undo mode to restore the default. By default, the data transmission mode is active.
Syntax
mode { active | passive } undo mode
View
FTP test type view
Default level
2: System level
Parameters
active: Sets the data transmission mode to active for FTP tests. In this mode, the FTP server initiates a data connection request.
183
passive: Sets the data transmission mode to passive for FTP tests. In this mode, a client initiates a data connection request.
Examples
# Set the data transmission mode to passive for FTP tests.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] mode passive
next-hop
Description
Use next-hop to configure the next hop IP address for ICMP echo requests of a test group. Use undo next-hop to remove the configured next hop IP address. By default, no next hop IP address is configured.
Syntax
next-hop ip-address undo next-hop
View
ICMP echo test type view
Default level
2: System level
Parameters
ip-address: IP address of the next hop.
Examples
# Configure the next hop IP address as 10.1.1.1.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] next-hop 10.1.1.1
nqa
Description
Use nqa to create an NQA test group and enter NQA test group view. Use undo nqa to remove the test group. If the test type has been configured for the test group, you directly enter NQA test type view when you execute the nqa command.
Syntax
nqa entry admin-name operation-tag undo nqa { all | entry admin-name operation-tag }
184
View
System view
Default level
2: System level
Parameters
admin-name: Specifies the name of the NQA test group administrator who creates the NQA test operation, a case-insensitive string of 1 to 32 characters, with - excluded. operation-tag: Specifies the tag of a test operation, a case-insensitive string of 1 to 32 characters, with - excluded. all: All NQA test groups.
Examples
# Create an NQA test group whose administrator name is admin and whose operation tag is test and enter NQA test group view.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test]
Syntax
nqa agent enable undo nqa agent enable
View
System view
Default level
2: System level
Parameters
None
Examples
# Enable the NQA client.
<Sysname> system-view [Sysname] nqa agent enable
185
A-MSR20-1X
Value range: 1 to 50 Default: 5
A-MSR20
Value range: 1 to 50 Default: 5
A-MSR30
Value range: 1 to 200 Default: 20
A-MSR50
Value range: 1 to 500 Default: 80
Syntax
nqa agent max-concurrent number undo nqa agent max-concurrent
View
System view
Default level
2: System level
Parameters
number: Maximum number of the tests that the NQA client can simultaneously perform. For the value range and default value for your router, see the value settings for this command.
Examples
# Configure the maximum number of the tests that the NQA client can simultaneously perform as 5.
<Sysname> system-view [Sysname] nqa agent max-concurrent 5
nqa schedule
Description
Use nqa schedule to configure the test start time and test duration for a test group. Use undo nqa schedule to stop the test for the test group. You cannot enter test group view or test type view after a test group is scheduled. A test group performs a test when the system time is between the start time and the end time (the start time plus test duration). If the system time is behind the start time when you execute the nqa schedule command, a test is started when the system time reaches the start time; if the system time is between the start time and the end time, a test is started at once; if the system time is ahead of the end time, no test is started. To view the current system time, use the display clock command. Related commands: display clock (Fundamentals Command Reference).
186
Syntax
nqa schedule admin-name operation-tag start-time { hh:mm:ss [ yyyy/mm/dd ] | now } lifetime { lifetime | forever } undo nqa schedule admin-name operation-tag
View
System view
Default level
2: System level
Parameters
admin-name: Specifies the name of the NQA test group administrator who creates the NQA test operation, which is a case-insensitive string of 1 to 32 characters. operation-tag: Specifies the test operation tag, which is a case-insensitive string of 1 to 32 characters. start-time: Specifies the start time and date of a test group. hh:mm:ss: Start time of a test group. yyyy/mm/dd: Start date of a test group. The default value is the current system time, and yyyy ranges from 2000 to 2035. now: Starts the tests for a test group immediately. lifetime: Specifies the duration of the test operation. lifetime: Duration of the test operation in seconds, which ranges from 1 to 2147483647. forever: Specifies that the tests are performed for a test group forever.
Examples
# Start the tests for the test group with the administrator name admin and operation tag test. The start time and duration of the test group are 08:08:08 2008/08/08 and 1000 seconds respectively.
<Sysname> system-view [Sysname] nqa schedule admin test start-time 08:08:08 2008/08/08 lifetime 1000
Syntax
operation { get | put } undo operation
View
FTP test type view
187
Default level
2: System level
Parameters
get: Obtains a file from the FTP server. put: Transfers a file to the FTP server.
Examples
# Configure the FTP operation type as put.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] operation put
Syntax
operation { get | post } undo operation
View
HTTP test type view
Default level
2: System level
Parameters
get: Obtains data from the HTTP server. post: Transfers data to the HTTP server.
Examples
# Configure the HTTP operation type as post.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] operation post
operation interface
Description
Use operation interface to specify the interface to perform a DHCP test. The specified interface must be up; otherwise, no probe packets can be sent out.
188
Use undo operation interface to restore the default. By default, no interface is specified to perform a DHCP test.
Syntax
operation interface interface-type interface-number undo operation interface
View
DHCP test type view
Default level
2: System level
Parameters
interface-type interface-number: Specifies an interface by its type and number.
Examples
# Specify the interface to perform a DHCP test as Ethernet 1/1.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type dhcp [Sysname-nqa-admin-test-dhcp] operation interface ethernet 1/1
Syntax
password password undo password
View
FTP test type view
Default level
2: System level
Parameters
password: Password used to log in to the FTP server, a case-sensitive string of 1 to 32 characters.
Examples
# Configure the password used for logging in to the FTP server as ftpuser.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp
189
probe count
Description
Use probe count to configure the number of probe operations to be performed per test. Use undo probe count to restore the default. By default, one probe operation is performed in an NQA test. Probe operations vary with NQA test types. During a TCP or DLSw test, one probe operation means setting up one connection. During a UDP jitter or a voice test, one probe operation means continuously sending a specified number of probe packets. The number of probe packets is configurable with the probe packetnumber command. During an FTP, HTTP, DHCP or DNS test, one probe operation means uploading or downloading a file, obtaining a web page, obtaining an IP address through DHCP, or translating a domain name to an IP address. During an ICMP echo or UDP echo test, one probe operation means sending an ICMP echo request or a UDP packet. During an SNMP test, one probe operation means sending one SNMPv1 packet, one SNMPv2C packet, and one SNMPv3 packet.
If more than one probe operation is to be performed in a test, the system starts a second probe operation when it receives responses to packets sent in the first probe operation, or when the probe timeout time expires. This command is not supported by voice tests. Only one probe operation is performed per voice test.
Syntax
probe count times undo probe count
View
DHCP, DNS, DLSw, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo, UDP jitter test type view
Default level
2: System level
Parameters
times: Number of probe operations per test, which ranges from 1 to 15.
Examples
# Configure the ICMP test group to perform 10 probe operations per test.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] probe count 10
190
probe packet-interval
Description
Use probe packet-interval to configure the interval for sending packets per probe operation. Use undo probe-interval to restore the default. By default, the interval is 20 milliseconds.
Syntax
probe packet-interval packet-interval undo probe packet-interval
View
UDP jitter, voice test type view
Default level
2: System level
Parameters
packet-interval: Interval for sending packets per probe operation, which ranges from 10 to 60000 milliseconds.
Examples
# Configure the UDP jitter test group to send packets at an interval of 100 milliseconds during each probe operation.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] probe packet-interval 100
probe packet-number
Description
Use probe packet-number to configure the number of packets to be sent per probe during one UDP jitter or voice test. Use undo probe packet-number to restore the default. By default, the number of packets to be sent per probe is 10 in one UDP jitter test and 1000 in one voice test.
Syntax
probe packet-number packet-number undo probe packet-number
View
UDP jitter, voice test type view
Default level
2: System level
191
Parameters
packet-number: Number of packets to be sent per probe operation. It ranges from 10 to 1000 for each probe operation in one UDP jitter test, and from 10 to 60000 for each probe operation in one voice test.
Examples
# Configure the UDP jitter test group to send 100 packets per probe.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] probe packet-number 100
probe packet-timeout
Description
Use probe packet-timeout to configure the timeout time for waiting for a response in a UDP jitter or voice test. Use undo probe packet-timeout to restore the default. By default, the timeout time in a UDP jitter and a voice test is 3000 and 5000 milliseconds respectively.
Syntax
probe packet-timeout packet-timeout undo probe packet-timeout
View
UDP jitter, voice test type view
Default level
2: System level
Parameters
packet-timeout: Timeout time for waiting for responses in a UDP jitter or voice test, which ranges from 10 to 3600000 milliseconds.
Examples
# Configure the timeout time for waiting for a response in a UDP jitter test as 100 milliseconds.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] probe packet-timeout 100
probe timeout
Description
Use probe timeout to configure the timeout time for a probe operation. When a probe operation does not complete within the period, the probe operation is timed out. Use undo probe timeout to restore the default. By default, the timeout time is 3000 milliseconds for a probe operation.
192
Syntax
probe timeout timeout undo probe timeout
View
DHCP, DNS, DLSw, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo test type view
Default level
2: System level
Parameters
timeout: Timeout time for a probe operation, in milliseconds. The value ranges from 10 to 86400000 for an FTP or HTTP probe operation, and from 10 to 3600000 for a DHCP, DNS, DLSw, ICMP echo, SNMP, TCP or UDP echo probe operation.
Examples
# Configure the timeout time for a DHCP probe operation as 10000 milliseconds.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type dhcp [Sysname-nqa-admin-test-dhcp] probe timeout 10000
Syntax
reaction item-number checked-element icpif threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number
View
Voice test type view
Default level
2: System level
Parameters
item-number: ID for a reaction entry, which ranges from 1 to 10. threshold-value: Specifies threshold values. upper-threshold: Upper threshold, which ranges from 1 to 100.
193
lower-threshold: Lower threshold, which ranges from 1 to 100. It must not be greater than the upper threshold. action-type: Specifies what action to be triggered to react to certain measurement conditions and it defaults to none. none: Specifies to only record events for terminal display, and not to send any trap messages. trap-only: Specifies to record events and send SNMP trap messages.
Examples
# Create reaction entry 1 for monitoring the ICPIF value in each voice test. Set the upper threshold to 50 and lower threshold to 5. Before the NQA test group starts, the initial state of the reaction entry is invalid. After each test, the ICPIF value is checked. If it is out of the threshold range, the state of the reaction entry is set to over-threshold; otherwise, the state is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type voice [Sysname-nqa-admin-test-voice] action-type trap-only reaction 1 checked-element icpif threshold-value 50 5
Syntax
reaction item-number checked-element { jitter-ds | jitter-sd } threshold-type { accumulate accumulateoccurrences | average } threshold-value upper-threshold lower-threshold [ action-type { none | trap-only }] undo reaction item-number
View
UDP jitter, voice test type view
Default level
2: System level
Parameters
item-number: ID for a reaction entry, which ranges from 1 to 10. jitter-ds: Specifies destination-to-source delay jitter of each probe packet as the monitored element. jitter-sd: Specifies source-to-destination delay jitter of each probe packet as the monitored element. threshold-type: Specifies a threshold type.
194
accumulate accumulate-occurrences: Total number of threshold violations in a test. It ranges from 1 to 14999 for UDP jitter tests, and 1 to 59999 for voice tests. average: Average one-way delay jitter in each test. threshold-value: Specifies threshold values in milliseconds. upper-threshold: Upper threshold, which ranges from 0 to 3600000. lower-threshold: Lower threshold, which ranges from 0 to 3600000. It must not be greater than the upper threshold. action-type: Specifies what action to be triggered to react to certain measurement conditions and it defaults to none. none: Specifies to only record events for terminal display, and not to send any trap messages. trap-only: Specifies to record events and send SNMP trap messages.
Examples
# Create reaction entry 1 for monitoring the average destination-to-source delay jitter of UDP jitter probe packets. Set the upper threshold to 50 milliseconds, and the lower threshold to 5 milliseconds. Before the NQA test group starts, the initial state of the reaction entry is invalid. After each test, the average destination-to-source delay jitter is checked. If it is out of the threshold range, the state of the reaction entry is set to over-threshold; otherwise, the state is set to below-threshold. Once state of the reaction entry changes, a trap message is generated and sent to the network management server.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element jitter-ds threshold-type average threshold-value 50 5 action-type trap-only
# Create reaction entry 2 for monitoring the destination-to-source delay jitter of UDP jitter probe packets. Set the upper threshold to 50 milliseconds, and the lower threshold to 5 milliseconds. Before the NQA test group starts, the initial state of the reaction entry is invalid. After each test, the destination-to-source delay jitter is checked against the threshold range. If the total number of threshold violations exceeds 100 (included), the state of the entry is set to over-threshold; otherwise, the state of the entry is set to belowthreshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 2 checked-element jitter-ds threshold-type accumulate 100 threshold-value 50 5 action-type trap-only
For the MOS threshold, the number is expressed in three digits representing ones, tenths, and hundredths. For example, to express a MOS threshold of 1, enter 100.
Syntax
reaction item-number checked-element mos threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number
View
Voice test type view
Default level
2: System level
Parameters
item-number: ID for a reaction entry, which ranges from 1 to 10. threshold-value: Specifies threshold values. upper-threshold: Upper threshold, which ranges from 1 to 500. lower-threshold: Lower threshold, which ranges from 1 to 500. It must not be greater than the upper threshold. action-type: Specifies what action to be triggered to react to certain measurement conditions and it defaults to none. none: Specifies to only record events for terminal display, and not to send any trap messages. trap-only: Specifies to record events and send SNMP trap messages.
Examples
# Create reaction entry 1 for monitoring the MOS value of each voice test. Set the upper threshold to 2, and lower threshold to 1. Before the NQA test group starts, the initial state of the reaction entry is invalid. After each test, the MOS value is checked. If it is out of the threshold range, the state of the reaction entry is set to over-threshold; otherwise, the state is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type voice [Sysname-nqa-admin-test-voice] reaction 1 checked-element mos threshold-value 200 100 action-type trap-only
No actions can be configured for a reaction entry of monitoring one-way delays. The monitoring results and statistics, however, can be displayed by the display nqa reaction counters and display nqa statistics commands.
Syntax
reaction item-number checked-element { owd-ds | owd-sd } threshold-value upper-threshold lowerthreshold undo reaction item-number
View
UDP jitter, voice test type view
Default level
2: System level
Parameters
item-number: ID for a reaction entry, which ranges from 1 to 10. owd-ds: Specifies the destination-to-source delay of each probe packet as the monitored element. owd-sd: Specifies the source-to-destination delay of each probe packet as the monitored element. threshold-value: Specifies threshold values in milliseconds. upper-threshold: Upper threshold, which ranges from 0 to 3600000. lower-threshold: Lower threshold, which ranges from 0 to 3600000. It must not be greater than the upper threshold.
Examples
# Create reaction entry 1 for monitoring the destination-to-source delay of every UDP jitter probe packet. Set the upper threshold to 50 milliseconds and lower threshold to 5 milliseconds. Before the NQA test group starts, the initial state of the reaction entry is invalid. The destination-to-source delay is calculated after the response to the probe packet arrives. If the delay is out of the threshold range, the state of the reaction entry is set to over-threshold; otherwise, the state is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element owd-ds threshold-value 50 5
197
Syntax
reaction item-number checked-element packet-loss threshold-type accumulate accumulate-occurrences [ action-type { none | trap-only } ] undo reaction item-number
View
UDP jitter, voice test type view
Default level
2: System level
Parameters
item-number: ID for a reaction entry, which ranges from 1 to 10. threshold-type: Specifies a threshold type. accumulate accumulate-occurrences: Total number of lost packets in a test. It ranges from 1 to 15000 for UDP jitter tests and 1 to 60000 for voice tests. action-type: Specifies what action to be triggered to react to certain measurement conditions and it defaults to none. none: Specifies to only record events for terminal display, and not to send any trap messages. trap-only: Specifies to record events and send SNMP trap messages.
Examples
# Create reaction entry 1 for monitoring the packet loss in each UDP jitter test. Before the NQA test group starts, the initial state of the reaction entry is invalid. After each test, the packet loss is checked. If the total number of lost packets exceeds 100 (included), the state of the reaction entry is set to overthreshold; otherwise, the state is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element packet-loss threshold-type accumulate 100 action-type trap-only
198
Syntax
reaction item-number checked-element probe-duration threshold-type { accumulate accumulateoccurrences | average | consecutive consecutive-occurrences } threshold-value upper-threshold lowerthreshold [ action-type { none | trap-only } ] undo reaction item-number
View
DHCP, DLSw, DNS, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo test type view
Default level
2: System level
Parameters
item-number: ID for a reaction entry, which ranges from 1 to 10. threshold-type: Specifies a threshold type. accumulate accumulate-occurrences: Total number of threshold violations in a test. It ranges from 1 to 15. average: Average probe duration in each test. consecutive consecutive-occurrences: Number of consecutive threshold violations since the NQA test group starts. It ranges from 1 to 16. threshold-value: Specifies threshold values in milliseconds. upper-threshold: Upper threshold, which ranges from 0 to 3600000. lower-threshold: Lower threshold, which ranges from 0 to 3600000. It must not be greater than the upper threshold. action-type: Specifies what action to be triggered to react to certain measurement conditions and it defaults to none. none: Specifies to only record events for terminal display, and not to send any trap messages. trap-only: Specifies to record events and send SNMP trap messages. This keyword is not supported in DNS test view.
Examples
# Create reaction entry 1 for monitoring the average duration of ICMP echo probes in a test. Set the upper threshold to 50 milliseconds and lower threshold to 5 milliseconds. Before the NQA test group starts, the initial state of the reaction entry is invalid. After each test, the average probe duration is checked. If it is out of the threshold range, the state is set to over-threshold; otherwise, the state of the reaction entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction 1 checked-element probe-duration thresholdtype average threshold-value 50 5 action-type trap-only
# Create reaction entry 2 for monitoring the duration of ICMP echo probes in a test. Set the upper threshold to 50 milliseconds, and the lower threshold to 5 milliseconds. Before the NQA test group starts, the initial state of the reaction entry is invalid. After each test, the probe duration is checked against the threshold range. If the total number of threshold violations exceeds 10 (included), the state of the entry is
199
set to over-threshold; otherwise, the state of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction 2 checked-element probe-duration thresholdtype accumulate 10 threshold-value 50 5 action-type trap-only
# Create reaction entry 3 for monitoring the duration time of ICMP echo probes. Set the upper threshold to 50 milliseconds, and the lower threshold to 5 milliseconds. Before the NQA test group starts, the initial state of the reaction entry is invalid. The probe duration is checked against the threshold range for each probe. If a threshold violation occurs consecutively for 10 times or more since the test group starts, the state of the entry is set to over-threshold; otherwise, the state of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction 3 checked-element probe-duration thresholdtype consecutive 10 threshold-value 50 5 action-type trap-only
Syntax
reaction item-number checked-element probe-fail threshold-type { accumulate accumulate-occurrences | consecutive consecutive-occurrences } [ action-type { none | trap-only } ] undo reaction item-number
View
DHCP, DLSw, DNS, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo test type view
Default level
2: System level
Parameters
item-number: ID for a reaction entry, which ranges from 1 to 10. threshold-type: Specifies a threshold type. accumulate accumulate-occurrences: Total number of probe failures in a test, which ranges from 1 to 15. consecutive consecutive-occurrences: Number of consecutive probe failures since the NQA test group starts. It ranges from 1 to 16.
200
action-type: Specifies what action to be triggered to react to certain measurement conditions and it defaults to none. none: Specifies to only record events for terminal display, and not to send any trap messages. trap-only: Specifies to record events and send SNMP trap messages. This keyword is not supported in DNS test view.
