Aruba JH691A Configuration Guide

Category
Software
Type
Configuration Guide
HPE FlexFabric 5940 Switch Series
Network Management and Monitoring
Configuration Guide
Software version: Release 671x and later
Document version: 6W100-20230822
© Copyright 2023 Hewlett Packard Enterprise Development LP
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard
Enterprise products and services are set forth in the express warranty statements accompanying such
products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett
Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or
copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s
standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise
website.
Acknowledgments
Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the
United States and other countries.
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java and Oracle are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
i
Contents
Using ping, tracert, and system debugging ···················································· 1
Ping ···································································································································································· 1
About ping ·················································································································································· 1
Using a ping command to test network connectivity ·················································································· 1
Example: Using the ping utility ··················································································································· 2
Tracert ································································································································································ 3
About tracert ··············································································································································· 3
Prerequisites ·············································································································································· 3
Using a tracert command to identify failed or all nodes in a path ······························································· 4
Example: Using the tracert utility ················································································································ 4
System debugging ············································································································································· 5
About system debugging ···························································································································· 5
Configuring debugging ······························································································································· 6
Display and maintenance commands for debugging ················································································· 7
Configuring NQA ··························································································· 8
About NQA ························································································································································· 8
NQA operating mechanism ························································································································ 8
Collaboration with Track ····························································································································· 8
Threshold monitoring ································································································································· 9
NQA templates ··········································································································································· 9
Restrictions and guidelines: NQA configuration ································································································· 9
NQA tasks at a glance ····································································································································· 10
Configuring the NQA server ····························································································································· 10
Enabling the NQA client ··································································································································· 11
Configuring NQA operations on the NQA client ······························································································· 11
NQA operations tasks at a glance············································································································ 11
Configuring the ICMP echo operation ······································································································ 11
Configuring the ICMP jitter operation ······································································································· 13
Configuring the DHCP operation·············································································································· 14
Configuring the DNS operation ················································································································ 14
Configuring the FTP operation ················································································································· 15
Configuring the HTTP operation ·············································································································· 16
Configuring the UDP jitter operation ········································································································ 17
Configuring the SNMP operation ············································································································· 19
Configuring the TCP operation ················································································································· 20
Configuring the UDP echo operation ······································································································· 21
Configuring the UDP tracert operation ····································································································· 22
Configuring the voice operation ··············································································································· 23
Configuring the DLSw operation ·············································································································· 25
Configuring the path jitter operation ········································································································· 26
Configuring optional parameters for the NQA operation ·········································································· 27
Configuring the collaboration feature ······································································································· 28
Configuring threshold monitoring ············································································································· 29
Configuring the NQA statistics collection feature ····················································································· 31
Configuring the saving of NQA history records ························································································ 32
Scheduling the NQA operation on the NQA client ··················································································· 32
Configuring NQA templates on the NQA client ································································································ 33
Restrictions and guidelines ······················································································································ 33
NQA template tasks at a glance··············································································································· 33
Configuring the ICMP template ················································································································ 33
Configuring the DNS template ················································································································· 35
Configuring the TCP template ·················································································································· 36
Configuring the TCP half open template ·································································································· 37
Configuring the UDP template ················································································································· 38
Configuring the HTTP template ················································································································ 39
Configuring the HTTPS template ············································································································· 41
ii
Configuring the FTP template ·················································································································· 43
Configuring the RADIUS template ··········································································································· 44
Configuring the SSL template ·················································································································· 45
Configuring optional parameters for the NQA template ··········································································· 46
Display and maintenance commands for NQA ································································································ 47
NQA configuration examples ··························································································································· 48
Example: Configuring the ICMP echo operation ······················································································ 48
Example: Configuring the ICMP jitter operation ······················································································· 49
Example: Configuring the DHCP operation ······························································································ 52
Example: Configuring the DNS operation ································································································ 53
Example: Configuring the FTP operation ································································································· 54
Example: Configuring the HTTP operation ······························································································ 55
Example: Configuring the UDP jitter operation ························································································ 56
Example: Configuring the SNMP operation ····························································································· 59
Example: Configuring the TCP operation································································································· 60
Example: Configuring the UDP echo operation ······················································································· 61
Example: Configuring the UDP tracert operation ····················································································· 63
Example: Configuring the voice operation ······························································································· 64
Example: Configuring the DLSw operation ······························································································ 67
Example: Configuring the path jitter operation ························································································· 68
Example: Configuring the path quality analysis operation ······································································· 70
Example: Configuring NQA collaboration ································································································· 71
Example: Configuring the ICMP template ································································································ 73
Example: Configuring the DNS template ································································································· 74
Example: Configuring the TCP template ·································································································· 75
Example: Configuring the TCP half open template ·················································································· 76
Example: Configuring the UDP template ································································································· 77
Example: Configuring the HTTP template································································································ 77
Example: Configuring the HTTPS template ····························································································· 78
Example: Configuring the FTP template ·································································································· 79
Example: Configuring the RADIUS template ··························································································· 80
Example: Configuring the SSL template ·································································································· 81
Configuring NTP ·························································································· 82
About NTP························································································································································ 82
NTP application scenarios ······················································································································· 82
NTP working mechanism ························································································································· 82
NTP architecture ······································································································································ 83
NTP association modes ··························································································································· 84
NTP security ············································································································································· 85
NTP for MPLS L3VPN instances ············································································································· 86