Examples
# Create reaction entry 1 for monitoring the probe failures in ICMP echo tests. Before the NQA test group starts, the initial state of the reaction entry is invalid. After each test, if the total number of probe failures exceeds 10 (included), the state of the entry is set to over-threshold; otherwise, the state of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction 1 checked-element probe-fail threshold-type accumulate 10 action-type trap-only
# Create reaction entry 2 for monitoring the probe failures in ICMP echo tests. Before the NQA test group starts, the initial state of the reaction entry is invalid. If probe failure occurs consecutively for 10 times or more since the test group starts, the state of the entry is set to over-threshold; otherwise, the state of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction 2 checked-element probe-fail threshold-type consecutive 10 action-type trap-only
Syntax
reaction item-number checked-element probe-fail threshold-type consecutive consecutive-occurrences action-type trigger-only undo reaction item-number
View
DHCP, DNS, DLSw, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo test type view
201
Default level
2: System level
Parameters
item-number: ID for a reaction entry, which ranges from 1 to 10. threshold-type: Specifies a threshold type. consecutive consecutive-occurrences: Number of consecutive probe failures since the test group starts. It ranges from 1 to 16. action-type: Specifies what actions to be triggered to react to certain measurement conditions. trigger-only: Triggers other modules to react to certain conditions.
Examples
# Create reaction entry 1. If probe failure occurs consecutively for 3 times, collaboration with other modules is triggered.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type tcp [Sysname-nqa-admin-test-tcp] reaction consecutive 3 action-type trigger-only 1 checked-element probe-fail threshold-type
Syntax
reaction item-number checked-element rtt threshold-type { accumulate accumulate-occurrences | average } threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number
View
UDP jitter, voice test type view
Default level
2: System level
Parameters
item-number: ID for a reaction entry, which ranges from 1 to 10. threshold-type: Specifies a threshold type. accumulate accumulate-occurrences: Total number of threshold violations in a test. It ranges from 1 to 15000 for UDP jitter tests and 1 to 60000 for voice tests.
202
average: Packet average round-trip time in a test. threshold-value: Specifies threshold values in milliseconds. upper-threshold: Upper threshold, which ranges from 0 to 3600000. lower-threshold: Lower threshold, which ranges from 0 to 3600000. It must not be greater than the upper threshold. action-type: Specifies what action to be triggered to react to certain measurement conditions and it defaults to none. none: Specifies to only record events for terminal display, and not to send any trap messages. trap-only: Specifies to record events and send SNMP trap messages.
Examples
# Create reaction entry 1 for monitoring the average round-trip time of UDP jitter probe packets. Set the upper threshold to 50 milliseconds and lower threshold to 5 milliseconds. Before the NQA test group starts, the initial state of the reaction entry is invalid. After each test, the average packet round-rip time is checked. If it is out of the threshold range, the state is set to over-threshold; otherwise, the state is set to below-threshold. Once the reaction entry state changes, a trap message is generated and sent to the network management server.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element rtt threshold-type average threshold-value 50 5 action-type trap-only
# Create reaction entry 2 for monitoring the round-trip time of UDP jitter probe packets. Set the upper threshold to 50 milliseconds, and lower threshold to 5 milliseconds. Before the NQA test group starts, the initial state of the reaction entry is invalid. After each test, the packet round-trip time is checked against the threshold range. If the total number of threshold violations exceeds 100 (included), the state of the entry is set to over-threshold; otherwise, the state of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the network management server.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-jitter [Sysname-nqa-admin-test-udp-jitter] reaction 1 checked-element accumulate 100 threshold-value 50 5 action-type trap-only rtt threshold-type
reaction trap
Description
Use reaction trap to configure to send traps to network management server under specified conditions. Use undo reaction trap to restore the default. By default, no traps are sent to the network management server. Only reaction trap test-complete is supported by voice tests.
Syntax
reaction trap { probe-failure consecutive-probe-failures | test-complete | test-failure cumulate-probefailures }
203
View
Any NQA test type view
Default level
2: System level
Parameters
probe-failure consecutive-probe-failures: Sends a trap to the network management server if the number of consecutive probe failures in one test is greater than or equal to consecutive-probe-failures, which ranges from 1 to 15. During the test, the system counts the number of consecutive probe failures after each probe operation, so multiple traps might be sent. test-complete: Specifies to send a trap to indicate that the test is completed. test-failure cumulate-probe-failures: Sends a trap if the total probe failures in an test is greater than or equal to cumulate-probe-failures, which ranges from 1 to 15. The system counts the total probe failures after the test completes, so one trap at most is sent.
Examples
# Configure the system to send a trap if consecutive probe failures in an ICMP echo test is greater than or equal to 5.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] reaction trap probe-failure 5
resolve-target
Description
Use resolve-target to set the domain name for a DNS test. Use undo resolve-target to restore the default. By default, no domain name is configured.
Syntax
resolve-target domain-name undo resolve-target
View
DNS test type view
Default level
2: System level
Parameters
domain-name: Specifies the domain name to be resolved. It is a case-insensitive string separated by dots (.), each part consisting of 1 to 63 characters. The total length must be within 255 characters, Valid characters in a part include letters, digits, hyphens (-), and underscores (_).
204
Examples
# Set the domain name for DNS resolution to domain1.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type dns [Sysname-nqa-admin-test-dns] resolve-target domain1
route-option bypass-route
Description
Use route-option bypass-route to enable the routing table bypass function to test the direct connectivity to the direct destination. Use undo route-option bypass-route to disable the routing table bypass function. By default, the routing table bypass function is disabled. When the routing table bypass function enabled, the routing table is not searched, and the packet is directly sent to the destination in a directly connected network.
Syntax
route-option bypass-route undo route-option bypass-route
View
DLSw, DNS, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo, UDP jitter, voice test type view
Default level
2: System level
Parameters
None
Examples
# Enable the routing table bypass function.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] route-option bypass-route
source interface
Description
Use source interface to configure the source interface for ICMP echo request packets. The ICMP echo request packets take the IP address of the source interface as their source IP address. The specified source interface must be up; otherwise, no ICMP echo requests can be sent out. Use undo source interface to restore the default. By default, no source interface is configured for ICMP echo request packets. If you configure both the source interface and source ip, source ip takes effect.
205
Syntax
source interface interface-type interface-number undo source interface
View
ICMP echo test type view
Default level
2: System level
Parameters
interface-type interface-number: Specifies an interface by its type and number.
Examples
# Specify the IP address of interface Ethernet 1/1 as the source IP address of ICMP echo request packets.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] source interface ethernet 1/1
source ip
Description
Use source ip to configure the source IP address of probe packets. The specified source IP address must be the IP address of a local interface. The local interface must be up; otherwise, no probe packets can be sent out. Use undo source ip to remove the configured source address. The IP address of the interface that sends a probe packet serves as the source IP address of the probe packet. By default, no source IP address is configured for probe packets. If you configure both source interface and source ip, source ip takes effect. Related commands: source interface.
Syntax
source ip ip-address undo source ip
View
DLSw, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo, UDP jitter, voice test type view
Default level
2: System level
Parameters
ip-address: Source IP address of a test operation.
Examples
# Configure the source IP address of the ICMP echo packets as 10.1.1.1.
206
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] source ip 10.1.1.1
source port
Description
Use source port to configure the source port of probe packets. Use undo source port to remove the configured port number. By default, no source port number is configured.
Syntax
source port port-number undo source port
View
SNMP, UDP echo, UDP jitter, voice test type view
Default level
2: System level
Parameters
port-number: Source port number of probe packets, which ranges from 1 to 50000.
Examples
# Configure port 8000 as the source port of probe packets in the UDP echo test group.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-echo [Sysname-nqa-admin-test-udp-echo] source port 8000
statistics hold-time
Description
Use statistics hold-time to configure the hold time of statistics groups for a test group. A statistics group is deleted when its hold time expires. Use undo statistics hold-time to restore the default. By default, the hold time of a statistics group is 120 minutes. This command is not supported by DHCP tests.
Syntax
statistics hold-time hold-time undo statistics hold-time
View
DLSw, DNS, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo, UDP jitter, voice test type view
207
Default level
2: System level
Parameters
hold-time: Hold time of a statistics group in minutes, which ranges from 1 to 1440.
Examples
# Configure the hold time of a statistics group as 3 minutes.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] statistics hold-time 3
statistics max-group
Description
Use statistics max-group to configure the maximum number of statistics groups that can be kept. Use undo statistics max-group to restore the default. By default, 2 statistics groups at most can be kept. When the number of statistics groups kept reaches the upper limit and a new statistics group is to be saved, the earliest statistics group is deleted. This command is not supported by DHCP tests.
Syntax
statistics max-group number undo statistics max-group
View
DLSw, DNS, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo, UDP jitter, voice test type view
Default level
2: System level
Parameters
number: Maximum number of statistics groups that can be kept, which ranges from 0 to 100. To disable collecting statistics, specify number 0.
Examples
# Configure the NQA to save up to 5 statistics groups for the ICMP test group.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] statistics max-group 5
statistics interval
Description
Use statistics interval to configure the interval for collecting test result statistics for a test group.
208
Use undo statistics interval to restore the default. By default, the interval is 60 minutes. NQA groups tests completed in the specified interval, and calculates the test result statistics. The statistics form a statistics group. To view information about the statistics groups, use the display nqa statistics command. This command is not supported by DHCP tests.
Syntax
statistics interval interval undo statistics interval
View
DLSw, DNS, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo, UDP jitter, voice test type view
Default level
2: System level
Parameters
interval: Interval in minutes for collecting statistics of the test results for a test group, which ranges from 1 to 35791394.
Examples
# Configure the interval for collecting the test result statistics of an ICMP test group as 2 minutes.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] statistics interval 2
tos
Description
Use tos to configure the value of the ToS field in the IP header in an NQA probe packet. Use undo tos to restore the default. By default, the ToS field in the IP header of an NQA probe packet is 0.
Syntax
tos value undo tos
View
DLSw, DNS, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo, UDP jitter, voice test type view
Default level
2: System level
Parameters
value: Value of the ToS field in the IP header in an NQA probe packet, which ranges from 0 to 255.
209
Examples
# Configure the ToS field in an IP packet header in an NQA probe packet as 1.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] tos 1
ttl
Description
Use ttl to configure the maximum number of hops a probe packet traverses in the network. Use undo ttl to restore the default. By default, the maximum number of hops that a probe packet can traverse in a network is 20. After you configure route-option bypass-route, the maximum number of hops a probe packet traverses in the network is 1, and ttl does not take effect.
Syntax
ttl value undo ttl
View
DLSw, DNS, FTP, HTTP, ICMP echo, SNMP, TCP, UDP echo, UDP jitter, voice test type view
Default level
2: System level
Parameters
value: Maximum number of hops a probe packet traverses in the network, which ranges from 1 to 255.
Examples
# Configure the maximum number of hops that a probe packet can traverse in a network as 16.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] ttl 16
type
Description
Use type to configure the test type of the current test group and enter test type view. By default, no test type is configured.
Syntax
type { dhcp | dlsw | dns | ftp | http | icmp-echo | snmp | tcp | udp-echo | udp-jitter | voice }
View
NQA test group view
210
Default level
2: System level
Parameters
dhcp: DHCP test. dlsw: DLSw test. dns: DNS test. ftp: FTP test. http: HTTP test. icmp-echo: ICMP echo test. snmp: SNMP test. tcp: TCP test. udp-echo: UDP echo test. udp-jitter: UDP jitter test. voice: Voice test.
Examples
# Configure the test type of a test group as FTP and enter test type view.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp]
url
Description
Use url to configure the website an HTTP test visits. Use undo url to remove the configured website an HTTP test visits. The character string of the configured URL cannot contain spaces.
Syntax
url url undo url
View
HTTP test type view
Default level
2: System level
Parameters
url: Website that an HTTP test visits, a case-sensitive string of 1 to 185 characters.
Examples
# Configure the website that an HTTP test visits as /index.htm.
21 1
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] url /index.htm
Syntax
username username undo username
View
FTP test type view
Default level
2: System level
Parameters
username: Username used to log in to the FTP server. The username takes a case-sensitive string of 1 to 32 characters.
Examples
# Configure the login username as administrator.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] username administrator
Syntax
vpn-instance vpn-instance-name undo vpn-instance
View
ICMP echo test type view
212
Default level
2: System level
Parameters
vpn-instance-name: Specifies the MPLS L3VPN, a case-sensitive string of 1 to 31 characters.
Examples
# Specify vpn1 as the MPLS L3VPN.
<Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] vpn-instance vpn1
Syntax
display nqa server status [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display NQA server status.
<Sysname> display nqa server status nqa server is: enabled tcp-connect: IP Address 2.2.2.2 udp-echo: IP Address Port Status Port 2000 Status active
213
3.3.3.3
3000
inactive
Description
NQA server status in the NQA TCP test NQA server status in the NQA UDP test IP address specified for the TCP/UDP listening service on the NQA server Port number of the TCP/UDP listening service on the NQA server Listening service status.
Syntax
nqa server enable undo nqa server enable
View
System view
Default level
2: System level
Parameters
None
Examples
# Enable the NQA server.
<Sysname> system-view [Sysname] nqa server enable
Configure the command on the NQA server for TCP tests only. The IP address and port number must be consistent with those on the NQA client and must be different from those for an existing listening service. The IP address must be that of an interface on the NQA server. Otherwise, the configuration will be invalid. Related commands: nqa server enable and display nqa server status.
Syntax
nqa server tcp-connect ip-address port-number undo nqa server tcp-connect ip-address port-number
View
System view
Default level
2: System level
Parameters
ip-address: IP address specified for the TCP listening service on the NQA server. port-number: Port number specified for the TCP listening service on the NQA server, which ranges from 1 to 50000.
Examples
# Create a TCP listening service by using the IP address 169.254.10.2 and port 9000.
<Sysname> system-view [Sysname] nqa server tcp-connect 169.254.10.2 9000
Syntax
nqa server udp-echo ip-address port-number undo nqa server udp-echo ip-address port-number
View
System view
215
Default level
2: System level
Parameters
ip-address: IP address specified for the UDP listening service on the NQA server. port-number: Port number specified for the UDP listening service on the NQA server, which ranges from 1 to 50000.
Examples
# Create a UDP listening service by using the IP address 169.254.10.2 and port 9000.
<Sysname> system-view [Sysname] nqa server udp-echo 169.254.10.2 9000
216
Syntax
display ip flow-ordering statistic { external | internal } [ | { begin | exclude | include } regularexpression ]
View
Any view
Default level
1: Monitor level
Parameters
external: Displays inbound IP traffic ordering statistics on the external interface. internal: Displays both inbound and outbound IP traffic ordering statistics on the internal interface. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the IP traffic ordering statistics on the internal interface.
Unit: kilobytes/second User IP 192.168.1.1 192.168.1.2 192.168.1.3 TOTAL IN TOTAL OUT TCP-IN TCP-OUT UDP-IN UDP-OUT ICMP-IN ICMP-OUT 0.2 0.1 0.0 0.1 0.0 0.0 0.1 0.1 0.0 0.1 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.0 0.1 0.0 0.0 0.0 0.0 0.0
Description
Unit: kilobytes/second User IP address Total inbound traffic statistics Total outbound traffic statistics Inbound TCP packet statistics 217
Field
TCP-OUT UDP-IN UDP-OUT ICMP-IN ICMP-OUT
Description
Outbound TCP packet statistics Inbound UDP packet statistics Outbound UDP packet statistics Inbound ICMP packet statistics Outbound ICMP packet statistics
ip flow-ordering
Description
Use ip flow-ordering to enable IP traffic ordering and specify its mode on the interface. Use undo ip flow-ordering to restore the default. By default, an interface does not collect IP traffic ordering statistics.
Syntax
ip flow-ordering { external | internal } undo ip flow-ordering
View
Interface view
Default level
2: System level
Parameters
external: Specifies an external interface to collect inbound IP traffic ordering statistics. internal: Specifies an internal interface to collect both inbound and outbound IP traffic ordering statistics.
Examples
# Specify interface Ethernet 1/1 as an external interface to collect inbound IP traffic ordering statistics.
<Sysname> system-view [Sysname] interface ethernet 1/1 [SysnameEthernet1/1] ip flow-ordering external
ip flow-ordering stat-interval
Description
Use ip flow-ordering stat-interval to set the IP traffic ordering interval. Use undo ip flow-ordering stat-interval to restore the default. By default, the IP traffic ordering interval is ten seconds.
Syntax
ip flow-ordering stat-interval { 5 | 10 | 15 | 30 | 45 | 60 } undo ip flow-ordering stat-interval
218
View
System view
Default level
2: System level
Parameters
5: Sets the IP traffic ordering interval to 5 seconds. 10: Sets the IP traffic ordering interval to 10 seconds. 15: Sets the IP traffic ordering interval to 15 seconds. 30: Sets the IP traffic ordering interval to 30 seconds. 45: Sets the IP traffic ordering interval to 45 seconds. 60: Sets the IP traffic ordering interval to 60 seconds.
Examples
# Set the IP traffic ordering interval to 10 seconds.
<Sysname> system-view [Sysname] ip flow-ordering stat-interval 10
219
Syntax
display sflow [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
2: System level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the sFlow configuration and operation information.
<Sysname> display sflow sFlow Version: 5 sFlow Global Information: Agent Source ID 1 2 3 4 5 6 7 8 9 10 sFlow Port Information: Interface CID Interval(s) FID MaxHLen Rate Mode Status IP 22:2:20::10 192.168.3.5 IP:10.10.10.1(CLI) Address:10.0.0.1 2001::1 Port 6535 6543 6343 6343 6343 6343 6343 6343 6343 6343 Aging N/A 500 0 0 0 0 0 0 0 0 Size 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 Description netserver Office
Collector Information:
220
Eth0/1 Eth0/2
1 2
100 100
1 2
128 128
1000 1000
determine determine
Active Active
Description
Currently, sFlow has the following versions:
Status
Suspend: Indicates the port is down. Active: Indicates the port is up.
sflow agent
Description
Use sflow agent to configure the IP address of the sFlow agent. Use undo sflow agent to remove the configured IP address.
221
By default, no IP address is configured for the sFlow agent. The device periodically checks the existence of sFlow agent address. If the sFlow agent has no IP address configured, the device automatically selects an interface IP address for the sFlow agent but does not save the selected IP address. NOTE: HP recommends that you configure an IP address manually for the sFlow agent. Only one IP address can be specified for the sFlow agent on the device.
Syntax
sflow agent { ip ip-address | ipv6 ipv6-address } undo sflow agent { ip | ipv6 }
View
System view
Default level
2: System level
Parameters
ip ip-address: IPv4 address of the sFlow agent. ipv6 ipv6-address: IPv6 address of the sFlow agent.
Examples
# Configure the IP address of the sFlow agent.
<Sysname> system-view [Sysname] sflow agent ip 10.10.10.1
sflow collector
Description
Use sflow collector to configure an sFlow collector. Use undo sflow collector to remove a specified sFlow collector. By default, the device provides a number of sFlow collectors. You can use display sflow to display these sFlow collectors.
Syntax
sflow collector collector-id { { ip ip-address | ipv6 ipv6-address } | datagram-size size | description text | port port-number | time-out seconds } * undo sflow collector collector-id
View
System view
Default level
2: System level
Parameters
collector-id: ID of the sFlow collector, in the range of 1 to 10.
222
ip ip-address: IPv4 address of the sFlow collector. ipv6 ipv6-address: IPv6 address of the sFlow collector. description text: Specifies a description for the sFlow collector. The default description is "CLI Collector." datagram-size size: Specifies the maximum length of the sFlow data portion in every sFlow packet that is sent out. The value is in the range of 200 to 3000 bytes and defaults to 1400 bytes. port port-number: Specifies the port number of the sFlow collector, in the range of 1 to 65535. The default port number is 6343. time-out seconds: Specifies the aging time of the sFlow collector, in the range of 60 to 2147483647, in seconds. By default, the sFlow collector never ages out. When the aging time expires, all the settings of the sFlow collector are restored to the default. The system does not save the configuration of collectors with an aging time specified.
Examples
# Specify sFlow collector 2's destination IP address as 3.3.3.1, port number as default, description as netserver, aging time as 1200 seconds, and maximum length of the sFlow data portion as 1000 bytes.