Protocols and standards ·························································································································· 87
Restrictions and guidelines: NTP configuration ······························································································· 87
NTP tasks at a glance ······································································································································ 87
Enabling the NTP service································································································································· 88
Configuring NTP association mode·················································································································· 88
Configuring NTP in client/server mode ···································································································· 88
Configuring NTP in symmetric active/passive mode ················································································ 89
Configuring NTP in broadcast mode ········································································································ 90
Configuring NTP in multicast mode ·········································································································· 90
Configuring the local clock as the reference source ························································································ 91
Configuring access control rights ····················································································································· 92
Configuring NTP authentication ······················································································································· 93
Configuring NTP authentication in client/server mode ············································································· 93
Configuring NTP authentication in symmetric active/passive mode ························································ 94
Configuring NTP authentication in broadcast mode ················································································· 96
Configuring NTP authentication in multicast mode ·················································································· 97
Controlling NTP message sending and receiving ···························································································· 99
Specifying a source address for NTP messages ····················································································· 99
Disabling an interface from receiving NTP messages ············································································· 99
Configuring the maximum number of dynamic associations ·································································· 100
Setting a DSCP value for NTP packets·································································································· 100
iii
Specifying the NTP time-offset thresholds for log and trap outputs ······························································· 101
Display and maintenance commands for NTP ······························································································· 101
NTP configuration examples ·························································································································· 101
Example: Configuring NTP client/server association mode ··································································· 101
Example: Configuring IPv6 NTP client/server association mode ··························································· 103
Example: Configuring NTP symmetric active/passive association mode··············································· 104
Example: Configuring IPv6 NTP symmetric active/passive association mode ····································· 105
Example: Configuring NTP broadcast association mode ······································································· 107
Example: Configuring NTP multicast association mode ········································································ 108
Example: Configuring IPv6 NTP multicast association mode ································································ 111
Example: Configuring NTP authentication in client/server association mode ········································ 114
Example: Configuring NTP authentication in broadcast association mode············································ 116
Example: Configuring MPLS L3VPN network time synchronization in client/server mode ···················· 118
Example: Configuring MPLS L3VPN network time synchronization in symmetric active/passive mode 120
Configuring SNTP ······················································································ 123
About SNTP ··················································································································································· 123
SNTP working mode ······························································································································ 123
Protocols and standards ························································································································ 123
Restrictions and guidelines: SNTP configuration ··························································································· 123
SNTP tasks at a glance·································································································································· 123
Enabling the SNTP service ···························································································································· 123
Specifying an NTP server for the device ········································································································ 124
Configuring SNTP authentication ··················································································································· 124
Specifying the SNTP time-offset thresholds for log and trap outputs····························································· 125
Display and maintenance commands for SNTP ···························································································· 125
SNTP configuration examples ······················································································································· 126
Example: Configuring SNTP ·················································································································· 126
Configuring PTP ························································································ 128
About PTP ······················································································································································ 128
Basic concepts ······································································································································· 128
Grandmaster clock selection and master-member/subordinate relationship establishment ·················· 130
Synchronization mechanism ·················································································································· 130
Protocols and standards ························································································································ 132
Restrictions and guidelines: PTP configuration······························································································ 133
PTP tasks at a glance ···································································································································· 133
Configuring PTP (IEEE 1588 version 2)································································································· 133
Configuring PTP (IEEE 802.1AS) ·········································································································· 134
Configuring PTP (SMPTE ST 2059-2) ··································································································· 134
Specifying PTP for obtaining the time ············································································································ 135
Specifying a PTP profile ································································································································· 135
Configuring clock nodes ································································································································· 136
Specifying a clock node type ·················································································································· 136
Configuring an OC to operate only as a member clock ········································································· 136
Specifying a PTP domain ······························································································································· 136
Enabling PTP globally ···································································································································· 137
Enabling PTP on a port ·································································································································· 137
Configuring PTP ports ···································································································································· 138
Configuring the role of a PTP port ·········································································································· 138
Configuring the mode for carrying timestamps ······················································································ 138
Specifying a delay measurement mechanism for a BC or an OC ·························································· 139
Configuring one of the ports on a TC+OC clock as an OC-type port ····················································· 139
Configuring PTP message transmission and receipt ····················································································· 140
Setting the interval for sending announce messages and the timeout multiplier for receiving announce
messages ··············································································································································· 140
Setting the interval for sending Pdelay_Req messages ········································································· 140
Setting the interval for sending Sync messages ···················································································· 141
Setting the minimum interval for sending Delay_Req messages ··························································· 141
Configuring parameters for PTP messages ··································································································· 142
Specifying the IPv4 UDP transport protocol for PTP messages ···························································· 142
Configuring a source IP address for multicast PTP messages transmitted over UDP ··························· 142
iv
Configuring a destination IP address for unicast PTP messages transmitted over UDP ······················· 143
Configuring the MAC address for non-Pdelay messages ······································································ 143
Setting a DSCP value for PTP messages transmitted over UDP ·························································· 144
Specifying a VLAN tag for PTP messages ····························································································· 144
Disabling PTP path tracing ····················································································································· 144
Adjusting and correcting clock synchronization ····························································································· 145
Setting the delay correction value ·········································································································· 145
Calculating the TAI based on the UTC time ··························································································· 145
Configuring a priority for a clock····················································································································· 146
Display and maintenance commands for PTP ······························································································· 146
PTP configuration examples ·························································································································· 147
Example: Configuring PTP (IEEE 1588 version 2, IEEE 802.3/Ethernet transport, multicast transmission)
······························································································································································· 147
Example: Configuring PTP (IEEE 1588 version 2, IPv4 UDP transport, multicast transmission) ·········· 150
Example: Configuring PTP (IEEE 1588 version 2, IPv4 UDP transport, unicast transmission) ············· 153
Example: Configuring PTP (IEEE 802.1AS, IEEE 802.3/Ethernet transport, multicast transmission) ··· 157
Example: Configuring PTP (SMPTE ST 2059-2, IPv4 UDP transport, multicast transmission) ············· 160
Configuring SNMP ····················································································· 164
About SNMP ·················································································································································· 164
SNMP framework ··································································································································· 164
MIB and view-based MIB access control ······························································································· 164
SNMP operations ··································································································································· 165
Protocol versions ···································································································································· 165
Access control modes ···························································································································· 165
SNMP silence ········································································································································· 165
FIPS compliance ············································································································································ 166
SNMP tasks at a glance ································································································································· 166
Enabling the SNMP agent ······························································································································ 166
Enabling SNMP versions ······························································································································· 167
Configuring SNMP common parameters ······································································································· 167
Configuring an SNMPv1 or SNMPv2c community ························································································· 168
About configuring an SNMPv1 or SNMPv2c community ······································································· 168
Restrictions and guidelines for configuring an SNMPv1 or SNMPv2c community································· 168
Configuring an SNMPv1/v2c community by a community name ··························································· 169
Configuring an SNMPv1/v2c community by creating an SNMPv1/v2c user ·········································· 169
Configuring an SNMPv3 group and user ······································································································· 170
Restrictions and guidelines for configuring an SNMPv3 group and user ··············································· 170
Configuring an SNMPv3 group and user in non-FIPS mode ································································· 170
Configuring an SNMPv3 group and user in FIPS mode········································································· 171
Configuring SNMP notifications ····················································································································· 172
About SNMP notifications ······················································································································ 172
Enabling SNMP notifications ·················································································································· 172
Configuring parameters for sending SNMP notifications ······································································· 173
Examining the system configuration for changes ·························································································· 174
Configuring SNMP logging ····························································································································· 175
Display and maintenance commands for SNMP ··························································································· 175
SNMP configuration examples ······················································································································· 176
Example: Configuring SNMPv1/SNMPv2c····························································································· 176
Example: Configuring SNMPv3·············································································································· 178
Configuring RMON ···················································································· 181
About RMON ·················································································································································· 181
RMON working mechanism ··················································································································· 181
RMON groups ········································································································································ 181
Sample types for the alarm group and the private alarm group ····························································· 183
Protocols and standards ························································································································ 183
Configuring the RMON statistics function ······································································································ 183
About the RMON statistics function ······································································································· 183
Creating an RMON Ethernet statistics entry ·························································································· 183
Creating an RMON history control entry ································································································ 183
Configuring the RMON alarm function ··········································································································· 184
v
Display and maintenance commands for RMON ··························································································· 185
RMON configuration examples ······················································································································ 186
Example: Configuring the Ethernet statistics function ············································································ 186
Example: Configuring the history statistics function ··············································································· 186
Example: Configuring the alarm function ······························································································· 187
Configuring the Event MIB ········································································· 190
About the Event MIB ······································································································································ 190
Trigger ···················································································································································· 190
Monitored objects ··································································································································· 190
Trigger test ············································································································································· 190
Event actions ·········································································································································· 191
Object list ··············································································································································· 191
Object owner ·········································································································································· 192
Restrictions and guidelines: Event MIB configuration ···················································································· 192
Event MIB tasks at a glance··························································································································· 192
Prerequisites for configuring the Event MIB ··································································································· 192
Configuring the Event MIB global sampling parameters ················································································ 193
Configuring Event MIB object lists ················································································································· 193
Configuring an event ······································································································································ 193
Creating an event ··································································································································· 193
Configuring a set action for an event ····································································································· 194
Configuring a notification action for an event ························································································· 194
Enabling the event ································································································································· 195
Configuring a trigger······································································································································· 195
Creating a trigger and configuring its basic parameters ········································································· 195
Configuring a Boolean trigger test·········································································································· 196
Configuring an existence trigger test ······································································································ 196
Configuring a threshold trigger test ········································································································ 197
Enabling trigger sampling ······················································································································· 198
Enabling SNMP notifications for the Event MIB module ················································································ 198
Display and maintenance commands for Event MIB ····················································································· 199
Event MIB configuration examples················································································································· 199
Example: Configuring an existence trigger test ······················································································ 199
Example: Configuring a Boolean trigger test ·························································································· 201
Example: Configuring a threshold trigger test ························································································ 204
Configuring NETCONF ·············································································· 207
About NETCONF ··········································································································································· 207
NETCONF structure ······························································································································· 207
NETCONF message format ··················································································································· 207
How to use NETCONF ··························································································································· 209
Protocols and standards ························································································································ 209
FIPS compliance ············································································································································ 209
NETCONF tasks at a glance ·························································································································· 209
Establishing a NETCONF session ················································································································· 210
Restrictions and guidelines for NETCONF session establishment ························································ 210
Setting NETCONF session attributes····································································································· 211
Establishing NETCONF over SOAP sessions ······················································································· 212
Establishing NETCONF over SSH sessions ·························································································· 213
Establishing NETCONF over Telnet or NETCONF over console sessions ··········································· 214
Exchanging capabilities ·························································································································· 214
Retrieving device configuration information ··································································································· 215
Restrictions and guidelines for device configuration retrieval ································································ 215
Retrieving device configuration and state information ··········································································· 215
Retrieving non-default settings··············································································································· 217
Retrieving NETCONF information ·········································································································· 218
Retrieving YANG file content ················································································································· 219
Retrieving NETCONF session information ····························································································· 219
Example: Retrieving a data entry for the interface table ········································································ 220
Example: Retrieving non-default configuration data ·············································································· 221
Example: Retrieving syslog configuration data ······················································································ 222
vi
Example: Retrieving NETCONF session information············································································· 223
Filtering data ·················································································································································· 224
About data filtering ································································································································· 224
Restrictions and guidelines for data filtering ·························································································· 224
Table-based filtering ······························································································································· 225
Column-based filtering ··························································································································· 225
Example: Filtering data with regular expression match·········································································· 228
Example: Filtering data by conditional match························································································· 229
Locking or unlocking the running configuration ······························································································ 230
About configuration locking and unlocking ····························································································· 230