<Sysname> system-view [Sysname] sflow collector 2 ip 3.3.3.1 description netserver time-out 1200 datagram-size 1000
Syntax
sflow counter interval-time undo sflow counter interval
View
Interface view
Default level
2: System level
Parameters
interval-time: Counter sampling interval in seconds, in the range of 2 to 86400.
Examples
# Set the counter sampling interval to 120 seconds on Ethernet 1/0.
<Sysname> system-view [Sysname] interface ethernet 1/0 [Sysname-Ethernet1/0] sflow counter interval 120
223
Syntax
sflow counter collector collector-id undo sflow counter collector
View
Interface view
Default level
2: System level
Parameters
collector-id: ID of the sFlow collector.
Examples
# Specify sFlow collector 2 on Ethernet 1/0 for counter sampling.
<Sysname> system-view [Sysname] interface ethernet 1/0 [Sysname-Ethernet1/0] sflow counter collector 2
Syntax
sflow flow collector collector-id undo sflow flow collector
View
Interface view
Default level
2: System level
Parameters
collector-id: ID of the sFlow collector.
Examples
# Specify the collector number 2 on Ethernet 1/0 for flow sampling.
<Sysname> system-view
224
Syntax
sflow flow max-header length undo sflow flow max-header
View
Interface view
Default level
2: System level
Parameters
Length: Maximum bytes of a sampled packet that can be copied, in the range of 18 to 512.
Examples
# Set the maximum bytes of a sampled packet that can be copied to 60.
<Sysname> system-view [Sysname] interface ethernet 1/0 [Sysname-Ethernet1/0] sflow flow max-header 60
sflow sampling-mode
Description
Use sflow sampling-mode to specify the packet sampling mode. Use undo sflow sampling-mode to restore the default. By default, the sampling mode is determine. This command is supported on physical Ethernet interfaces only, instead of logical interfaces (Ethernet subinterfaces and VLAN interfaces) and network management interfaces. Related commands: sflow sampling-rate.
Syntax
sflow sampling-mode determine undo sflow sampling-mode
View
Interface view
225
Default level
2: System level
Parameters
determine: Fixed sampling mode. For example, if the flow sampling rate is set to 4000 (by using the sflow sampling-rate command), the device randomly samples a packet, like the tenth packet, from the first 4000 packets. The next time the device samples the 4010th packet, and so on.
Examples
# Specify the fixed sample mode on Ethernet 1/0.
<Sysname> system-view [Sysname] interface ethernet 1/0 [Sysname-Ethernet1/0] sflow sampling-mode determine
sflow sampling-rate
Description
Use sflow sampling-rate to specify the number of packets out of which the interface will sample a packet. This command is supported on Ethernet interfaces only, instead of logical interfaces (such as Ethernet subinterfaces and VLAN interfaces) and network management interfaces. Related commands: sflow sampling-mode.
Syntax
sflow sampling-rate rate undo sflow sampling-rate
View
Interface view
Default level
2: System level
Parameters
rate: Number of packets out of which the interface will sample a packet, in the range of 1000 to 5000.
Examples
# Set Ethernet 1/0 to sample a packet out of 4000 packets.
<Sysname> system-view [Sysname] interface ethernet 1/0 [Sysname-Ethernet1/0] sflow sampling-rate 4000
sflow source
Description
Use sflow source to specify the source IP address of sent sFlow packets. Use undo sflow source to remove the specified source IP address. By default, no source IP address is specified for sent sFlow packets.
226
Syntax
sflow source { ip ip-address | ipv6 ipv6-address } * undo sflow source { ip | ipv6 } *
View
System view
Default level
2: System level
Parameters
ip ip-address: Source IPv4 address of sent sFlow packets. ipv6 ipv6-address: Source IPv6 address of sent sFlow packets.
Examples
# Specify the source IPv4 address of sent sFlow packets as 10.0.0.1.
<Sysname> system-view [Sysname] sflow source ip 10.0.0.1
sflow version
Description
Use sflow version to specify an sFlow version. Use undo sflow sampling-rate to restore the default. By default, the sFlow version is 5.
Syntax
sflow version { 4 | 5 } undo sflow version
View
System view
Default level
2: System level
Parameters
4: Refers to sFlow version 4. 5: Refers to sFlow version 5.
Examples
# Specify the sFlow version as 4.
<Sysname> system-view [Sysname] sflow version 4
227
Syntax
display sampler [ sampler-name ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
sampler-name: Specifies the sampler name, a case-insensitive string of 1 to 32 characters. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the configuration and running information about the specified sampler on a router.
<Sysname> display sampler 256 Sampler name: 256 Index: 1, Mode: Fixed, Packet-interval: 8 Packet counter: 0, Random number: 1
Description
Name of the sampler Index number identifying a sampler Sampling mode, including fixed mode and random mode Sampling rate Counts the number of packets that have been received for one sampling
228
Field
Description In fixed mode, it is the first packet that is selected in each sampling.
The value for this field is always 1.
Random number
Syntax
reset sampler statistics [ sampler-name ]
View
User view
Default level
1: Monitor level
Parameters
sampler-name: Specifies the sampler name, a case-insensitive string of 1 to 32 characters.
Description
Use reset sampler statistics to clear the running information of a sampler, including the counter, total number of packets processed and selected. With no sampler-name specified, this command clears the running information of all samplers.
Examples
# Clear the running information of the specified sampler.
<Sysname> reset sampler statistics abc
sampler
Description
Use sampler to create a sampler. A total of 32 samplers can be created. Use undo sampler to delete a sampler.
Syntax
sampler sampler-name mode { fixed | random } packet-interval rate undo sampler sampler-name
229
View
System view
Default level
2: System level
Parameters
sampler-name: Assigns the name for the sampler, a case-insensitive string of 1 to 32 characters. fixed: Specifies the fixed sampling mode, in which the first packet is selected per sampling. random: Specifies the random sampling mode, in which a packet is randomly selected out of a group of packets, and which packet is selected for each sampling varies. packet-interval rate: Specifies the sampling rate, which equals the 2 to the power of rate. The value is in the range of 1 to 16.
Examples
# Create a sampler with the name abc in random sampling mode. Set the sampling rate to 8, which means one packet out of 256 packets (2 to the power of 8) is sampled.
<Sysname> system-view [Sysname] sampler abc mode random packet-interval 8
230
apply poe-profile
Description
Use apply poe-profile to apply the PoE configuration file to the current PoE interface. Use undo apply poe-profile to remove the application of the PoE configuration file to the current PoE interface. The index number, instead of the name, of the PoE configuration file is displayed when you execute the display this command. Related commands: display poe-profile and apply poe-profile interface.
Syntax
apply poe-profile { index index | name profile-name } undo apply poe-profile { index index | name profile-name }
View
PoE interface view
Default level
2: System level
Parameters
index index: Index number of the PoE configuration file, in the range of 1 to 100. name profile-name: Name of the PoE configuration file, a string of 1 to 15 characters.
Examples
# Apply the PoE configuration file named forIPphone to PoE interface GigabitEthernet 1/1.
<Sysname> system-view [Sysname] interface gigabitethernet 1/1 [Sysname-GigabitEthernet1/1] apply poe-profile name forIPphone [Sysname-GigabitEthernet1/1] display this # interface GigabitEthernet1/1 apply poe-profile index 1 # return
231
Syntax
apply poe-profile { index index | name profile-name } interface interface-range undo apply poe-profile { index index | name profile-name } interface interface-range
View
System view
Default level
2: System level
Parameters
index index: Index number of the PoE configuration file, in the range of 1 to 100. name profile-name: Name of the PoE configuration file, a string of 1 to 15 characters. interface-range: Range of Ethernet interface numbers, indicating multiple Ethernet interfaces. The expression is interface-range = interface-type interface-number [ to interface-type interface-number ], where interface-type interface-number represents the interface type and interface number. The start interface number should be smaller than the end interface number. Ethernet interface numbers can be in any range. If any interface in the specified range does not support PoE, it is ignored when the PoE configuration file is applied.
Examples
# Apply the PoE configuration file named forIPphone to PoE interface GigabitEthernet 1/1.
<Sysname> system-view [Sysname] apply poe-profile name forIPphone interface gigabitethernet 1/1
# Apply the PoE configuration file with index number 1 to PoE interfaces GigabitEthernet 1/2 through GigabitEthernet 1/8.
<Sysname> system-view [Sysname] apply poe-profile index 1 interface gigabitethernet 1/2 to gigabitethernet 1/8
Syntax
display poe device [ | { begin | exclude | include } regular-expression ]
View
Any view
232
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the PSE information.
<Sysname> display poe device PSE ID 7 10 SlotNo SubSNo PortNum 2 3 0 0 24 24 MaxPower(W) 370 370 State Model off off LSP2LTSUC LSP2LTSUC
Description
ID of the PSE. This field takes a value of 1. Slot number of the PSE. This field takes a value of 1. Sub-slot number of the PSE. This field takes a value of 0. Number of PoE interfaces on the PSE Maximum power of the PSE (W) PSE state:
State
on: The PSE is supplying power. off: The PSE stops supplying power. faulty: The PSE fails.
PSE model
Model
Syntax
display poe interface [ interface-type interface-number ] [ | { begin | exclude | include } regularexpression ]
View
Any view
233
Default level
1: Monitor level
Parameters
interface-type interface-number: Specifies an interface by its type and number. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the power state of GigabitEthernet 1/1.
<Sysname> display poe interface gigabitethernet 1/1 Port Power Enabled Port Power Priority Port Operating Status Port IEEE Class Port Detection Status Port Power Mode Port Current Power Port Average Power Port Peak Power Port Max Power Port Current Port Voltage Port PD Description : enabled : critical : on : 1 : on : signal : 11592 : 11610 : 11684 : 15400 : 244 : 51.7 mW mW mW mW mA V
Description
PoE stateenabled/disabled Power priority of the PoE interface:
234
Field
Description
Power detection state of a PoE interface:
disabledThe PoE function is disabled. searchingThe PoE interface is searching for the
Port Detection Status PD.
Port Average Power Port Peak Power Port Max Power Port Current Port Voltage Port PD Description
8.4(W) consumed,
Description
Shortened form of a PoE interface PoE stateenabled/disabled
235
Field
Description
Power priority of a PoE interface:
Priority
CurPower
Operating Status
IEEE class
disabledThe PoE function is disabled. searchingThe PoE interface is searching for the
Detection Status PD.
Syntax
display poe interface power [ interface-type interface-number ] [ | { begin | exclude | include } regularexpression ]
View
Any view
Default level
1: Monitor level
Parameters
interface-type interface-number: Specifies an interface by its type and number. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow.
236
exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the power information of GigabitEthernet 1/1.
<Sysname> display poe interface power gigabitethernet 1/1 Interface GE1/1 CurPower PeakPower MaxPower PD Description (W) 15.0 (W) 15.3 (W) 15.4 Acess Point on Room 509 for Peter
3 port(s) on,
23.8(W) consumed,
Description
Shortened form of a PoE interface Current power of a PoE interface Peak power of a PoE interface Maximum power of a PoE interface Description of the PD connected with a PoE interface When the description contains more than 34 characters, the first 30 characters followed by four dots are displayed. Number of PoE interfaces that are supplying power Power currently consumed by all PoE interfaces Total remaining power of the system
PD Description
Syntax
display poe power-usage [ | { begin | exclude | include } regular-expression ]
237
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the power information of the PoE power and all PSEs.
<Sysname> display poe power-usage PoE Current Power PoE Max Power PoE Max Guaranteed Power PoE Remaining Allocated Power PoE Remaining Guaranteed Power PoE Total Powered Port Number Detailed power usage of PSE(s): PSE ID 5 Max (W) 200 Current (W) 12 Peak (W) 12 Average (W) 6 Remaining 200 Powered 1 Guaranteed(W) PortNum : 12 : 2000 : 2000 : 1800 : 2000 : 1 W W W W W
Description
Total consumption power of the PSE Maximum PoE power Guaranteed maximum PoE power (the maximum power supplied to critical PSEs) Remaining allocable PoE power = Maximum PoE power the sum of the maximum power of all PoEenabled PSEs Guaranteed remaining PoE power = Guaranteed maximum PoE power the sum of the maximum power of critical PSEs (Generally, the guaranteed maximum PoE power equals to the maximum PoE power.) Number of PoE interfaces that are currently supplying power ID of the PSE
238
Field
Max Current Peak Average
Description
Maximum power of the PSE Current power of the PSE Peak power of the PSE Average power of the PSE Guaranteed remaining power of the PSE = Guaranteed maximum power of the PSE the sum of the maximum power of critical PoE interfaces of the PSE (Generally, the guaranteed maximum PSE power equals to the maximum PSE power.) Number of PoE interfaces for which the PSE is supplying power
Remaining Guaranteed
Powered PortNum
Syntax
display poe pse [ pse-id ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
pse-id: PSE ID. To view the mapping between PSE ID and slot, use the display poe device command. If you do not specify this parameter, the information of all PSEs on the device is displayed. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the information of PSE 1 (for a device with multiple PSEs).
<Sysname> display poe pse 1 PSE ID PSE Slot No PSE Model PSE Power Enabled PSE Power Preempted : 1 : 2 : LSBMPOEGV48TP : enabled : no
239
PSE Power Priority PSE Current Power PSE Average Power PSE Peak Power PSE Max Power PSE Remaining Guaranteed PSE CPLD Version PSE Software Version PSE Hardware Version PSE Legacy Detection PSE Utilization-threshold PSE Pse-policy Mode PSE Pd-policy Mode PSE PD Disconnect Detect Mode
: low : 130 : 20 : 240 : 200 : 120 : 100 : 200 : 100 : disabled : 80 : disabled : disabled : DC W W W W W
Description
ID of the PSE Slot number of the PSE Model of the PSE module PoE is enabled for the PSE PSE power preempted state:
noThe power of the PSE is not preempted. yesThe power of the PSE is preempted so that it
cannot supply power, although PoE is enabled for the PSE
PSE Power Priority PSE Current Power PSE Average Power PSE Peak Power PSE Max Power
Power priority of the PSE Current power of the PSE Average power of the PSE Peak power of the PSE Maximum power of the PSE Guaranteed remaining power of the PSE = Guaranteed maximum power of the PSE the sum of the maximum power of the critical PoE interfaces of the PSE PSE CPLD version PSE software version number PSE hardware version number Nonstandard PD detection by the PSE: enabled or disabled PSE power alarm threshold PSE power management policy mode PD power management policy mode 240
PSE CPLD Version PSE Software Version PSE Hardware Version PSE Legacy Detection PSE Utilization-threshold PSE Pse-policy Mode PSE Pd-policy Mode
Field
PSE PD Disconnect Detect Mode
Description
PD disconnection detection mode
Syntax
display poe pse pse-id interface [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
pse pse-id: Specifies a PSE ID. To view the mapping between PSE ID and slot, use the display poe device command. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the state of all PoE interfaces connected to PSE 1.
<Sysname> display poe pse 1 interface Interface GE1/1 GE1/2 GE1/3 GE1/4 GE1/5 GE1/6 GE1/7 --Enable enabled enabled enabled enabled enabled enabled disabled 2 port(s) on, Priority low critical low critical low low low CurPower (W) 4.4 0.0 0.0 0.0 4.0 0.0 0.0 on power-lack power-deny on power-limit power-itself off 2 Operating IEEE 1 Detection class Status delivering-power disabled disabled searching delivering-power disabled fault Status
8.4(W) consumed,
Description
Shortened form of a PoE interface
241
Field
Enable Priority CurPower Operating IEEE Detection port(s) on consumed Remaining
Description
PoE enabled/disabled state. For the value, see Table 49. Priority of a PoE interface. For the value, see Table 49. Current power of a PoE interface Operating state of a PoE interface. For the value, see Table 49. PD power class Power detection state of a PoE interface. For the value, see Table 49. Number of PoE interfaces that are supplying power Power consumed by PoE interfaces on the PSE Remaining power on the PSE
Syntax
display poe pse pse-id interface power [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
pse pse-id: Specifies a PSE ID. To view the mapping between PSE ID and slot, use the display poe device command. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the power information of PoE interfaces connected with PSE 1.
<Sysname> display poe pse 1 interface power Interface CurPower PeakPower MaxPower PD Description
242
(W) GE1/25 GE1/26 GE1/27 GE1/28 GE1/29 GE1/30 --4.4 4.4 15.0 0.0 0.0 0.0
(W) 4.6 15.4 15.4 5.0 4.0 5.0 IP Phone on Room 309 for Peter Smith.... IP Phone on Room 409 for Peter Pan Acess Point on Room 509 for Peter IP Phone on Room 609 for Peter John.... IP Phone on Room 709 for Jack IP Phone on Room 809 for Alien 776.2(W) Remaining ---
3 port(s) on,
23.8(W) consumed,
Description
Shortened form of a PoE interface Current power of a PoE interface Peak power of a PoE interface Maximum power of a PoE interface Description of the PD connected with a PoE interface. When the description contains more than 34 characters, the first 30 characters followed by four dots are displayed. Number of PoE interfaces that are supplying power Power currently consumed by all PoE interfaces Remaining power on the PSE
PD Description
display poe-power
Description
Use display poe-power to display the information of the PoE power.
Syntax
display poe-power [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
243
Examples
# Display information of the PoE power.
<Sysname> display poe-power PoE Current Power PoE Average Power PoE Peak Power PoE Max Power PoE Nominal Power PoE Current Current PoE Current Voltage PoE Input-threshold Lower PoE Input-threshold Upper : 1870 : 2100 : 2350 : 2000 : 2500 : 3.00 : 55.00 : 111.22 : 131.00 V V V V W W W W W A V
PoE Output-threshold Lower : 45.00 PoE Output-threshold Upper : 57.00 PoE Hardware Version PoE Software Version PoE Power Number PoE Power 1: Manufacturer Type Status PoE Power 2: Manufacturer Type Status : NONE : NONE : Normal : NONE : NONE : Normal : 0002 : 0001 : 2
Description
Current PoE power Average PoE power Peak PoE power Maximum PoE power Nominal PoE power Current PoE current Current PoE voltage AC input under-voltage threshold AC input over-voltage threshold DC output under-voltage threshold DC output over-voltage threshold PoE hardware version number PoE software version number Number of PoE power supply units
244
Field
Manufacturer
Description
Manufacturer of the PoE power. If the device does not support to get this field, it is displayed as NONE. Type of the PoE power. If the device does not support to get this field, it is displayed as NONE. PoE power state:
Type
Status
display poe-profile
Description
Use display poe-profile to display the information of the PoE configuration file. If no argument is specified, all information of the configurations and applications of existing PoE configuration files is displayed.
Syntax
display poe-profile [ index index | name profile-name ] [ | { begin | exclude | include } regularexpression ]
View
Any view
Default level
1: Monitor level
Parameters
index index: Index number of the PoE configuration file, in the range of 1 to 100. name profile-name: Name of the PoE configuration file, a string of 1 to 15 characters. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the information of all PoE configuration files.
<Sysname> display poe-profile Poe-profile forIPphone Index 1 ApplyNum 6 Interface GE1/5 GE1/6 Configuration poe enable poe priority critical
245
GE1/7 GE1/8 GE1/9 GE1/10 forAP 2 2 GE1/11 GE1/12 --2 poe-profile(s) created, 8 port(s) applied poe enable poe max-power 14000 ---
# Display the information of the PoE configuration file with index number 1.
<Sysname> display poe-profile index 1 Poe-profile forIPphone Index 1 ApplyNum 6 Interface GE1/5 GE1/6 GE1/7 GE1/8 GE1/9 GE1/10 --6 port(s) applied --Configuration poe enable poe priority critical
Description
Name of the PoE configuration file Index number of the PoE configuration file Number of PoE interfaces to which a PoE configuration file is applied Shortened form of the PoE interface to which the PoE configuration is applied Configurations of the PoE configuration file Number of PoE configuration files Sum of the number of PoE interfaces to which all PoE configuration files are respectively applied
246
Syntax
display poe-profile interface interface-type interface-number [ | { begin | exclude | include } regularexpression ]
View
Any view
Default level
1: Monitor level
Parameters
interface-type interface-number: Specifies an interface by its type and number. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display all information of the configurations and applications of the current PoE configuration file applied to Ethernet 1/1.