Restrictions and guidelines for configuration locking and unlocking ······················································ 230
Locking the running configuration ·········································································································· 230
Unlocking the running configuration ······································································································· 231
Example: Locking the running configuration ·························································································· 231
Modifying the configuration ···························································································································· 232
About the <edit-config> operation ·········································································································· 232
Procedure ··············································································································································· 232
Example: Modifying the configuration ···································································································· 234
Saving the running configuration ··················································································································· 235
About the <save> operation ··················································································································· 235
Restrictions and guidelines ···················································································································· 235
Procedure ··············································································································································· 235
Example: Saving the running configuration ···························································································· 236
Loading the configuration ······························································································································· 237
About the <load> operation ···················································································································· 237
Restrictions and guidelines ···················································································································· 237
Procedure ··············································································································································· 237
Rolling back the configuration ························································································································ 238
Restrictions and guidelines ···················································································································· 238
Rolling back the configuration based on a configuration file ·································································· 238
Rolling back the configuration based on a rollback point ······································································· 238
Enabling preprovisioning ································································································································ 242
Performing CLI operations through NETCONF······························································································ 243
About CLI operations through NETCONF ······························································································ 243
Restrictions and guidelines ···················································································································· 243
Procedure ··············································································································································· 243
Example: Performing CLI operations ····································································································· 244
Subscribing to events ····································································································································· 245
About event subscription ························································································································ 245
Restrictions and guidelines ···················································································································· 245
Subscribing to syslog events ·················································································································· 245
Subscribing to events monitored by NETCONF····················································································· 246
Subscribing to events reported by modules ··························································································· 247
Canceling an event subscription ············································································································ 248
Example: Subscribing to syslog events ·································································································· 249
Terminating NETCONF sessions ··················································································································· 250
About NETCONF session termination ··································································································· 250
Procedure ··············································································································································· 250
Example: Terminating another NETCONF session ··············································································· 250
Returning to the CLI ······································································································································· 251
Display and maintenance commands for NETCONF ···················································································· 251
Supported NETCONF operations ······························································ 253
action ······················································································································································ 253
CLI ·························································································································································· 253
close-session ········································································································································· 254
edit-config: create ··································································································································· 254
edit-config: delete ··································································································································· 255
edit-config: merge ·································································································································· 255
edit-config: remove ································································································································· 256
edit-config: replace ································································································································· 256
edit-config: test-option ···················································································································· 256
vii
edit-config: default-operation·················································································································· 257
edit-config: error-option ·························································································································· 258
edit-config: incremental ·························································································································· 259
get ·························································································································································· 259
get-bulk ·················································································································································· 260
get-bulk-config ········································································································································ 260
get-config ··············································································································································· 261
get-sessions ··········································································································································· 261
kill-session ·············································································································································· 261
load ························································································································································ 262
lock ························································································································································· 262
rollback ··················································································································································· 262
save ························································································································································ 263
unlock ····················································································································································· 263
xml2cli ···················································································································································· 263
Using Ansible for automated configuration management ··························· 265
About Ansible ················································································································································· 265
Ansible network architecture ·················································································································· 265
How Ansible works ································································································································· 265
Restrictions and guidelines ···························································································································· 265
Configuring the device for management with Ansible ···················································································· 266
Device setup examples for management with Ansible ·················································································· 266
Example: Setting up the device for management with Ansible ······························································ 266
Configuring Puppet ···················································································· 268
About Puppet ················································································································································· 268
Puppet network framework ···················································································································· 268
Puppet resources ··································································································································· 269
Restrictions and guidelines: Puppet configuration ························································································· 269
Prerequisites for Puppet································································································································· 269
Starting Puppet ·············································································································································· 270
Configuring resources ···························································································································· 270
Configuring a Puppet agent ··················································································································· 270
Signing a certificate for the Puppet agent ······························································································ 270
Shutting down Puppet on the device ············································································································· 270
Puppet configuration examples ······················································································································ 271
Example: Configuring Puppet ················································································································ 271
Puppet resources······················································································· 272
netdev_device ················································································································································ 272
netdev_interface············································································································································· 273
netdev_l2_interface ········································································································································ 274
netdev_l2vpn ·················································································································································· 275
netdev_lagg···················································································································································· 276
netdev_vlan ···················································································································································· 277
netdev_vsi ······················································································································································ 278
netdev_vte······················································································································································ 278
netdev_vxlan ·················································································································································· 279
Configuring Chef ························································································ 281
About Chef ····················································································································································· 281
Chef network framework ························································································································ 281
Chef resources ······································································································································· 282
Chef configuration file ···························································································································· 282
Restrictions and guidelines: Chef configuration ····························································································· 283
Prerequisites for Chef ···································································································································· 284
Starting Chef ·················································································································································· 284
Configuring the Chef server ··················································································································· 284
Configuring a workstation ······················································································································· 284
Configuring a Chef client ························································································································ 284
Shutting down Chef ········································································································································ 285
viii
Chef configuration examples·························································································································· 285
Example: Configuring Chef ···················································································································· 285
Chef resources ·························································································· 288
netdev_device ················································································································································ 288
netdev_interface············································································································································· 288
netdev_l2_interface ········································································································································ 290
netdev_l2vpn ·················································································································································· 291
netdev_lagg···················································································································································· 291
netdev_vlan ···················································································································································· 292
netdev_vsi ······················································································································································ 293
netdev_vte······················································································································································ 294
netdev_vxlan ·················································································································································· 294
Configuring CWMP ···················································································· 296
About CWMP ················································································································································· 296
CWMP network framework ···················································································································· 296
Basic CWMP functions ··························································································································· 296
How CWMP works ································································································································· 298
Restrictions and guidelines: CWMP configuration ························································································· 300
CWMP tasks at a glance ································································································································ 300
Enabling CWMP from the CLI ························································································································ 301
Configuring ACS attributes····························································································································· 301
About ACS attributes ······························································································································ 301
Configuring the preferred ACS attributes ······························································································· 301
Configuring the default ACS attributes from the CLI ·············································································· 302
Configuring CPE attributes····························································································································· 303
About CPE attributes ······························································································································ 303
Specifying an SSL client policy for HTTPS connection to ACS ····························································· 303
Configuring ACS authentication parameters ·························································································· 303
Configuring the provision code ··············································································································· 304
Configuring the CWMP connection interface ························································································· 304
Configuring autoconnect parameters ····································································································· 305
Setting the close-wait timer ···················································································································· 306
Display and maintenance commands for CWMP ·························································································· 306
CWMP configuration examples ······················································································································ 306
Example: Configuring CWMP ················································································································ 306
Configuring EAA ························································································ 315
About EAA······················································································································································ 315
EAA framework ······································································································································ 315
Elements in a monitor policy ·················································································································· 316
EAA environment variables ···················································································································· 317
Restrictions and guidelines ···················································································································· 318
Configuring a user-defined EAA environment variable ·················································································· 318
Configuring a monitor policy from the CLI ······································································································ 319
Tasks at a glance ··································································································································· 319
Creating a CLI-defined policy ················································································································· 319
Setting the size for the EAA-monitored log buffer ·················································································· 319
Configuring automatic email sending parameters ·················································································· 320
Configuring an event ······························································································································ 321
Configuring an action ····························································································································· 321
Assigning a user role to a CLI-defined policy ························································································· 322
Configuring the policy action runtime ····································································································· 322
Enabling the CLI-defined monitor policy ································································································ 323
Configuring a monitor policy by using Tcl ······························································································ 323
Suspending monitor policies ·························································································································· 324
Display and maintenance commands for EAA ······························································································· 324
EAA configuration examples ·························································································································· 325
Example: Configuring a CLI event monitor policy by using Tcl ······························································ 325
Example: Configuring a CLI event monitor policy from the CLI ····························································· 326
Configuring an automatic email sending action for a CLI-defined monitor policy ·································· 327
ix
Example: Configuring a track event monitor policy from the CLI ··························································· 328
Example: Configuring a CLI event monitor policy with EAA environment variables from the CLI ·········· 330
Monitoring and maintaining processes ······················································· 332
About monitoring and maintaining processes ································································································ 332
Process monitoring and maintenance tasks at a glance ················································································ 332
Starting or stopping a third-party process ······································································································ 332
About third-party processes ··················································································································· 332
Starting a third-party process ················································································································· 333
Stopping a third-party process ··············································································································· 333
Monitoring and maintaining processes ·········································································································· 333
Monitoring and maintaining user processes ·································································································· 334
About monitoring and maintaining user processes ················································································ 334
Configuring core dump ··························································································································· 334
Display and maintenance commands for user processes······································································ 335
Monitoring and maintaining kernel threads ···································································································· 335
Configuring kernel thread deadloop detection ······················································································· 335
Configuring kernel thread starvation detection······················································································· 336
Display and maintenance commands for kernel threads ······································································· 337
Configuring port mirroring ·········································································· 338
About port mirroring ······································································································································· 338
Terminology ··········································································································································· 338
Port mirroring classification ···················································································································· 339
Local port mirroring (SPAN) ··················································································································· 339
Layer 2 remote port mirroring (RSPAN) ································································································· 339
Layer 3 remote port mirroring (ERSPAN) ······························································································ 341
Restrictions and guidelines: Port mirroring configuration ··············································································· 343
Configuring local port mirroring (SPAN) ········································································································· 344
Restrictions and guidelines for local port mirroring configuration ··························································· 344
Local port mirroring tasks at a glance ···································································································· 344
Creating a local mirroring group ············································································································· 344
Configuring mirroring sources ················································································································ 344
Configuring the monitor port ··················································································································· 345
Configuring Layer 2 remote port mirroring (RSPAN) ····················································································· 346