<Sysname> display poe-profile interface gigabitethernet 1/1 Poe-profile forIPphone Index 1 ApplyNum 6 Interface GE1/5 Current Configuration poe enable poe priority critical
Because not all the configurations of a PoE configuration file can be applied successfully, only the configurations that currently take effect on the interface are displayed. For the descriptions for other fields, see Table 57.
poe disconnect
Description
Use poe disconnect to configure a PD disconnection detection mode. Use undo poe disconnect to restore the default. The default PD disconnection detection mode is ac. Changing to the PD disconnection detection mode may lead to power-off of some PDs.
Syntax
poe disconnect { ac | dc }
247
View
System view
Default level
2: System level
Parameters
ac: Specifies the PD disconnection detection mode as ac. dc: Specifies the PD disconnection detection mode as dc.
Examples
# Set the PD disconnection detection mode to dc.
<Sysname> system-view [Sysname] poe disconnect dc
poe enable
CAUTION: If a PoE configuration file is already applied to a PoE interface, remove the application of the file to the PoE
interface before configuring the interface in PoE-profile view.
If a PoE configuration file is applied to a PoE interface, remove the application of the file to the PoE interface
before configuring the interface in PoE interface view.
Description
Use poe enable to enable PoE on a PoE interface. Use undo poe enable to disable PoE on a PoE interface. By default, PoE is disabled on a PoE interface.
Syntax
poe enable undo poe enable
View
PoE interface view, PoE-profile file view
Default level
2: System level
Parameters
None
Examples
# Enable PoE on a PoE interface.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] poe enable
<Sysname> system-view [Sysname] poe-profile abc [Sysname-poe-profile-abc-1] poe enable [Sysname-poe-profile-abc-1] quit [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] apply poe-profile name abc
Syntax
poe enable pse pse-id undo poe enable pse pse-id
View
System view
Default level
2: System level
Parameters
pse-id: PSE ID.
Examples
# Enable PoE for PSE 1.
<Sysname> system-view [Sysname] poe enable pse 1
Syntax
poe legacy enable pse pse-id undo poe legacy enable pse pse-id
View
System view
Default level
2: System level
249
Parameters
pse pse-id: Specifies a PSE ID.
Examples
# Enable PSE 7 to detect nonstandard PDs.
<Sysname> system-view [Sysname] poe legacy enable pse 1
poe max-power
Description
Use poe max-power to configure the maximum power for a PoE interface. Use undo poe max-power to restore the default. By default, the maximum power of the PoE interface is 15400 milliwatts.
Syntax
poe max-power max-power undo poe max-power
View
PoE interface view, PoE-profile file view
Default level
2: System level
Parameters
max-power: Maximum power in milliwatts allocated to a PoE interface, in the range of 1000 to 15400 milliwatts.
Examples
# Set the maximum power of Ethernet 1/1 to 12000 milliwatts.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] poe max-power 12000
# Set the maximum power of Ethernet 1/1 to 12000 milliwatts through a PoE configuration file.
<Sysname> system-view [Sysname] poe-profile abc [Sysname-poe-profile-abc-1] poe max-power 12000 [Sysname-poe-profile-abc-1] quit [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] apply poe-profile name abc
By default, the maximum power is 247 W for the MIM/FIC 16FSW, and 370 W for the MIM/FIC 24FSW. The maximum power of the PSE must be greater than or equal to the sum of the maximum power of all critical PoE interfaces on the PSE so as to guarantee the power supply to these PoE interfaces. When the consumption power of all PDs connected to the PSE is greater than the maximum power of the PSE, some PDs will be powered off. The sum of the maximum power of all PSEs cannot exceed the maximum PoE power. Related commands: poe priority (system view).
Syntax
poe max-power max-power pse pse-id undo poe max-power pse pse-id
View
System view
Default level
2: System level
Parameters
max-power: Maximum power in watts of the PSE, in the range of 37 to 480 watts. pse pse-id: Specifies a PSE ID.
Examples
# Set the maximum power of PSE 1 to 150 watts.
<Sysname> system-view [Sysname] poe max-power 150 pse 1
poe mode
Description
Use poe mode to configure a PoE mode. Use undo poe mode to restore the default. By default, the PoE mode is signal (power over signal cables).
Syntax
poe mode signal undo poe mode
View
PoE interface view, PoE-profile file view
Default level
2: System level
Parameters
signal: Specifies the PoE mode as signal (power over signal cables), which means to use the pairs (1, 2, 3, 6) for transmitting data in category 3/5 twisted pair cable to supply DC power.
251
Examples
# Set the PoE mode to signal (power over signal cables).
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] poe mode signal
# Set the PoE mode to signal (power over signal cables) through a PoE configuration file.
<Sysname> system-view [Sysname] poe-profile abc [Sysname-poe-profile-abc-1] poe mode signal [Sysname-poe-profile-abc-1] quit [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] apply poe-profile name abc
poe pd-description
Description
Use poe pd-description to configure a description for the PD connected to a PoE interface. Use undo poe pd-description to restore the default. By default, no description is available for the PD connected to a PoE interface.
Syntax
poe pd-description text undo poe pd-description
View
PoE interface view
Default level
2: System level
Parameters
text: Description of the PD connected to a PoE interface, a string of 1 to 80 characters.
Examples
# Configure the description for the PD connected to Ethernet 1/1 as IP Phone for Room 101.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] poe pd-description IP Phone For Room 101
252
If the policy is enabled, and the PoE interface needs to supply power to outside in the case that the PSE is overloaded, the system allows the PoE interface to enable the PoE function, but whether the power can be supplied depends on the PoE interface priority. If the policy is not enabled, and the PoE interface needs to supply power to outside in the case that the PSE is overloaded, the system will not allow the PoE interface to enable the PoE function.
Syntax
poe pd-policy priority undo poe pd-policy priority
View
System view
Default level
2: System level
Parameters
None
Examples
# Configure a PD power management priority policy
<Sysname> system-view [Sysname] poe pd-policy priority
poe priority
Description
Use poe priority to configure a power priority level for a PoE interface. Use undo poe priority to restore the default. By default, the power priority of a PoE interface is low. When the PoE power is insufficient, power is first supplied to PoE interfaces with a higher priority level. If a PoE configuration file is already applied to a PoE interface, remove the application of the file to the PoE interface before configuring the interface in PoE-profile view. If a PoE configuration file is applied to a PoE interface, remove the application of the file to the PoE interface before configuring the interface in PoE interface view. If two PoE interfaces have the same priority level, the PoE interface with a smaller ID has the higher priority level.
Syntax
poe priority { critical | high | low } undo poe priority
View
PoE interface view, PoE-profile file view
Default level
2: System level
253
Parameters
critical: Sets the power priority of a PoE interface to critical. The PoE interface whose power priority level is critical works in guaranteed mode. In other words, power is first supplied to the PD connected to this critical PoE interface. high: Sets the power priority of a PoE interface to high. low: Sets the power priority of a PoE interface to low.
Examples
# Set the power priority of Ethernet 1/1 to critical.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] poe priority critical
# Set the power priority of Ethernet 1/1 to critical through a PoE configuration file.
<Sysname> system-view [Sysname] poe-profile abc [Sysname-poe-profile-abc-1] poe priority critical [Sysname-poe-profile-abc-1] quit [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] apply poe-profile name abc
Syntax
poe priority { critical | high | low } pse pse-id undo poe priority pse pse-id
View
System view
Default level
2: System level
Parameters
critical: Sets the power priority level of the PSE to critical. The PSE whose power priority level is critical works in guaranteed mode, that is, power is first supplied to the PSE.
254
high: Sets the power priority of the PSE to high. low: Sets the power priority of the PSE to low. pse pse-id: Specifies a PSE ID.
Examples
# Set the power priority of PSE 1 to critical.
<Sysname> system-view [Sysname] poe priority critical pse 1
Syntax
poe pse-policy priority undo poe pse-policy priority
View
System view
Default level
2: System level
Parameters
None
Examples
# Configure a PSE power management priority policy.
<Sysname> system-view [Sysname] poe pse-policy priority
poe update
CAUTION: The full mode is used only in the case that anomalies occur when you use the refresh mode to upgrade the PSE
processing software. Do not use the full mode in other circumstances.
Use full mode to upgrade the PSE processing software to restore the PSE firmware when the PSE processing
software is unavailable (it means that none of the PoE commands are executed successfully).
255
Description
Use poe update to upgrade the PSE processing software online.
Syntax
poe update { full | refresh } filename [ pse pse-id ]
View
System view
Default level
2: System level
Parameters
full: Specifies to upgrade the PSE processing software in full mode when the software is unavailable. refresh: Specifies to upgrade the PSE processing software in refresh mode when the software is available. filename: Name of the upgrade file, a string of 1 to 64 characters. This file must be in the root directory of the file system of the device. pse pse-id: Specifies a PSE ID.
Examples
# Upgrade the processing software of PSE 1 in service.
<Sysname> system-view [Sysname] poe update refresh 0400_001.S19 pse 1
poe utilization-threshold
Description
Use poe utilization-threshold to configure a power alarm threshold for the PSE. Use undo poe utilization-threshold to restore the default power alarm threshold of the PSE. By default, the power alarm threshold for the PSE is 80%. The system sends a trap message when the power utilization exceeds the alarm threshold. If the power utilization always keeps above the alarm threshold, the system does not send any trap message. Instead, when the percentage of the power utilization drops below the alarm threshold, the system sends a Trap message again.
Syntax
poe utilization-threshold utilization-threshold-value pse pse-id undo poe utilization-threshold pse pse-id
View
System view
Default level
2: System level
Parameters
utilization-threshold-value: Power alarm threshold in percentage, in the range of 1 to 99.
256
Examples
# Set the power alarm threshold of PSE 1 to 90%.
<Sysname> system-view [Sysname] poe utilization-threshold 90 pse 1
poe-profile
Description
Use poe-profile profile-name to create a PoE configuration file and enter PoE-profile view. Use undo poe-profile to delete the specified PoE configuration file. If no index is specified, the system automatically assigns an index to the PoE configuration file, starting from 1. If a PoE configuration file is already applied to a PoE interface, you cannot delete it. To delete the file, execute undo apply poe-profile to remove the application of the PoE configuration file to the PoE interface.
Syntax
poe-profile profile-name [ index ] undo poe-profile { index index | name profile-name }
View
System view
Default level
2: System level
Parameters
profile-name: Name of a PoE configuration file, a string of 1 to 15 characters. A PoE configuration file name begins with a letter (a through z or A through Z) and must not contain reserved keywords such as undo, all, name, interface, user, poe, disable, max-power, mode, priority and enable. index: Index number of a PoE configuration file, in the range of 1 to 100.
Examples
# Create a PoE configuration file, name it abc, and specify the index number as 3.
<Sysname> system-view [Sysname] poe-profile abc 3
257
A-MSR900
Value range for group-id: 1 to 5
A-MSR20-1X
Value range for group-id: 1 to 5
A-MSR20
Value range for group-id: 1 to 5
A-MSR30
Value range for group-id: 1 to 5
A-MSR50
Value range for group-id: 1 to 10
Syntax
display mirroring-group { group-id | all | local } [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
2: System level
Parameters
group-id: Number of the mirroring group to be displayed. all: Displays all mirroring groups. local: Displays local mirroring groups. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display information about all the mirroring groups.
<Sysname> display mirroring-group all mirroring-group 3: type: local status: active mirroring port:
258
Ethernet1/1 Ethernet1/2
inbound both
Description
Number of the mirroring group Type of the mirroring group, which can only be local Status of the mirroring group, which can be active or inactive Source port Destination port
mirroring-group
Description
Use mirroring-group to create a mirroring group. Use undo mirroring-group to remove the specified mirroring group or groups. By default, no mirroring group exists on a device. All the A-MSR routers support this command. The following table shows parameter and router compatibility: A-MSR900
Value range for group-id: 1 to 5
A-MSR20-1X
Value range for group-id: 1 to 5
A-MSR20
Value range for group-id: 1 to 5
A-MSR30
Value range for group-id: 1 to 5
A-MSR50
Value range for group-id: 1 to 10
Syntax
mirroring-group group-id local undo mirroring-group { group-id | all | local }
View
System view
Default level
2: System level
Parameters
group-id: Specifies the number of the mirroring group to be created or removed. all: Removes all mirroring groups by using the undo command. local: Creates a local mirroring group or removes all local mirroring groups with the undo command.
Examples
# Create a local mirroring group numbered 1.
<Sysname> system-view [Sysname] mirroring-group 1 local
259
mirroring-group mirroring-port
Description
Use mirroring-group mirroring-port to assign ports to a local mirroring group as source ports. Use undo mirroring-group mirroring-port to remove source ports from the mirroring group. By default, no source port is configured for any mirroring group. When removing a source port from a mirroring group, make sure the traffic direction you specified in undo mirroring-group mirroring-port matches the actual monitored direction specified earlier in mirroring-group mirroring-port. Related commands: mirroring-group. The following table shows the parameter and router compatibility: A-MSR900
Value range for group-id: 1 to 5
A-MSR20-1X
Value range for group-id: 1 to 5
A-MSR20
Value range for group-id: 1 to 5
A-MSR30
Value range for group-id: 1 to 5
A-MSR50
Value range for group-id: 1 to 10
Syntax
mirroring-group group-id mirroring-port mirroring-port-list { both | inbound | outbound } undo mirroring-group group-id mirroring-port mirroring-port-list { both | inbound | outbound }
View
System view
Default level
2: System level
Parameters
group-id: Number of a local mirroring group. The mirroring group specified by the group-id argument must already exist. mirroring-port-list: A list of source ports/port ranges to be assigned to or removed from the mirroring group specified by group-id. You can specify up to eight single ports, port ranges, or combinations of both for the list. A single port takes the form of interface-type interface-number. A port range takes the form interface-type interface-number to interface-type interface-number, where the end port number must be greater than the start port number. For example, you may specify up to eight combinations of single ports and port ranges for the list like this: ethernet 1/1 ethernet 1/3 ethernet 1/5 ethernet 2/2 to ethernet 2/10 ethernet 3/1 ethernet 3/4 ethernet 3/6 to ethernet 3/10 ethernet 3/12. both: Mirrors both inbound and outbound packets on the specified port(s). inbound: Mirrors only inbound packets on the specified port(s). outbound: Mirrors only outbound packets on the specified port(s).
Examples
# Create local mirroring group 1, configure Ethernet 1/1 as a source port of the mirroring group, and specify that the mirroring group monitor the bidirectional traffic of the port.
<Sysname> system-view [Sysname] mirroring-group 1 local [Sysname] mirroring-group 1 mirroring-port ethernet 1/1 both
260
mirroring-group monitor-port
Description
Use mirroring-group monitor-port to assign a port to a local mirroring group as the monitor port. Use undo mirroring-group monitor-port to remove the monitor port from the local mirroring group. By default, no monitor port is configured for a mirroring group. You cannot assign a source port in an existing mirroring group to another mirroring group as the monitor port. Related commands: mirroring-group. The following table shows the parameter and router compatibility: A-MSR900
Value range for group-id: 1 to 5
A-MSR20-1X
Value range for group-id: 1 to 5
A-MSR20
Value range for group-id: 1 to 5
A-MSR30
Value range for group-id: 1 to 5
A-MSR50
Value range for group-id: 1 to 10
Syntax
mirroring-group group-id monitor-port monitor-port-id undo mirroring-group group-id monitor-port monitor-port-id
View
System view
Default level
2: System level
Parameters
group-id: Number of a local mirroring group. The mirroring group specified by group-id must already exist. monitor-port-id: Port to be assigned to the specified mirroring group as the monitor port. The argument takes the form of interface-type interface-number, where interface-type specifies the port type and interface-number specifies the port number.
Examples
# Create local mirroring group 1, and configure port Ethernet 1/1 as its monitor port.
<Sysname> system-view [Sysname] mirroring-group 1 local [Sysname] mirroring-group 1 monitor-port ethernet 1/1
mirroring-port
Description
Use mirroring-port to assign the current port to a local mirroring group as a source port. Use undo mirroring-port to remove the current port from the mirroring group. By default, a port does not serve as a source port for any mirroring group.
261
When removing a source port from a mirroring group, make sure the traffic direction you specified in undo mirroring-group matches the actual monitored direction of the port specified earlier in mirroringport. The following table shows the parameter and router compatibility: A-MSR900
Value range for group-id: 1 to 5
A-MSR20-1X
Value range for group-id: 1 to 5
A-MSR20
Value range for group-id: 1 to 5
A-MSR30
Value range for group-id: 1 to 5
A-MSR50
Value range for group-id: 1 to 10
Syntax
[ mirroring-group group-id ] mirroring-port { inbound | outbound | both } undo [ mirroring-group group-id ] mirroring-port { inbound | outbound | both }
View
Interface view
Default level
2: System level
Parameters
mirroring-group group-id: Specifies a local mirroring group by its number. The mirroring group specified by group-id must already exist. The default value is 1. both: Mirrors both inbound and outbound packets on the current port. inbound: Mirrors only inbound packets on the current port. outbound: Mirrors only outbound packets on the current port.
Examples
# Create local mirroring group 1, configure Ethernet 1/1 as a source port of the mirroring group, and specify that the mirroring group monitor the bidirectional traffic of the port.
<Sysname> system-view [Sysname] mirroring-group 1 local [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] mirroring-group 1 mirroring-port both
monitor-port
Description
Use monitor-port to assign the current port to a local mirroring group as the monitor port. Use undo monitor-port to remove the current port from the mirroring group. By default, a port does not serve any mirroring group as the monitor port. You cannot configure a source port of an existing mirroring group as a monitor port. Related commands: mirroring-group. All A-MSR routers support this command. The following table shows the parameter and router compatibility:
262
A-MSR900
Value range for group-id: 1 to 5
A-MSR20-1X
Value range for group-id: 1 to 5
A-MSR20
Value range for group-id: 1 to 5
A-MSR30
Value range for group-id: 1 to 5
A-MSR50
Value range for group-id: 1 to 10
Syntax
[ mirroring-group group-id ] monitor-port undo [ mirroring-group group-id ] monitor-port
View
Interface view
Default level
2: System level
Parameters
mirroring-group group-id: Specifies a local mirroring group by its number. The mirroring group specified by group-id must already exist. The default value is 1.
Examples
# Create local mirroring group 1, and configure Ethernet 1/1 as its monitor port.
<Sysname> system-view [Sysname] mirroring-group 1 local [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] monitor-port
263
A-MSR900
No
A-MSR20-1X
No
A-MSR20
No
A-MSR30
Yes
A-MSR50
Yes
Syntax
mirror-to interface interface-type interface-number undo mirror-to interface interface-type interface-number
View
Traffic behavior view
Default level
2: System level
Parameters
interface interface-type interface-number: Mirrors traffic to an interface specified by its type and number.
Examples
# Create traffic behavior 1 and configure the action of mirroring traffic to port Ethernet 1/1 for the traffic behavior.
<Sysname> system-view [Sysname] traffic behavior 1 [Sysname-behavior-1] mirror-to interface ethernet 1/1
264
Syntax
display channel [ channel-number | channel-name ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
channel-number: Displays information of the channel with a specified number, where channel-number represents the channel number, which ranges from 0 to 9. channel-name: Displays information of the channel with a specified name, where channel-name represents the channel name, which could be a default name or a self-defined name. The user needs to specify a channel name first before using it as a self-defined channel name. For more information, see the info-center channel name command. Table 59 Information channels for different output destinations Output destination
Console Monitor terminal Log host Trap buffer Log buffer SNMP module Web interface Log file
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression.