Restrictions and guidelines for Layer 2 remote port mirroring configuration ·········································· 346
Layer 2 remote port mirroring with reflector port configuration task list ················································· 346
Layer 2 remote port mirroring with egress port configuration task list ···················································· 347
Creating a remote destination group ······································································································ 347
Configuring the monitor port ··················································································································· 347
Configuring the remote probe VLAN ······································································································ 348
Assigning the monitor port to the remote probe VLAN··········································································· 348
Creating a remote source group ············································································································ 349
Configuring mirroring sources ················································································································ 349
Configuring the reflector port ·················································································································· 350
Configuring the egress port ···················································································································· 351
Configuring Layer 3 remote port mirroring (ERSPAN in tunnel mode) ·························································· 352
Restrictions and guidelines for Layer 3 remote port mirroring configuration ·········································· 352
Layer 3 remote port mirroring tasks at a glance ····················································································· 352
Prerequisites for Layer 3 remote port mirroring ····················································································· 352
Configuring local mirroring groups ········································································································· 352
Configuring mirroring sources ················································································································ 353
Configuring the monitor port ··················································································································· 354
Configuring Layer 3 remote port mirroring (ERSPAN in encapsulation parameter mode) ····························· 354
Restrictions and guidelines for Layer 3 remote port mirroring in ERSPAN mode configuration ············ 354
Layer 3 remote port mirroring tasks at a glance ····················································································· 355
Creating a local mirroring group on the source device··········································································· 355
Configuring mirroring sources ················································································································ 355
Configuring the monitor port ··················································································································· 356
Display and maintenance commands for port mirroring ················································································ 357
Port mirroring configuration examples ··········································································································· 357
Example: Configuring local port mirroring (SPAN in source port mode) ················································ 357
x
Example: Configuring local port mirroring (SPAN in source CPU mode)··············································· 358
Example: Configuring local port mirroring with multiple monitoring devices ·········································· 359
Example: Configuring Layer 2 remote port mirroring (RSPAN with reflector port) ································· 360
Example: Configuring Layer 2 remote port mirroring (RSPAN with egress port) ··································· 363
Example: Configuring Layer 3 remote port mirroring (ERSPAN in tunnel mode) ·································· 365
Example: Configuring Layer 3 remote port mirroring (ERSPAN in encapsulation parameter mode) ····· 367
Configuring flow mirroring ·········································································· 369
About flow mirroring ······································································································································· 369
Types of flow-mirroring traffic to an interface ································································································· 369
Flow mirroring SPAN or RSPAN ············································································································ 369
Flow mirroring ERSPAN ························································································································· 370
Restrictions and guidelines: Flow mirroring configuration ·············································································· 372
Flow mirroring tasks at a glance ···················································································································· 372
Configuring a traffic class ······························································································································· 373
Configuring a traffic behavior ························································································································· 373
Configuring a QoS policy ······························································································································· 374
Applying a QoS policy ···································································································································· 374
Applying a QoS policy to an interface ···································································································· 374
Applying a QoS policy to a VLAN ··········································································································· 375
Applying a QoS policy globally ··············································································································· 375
Applying a QoS policy to the control plane ···························································································· 375
Flow mirroring configuration examples ·········································································································· 376
Example: Configuring flow mirroring ······································································································ 376
Configuring sFlow ······················································································ 378
About sFlow ··················································································································································· 378
Protocols and standards ································································································································ 378
Restrictions and guidelines: sFlow configuration ··························································································· 378
Configuring basic sFlow information ·············································································································· 379
Configuring flow sampling ······························································································································ 379
Configuring counter sampling ························································································································ 380
Display and maintenance commands for sFlow ···························································································· 380
sFlow configuration examples ························································································································ 381
Example: Configuring sFlow ·················································································································· 381
Troubleshooting sFlow ··································································································································· 382
The remote sFlow collector cannot receive sFlow packets ···································································· 382
Configuring the information center ····························································· 384
About the information center ·························································································································· 384
Log types ················································································································································ 384
Log levels ··············································································································································· 384
Log destinations ····································································································································· 385
Default output rules for logs ··················································································································· 385
Default output rules for diagnostic logs ·································································································· 385
Default output rules for security logs ······································································································ 385
Default output rules for hidden logs ······································································································· 386
Default output rules for trace logs ·········································································································· 386
Log formats and field descriptions ········································································································· 386
FIPS compliance ············································································································································ 390
Information center tasks at a glance ·············································································································· 390
Managing standard system logs ············································································································ 390
Managing hidden logs ···························································································································· 390
Managing security logs ·························································································································· 390
Managing diagnostic logs ······················································································································· 391
Managing trace logs ······························································································································· 391
Enabling the information center ····················································································································· 391
Outputting logs to various destinations ·········································································································· 391
Outputting logs to the console················································································································ 391
Outputting logs to the monitor terminal ·································································································· 392
Outputting logs to log hosts ···················································································································· 393
Outputting logs to the log buffer ············································································································· 394
xi
Saving logs to the log file ······················································································································· 394
Setting the minimum storage period ·············································································································· 396
About setting the minimum storage period····························································································· 396
Procedure ··············································································································································· 396
Enabling synchronous information output ······································································································ 396
Configuring log suppression··························································································································· 397
Enabling duplicate log suppression········································································································ 397
Configuring log suppression for a module ······························································································ 399
Disabling an interface from generating link up or link down logs ··························································· 399
Enabling SNMP notifications for system logs································································································· 400
Managing security logs ·································································································································· 400
Saving security logs to the security log file ···························································································· 400
Managing the security log file ················································································································· 401
Saving diagnostic logs to the diagnostic log file ····························································································· 401
Setting the maximum size of the trace log file································································································ 402
Display and maintenance commands for information center ········································································· 402
Information center configuration examples ···································································································· 403
Example: Outputting logs to the console································································································ 403