265
Examples
# Display information for channel 0.
<Sysname> display channel 0 channel number:0, channel name:console MODU_ID NAME ENABLE LOG_LEVEL Y informational ENABLE TRAP_LEVEL Y debugging ENABLE DEBUG_LEVEL Y debugging ffff0000 default
The output information indicates to output log information with the severity from 0 to 4, trap information with the severity from 0 to 7 and debugging information with the severity from 0 to 7 to the console. The information source modules are all modules (default). Table 60 Output description Field
channel number channel name MODU_ID
Description
A specified channel number, in the range 0 to 9. A specified channel name, which varies with users configuration. For more information, see the info-center channel name command. The ID of the module to which the information permitted to pass through the current channel belongs The name of the module to which the information permitted to pass through the current channel belongs Default means all modules are allowed to output system information, but the module type varies with devices. Indicates whether to enable or disable the output of log information, which could be Y or N. The severity of log information, see Table 62 for details. Indicates whether to enable or disable the output of trap information, which could be Y or N. The severity of trap information, see Table 62 for details. Indicates whether to enable or disable the output of debugging information, which could be Y or N. The severity of debugging information, see Table 62 for details.
NAME
display info-center
Description
Use display info-center to display the information of each output destination.
Syntax
display info-center [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
266
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display configurations on each output destination.
<Sysname> display info-center Information Center:enabled Log host: 1.1.1.1, port number : 514, host facility : local7, channel number : 2, channel name : loghost Console: channel number : 0, channel name : console Monitor: channel number : 1, channel name : monitor SNMP Agent: channel number : 5, channel name : snmpagent Log buffer: enabled,max buffer size 1024, current buffer size 512, current messages 512, dropped messages 0, overwritten messages 740 channel number : 4, channel name : logbuffer Trap buffer: enabled,max buffer size 1024, current buffer size 256, current messages 216, dropped messages 0, overwritten messages 0 channel number : 3, channel name : trapbuffer logfile: channel number:9, channel name:channel9 syslog: channel number:6, channel name:channel6 Information timestamp setting: log - date, trap - date, debug - date, loghost - date
Description
The current state of the information center, which could be enabled or disabled.
267
Field
Log host: 1.1.1.1, port number : 514, host facility : local2, channel number : 8, channel name : channel8 Console: channel number : 0, channel name : console Monitor: channel number : 1, channel name : monitor SNMP Agent: channel number : 5, channel name : snmpagent Log buffer: enabled,max buffer size 1024, current buffer size 512, current messages 512, dropped messages 0, overwritten messages 740 channel number : 4, channel name : logbuffer Trap buffer: enabled,max buffer size 1024, current buffer size 256, current messages 216, dropped messages 0, overwritten messages 0 channel number : 3, channel name : trapbuffer logfile: channel number:9, channel name:channel9 syslog: channel number:6, channel name:channel6
Description
Configurations on the log host destination (It can be displayed only when info-center loghost is configured), including IP address of the log host, number of the port that receives the system information on the log host, logging facility used, and the channel number and channel name used.) Configurations on the console destination, including the channel number and channel name used Configurations on the monitor terminal destination, including the channel number and channel name used Configurations on the SNMP module destination, including the channel number and channel name used Configurations on the log buffer destination, including whether information output to this destination is enabled or disabled, the maximum capacity, the current capacity, the current number of messages, the number of dropped messages, the number of messages that have been overwritten, and the channel number and channel name used. Configurations on the trap buffer destination, including whether information output to this destination is enabled or disabled, the maximum capacity, the current capacity, the current number of messages, the number of dropped messages, the number of messages that have been overwritten, and the channel number and channel name used. Configurations on the log file destination, including the channel number, and channel name used. Configurations on the Web interface destination, including the channel number, and channel name used. The time stamp configurations, specifying the time stamp format for log, trap, debug, and log host information.
NOTE: Only devices that support the log file feature display the related log file information after the execution of the display info-center command.
display logbuffer
Description
Use display logbuffer to display the state of the log buffer and the log information recorded. Absence of the size buffersize argument indicates that all log information recorded in the log buffer is displayed.
268
Syntax
display logbuffer [ reverse ] [ level severity | size buffersize ] * [ | { begin | exclude | include } regularexpression ]
View
Any view
Default level
1: Monitor level
Parameters
reverse: Displays log entries chronologically, with the most recent entry at the top. If this keyword is not specified, the log entries will be displayed chronologically, with the oldest entry at the top. level severity: Displays information of the log with specified level, where severity represents information level, which ranges from 0 to 7. Table 62 Severity description Severity
Emergency Alert Critical Error Warning Notice Informational Debug
Value
0 1 2 3 4 5 6 7
Description
The system is unusable. Action must be taken immediately Critical conditions Error conditions Warning conditions Normal but significant condition Informational messages Debug-level messages
size buffersize: Displays specified number of the latest log messages in the log buffer, where buffersize represents the number of the latest log messages to be displayed in the log buffer. The value is in the range 1 to 1024. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the state of the log buffer and the log information recorded.
<Sysname> display logbuffer Logging buffer configuration and contents:enabled
269
Allowed max buffer size : 1024 Actual buffer size : 512 Channel number : 4 , Channel name : logbuffer Dropped messages : 0 Overwritten messages : 718 Current messages : 512 %Jun 17 15:57:09:578 2006 Sysname IC/7/SYS_RESTART: System restarted --
Description
Indicates the current state of the log buffer and its contents, which could be enabled or disabled. The maximum buffer size allowed The actual buffer size The channel number of the log buffer, defaults to 4. The channel name of the log buffer, defaults to logbuffer. The number of dropped messages The number of overwritten messages (when the buffer size is not big enough to hold all messages, the latest messages overwrite the old ones). The number of the current messages
Syntax
display logbuffer summary [ level severity ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
level severity: Displays the summary of the log buffer, where severity represents information level, which ranges from 0 to 7. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.
270
begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the summary of the log buffer.
<Sysname> display logbuffer summary EMERG ALERT 0 0 CRIT ERROR 0 0 WARN NOTIF 22 0 INFO DEBUG 1 0
Description
Represents emergency, see Table 62 for details Represents alert, see Table 62 for details Represents critical, see Table 62 for details Represents error, see Table 62 for details Represents warning, see Table 62 for details Represents notice, see Table 62 for details Represents informational, see Table 62 for details Represents debug, see Table 62 for details
A-MSR900
Yes
A-MSR201X
No
A-MSR20
Yes
A-MSR30
Yes
A-MSR50
Yes
Syntax
display logfile buffer [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
271
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the contents of the log file buffer.
<Sysname> display logfile buffer %@27091414#Aug 7 08:04:02:470 2009 Sysname IFNET/4/INTERFACE UPDOWN: Interface 983040 is Up, ifAdminStatus is 1, Trap 1.3.6.1.6.3.1.1.5.4<linkUp>: ifOperStatus is 1
A-MSR900
Yes
A-MSR201X
No
A-MSR20
Yes
A-MSR30
Yes
A-MSR50
Yes
Syntax
display logfile summary [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the configuration of the log file.
<Sysname> display logfile summary
272
Log file is enabled. Channel number : 9 Log file size quota : 10 MB Log file directory : flash:/logfile Writing frequency : 24 hour 0 min 10 sec
Description
The current state of a log file, which could be enabled or disabled. The channel number of a log file, defaults to 9. The maximum storage space reserved for a log file Log file directory Log file writing frequency
display trapbuffer
Description
Use display trapbuffer to display the state and the trap information recorded. Absence of the size buffersize argument indicates that all trap information is displayed.
Syntax
display trapbuffer [ reverse ] [ size buffersize ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
reverse: Displays trap entries chronologically, with the most recent entry at the top. If this keyword is not specified, trap entries will be displayed chronologically, with the oldest entry at the top. size buffersize: Displays specified number of the latest trap messages in a trap buffer, where buffersize represents the number of the latest trap messages in a trap buffer, which ranges from 1 to 1,024. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the state of the trap buffer and the trap information recorded.
<Sysname> display trapbuffer
273
Trapping buffer configuration and contents:enabled Allowed max buffer size : 1024 Actual buffer size : 256 Channel number : 3 , channel name : trapbuffer Dropped messages : 0 Overwritten messages : 0 Current messages : 19 #Aug #Aug #Aug #Aug #Aug #Aug #Aug 9 09:54:03:625 2011 HP DEVM/4/SYSTEM COLD START: 9 09:55:16:500 2011 HP SHELL/4/LOGIN: 9 09:55:17:969 2011 HP SHELL/4/LOGOUT: 9 10:16:24:000 2011 HP SHELL/4/LOGIN: 9 10:26:26:808 2011 HP SHELL/4/LOGOUT: 9 11:22:37:890 2011 HP SHELL/4/LOGIN: 9 11:34:06:907 2011 HP CFGMAN/4/TRAP: changed, EventIndex=2, CommandSource=2, Trap 1.3.6.1.4.1.25506.6.8.4: system cold start. Trap 1.3.6.1.4.1.25506.2.2.1.1.3.0.1: login from Console Trap 1.3.6.1.4.1.25506.2.2.1.1.3.0.2: logout from Console Trap 1.3.6.1.4.1.25506.2.2.1.1.3.0.1: login from Console Trap 1.3.6.1.4.1.25506.2.2.1.1.3.0.2: logout from Console Trap 1.3.6.1.4.1.25506.2.2.1.1.3.0.1: login from Console Trap 1.3.6.1.4.1.25506.2.4.2.1: configure ConfigSource=4, ConfigDestination=2. #Aug #Aug #Aug #Aug #Aug 9 11:42:59:787 2011 HP SHELL/4/LOGOUT: 9 11:43:18:370 2011 HP SHELL/4/LOGIN: 9 11:48:20:057 2011 HP SHELL/4/LOGIN: 9 11:48:29:223 2011 HP IFNET/4/INTERFACE UPDOWN: 9 11:54:06:897 2011 HP CFGMAN/4/TRAP: changed, EventIndex=3, CommandSource=2,
Trap 1.3.6.1.4.1.25506.2.2.1.1.3.0.2: logout from Console Trap 1.3.6.1.4.1.25506.2.2.1.1.3.0.1: login from Console Trap 1.3.6.1.4.1.25506.2.2.1.1.3.0.1:admin login from Web Trap 1.3.6.1.6.3.1.1.5.4: Interface 3276800 is Up, ifAdminStatus is 1, ifOperStatus is 1 Trap 1.3.6.1.4.1.25506.2.4.2.1: configure ConfigSource=4, ConfigDestination=2. #Aug #Aug #Aug #Aug #Aug 2 #Aug #Aug 9 13:38:07:790 2011 HP IFNET/4/INTERFACE UPDOWN: 9 13:38:48:650 2011 HP SHELL/4/LOGIN: Trap 1.3.6.1.6.3.1.1.5.4: Interface 983043 is Up, ifAdminStatus is 1, ifOperStatus is 1 Trap 1.3.6.1.4.1.25506.2.2.1.1.3.0.1: login from Console 9 12:00:12:319 2011 HP SHELL/4/LOGOUT: 9 12:01:01:009 2011 HP SHELL/4/LOGOUT: 9 13:34:47:790 2011 HP IFNET/4/INTERFACE UPDOWN: 9 13:35:19:010 2011 HP SHELL/4/LOGIN: 9 13:38:02:790 2011 HP IFNET/4/INTERFACE UPDOWN:
Trap 1.3.6.1.4.1.25506.2.2.1.1.3.0.2: logout from Console Trap 1.3.6.1.4.1.25506.2.2.1.1.3.0.2:admin logout from Web Trap 1.3.6.1.6.3.1.1.5.4: Interface 983043 is Up, ifAdminStatus is 1, ifOperStatus is 1 Trap 1.3.6.1.4.1.25506.2.2.1.1.3.0.1:admin login from Web Trap 1.3.6.1.6.3.1.1.5.3: Interface 983043 is Down, ifAdminStatus is 1, ifOperStatus is
274
Description
Indicates the current state of the trap buffer and its contents, which could be enabled or disabled. The maximum buffer size allowed The actual buffer size The channel number of the trap buffer, defaults to 3. The channel name of the trap buffer, defaults to trapbuffer. The number of dropped messages The number of overwritten messages (when the buffer size is not big enough to hold all messages, the latest messages overwrite the old ones). The number of the current messages
Syntax
enable log updown undo enable log updown
View
Interface view
Default level
2: System level
Parameters
None
Examples
# Disable port Ethernet 1/1 from generating link up/down logging information.
<Sysname> system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] undo enable log updown
275
Syntax
info-center channel channel-number name channel-name undo info-center channel channel-number
View
System view
Default level
2: System level
Parameters
channel-number: Specifies a channel number, which ranges from 0 to 9. channel-name: Specifies a channel name, which is a string of 1 to 30 characters. It must be a combination of letters and numbers, and start with a letter and is case-insensitive.
Examples
# Name channel 0 as abc.
<Sysname> system-view [Sysname] info-center channel 0 name abc
Syntax
info-center console channel { channel-number | channel-name } undo info-center console channel
View
System view
Default level
2: System level
276
Parameters
channel-number: Specifies a channel number, which ranges from 0 to 9. channel-name: Specifies a channel name, which could be a default name or a self-defined name. The user needs to specify a channel name first before using it as a self-defined channel name. For more information, see the info-center channel name command.
Examples
# Set channel 0 to output system information to the console.
<Sysname> system-view [Sysname] info-center console channel 0
info-center enable
Description
Use info-center enable to enable information center. Use undo info-center enable to disable the information center. The system outputs information to the log host or the console only after the information center is enabled first. By default, the information center is enabled.
Syntax
info-center enable undo info-center enable
View
System view
Default level
2: System level
Parameters
None
Examples
# Enable the information center.
<Sysname> system-view [Sysname] info-center enable Info: Information center is enabled.
Syntax
info-center format unicom undo info-center format
View
System view
Default level
2: System level
Parameters
None
Examples
# Set the format of the system information sent to a log host to UNICOM.
<Sysname> system-view [Sysname] info-center format unicom
info-center logbuffer
Description
Use info-center logbuffer to enable information output to a log buffer and set the corresponding parameters. Use undo info-center logbuffer to disable information output to a log buffer. By default, information is output to the log buffer with the default channel of channel 4 (logbuffer) and the default buffer size of 512. Note that info-center logbuffer takes effect only after the information center is enabled with info-center enable.
Syntax
info-center logbuffer [ channel { channel-number | channel-name } | size buffersize ] * undo info-center logbuffer [ channel | size ]
View
System view
Default level
2: System level
Parameters
channel-number: A specified channel number, which ranges from 0 to 9. channel-name: Specifies a channel name, which could be a default name or a self-defined name. The user needs to specify a channel name first before using it as a self-defined channel name. For more information, see the info-center channel name command. buffersize: Specifies the maximum number of log messages that can be stored in a log buffer. The value is in the range 0 to 1024 and defaults to 512.
278
Examples
# Configure the system to output information to the log buffer through channel 4, and set the log buffer size to 50.
<Sysname> system-view [Sysname] info-center logbuffer size 50
A-MSR900
Yes
A-MSR201X
No
A-MSR20
Yes
A-MSR30
Yes
A-MSR50
Yes
Syntax
info-center logfile enable undo info-center logfile enable
View
System view
Default level
2: System level
Parameters
None
Examples
# Enable the log file feature.
<Sysname> system-view [Sysname] info-center logfile enable
279
Command
A-MSR900
Yes
A-MSR201X
A-MSR20
Yes
A-MSR50
Yes Default value for freq-sec: 86400
No
Syntax
info-center logfile frequency freq-sec undo info-center logfile frequency
View
System view
Default level
2: System level
Parameters
freq-sec: Frequency with which the system saves the log file, which ranges from 1 to 86,400 seconds.
Examples
# Configure the frequency with which the system saves the log file as 60,000 seconds.
<Sysname> system-view [Sysname] info-center logfile frequency 60000
A-MSR201X
Default
value for size: 10
Default value
for size: 10
Default value
for size: 10
Default value
for size: 10
Syntax
info-center logfile size-quota size undo info-center logfile size-quota
280
View
System view
Default level
2: System level
Parameters
size: The maximum storage space reserved for a log file, in MB.
Examples
# Set the maximum storage space reserved for a log file to 6 MB.
<Sysname> system-view [Sysname] info-center logfile size-quota 6
A-MSR900
Yes
A-MSR201X
No
A-MSR20
Yes
A-MSR30
Yes
A-MSR50
Yes
Syntax
info-center logfile switch-directory dir-name
View
System view
Default level
2: System level
Parameters
dir-name: The name of the directory where a log file is saved, which is a string of 1 to 64 characters.
Examples
# Create a directory with the name test under flash root directory.
<Sysname> mkdir test %Created dir flash:/test.
281
info-center loghost
Description
Use info-center loghost to specify a log host and to configure the related parameters. Use undo info-center loghost to restore the default configurations on a log host. By default, output of system information to the log host is disabled. When it is enabled, the default channel name will be loghost and the default channel number will be 2. Note that: info-center loghost takes effect only after the information center is enabled with info-center enable. Ensure to input a correct IP address while using info-center loghost to configure the IP address for a log host. System will prompt an invalid address if the loopback address (127.0.0.1) is input. A maximum number of 4 hosts (different) can be designated as the log host.
Syntax
info-center loghost { ipv6 host-ipv6-address | [ vpn-instance vpn-instance-name ] host-ipv4-address } [ port port-number ] [ channel { channel-number | channel-name } | facility local-number ] * undo info-center loghost { ipv6 host-ipv6-address | [ vpn-instance vpn-instance-name ] host-ipv4-address }
View
System view
Default level
2: System level
Parameters
vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the log host belongs, where vpninstance-name is a case-sensitive string of 1 to 31 characters. If the log host is on the public network, do not specify this option. ipv6 host-ipv6-address: The IPv6 address of the log host. host-ipv4-address: The IPv4 address of the log host. port port-number: Specifies the number of the port that receives the system information on the log host. The value ranges from 1 to 65535 and defaults to 514. In addition, the value of the port-number argument should be the same as the value configured on the log host, otherwise, the log host cannot receive system information. channel: Specifies the channel through which system information can be output to the log host. channel-number: Specifies a channel number, which ranges from 0 to 9. channel-name: Specifies a channel name, which could be a default name or a self-defined name. The user needs to specify a channel name first before using it as a self-defined channel name. For more information, see the info-center channel name command. facility local-number: The logging facility of the log host. The value can be local0 to local7 and defaults to local7. Logging facility is mainly used to mark different logging sources, query and filer the logs of the corresponding log source.
Examples
# Output log information to a log host with the IP address being 1.1.1.1.
282
# Output log information to a log host with the IP address being 1.1.1.2, and the VPN instance name is vpn1.
<Sysname> system-view [Sysname] info-center loghost vpn-instance vpn1 1.1.1.2
# Output log information to a log host with the IPv6 address being 1::1.
<Sysname> system-view [Sysname] info-center loghost ipv6 1::1
Syntax
info-center loghost source interface-type interface-number undo info-center loghost source
View
System view
Default level
2: System level
Parameters
interface-type interface-number: Specifies the egress interface for log information by the interface type and interface number.
Examples
When the source IP address for log information is not specified, the status of interface Ethernet 1/1 is up, and the log information in this format is displayed on the log host:
<187>Jul 22 05:58:06 2008 Sysname %%10IFNET/3/LINK UPDOWN(l): Ethernet1/1 link status is UP.
# Specify the IP address of interface loopback 0 as the source IP address of log information.
283
<Sysname> system-view [Sysname] interface loopback 0 [Sysname-LoopBack0] ip address 2.2.2.2 32 [Sysname-LoopBack0] quit [Sysname] info-center loghost source loopback 0
After this configuration, the status of interface Ethernet 1/1 becomes up, and the log information in the next format is displayed on the log host (compared with the format displayed when the source IP address for log information is not specified, this format has the -DevIP=2.2.2.2 field which indicates the source IP address):
<187>Jul 22 06:11:31 2008 Sysname %%10IFNET/3/LINK UPDOWN(l):-DevIP=2.2.2.2;Ethernet1/1 link status is UP.
Syntax
info-center monitor channel { channel-number | channel-name } undo info-center monitor channel
View
System view
Default level
2: System level
Parameters
channel-number: Specifies a channel number, which ranges from 0 to 9. channel-name: Specifies a channel name, which could be a default name or a self-defined name. The user needs to specify a channel name first before using it as a self-defined channel name. For more information, see info-center channel name.
Examples
# Output system information to the monitor through channel 0.
<Sysname> system-view [Sysname] info-center monitor channel 0
Use undo info-center snmp channel to restore the default channel to output system information to the SNMP module. By default, output of system information to the SNMP module is enabled with a default channel name of snmpagent and a default channel number of 5. For more information, see display snmp-agent in the chapter SNMP configuration commands.
Syntax
info-center snmp channel { channel-number | channel-name } undo info-center snmp channel
View
System view
Default level
2: System level
Parameters
channel-number: Specifies a channel number, which ranges from 0 to 9. channel-name: Specifies a channel name, which could be a default name or a self-defined name. The user needs to specify a channel name first before using it as a self-defined channel name. For more information, see the info-center channel name command.
Examples
# Output system information to the SNMP module through channel 6.
<Sysname> system-view [Sysname] info-center snmp channel 6
info-center source
Description
Use info-center source to specify the output rules of the system information. Use undo info-center source to remove the specified output rules. By default, the output rules for the system information are listed in Table 67. This command can be used to set the filter and redirection rules of log, trap and debugging information. For example, the user can set to output log information with severity higher than warning to the log host, and information with severity higher than informational to the log buffer. The user can also set to output trap information of the IP module to a specified output destination. Note that: If you do not use the module-name argument to set output rules for a module, the module uses the default output rules or the output rules set by the default keyword; otherwise the module uses the output rules separately set for it. If you use the default keyword to set the output rules for all the modules without specifying the debug, log, and trap keywords, the default output rules for the modules are used. See Table 67 for more information. If you use the module-name argument to set the output rules for a module without specifying the debug, log, and trap keywords, the default output rules for the module are as follows: the output of
285
log and trap information is enabled, with severity being informational; the output of debugging information is disabled, with severity being debug. For example, if you execute the command infocenter source snmp channel 5, the command is actually equal to the command info-center source snmp channel 5 debug level debugging state off log level informational state on trap level informational state on. If you repeatedly use the command to set the output rules for a module or for all the modules with the default keyword, the last configured output rules take effect After you separately set the output rules for a module, you must use the module-name argument to modify or remove the rules. The new configuration by using the default keyword is invalid on the module. You can configure to output the log, trap and debugging information to the trap buffer, but the trap buffer only receives the trap information and discards the log and debugging information. You can configure to output the log, trap and debugging information to the log buffer, but the log buffer only receives the log and debugging information and discards the trap information. You can configure to output the log, trap and debugging information to the SNMP module, but the SNMP module only receives the trap information and discards the log and debugging information.
Table 67 Default output rules for different output destinations Output destinatio n
Console Monitor terminal Log host Trap buffer Log buffer SNMP module Log file
Modules allowed
default (all modules) default (all modules) default (all modules) default (all modules) default (all modules) default (all modules) default (all modules)
TRAP Severity
Informatio nal Informatio nal Informatio nal Informatio nal Informatio nal Debug Debug
DEBUG Severity
Debug Debug Debug Informatio nal Debug Informatio nal Debug
Enabled/ disabled
Enabled Enabled Enabled Enabled Disabled Enabled Enabled
Enabled/ disabled
Enabled Enabled Disabled Disabled Disabled Disabled Disabled
Severity
Debug Debug Debug Debug Debug Debug Debug
Syntax
info-center source { module-name | default } channel { channel-number | channel-name } [ debug { level severity | state state } * | log { level severity | state state } * | trap { level severity | state state } * ] * undo info-center source { module-name | default } channel { channel-number | channel-name }
View
System view
286
Default level
2: System level
Parameters
module-name: Specifies the output rules of the system information of the specified modules. For instance, if information on ARP module is to be output, you can configure this argument as ARP. You can use infocenter source ? to view the modules supported by the device. default: Specifies the output rules of the system information of all the modules allowed to output the system information, including all the modules displayed by using info-center source ?. debug: Debugging information. log: Log information. trap: Trap information. level severity: Specifies the severity of system information. For more information, see Table 62. With this keyword, you can specify the severity level of the information allowed/denied to output. state state: Configures whether to output the system information, which could be on (enabled) or off (disabled). With this keyword, you can specify whether to output the specified system information. channel-number: Specifies a channel number, which ranges from 0 to 9. channel-name: Specifies a channel name, which could be a default name or a self-defined name. The user needs to specify a channel name first before using it as a self-defined channel name. For more information, see the info-center channel name command.
Examples
# Set the output channel for the log information of VLAN module to snmpagent and to output information with severity being emergency. Log information of other modules cannot be output to this channel; other types of information of this module may or may not be output to this channel.
<Sysname> system-view [Sysname] info-center source default channel snmpagent log state off [Sysname] info-center source vlan channel snmpagent log level emergencies state on
# Set the output channel for the log information of VLAN module to snmpagent and to output information with severity being emergency. Log information of other modules and all the other system information cannot be output to this channel.
<Sysname> system-view [Sysname] info-center source default channel snmpagent debug state off log state off trap state off [Sysname] info-center source vlan channel snmpagent log level emergencies state on
info-center synchronous
Description
Use info-center synchronous to enable synchronous information output. Use undo info-center synchronous to disable the synchronous information output. By default, the synchronous information output is disabled.
287
NOTE: If system information, such as log information, is output before you input any information under a current
command line prompt, the system will not display the command line prompt after the system information output.
If system information is output when you are inputting some interactive information (non Y/N confirmation
information), then after the system information output, the system will not display the command line prompt but your previous input in a new line.
Syntax
info-center synchronous undo info-center synchronous
View
System view
Default level
2: System level
Parameters
None
Examples
# Enable the synchronous information output function, and then input the display interface ethe command to view Ethernet interface information.
<Sysname> system-view [Sysname] info-center synchronous % Info-center synchronous output is on [Sysname] display interface ethe
At this time, the system receives log messages, and it then displays the log messages first. After the system displays all the log messages, it displays the users previous input, which is display interface ethe in this example.
%Apr 29 08:12:44:71 2007 Sysname IFNET/4/LINK UPDOWN: Ethernet2/1: link status is UP [Sysname] display interface ethe
After the above information is displayed, you can input rnet to complete your input of the display interface ethernet command, and then press the Enter key to execute the command. # Enable the synchronous information output function, and then save the current configuration (input interactive information).
<Sysname> system-view [Sysname] info-center synchronous % Info-center synchronous output is on [Sysname] save The current configuration will be written to the device. Are you sure? [Y/N]:
At this time, the system receives the log information, and it then displays the log information first. After the system displays all the log information, it displays [Y/N].
%May 21 14:33:19:425 2007 Sysname SHELL/4/LOGIN: VTY login from 192.168.1.44 [Y/N]:
288
After the above information is displayed, you can input Y or N to complete your input before the output of the log information.
Syntax
info-center syslog channel { channel-number | channel-name } undo info-center syslog channel
View
System view
Default level
2: System level
Parameters
channel-number: Specifies a channel number, which ranges from 0 to 9. channel-name: Specifies a channel name, which could be a default name or a self-defined name. You need to specify a channel name first before using it as a self-defined channel name. For more information, see the info-center channel name command.
Examples
# Configure the system to output information to the Web interface through channel 7.
<Sysname> system-view [Sysname] info-center syslog channel 7
info-center timestamp
Description
Use info-center timestamp to configure the time stamp format of the system information sent to all destinations except log host. Use undo info-center timestamp to restore the default. By default, the time stamp format of the system information sent to a log host is set by the info-center timestamp loghost command, and the format of log, trap and debugging information sent to other destinations is date. Related commands: info-center timestamp loghost.
Syntax
info-center timestamp { debugging | log | trap } { boot | date | none } undo info-center timestamp { debugging | log | trap }
289
View
System view
Default level
2: System level
Parameters
debugging: Sets the time stamp format of the debugging information. log: Sets the time stamp output format of the log information. trap: Sets the time stamp output format of the trap information. boot: The time taken to boot up the system, in the format of xxxxxx.yyyyyy, in which xxxxxx represents the most significant 32 bits of the time taken to boot up the system (in milliseconds) whereas yyyyyy is the least significant 32 bits. For example, 0.21990989 equals Jun 25 14:09:26:881 2007. date: The current system date and time, in the format of Mmm dd hh:mm:ss:sss yyyy. Mmm: The abbreviations of the months in English, which could be Jan, Feb, Mar, Apr, May, Jun, Jul, Aug, Sep, Oct, Nov, or Dec. dd: The date, starting with a space if less than 10, for example 7. hh:mm:ss:sss: The local time, with hh ranging from 00 to 23, mm and ss ranging from 00 to 59, and sss ranging from 0 to 999. yyyy: Represents the year.
Examples
# Configure the time stamp format for log information as boot.
<Sysname> system-view [Sysname] info-center timestamp log boot
At this time, if you execute shutdown on Ethernet 1/1 that is in the UP state, the log information generated is as follows:
%0.1382605158 Sysname IFNET/4/LINK UPDOWN: Ethernet1/1: link status is DOWN
At this time, if you execute shutdown on Ethernet 1/1 that is in the UP state, the log information generated is as follows:
%Sep 29 17:19:11:188 2007 Sysname IFNET/4/LINK UPDOWN: Ethernet1/1: link status is DOWN
At this time, if you execute shutdown on Ethernet 1/1 that is in the UP state, the log information generated is as follows:
% Sysname IFNET/4/LINK UPDOWN: Ethernet1/1: link status is DOWN
290
Syntax
info-center timestamp loghost { date | iso | no-year-date | none } undo info-center timestamp loghost
View
System view
Default level
2: System level
Parameters
date: Indicates the current system date and time, in the format of "Mmm dd hh:mm:ss:ms yyyy". However, the display format depends on the log host. iso: Sets the time stamp to ISO 8601 format, for example, 2009-09-21T15:32:55. no-year-date: Indicates the current system date and time (year exclusive). none: Indicates that no time stamp information is provided.
Examples
# Configure that the system information output to the log host does not include the year information.
<Sysname> system-view [Sysname] info-center timestamp loghost no-year-date
info-center trapbuffer
Description
Use info-center trapbuffer to enable information output to the trap buffer and set the corresponding parameters. Use undo info-center trapbuffer to disable information output to the trap buffer. By default, information output to the trap buffer is enabled with channel 3 (trapbuffer) as the default channel and a maximum buffer size of 256. Note that info-center trapbuffer takes effect only after the information center is enabled with info-center enable.
Syntax
info-center trapbuffer [ channel { channel-number | channel-name } | size buffersize ] * undo info-center trapbuffer [ channel | size ]
291
View
System view
Default level
2: System level
Parameters
size buffersize: Specifies the maximum number of trap messages in a trap buffer, which ranges from 0 to 1,024, and defaults to 256. channel-number: Specifies a channel number, which ranges from 0 to 9. channel-name: Specifies a channel name, which could be a default name or a self-defined name. The user needs to specify a channel name first before using it as a self-defined channel name. For more information, see the info-center channel name command.
Examples
# Configure the system to output information to the trap buffer through the default channel, and set the trap buffer size to 30.
<Sysname> system-view [Sysname] info-center trapbuffer size 30
logfile save
Description
Use logfile save to save all the contents in the log file buffer into the log file. By default, the system automatically saves the log file based on a frequency configured by info-center logfile frequency into a directory configured by info-center logfile switch-directory. Note that all contents in the log file buffer will be cleared after they are successfully saved into the log file automatically or manually. The following table shows the command and router compatibility: Command
logfile save
A-MSR900
Yes
A-MSR201X
No
A-MSR20
Yes
A-MSR30
Yes
A-MSR50
Yes
Syntax
logfile save
View
Any view
Default level
2: System level
Parameters
None
Examples
# Save the contents in the log file buffer into the log file.
<Sysname> logfile save
292
reset logbuffer
Description
Use reset logbuffer to reset the log buffer contents.
Syntax
reset logbuffer
View
User view
Default level
3: Manage level
Parameters
None
Examples
# Reset the log buffer contents.
<Sysname> reset logbuffer
reset trapbuffer
Description
Use reset trapbuffer to reset the trap buffer contents.
Syntax
reset trapbuffer
View
User view
Default level
3: Manage level
Parameters
None
Examples
# Reset the trap buffer contents.
<Sysname> reset trapbuffer
terminal debugging
Description
Use terminal debugging to enable the display of debugging information on the current terminal. Use undo terminal debugging to disable the display of debugging information on the current terminal. By default, the display of debugging information on the current terminal is disabled. Note that:
293
To display the debugging information, you need to execute the terminal monitor and terminal debugging commands, then enable information center (enabled by default), and finally use a debugging command to enable the related debugging. The configuration of this command is valid for only the current connection between the terminal and the device. If a new connection is established, the display of debugging information on the terminal restores the default.
Syntax
terminal debugging undo terminal debugging
View
User view
Default level
1: Monitor level
Parameters
None
Examples
# Enable the display of debugging information on the current terminal.
<Sysname> terminal debugging Info: Current terminal debugging is on.
terminal logging
Description
Use terminal logging to enable the display of log information on the current terminal. Use undo terminal logging to disable the display of log information on the current terminal. By default, the display of log information on the current terminal is disabled. Note that: To display the log information, you need to execute the terminal monitor and terminal logging commands, and then enable information center (enabled by default). The configuration of this command is valid for only the current connection between the terminal and the device. If a new connection is established, the display of log information on the terminal restores the default.
Syntax
terminal logging undo terminal logging
View
User view
Default level
1: Monitor level
294
Parameters
None
Examples
# Disable the display of log information on the current terminal.
<Sysname> undo terminal logging Info: Current terminal logging is off.
terminal monitor
Description
Use terminal monitor to enable the monitoring of system information on the current terminal. Use undo terminal monitor to disable the monitoring of system information on the current terminal. By default, monitoring of the system information on the console is enabled and that on the monitor terminal is disabled. Note that: You need to configure terminal monitor before you can display the log, trap, and debugging information. Configuration of undo terminal monitor automatically disables the monitoring of log, trap, and debugging information. The configuration of this command is valid for only the current connection between the terminal and the device. If a new connection is established, the monitoring of system information on the terminal restores the default.
Syntax
terminal monitor undo terminal monitor
View
User view
Default level
1: Monitor level
Parameters
None
Examples
# Enable the monitoring of system information on the current terminal.
<Sysname> terminal monitor Info: Current terminal monitor is on.
terminal trapping
Description
Use terminal trapping to enable the display of trap information on the current terminal. Use undo terminal trapping to disable the display of trap information on the current terminal.
295
By default, the display of trap information on the current terminal is enabled. Note that: To display the trap information, you need to execute the terminal monitor and terminal trapping commands, and then enable information center (enabled by default). The configuration of this command is valid for only the current connection between the terminal and the device. If a new connection is established, the display of trap information on the terminal restores the default.
Syntax
terminal trapping undo terminal trapping
View
User view
Default level
1: Monitor level
Parameters
None
Examples
# Enable the display of trap information on the current terminal.
<Sysname> terminal trapping Info: Current terminal trapping is on.
296
If the source receives an ICMP echo reply from the destination within the timeout, the system outputs the related information of the reply. If the source does not receive an ICMP echo reply from the destination within the timeout, the system outputs Request time out.
To use the name of the destination host to perform the ping operation, you must configure DNS on the device first; otherwise, the ping operation fails. For more information about DNS, see Layer 3IP Services Configuration Guide. In addition, you must use the command in the form of ping ip ip instead of ping ip if the destination name is a key word, such as ip. Only the directly connected segment address can be pinged if the outbound interface is specified with the -i argument. To abort the ping operation during the execution of the command, press Ctrl+C.
Syntax
ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i interface-type interface-number | -m interval | -n | -p pad | -q | -r | -s packet-size | -t timeout | -tos tos | -v | { -vpn-instance vpn-instance-name } ] * host
View
Any view
Default level
0: Visit level
Parameters
ip: Supports IPv4 protocol. If this keyword is not provided, IPv4 is also supported. -a source-ip: Specifies the source IP address of an ICMP echo request (ECHO-REQUEST). It must be an IP address configured on the device. If this parameter is not provided, the source IP address of an ICMP echo request is the primary IP address of the outbound interface of the request. -c count: Specifies the number of times that an ICMP echo request is sent, which ranges from 1 to 4294967295 and defaults to 5.
297
-f: Discards packets larger than the MTU of a given interface, which means the ICMP echo request is not allowed to be fragmented. -h ttl: Specifies the TTL value for an ICMP echo request, which ranges from 1 to 255 and defaults to 255. -i interface-type interface-number: Specifies the ICMP echo request sending interface by its type and number. If this parameter is not provided, the ICMP echo request sending interface is determined by searching the routing table or forwarding table according to the destination IP address. -m interval: Specifies the interval (in milliseconds) to send an ICMP echo request, which ranges from 1 to 65535 and defaults to 200. If a response from the destination is received within the timeout time, the interval to send the next echo request equals the actual response period plus the value of interval. If no response from the destination is received within the timeout time, the interval to send the next echo request equals the timeout value plus the value of interval.
-n: Disables domain name resolution for the host argument. When this keyword is not provided, if the host argument represents the host name of the destination, the device translates host into an address. -p pad: Specifies the value of the pad field in an ICMP echo request, in hexadecimal format, 1 to 8 bits, in the range 0 to ffffffff. If the specified value is less than 8 bits, 0s are added in front of the value to extend it to 8 bits. For example, if pad is configured as 0x2f, then the packets are padded with 0x0000002f repeatedly to make the total length of the packet meet the requirements of the device. By default, the padded value starts from 0x01 up to 0xff, where another round starts again if necessary, like 0x010203feff01. -q: Presence of this keyword indicates that only statistics are displayed. Absence of this keyword indicates that all information is displayed. -r: Records routing information. If this keyword is not provided, routes are not recorded. -s packet-size: Specifies length (in bytes) of an ICMP echo request, which ranges from 20 to 8100 and defaults to 56. -t timeout: Specifies the timeout value (in milliseconds) of an ICMP echo reply (ECHO-REPLY). If the source does not receive an ICMP echo reply within the timeout, it considers the ICMP echo reply timed out. The value ranges from 0 to 65535 and defaults to 2000. -tos tos: Specifies ToS of an echo request, which ranges from 0 to 255 and defaults to 0. -v: Displays non ICMP echo reply received. If this keyword is not provided, the system does not display non ICMP echo reply. -vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the destination belongs, where vpninstance-name is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option. host: IP address or host name (a string of 1 to 255 characters) of the destination.
Examples
# Check whether the device with an IP address of 1.1.2.2 is reachable.
<Sysname> ping 1.1.2.2 PING 1.1.2.2: 56 data bytes, press CTRL_C to break Reply from 1.1.2.2: bytes=56 Sequence=1 ttl=254 time=205 ms Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms
298
Reply from 1.1.2.2: bytes=56 Sequence=5 ttl=254 time=1 ms --- 1.1.2.2 ping statistics --5 packet(s) transmitted 5 packet(s) received 0.00% packet loss round-trip min/avg/max = 1/41/205 ms
The output shows the following: The destination was reachable. All ICMP echo requests sent by the source got responses. The minimum time, average time, and maximum time for the packets roundtrip time are 1 ms, 41 ms, and 205 ms respectively.
The output shows the following: The destination in VPN 1 was reachable. All ICMP echo requests sent by the source got responses. The minimum time, average time, and maximum time for the packets roundtrip time are 1 ms, 41 ms, and 205 ms respectively.