Example: Outputting logs to a UNIX log host ························································································· 404
Example: Outputting logs to a Linux log host ························································································· 405
Configuring the packet capture ·································································· 407
About packet capture ····································································································································· 407
Packet capture modes ··························································································································· 407
Filter rule elements ································································································································· 407
Building a capture filter rule···························································································································· 408
Capture filter rule keywords ··················································································································· 408
Capture filter rule operators ··················································································································· 409
Capture filter rule expressions ··············································································································· 410
Building a display filter rule ···························································································································· 411
Display filter rule keywords ···················································································································· 412
Display filter rule operators ···················································································································· 413
Display filter rule expressions ················································································································ 414
Restrictions and guidelines: Packet capture ·································································································· 415
Configuring local packet capture ···················································································································· 415
Configuring remote packet capture ················································································································ 415
Configuring feature image-based packet capture ·························································································· 415
Restrictions and guidelines ···················································································································· 415
Prerequisites ·········································································································································· 416
Saving captured packets to a file ··········································································································· 416
Displaying specific captured packets ····································································································· 416
Stopping packet capture ································································································································ 416
Displaying the contents in a packet file ·········································································································· 416
Display and maintenance commands for packet capture ·············································································· 417
Packet capture configuration examples ········································································································· 417
Example: Configuring remote packet capture ························································································ 417
Example: Configuring feature image-based packet capture ·································································· 418
Configuring VCF fabric ·············································································· 422
About VCF fabric ············································································································································ 422
VCF fabric topology ································································································································ 422
Neutron overview ··································································································································· 425
Automated VCF fabric deployment ········································································································ 427
Process of automated VCF fabric deployment ······················································································· 428
Template file ··········································································································································· 428
VCF fabric task at a glance ···························································································································· 429
Configuring automated VCF fabric deployment ····························································································· 430
Enabling VCF fabric topology discovery ········································································································ 431
Configuring automated underlay network deployment ··················································································· 431
Restrictions and guidelines ···················································································································· 431
Specify the template file for automated underlay network deployment ·················································· 431
Specifying the role of the device in the VCF fabric ················································································ 432
xii
Configuring the device as a master spine node ····················································································· 432
Setting the NETCONF username and password ··················································································· 432
Pausing automated underlay network deployment ················································································ 433
Configuring automated overlay network deployment ····················································································· 433
Restrictions and guidelines for automated overlay network deployment ··············································· 433
Automated overlay network deployment tasks at a glance ···································································· 434
Prerequisites for automated overlay network deployment ····································································· 434
Configuring parameters for the device to communicate with RabbitMQ servers ··································· 434
Specifying the network type ··················································································································· 436
Enabling L2 agent ·································································································································· 436
Enabling L3 agent ·································································································································· 436
Configuring the border node ·················································································································· 437
Enabling local proxy ARP ······················································································································· 438
Configuring the MAC address of VSI interfaces ····················································································· 438
Display and maintenance commands for VCF fabric ····················································································· 438
Managing device performance ··································································· 440
About performance management··················································································································· 440
Restrictions and guidelines: Performance management················································································ 440
Performance management tasks at a glance································································································· 440
Configuring performance statistics tasks ······································································································· 440
Enabling performance statistics ····················································································································· 441
Display and maintenance commands for performance management configuration ······································ 442
Performance management configuration examples ······················································································ 442
Example: Configuring performance management (gRPC)····································································· 442
Example: Configuring performance management (NETCONF) ····························································· 444
Document conventions and icons ······························································ 446
Conventions ··················································································································································· 446
Network topology icons ·································································································································· 447
Support and other resources ····································································· 448
Accessing Hewlett Packard Enterprise Support····························································································· 448
Accessing updates ········································································································································· 448
Websites ················································································································································ 449
Customer self repair ······························································································································· 449
Remote support ······································································································································ 449
Documentation feedback ······················································································································· 449
Index ·········································································································· 451
1
Using ping, tracert, and system
debugging
This chapter covers ping, tracert, and information about debugging the system.
Ping
About ping
Use the ping utility to determine if an address is reachable.
Ping sends ICMP echo requests (ECHO-REQUEST) to the destination device. Upon receiving the
requests, the destination device responds with ICMP echo replies (ECHO-REPLY) to the source
device. The source device outputs statistics about the ping operation, including the number of
packets sent, number of echo replies received, and the round-trip time. You can measure the
network performance by analyzing these statistics.
You can use the ping –r command to display the routers through which ICMP echo requests have
passed. The test procedure of ping –r is as shown in Figure 1:
1. The source device (Device A) sends an ICMP echo request to the destination device (Device C)
with the RR option empty.
2. The intermediate device (Device B) adds the IP address of its outbound interface (1.1.2.1) to
the RR option of the ICMP echo request, and forwards the packet.
3. Upon receiving the request, the destination device copies the RR option in the request and
adds the IP address of its outbound interface (1.1.2.2) to the RR option. Then the destination
device sends an ICMP echo reply.
4. The intermediate device adds the IP address of its outbound interface (1.1.1.2) to the RR option
in the ICMP echo reply, and then forwards the reply.
5. Upon receiving the reply, the source device adds the IP address of its inbound interface (1.1.1.1)
to the RR option. The detailed information of routes from Device A to Device C is formatted as:
1.1.1.1 <-> {1.1.1.2; 1.1.2.1} <-> 1.1.2.2.
Figure 1 Ping operation
Using a ping command to test network connectivity
Perform the following tasks in any view:
Determine if an IPv4 address is reachable.
Device A Device B Device C
1.1.1.1/24
1.1.1.2/24
ECHO-REQUEST
(NULL) ECHO-REQUEST
1st=1.1.2.1
1.1.2.1/24
1.1.2.2/24
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
3rd1.1.1.2
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
3rd1.1.1.2
4th=1.1.1.1
2
ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i interface-type
interface-number | -m interval | -n | -p pad | -q | -r | -s packet-size | -t
timeout | -tos tos | -v | -vpn-instance vpn-instance-name ] * host
Increase the timeout time (indicated by the -t keyword) on a low-speed network.
Determine if an IPv6 address is reachable.
ping ipv6 [ -a source-ipv6 | -c count | -i interface-type
interface-number | -m interval | -q | -s packet-size | -t timeout | -tc
traffic-class | -v | -vpn-instance vpn-instance-name ] * host
Increase the timeout time (indicated by the -t keyword) on a low-speed network.
Determine if a node in an MPLS network is reachable.
ping mpls ipv4
For more information about this command, see MPLS Command Reference.
Determine if an RB in a TRILL network is reachable.
ping trill
For more information about this command, see TRILL Command Reference.
Example: Using the ping utility
Network configuration
As shown in Figure 2, determine if Device A and Device C can reach each other.
Figure 2 Network diagram
Procedure
# Test the connectivity between Device A and Device C.
<DeviceA> ping 1.1.2.2
Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL+C to break
56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms
56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms
56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms
56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms
56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms
The output shows the following information:
Device A sends five ICMP packets to Device C and Device A receives five ICMP packets.