# Check whether the device with an IP address of 1.1.2.2 is reachable. Only the check results are displayed.
<Sysname> ping -q 1.1.2.2 PING 1.1.2.2: 56 data bytes, press CTRL_C to break
--- 1.1.2.2 ping statistics --5 packet(s) transmitted 4 packet(s) received 20.00% packet loss round-trip min/avg/max = 1/12/29 ms
# Check whether the device with an IP address of 1.1.2.2 is reachable. The route information is required to be displayed.
<Sysname> ping -r 1.1.2.2 PING 1.1.2.2: 56 data bytes, press CTRL_C to break
299
Reply from 1.1.2.2: bytes=56 Sequence=1 ttl=254 time=53 ms Record Route: 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms Record Route: 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms Record Route: 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms Record Route: 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=5 ttl=254 time=1 ms Record Route: 1.1.2.1 1.1.2.2 1.1.1.2 1.1.1.1 --- 1.1.2.2 ping statistics --5 packet(s) transmitted 5 packet(s) received 0.00% packet loss round-trip min/avg/max = 1/11/53 ms
The output shows the following: The destination was reachable. The route is 1.1.1.1 <-> {1.1.1.2; 1.1.2.1} <-> 1.1.2.2.
Description
Check whether the device with IP address 1.1.2.2 is reachable Number of data bytes in each ICMP echo request During the execution of the command, you can press Ctrl+C to abort the ping operation. 300
Field
Description
Received the ICMP reply from the device whose IP address is 1.1.2.2. If no reply is received during the timeout period, Request time out will be displayed.
bytes= indicates the number of data bytes in the ICMP reply. Sequence= indicates the packet sequence, used to determine
whether a segment is lost, disordered or repeated.
ttl= indicates the TTL value in the ICMP reply. time= indicates the response time.
Record Route: --- 1.1.2.2 ping statistics --5 packet(s) transmitted 5 packet(s) received 0.00% packet loss round-trip min/avg/max = 0/4/20 ms The routers through which the ICMP echo request passed. They are displayed in inversed order, that is, the router with a smaller distance to the destination is displayed first. Statistics on data received and sent in the ping operation Number of ICMP echo requests sent Number of ICMP echo requests received Percentage of packets not responded to the total packets sent Minimum/average/maximum response time, in ms. The field is not available for failed ping attempts in an IPv4 network. In an IPv6 network, however, the field is available and set to 0/0/0 ms.
ping ipv6
Description
Use ping ipv6 to verify whether an IPv6 address is reachable, and display the corresponding statistics. To use the name of the destination host to perform the ping operation, you must configure DNS on the device first; otherwise, the ping operation fails. For more information about DNS, see Layer 3IP Services Configuration Guide. You must use the command in the form of ping ipv6 ipv6 instead of ping ipv6 if the destination name is an ipv6 name. To abort the ping ipv6 operation during the execution of the command, press Ctrl+C.
Syntax
ping ipv6 [ -a source-ipv6 | -c count | -m interval | -s packet-size | -t timeout | -vpn-instance vpninstance-name ] * host [ -i interface-type interface-number ]
View
Any view
Default level
0: Visit level
Parameters
-a source-ipv6: Specifies the source IPv6 address of an ICMP echo request. It must be a legal IPv6 address configured on the device. If this parameter is not provided, the source IPv6 address of an ICMP echo request is the primary IPv6 address of the outbound interface of the request. -c count: Specifies the number of times that an ICMPv6 echo request is sent, which ranges from 1 to 4294967295 and defaults to 5.
301
-m interval: Specifies the interval (in milliseconds) to send an ICMPv6 echo reply, which ranges from 1 to 65535 and defaults to 200. If a response from the destination is received within the timeout time, the interval to send the next echo request equals the actual response period plus the value of interval. If no response from the destination is received within the timeout time, the interval to send the next echo request equals the timeout value plus the value of interval.
-s packet-size: Specifies length (in bytes) of an ICMPv6 echo request, which ranges from 20 to 8100 and defaults to 56. -t timeout: Specifies the timeout value (in milliseconds) of an ICMPv6 echo reply, which ranges from 0 to 65535 and defaults to 2000. host: IPv6 address or host name of the destination, which is a string of 1 to 46 characters. -i interface-type interface-number: Specifies an outbound interface by its type and number. This parameter can be used only in case that the destination address is the link local address and the specified outbound interface must have a link local address (For more information about the configuration of link local address, see Layer 3IP Services Configuration Guide). If this parameter is not provided, the ICMP echo request sending interface is determined by searching the routing table or forwarding table according to the destination IP address. -vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the destination belongs, where vpninstance-name is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option.
Examples
# Verify whether the IPv6 address 2001::1 is reachable.
<Sysname> ping ipv6 2001::1 PING 2001::2 : 56 data bytes, press CTRL_C to break time = 62 ms time = 26 ms time = 20 ms time = 4 ms time = 16 ms Reply from 2001::1 bytes=56 Sequence=1 hop limit=64 Reply from 2001::1 bytes=56 Sequence=2 hop limit=64 Reply from 2001::1 bytes=56 Sequence=3 hop limit=64 Reply from 2001::1 bytes=56 Sequence=4 hop limit=64 Reply from 2001::1 bytes=56 Sequence=5 hop limit=64 --- 2001::2 ping statistics --5 packet(s) transmitted 5 packet(s) received 0.00% packet loss round-trip min/avg/max = 4/25/62 ms
302
Reply from 2001::1 bytes=56 Sequence=2 hop limit=64 Reply from 2001::1 bytes=56 Sequence=3 hop limit=64 Reply from 2001::1 bytes=56 Sequence=4 hop limit=64 Reply from 2001::1 bytes=56 Sequence=5 hop limit=64 --- 2001::2 ping statistics --5 packet(s) transmitted 5 packet(s) received 0.00% packet loss round-trip min/avg/max = 4/25/62 ms time = 16 ms time = 4 ms time = 20 ms time = 26 ms
The hop limit field in this prompt information has the same meaning as the ttl field in the prompt information displayed by the IPv4 ping command, indicating the TTL value in the ICMPv6 echo request. For the description on other fields, see Table 68.
tracert
Description
Use tracert to trace the path the packets traverse from source to destination. After having identified network failure with the ping command, use tracert to determine the failed node(s). Output information of tracert includes IP addresses of all the Layer 3 devices the packets traverse from source to destination. If a device times out, "* * *" will be displayed. To abort the tracert operation during the execution of the command, press Ctrl+C.
Syntax
tracert [ -a source-ip | -f first-ttl | -m max-ttl | -p port | -q packet-number | { -vpn-instance vpn-instancename } | -w timeout ] * host
View
Any view
Default level
0: Visit level
Parameters
-a source-ip: Specifies the source IP address of a tracert packet. It must be a legal IP address configured on the device. If this parameter is not provided, the source IP address of an ICMP echo request is the primary IP address of the outbound interface of the tracert packet. -f first-ttl: Specifies the first TTL, or, the allowed number of hops for the first packet. It ranges from 1 to 255 and defaults to 1, and must be less than the maximum TTL. -m max-ttl: Specifies the maximum TTL, or, the maximum allowed number of hops for a packet. It ranges from 1 to 255 and defaults to 30, and must be greater than the first TTL.
303
-p port: Specifies the UDP port number of the destination, which ranges from 1 to 65535 and defaults to 33434. You do not need to modify this parameter. -q packet-number: Specifies the number of probe packets sent each time, which ranges from 1 to 65535 and defaults to 3. -vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the destination belongs, where vpninstance-name is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option. -w timeout: Specifies the timeout time of the reply packet of a probe packet, which ranges from 1 to 65535 milliseconds and defaults to 5000 milliseconds. host: IP address or host name (a string of 1 to 255 characters) of the destination.
Examples
# Display the path the packets traverse from source to destination with an IP address of 1.1.2.2.
<Sysname> system-view <Sysname> tracert 1.1.2.2 traceroute to 1.1.2.2(1.1.2.2) 30 hops max,40 bytes packet, press CTRL_C to break 1 2 1.1.1.2 673 ms 425 ms 30 ms 1.1.2.2 580 ms 470 ms 80 ms
MPLS Label=100048 Exp=0 TTL=1 S=1 MPLS Label=100016 Exp=0 TTL=1 S=1
Description
Display the route the IP packets traverse from the current device to the device whose IP address is 1.1.2.2. Maximum number of hops of the probe packets, which can be set through the -m keyword Number of bytes of a probe packet During the execution of the command, you can press Ctrl+C to abort the tracert operation. The probe result of the probe packets whose TTL is 1, including the IP address of the first hop and the roundtrip time of three probe packets. Number of packets that can be sent in each probe can be set through the -q keyword.
304
Field
Description
ICMP timeout packets on an MPLS network, carry MPLS label information:
Label: Label value that is used to identify a FEC Exp: Reserved, usually used for CoS. TTL: TTL value S: MPLS supports multiple levels of labels. Value 1 indicates that the label is at the bottom of the label stack, and value 0 indicates that the label is not at the bottom of the label stack.
tracert ipv6
Description
Use tracert ipv6 to view the path the IPv6 packets traverse from source to destination. After having identified network failure with the ping command, you can use tracert to determine the failed node(s). Output information of tracert ipv6 includes IPv6 addresses of all the Layer 3 devices the packets traverse from source to destination. If a device times out, "* * *" will be displayed. To abort the tracert operation during the execution of the command, press Ctrl+C.
Syntax
tracert ipv6 [ -f first-ttl | -m max-ttl | -p port | -q packet-number | -vpn-instance vpn-instance-name | -w timeout ] * host
View
Any view
Default level
0: Visit level
Parameters
-f first-ttl: Specifies the first TTL, or, the allowed number of hops for the first packet. It ranges from 1 to 255 and defaults to 1, and must be less than the maximum TTL. -m max-ttl: Specifies the maximum TTL, or, the maximum allowed number of hops for a packet. It ranges from 1 to 255 and defaults to 30, and must be greater than the first TTL. -p port: Specifies the UDP port number of the destination, which ranges from 1 to 65535 and defaults to 33434. It is unnecessary to modify this parameter. -q packet-number: Specifies the number of probe packets sent each time, which ranges from 1 to 65535 and defaults to 3. -w timeout: Specifies the timeout time of the reply packet of a probe packet, which ranges from 1 to 65535 milliseconds and defaults to 5000 milliseconds. host: IPv6 address or host name of the destination, which is a string of 1 to 46 characters. -vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the destination belongs, where vpninstance-name is a case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify this option.
305
Examples
# View the path the packets traverse from source to destination with IPv6 address 2001::1.
<Sysname> tracert ipv6 2001::1 traceroute to 2001::1 1 30 hops max,60 bytes packet, press CTRL_C to break 2001::1 3 ms <1 ms 19 ms
# View the path the packets traverse from source to destination with IPv6 address 2001::1 in VPN 1.
<Sysname> tracert ipv6 vpn-instance vpn1 2001::1 traceroute to 2001::1 1 30 hops max,60 bytes packet, press CTRL_C to break 2001::1 3 ms <1 ms 19 ms
For description on the fields in the output information, see Table 69.
Syntax
debugging { all [ timeout time ] | module-name [ option ] } undo debugging { all | module-name [ option ] }
View
User view
Default level
1: Monitor level
Parameters
all: All debugging functions. timeout time: Specifies the timeout time for debugging all. When all debugging is enabled, the system automatically executes undo debugging all after the time. The value ranges from 1 to 1440, in minutes.
306
module-name: Module name, such as arp or device. To display the current module name, use debugging ?. option: The debugging option for a specific module. Different modules have different debugging options in terms of their number and content. To display the currently supported options, use the debugging module-name ? command.
Examples
# Enable IP packet debugging.
<Sysname> debugging ip packet
display debugging
Description
Use display debugging to display enabled debugging functions. Related commands: debugging.
Syntax
display debugging [ interface interface-type interface-number ] [ module-name ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
interface interface-type interface-number: Displays the debugging settings of the specified interface, where interface-type interface-number represents the interface type and number. module-name: Module name. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display all enabled debugging functions.
<Sysname> display debugging IP packet debugging is on
307
Syntax
display ipv6 netstream cache [ verbose ] [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
verbose: Displays the detailed information of the IPv6 NetStream entries in the cache. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display the IPv6 NetStream entry information in the cache.
<Sysname> display ipv6 netstream cache IPv6 netstream cache information: Stream active timeout (in minutes) Stream max entry number IPv6 active stream entry number MPLS active stream entry number IPL2 active stream entry number IPv6 stream entries been counted MPLS stream entries been counted IPL2 stream entries been counted Last statistics reset time 1-32 512 64 544 96 128 160 192 224 : 60 : 1000 : 1 : 2 : 1 : 10 : 20 : 20 : 01/01/2000, 00:01:02 256 288 320 352 384 416 448 480 Stream inactive timeout (in seconds) : 10
IPv6 packet size distribution (1103746 total packets): .249 .694 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 .000 576 1024 1536 2048 2560 3072 3584 4096 4608 >4608 .000 .000 .027 .000 .027 .000 .000 .000 .000 .000 .000 .000
308
Protocol
Total Streams
Packets /Sec 372 86 1006 11170 3752 570 2272 125 5 SrcIP(Port) SrcMAC(VLAN)
-------------------------------------------------------------------------TCP-Telnet TCP-FTP TCP-FTPD TCP-WWW TCP-other UDP-DNS UDP-other ICMP IP-other Type DstIP(Port) DstMAC(VLAN) 2656855 5900082 3200453 546778274 49148540 117240379 45502422 14837957 77406
FlowLbl If(Direct)
TopLblType(IP/MASK)Lbl-Exp-S-List -------------------------------------------------------------------------IP 2001::1(1024) 2002::1(21) 1:18-6-0 2:24-6-0 3:30-6-1 IP& L2 IP& 2003::1(2048) 0012-3f86-e95d(0) 2010::1(1024) 2008::1(0) 2020::1(67) 1:55-6-0 2:16-6-1 2:0-0-0 1 17 0 0 0x0 ET1/1(O) 10 1848 0012-3f86-e116(1008) 0x12345 ET1/2(I) 6 0 0x6000 ET1/0(I) ET1/1(O) 42996 291 MPLS LDP(3.3.3.3/24)
MPLS LDP(4.4.4.4)
Description
Information of IPv6 NetStream entries in the cache Active aging timer in minutes for IPv6 NetStream entries Inactive aging timer in seconds for IPv6 NetStream entries Maximum number of flow entries allowed in the cache Number of active IPv6 flows in the cache Number of active MPLS flows in the cache Number of active IP and Layer 2 flows in the cache Number of free IPv6 flows that are counted Number of free MPLS flows that are counted Number of free IP and Layer 2 flows that are counted This field is an absolute time and will not change with the system time. This field is displayed only when the reset ipv6 netstream statistics command is executed; otherwise, the value for this is Never.
309
Field
IPv6 packet size distribution (1103746 total packets):
Description
Distribution of IPv6 packets by packet size and the bracketed number is the total number of packets The value is displayed in the proportion of number of IP packets to the total IP packets, and is displayed with 3 decimal places. Range of IP packet size (excluding data link layer header), in bytes. In the range 1 to 576, the range increments in the step of 32. For example, "1-32" shows the number of packets in size of 1 to 32 bytes, and "64" shows the number of packets in size of 33 to 64 bytes. For the value greater than 1024, the range increments in the step of 512. For example, "1536" shows the number of packets in size of 1025 to 1536 bytes. Packets in size of 577 to 1024 are recorded in the 1024 entry. Statistics of packet by protocol type in the following accounting criteria: protocol number, total number of flows, number of packets per second, number of flows per second, number of packets for flow, active time of each flow, inactive time of each flow Statistics of the active flows in the NetStream cache including flow type, destination IPv6 address (destination port), source IPv6 address (source port), protocol, traffic class, flow label, interface type and name (direction), and the number of packets
1-32 64 96 128 160 192 224 256 288 320 352 384 416 448 480 512 544 576 1024 1536 2048 2560 3072 3584 4096 4608>4608 Protocol /Sec Total Streams Packets
Flows are classified into the following types: IP flows, L2 flows, IP and Layer 2 flows, MPLS flows with no IP options (MPLS), MPLS flows with IP options (IP&MPLS) ICMPv6 packets do not contain port number fields, so the type field and code field are captured. The value for the destination port represents these two fields. More specifically, the highest 8 bits represent the type field and the lowest 8 bits represent the code field. The value for the source port is set to 0 and does not indicate any statistics. Layer 2 information of the active flows in the current cache, including destination MAC address, destination VLAN ID, source MAC address, and source VLAN ID Information of the active MPLS flows in the current cache, including type of the labels at the top of the label stack (IP addresses and masks associated with the label), and label list.
DstMAC(VLAN) SrcMAC(VLAN)
TopLblType(IP/MASK) List
Lbl-Exp-S-
Label field, 20 bits in length. Exp field, for QoS, three bits in length. S field, one bit in length. The value of 1 indicates that the label is
at the bottom of the label stack.
310
Field
TcpFlag: DstMask: SrcMask: DstAS: Nexthop: BgpNexthop: OutVRF: Active: InVRF: Bytes/Pkt: SrcAS
Description
Other information of the active flows in the cache, including TCP tag, destination mask, source mask, routing next hop, destination AS, source AS, BGP next hop, VPN to which the outbound packets belong, VPN to which the inbound packets belong, stream active time, number of bytes in each packet.
Syntax
display ipv6 netstream export [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display statistics about IPv6 NetStream data export.
<Sysname> display ipv6 netstream export IPv6 export information: Stream source interface Stream destination VPN-instance Stream destination IP (UDP) Version 9 exported stream number AS aggregation export information: Stream source interface Stream destination VPN -instance Stream destination IP (UDP) Version 9 exported stream number : Ethernet1/0 : VPN1 : 10.10.0.10 (30000) : 16 : Ethernet1/0 : VPN1 : 10.10.0.10 (30000) : 16
311
Description
Statistics about IPv6 NetStream data export in version 9 Source interface from which the IPv6 NetStream data is export VPN to which the destination address of the IPv6 NetStream data export belongs Destination address and port number of IPv6 NetStream data export (UDP) Number of flows that have been sent Number of UDP packets that failed to be sent Statistics about IPv6 NetStream AS aggregation in version 9 format. Displayed only when IPv6 NetStream AS aggregation is enabled.
Syntax
display ipv6 netstream template [ | { begin | exclude | include } regular-expression ]
View
Any view
Default level
1: Monitor level
Parameters
|: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters.
Examples
# Display information about IPv6 NetStream templates.
<Sysname> display ipv6 netstream template Stream template refresh-rate packet Active stream templates : 20 : 2 Stream template refresh-rate time(in minute) : 30
312
Added stream templates IPv6 outbound template: Template ID Packets Last template export time Field count Field type Out packets Out bytes First switched Last switched Input SNMP Output SNMP IPv6 source address IPv6 destination address IPv6 nexthop PAD IPv6 flow label Source AS Destination AS L4 source port L4 destination port IP protocol version TCP flags Protocol Source ToS IPv6 source mask IPv6 destination mask Direction Forwarding offset Out VPN ID Sampling algorithm PAD Sampling interval IPv6 inbound template: Template ID Packets Last template export time Field count Field type In packets In bytes First switched Last switched Input SNMP Output SNMP : 3304 : 0 : Never : 27 : 3305 : 0 : Never : 27
: 2
---------------------------------------------------------------------------
---------------------------------------------------------------------------
313
IPv6 source address IPv6 destination address IPv6 nexthop PAD IPv6 flow label Source AS Destination AS L4 source port L4 destination port IP protocol version TCP flags Protocol Source ToS IPv6 source mask IPv6 destination mask Direction Forwarding offset In VPN ID Sampling algorithm PAD Sampling interval
16 16 16 1 3 4 4 2 2 1 1 1 1 1 1 1 1 2 1 1 4
Description
Refresh frequency with which the template is sent. Refresh interval in minutes at which the template is sent. Number of active stream templates at present. Number of templates that have been created since the system starts Information of the IPv6 template in the outbound direction Information of the IPv6 template in the inbound direction Number of packets sent using the template. A packet may contain multiple flows and different flows may use different templates. The number of packets is in fact the number of flows. Last time when the template was exported. Total number of fields in a template
Packets
enable
Description
Use enable to enable current IPv6 NetStream aggregation. Use undo enable to disable current IPv6 NetStream aggregation. By default, no IPv6 NetStream aggregation is enabled.
314
Syntax
enable undo enable
View
NetStream aggregation view
Default level
3: Manage level
Parameters
None
Examples
# Enable IPv6 NetStream AS aggregation.
<Sysname> system-view [Sysname] ipv6 netstream aggregation as [Sysname-ns6-aggregation-as] enable
ipv6 netstream
Description
Use ipv6 netstream to enable IPv6 NetStream on a specified interface. Use undo ipv6 netstream to disable IPv6 Netstream on the a specified interface. By default, IPv6 NetStream is disabled on an interface.
Syntax
ipv6 netstream { inbound | outbound } undo ipv6 netstream { inbound | outbound }
View
Interface view
Default level
3: Manage level
Parameters
inbound: Enables IPv6 NetStream for incoming traffic. outbound: Enables IPv6 NetStream for outgoing traffic.
Examples
# Enable IPv6 NetStream for incoming traffic on interface Ethernet 1/0.
<Sysname> system-view [Sysname] interface ethernet 1/0 [Sysname-Ethernet1/0] ipv6 netstream inbound
Description
Use ipv6 netstream aggregation to set an IPv6 NetStream aggregation mode and enter the IPv6 NetStream aggregation view. Then in the IPv6 NetStream aggregation view, you can perform the following tasks: Enable or disable the specific IPv6 NetStream aggregation. Configure the source interface, destination IP address, and destination port for IPv6 NetStream data export.
Related commands: enable, ipv6 netstream export host, and ipv6 netstream export source.
Syntax
ipv6 netstream aggregation { as | bgp-nexthop | destination-prefix | prefix | protocol-port | sourceprefix }
View
System view
Default level
3: Manage level
Parameters
as: AS aggregation by source AS number, destination AS number, inbound interface index, and outbound interface index. bgp-nexthop: BGP nexthop aggregation by BGP next hop IPv6 address, and outbound interface index. destination-prefix: Destination-prefix aggregation by destination AS number, destination address mask length, destination prefix, and outbound interface index. prefix: Source and destination prefix aggregation by source AS number, destination AS number, source address mask length, destination address mask length, source prefix, destination prefix, inbound interface index, and outbound interface index. protocol-port: Protocol-port aggregation by protocol number, source port, and destination port. source-prefix: Source-prefix aggregation by source AS number, source address mask length, source prefix, and inbound interface index.
Examples
# Set the IPv6 NetStream aggregation mode as AS and enter the NetStream AS aggregation view.
<Sysname> system-view [Sysname] ipv6 netstream aggregation as [Sysname-ns6-aggregation-as]
The destinations in different aggregation views can be the same. When no destination is configured in aggregation view, the one configured in system view applies. If the ip-address argument is not specified in the undo ipv6 netstream export host command, all the addresses configured in the current view are removed. Up to four different destination addresses, including addresses in different VPNs, can be configured in one aggregation view. If you have configured the destination addresses with the same IP addresses but different UDP port numbers, the last configuration takes effect. If you configure different VPN names, configure destination addresses with the same IP address and UDP port number. IPv6 NetStream traditional data is exported to all destination addresses configured in system view, and IPv6 NetStream aggregation data is exported to all destination addresses configured in the related aggregation view. If you expect IPv6 NetStream aggregation data only, configure the destination address in the aggregation view, and do not configure the destination address in system view; otherwise, the IPv6 NetStream traditional data is also be exported, which will increase the bandwidth occupation. Related commands: ipv6 netstream aggregation and ipv6 netstream export source.
Syntax
ipv6 netstream export host ip-address udp-port [ vpn-instance vpn-instance-name ] undo ipv6 netstream export host [ ip-address [ vpn-instance vpn-instance-name ] ]
View
System view, NetStream aggregation view
Default level
3: Manage level
Parameters
ip-address: Destination IP address for IPv6 NetStream data export. Only IPv4 addresses are supported. udp-port: Destination UDP port number for IPv6 NetStream data export, which is in the range 0 to 65535. vpn-instance vpn-instance-name: Specifies an MPLS L3VPN that the IPv6 NetStream data export destination belongs to. The vpn-instance-name argument is a case sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify the keyword and argument combination.
Examples
# Configure the address for IPv6 NetStream data export as 1.1.1.1, UDP port 5000, and vpn1.
<Sysname> system-view [Sysname] ipv6 netstream export host 1.1.1.1 5000 vpn-instance vpn1
Syntax
ipv6 netstream export rate rate
317
View
System view
Default level
3: Manage level
Parameters
rate: Maximum rate for exporting IPv6 NetStream data, in the unit of the maximum number of packets per second, in the range 1 to 1000.
Examples
# Allow 10 packets at most to be exported per second.
<Sysname> system-view [Sysname] ipv6 netstream export rate 10
Syntax
ipv6 netstream export source interface interface-type interface-number undo ipv6 netstream export source
View
System view, NetStream aggregation view
Default level
3: Manage level
Parameters
interface-type interface-number: Specifies a source interface for NetStream data by its type and number.
Examples
# Configure the source interface for IPv6 NetStream data export as Ethernet 1/0.
<Sysname> system-view [Sysname] ipv6 netstream export source interface ethernet 1/0
318
Syntax
ipv6 netstream export v9-template refresh-rate packet packets undo ipv6 netstream export v9-template refresh-rate packet
View
System view
Default level
3: Manage level
Parameters
packets: Specifies the number of packets that are sent before version 9 templates are sent to the NetStream server for an update. It is in the range 1 to 600.
Examples
# Configure the device to wait until 100 packets are sent before sending NetStream version 9 templates again to the NetStream server.
<Sysname> system-view [Sysname] ipv6 netstream export v9-template refresh-rate packet 100
NetStream device and not updated on the NetStream server, the server is unable to associate the received statistics with its proper fields. To avoid such situation, configure the refresh interval for version 9 templates so that the NetStream server can refresh them on time. The refresh frequency and interval can be both configured, and the template is resent when either of the conditions is reached. Related commands: ipv6 netstream export v9-template refresh-rate packet.
Syntax
ipv6 netstream export v9-template refresh-rate time minutes undo ipv6 netstream export v9-template refresh-rate time
View
System view
Default level
3: Manage level
Parameters
minutes: Specifies the refresh interval in minutes that the device waits after IPv6 NetStream version 9 templates are sent to the NetStream server. It is in the range 1 to 3600.
Examples
# Configure the device to wait for 60 minutes before sending NetStream version 9 templates again to the NetStream server.
<Sysname> system-view [Sysname] ipv6 netstream export v9-template refresh-rate time 60
Syntax
ipv6 netstream export version 9 [ origin-as | peer-as ] [ bgp-nexthop ] undo ipv6 netstream export version
View
System view
Default level
3: Manage level
320
Parameters
origin-as: Exports the statistics about source AS and destination AS. peer-as: Exports the statistics about the peer ASs. bgp-nexthop: Exports statistics about BGP next hops.
Examples
# Configure the device to export IPv6 NetStream data in version 9 format and record the number of AS that originates the BGP route.
<Sysname> system-view [Sysname] ipv6 netstream export version 9 origin-as
Syntax
ipv6 netstream max-entry max-entries undo ipv6 netstream max-entry
View
System view
Default level
3: Manage level
Parameters
max-entries: Specifies the maximum number of entries that the cache can save. The value ranges from 1000 to 20000.
Examples
# Set the maximum entries in the cache to 5000.
<Sysname> system-view [Sysname] ipv6 netstream max-entry 5000
321
NOTE:
The aging timers for active flows and inactive flows apply to only NetStream traditional data flows. You can configure both the aging timer for active flows and the aging timer for inactive flows. When either timer for a flow expires, the flow is aged out. The time precision is 10 seconds.
Syntax
ipv6 netstream timeout active minutes undo ipv6 netstream timeout active
View
System view
Default level
3: Manage level
Parameters
minutes: Sets the aging timer for active flows, in minutes. It is in the range 1 to 60.
Examples
# Set the aging timer to 60 minutes for active flows.
<Sysname> system-view [Sysname] ipv6 netstream timeout active 60
Syntax
ipv6 netstream timeout inactive seconds undo ipv6 netstream timeout inactive
View
System view
Default level
3: Manage level
Parameters
seconds: Sets the aging time for inactive flows, in seconds. It is in the range 10 to 600.
322
Examples
# Set the aging timer to 60 seconds for inactive flows.
<Sysname> system-view [Sysname] ipv6 netstream timeout inactive 60
View
User view
Default level
2: System level
Parameters
None
Description
Use reset ipv6 netstream statistics to age out and export all IPv6 NetStream data and clear the cache. When you execute the command, messages appear telling you that the process of clearing the cache takes several minutes and the system does not perform NetStream during this process.
Examples
# Age out and export all IPv6 NetStream data and clear the cache.
<Sysname> reset ipv6 netstream statistics This process may take a few minutes. Netstream statistic function is disabled during this process.
323
Subscription service
HP recommends that you register your product at the Subscriber's Choice for Business website: http://www.hp.com/go/wwalerts After registering, you will receive email notification of product enhancements, new driver versions, firmware updates, and other product resources.
Related information
Documents
To find related documents, browse to the Manuals page of the HP Business Support Center website: http://www.hp.com/support/manuals For related documentation, navigate to the Networking section, and select a networking category. For a complete list of acronyms and their definitions, see HP A-Series Acronyms.
Websites
HP.com http://www.hp.com HP Networking http://www.hp.com/go/networking HP manuals http://www.hp.com/support/manuals HP download drivers and software http://www.hp.com/support/downloads HP software depot http://www.software.hp.com
324
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention
Boldface Italic [] { x | y | ... } [ x | y | ... ] { x | y | ... } * [ x | y | ... ] * &<1-n> #
Description
Bold text represents commands and keywords that you enter literally as shown. Italic text represents arguments that you replace with actual values. Square brackets enclose syntax choices (keywords or arguments) that are optional. Braces enclose a set of required syntax choices separated by vertical bars, from which you select one. Square brackets enclose a set of optional syntax choices separated by vertical bars, from which you select one or none. Asterisk-marked braces enclose a set of required syntax choices separated by vertical bars, from which you select at least one. Asterisk-marked square brackets enclose optional syntax choices separated by vertical bars, from which you select one choice, multiple choices, or none. The argument or keyword and argument combination before the ampersand (&) sign can be entered 1 to n times. A line that starts with a pound (#) sign is comments.
GUI conventions
Convention
Boldface >
Description
Window names, button names, field names, and menu items are in bold text. For example, the New User window appears; click OK. Multi-level menus are separated by angle brackets. For example, File > Create > Folder.
Symbols
Convention
WARNING CAUTION IMPORTANT NOTE TIP
Description
An alert that calls attention to important information that if not understood or followed can result in personal injury. An alert that calls attention to important information that if not understood or followed can result in data loss, data corruption, or damage to hardware or software. An alert that calls attention to essential information. An alert that contains additional or supplementary information. An alert that provides helpful information.
325
326
Index
ABCDEFHILMNOPRSTUV
A add-member,88 administrator-address,89 advantage-factor,161 apply poe-profile,231 apply poe-profile interface,232 auto-build,89 B black-list add-mac,91 black-list delete-mac,91 build,92 C cluster,93 Cluster configuration commands,88 cluster enable,93 cluster switch-to,94 cluster-local-user,95 cluster-mac,96 cluster-mac syn-interval,96 cluster-snmp-agent community,97 cluster-snmp-agent group v3,98 cluster-snmp-agent mib-view,99 cluster-snmp-agent usm-user v3,100 codec-type,161 cwmp,123 cwmp acs password,123 cwmp acs url,124 cwmp acs username,124 cwmp cpe connect interface,125 cwmp cpe connect retry,125 cwmp cpe inform interval,126 cwmp cpe inform interval enable,127 cwmp cpe inform time,127 cwmp cpe password,128 cwmp cpe username,128 cwmp cpe wait timeout,129
327
cwmp enable,130 D data-fill,162 data-size,163 debugging,306 delete-member,101 description (any NQA test type view),164 destination ip,164 destination port,165 display channel,265 display cluster,102 display cluster base-topology,103 display cluster black-list,105 display cluster candidates,106 display cluster current-topology,107 display cluster members,109 display cwmp configuration,130 display cwmp status,131 display debugging,307 display dmc device-type,69 display info-center,266 display ip count,134 display ip count rule,135 display ip flow-ordering statistic,217 display ip netstream cache,142 display ip netstream export,144 display ip netstream template,146 display ipv6 netstream cache,308 display ipv6 netstream export,31 1 display ipv6 netstream template,312 display logbuffer,268 display logbuffer summary,270 display logfile buffer,271 display logfile summary,272 display mirroring-group,258 display ndp,73 display nqa history,166
display nqa reaction counters,167 display nqa result,169 display nqa server status,213 display nqa statistics,173 display ntdp,79 display ntdp device-list,80 display ntdp single-device,82 display ntp-service sessions,51 display ntp-service status,55 display ntp-service trace,57 display poe device,232 display poe interface,233 display poe interface power,236 display poe power-usage,237 display poe pse,239 display poe pse interface,241 display poe pse interface power,242 display poe-power,243 display poe-profile,245 display poe-profile interface,247 display rmon alarm,33 display rmon event,34 display rmon eventlog,36 display rmon history,37 display rmon prialarm,40 display rmon statistics,41 display sampler,228 display sflow,220 display snmp-agent community,1 display snmp-agent group,2 display snmp-agent local-engineid,3 display snmp-agent mib-view,4 display snmp-agent statistics,6 display snmp-agent sys-info,7 display snmp-agent trap queue,8 display snmp-agent trap-list,9 display snmp-agent usm-user,10 display trapbuffer,273 dmc acl,70 dmc device-type detect,71 dmc enable,71 E enable,148 enable,314
328
enable log updown,275 enable snmp trap updown,1 1 F filename,179 frequency,180 ftp-server,1 12 H history-record enable,181 history-record keep-time,181 history-record number,182 holdtime,1 12 http-version,183 I info-center channel name,276 info-center console channel,276 info-center enable,277 info-center format unicom,277 info-center logbuffer,278 info-center logfile enable,279 info-center logfile frequency,279 info-center logfile size-quota,280 info-center logfile switch-directory,281 info-center loghost,282 info-center loghost source,283 info-center monitor channel,284 info-center snmp channel,284 info-center source,285 info-center synchronous,287 info-center syslog channel,289 info-center timestamp,289 info-center timestamp loghost,291 info-center trapbuffer,291 ip count enable,136 ip count exterior-threshold,136 ip count firewall-denied,137 ip count inbound-packets,137 ip count interior-threshold,138 ip count outbound-packets,139 ip count rule,139 ip count timeout,140 ip flow-ordering,218 ip flow-ordering stat-interval,218 ip netstream,149
ip netstream aggregation,149 ip netstream export host,151 ip netstream export rate,152 ip netstream export source,152 ip netstream export v9-template refresh-rate packet,153 ip netstream export v9-template refresh-rate time,154 ip netstream export version,154 ip netstream filter,155 ip netstream max-entry,156 ip netstream mpls,157 ip netstream sampler,157 ip netstream timeout active,158 ip netstream timeout inactive,159 ip-pool,1 13 ipv6 netstream,315 ipv6 netstream aggregation,315 ipv6 netstream export host,316 ipv6 netstream export rate,317 ipv6 netstream export source,318 ipv6 netstream export v9-template refresh-rate packet,319 ipv6 netstream export v9-template refresh-rate time,319 ipv6 netstream export version 9,320 ipv6 netstream max-entry,321 ipv6 netstream timeout active,321 ipv6 netstream timeout inactive,322 L logfile save,292 logging-host,1 14 M management-vlan,1 14 management-vlan synchronization enable,1 15 mirroring-group,259 mirroring-group mirroring-port,260 mirroring-group monitor-port,261 mirroring-port,261 mirror-to,264 mode,183 monitor-port,262 N NDP configuration commands,73 ndp enable,76 ndp timer aging,77
329
ndp timer hello,78 next-hop,184 nm-interface vlan-interface,1 16 nqa,184 nqa agent enable,185 nqa agent max-concurrent,186 NQA client configuration commands,161 nqa schedule,186 NQA server configuration commands,213 nqa server enable,214 nqa server tcp-connect,214 nqa server udp-echo,215 NTDP configuration commands,79 ntdp enable,84 ntdp explore,85 ntdp hop,85 ntdp timer,86 ntdp timer hop-delay,86 ntdp timer port-delay,87 ntp-service access,58 ntp-service authentication enable,59 ntp-service authentication-keyid,60 ntp-service broadcast-client,60 ntp-service broadcast-server,61 ntp-service in-interface disable,62 ntp-service max-dynamic-sessions,62 ntp-service multicast-client,63 ntp-service multicast-server,64 ntp-service refclock-master,64 ntp-service reliable authentication-keyid,65 ntp-service source-interface,66 ntp-service unicast-peer,66 ntp-service unicast-server,67 O operation (FTP test type view),187 operation (HTTP test type view),188 operation interface,188 P password (FTP test type view),189 ping,297 ping ipv6,301 poe disconnect,247 poe enable,248
poe enable pse,249 poe legacy enable,249 poe max-power,250 poe max-power (system view),250 poe mode,251 poe pd-description,252 poe pd-policy priority,252 poe priority,253 poe priority (system view),254 poe pse-policy priority,255 poe update,255 poe utilization-threshold,256 poe-profile,257 probe count,190 probe packet-interval,191 probe packet-number,191 probe packet-timeout,192 probe timeout,192 R reaction checked-element { jitter-ds | jitter-sd },194 reaction checked-element { owd-ds | owd-sd },196 reaction checked-element icpif,193 reaction checked-element mos,195 reaction checked-element packet-loss,197 reaction checked-element probe-duration,198 reaction checked-element probe-fail (for trap),200 reaction checked-element probe-fail (for trigger),201 reaction checked-element rtt,202 reaction trap,203 reboot member,1 16 redirect monitor-port,72 reset ip count,141 reset ip netstream statistics,159 reset ipv6 netstream statistics,323 reset logbuffer,293 reset ndp statistics,78 reset sampler statistics,229 reset trapbuffer,293 resolve-target,204 rmon alarm,43 rmon event,45 rmon history,46 rmon prialarm,47 rmon statistics,49
330
route-option bypass-route,205 S sampler,229 sflow agent,221 sflow collector,222 sflow counter collector,224 sflow counter interval,223 sflow flow collector,224 sflow flow max-header,225 sflow sampling-mode,225 sflow sampling-rate,226 sflow source,226 sflow version,227 snmp-agent,12 snmp-agent calculate-password,13 snmp-agent community,14 snmp-agent group,15 snmp-agent local-engineid,17 snmp-agent log,17 snmp-agent mib-view,18 snmp-agent packet max-size,19 snmp-agent sys-info,20 snmp-agent target-host,21 snmp-agent trap enable,22 snmp-agent trap if-mib link extended,25 snmp-agent trap life,26 snmp-agent trap queue-size,26 snmp-agent trap source,27 snmp-agent usm-user { v1 | v2c },28 snmp-agent usm-user v3,29 snmp-host,1 17 source interface,205 source ip,206 source port,207 statistics hold-time,207 statistics interval,208 statistics max-group,208 System debugging commands,306 System maintenance commands,297 T terminal debugging,293 terminal logging,294 terminal monitor,295
terminal trapping,295 tftp-server,1 18 timer,1 19 topology accept,1 19 topology restore-from,120 topology save-to,121 tos,209 tracert,303 tracert ipv6,305 ttl,210 type,210 U url,21 1 username (FTP test type view),212 V vpn-instance (ICMP echo test type view),212
331