No ICMP packet is lost.
The route is reachable.
Device A Device B Device C
1.1.1.1/24 1.1.1.2/24 1.1.2.1/24 1.1.2.2/24
3
Tracert
About tracert
Tracert (also called Traceroute) enables retrieval of the IP addresses of Layer 3 devices in the path
to a destination. In the event of network failure, use tracert to test network connectivity and identify
failed nodes.
Figure 3 Tracert operation
Tracert uses received ICMP error messages to get the IP addresses of devices. Tracert works as
shown in Figure 3:
1. The source device sends a UDP packet with a TTL value of 1 to the destination device. The
destination UDP port is not used by any application on the destination device.
2. The first hop (Device B, the first Layer 3 device that receives the packet) responds by sending a
TTL-expired ICMP error message to the source, with its IP address (1.1.1.2) encapsulated. This
way, the source device can get the address of the first Layer 3 device (1.1.1.2).
3. The source device sends a packet with a TTL value of 2 to the destination device.
4. The second hop (Device C) responds with a TTL-expired ICMP error message, which gives the
source device the address of the second Layer 3 device (1.1.2.2).
5. This process continues until a packet sent by the source device reaches the ultimate
destination device. Because no application uses the destination port specified in the packet, the
destination device responds with a port-unreachable ICMP message to the source device, with
its IP address encapsulated. This way, the source device gets the IP address of the destination
device (1.1.3.2).
6. The source device determines that:
The packet has reached the destination device after receiving the port-unreachable ICMP
message.
The path to the destination device is 1.1.1.2 to 1.1.2.2 to 1.1.3.2.
Prerequisites
Before you use a tracert command, perform the tasks in this section.
For an IPv4 network:
Enable sending of ICMP timeout packets on the intermediate devices (devices between the
source and destination devices). If the intermediate devices are HPE devices, execute the ip
Device A Device B Device D
Device C
1.1.1.1/24
1.1.1.2/24
Hop Limit=1
TTL exceeded
1.1.2.1/24 1.1.3.1/24
1.1.2.2/24 1.1.3.2/24
Hop Limit=2
TTL exceeded
UDP port unreachable
Hop Limit=n
4
ttl-expires enable command on the devices. For more information about this command,
see Layer 3IP Services Command Reference.
Enable sending of ICMP destination unreachable packets on the destination device. If the
destination device is an HPE device, execute the ip unreachables enable command. For
more information about this command, see Layer 3IP Services Command Reference.
For an IPv6 network:
Enable sending of ICMPv6 timeout packets on the intermediate devices (devices between the
source and destination devices). If the intermediate devices are HPE devices, execute the
ipv6 hoplimit-expires enable command on the devices. For more information about
this command, see Layer 3IP Services Command Reference.
Enable sending of ICMPv6 destination unreachable packets on the destination device. If the
destination device is an HPE device, execute the ipv6 unreachables enable command.
For more information about this command, see Layer 3IP Services Command Reference.
Using a tracert command to identify failed or all nodes in a
path
Perform the following tasks in any view:
Trace the route to an IPv4 destination.
tracert [ -a source-ip | –e | -f first-ttl | -m max-ttl | -p port | -q
packet-number | -t tos | -vpn-instance vpn-instance-name [ -resolve-as
{ global | none | vpn } ] | -w timeout ] * host
Trace the route to an IPv6 destination.
tracert ipv6 [ -a source-ipv6 | –e | -f first-hop | -m max-hops | -p port
| -q packet-number | -t traffic-class | -vpn-instance vpn-instance-name
[ -resolve-as { global | none | vpn } ] | -w timeout ] * host
Trace the route to a destination in an MPLS network.
tracert mpls ipv4
For more information about this command, see MPLS Command Reference.
Trace the route to an RB in a TRILL network.
tracert trill
For more information about this command, see TRILL Command Reference.
Example: Using the tracert utility
Network configuration
As shown in Figure 4, Device A failed to Telnet to Device C.
Test the network connectivity between Device A and Device C. If they cannot reach each other,
locate the failed nodes in the network.
Figure 4 Network diagram
Procedure
1. Configure IP addresses for the devices as shown in Figure 4.
Device A Device B Device C
1.1.1.1/24 1.1.1.2/24 1.1.2.1/24 1.1.2.2/24
5
2. Configure a static route on Device A.
<DeviceA> system-view
[DeviceA] ip route-static 0.0.0.0 0.0.0.0 1.1.1.2
3. Test connectivity between Device A and Device C.
[DeviceA] ping 1.1.2.2
Ping 1.1.2.2(1.1.2.2): 56 -data bytes, press CTRL+C to break
Request time out
Request time out
Request time out
Request time out
Request time out
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted,0 packet(s) received,100.0% packet loss
The output shows that Device A and Device C cannot reach each other.
4. Identify failed nodes:
# Enable sending of ICMP timeout packets on Device B.
<DeviceB> system-view
[DeviceB] ip ttl-expires enable
# Enable sending of ICMP destination unreachable packets on Device C.
<DeviceC> system-view
[DeviceC] ip unreachables enable
# Identify failed nodes.
[DeviceA] tracert 1.1.2.2
traceroute to 1.1.2.2 (1.1.2.2) 30 hops at most,40 bytes each packet, press CTRL+C
to break
1 1.1.1.2 (1.1.1.2) 1 ms 2 ms 1 ms
2 * * *
3 * * *
4 * * *
5
[DeviceA]
The output shows that Device A can reach Device B but cannot reach Device C. An error has
occurred on the connection between Device B and Device C.
5. To identify the cause of the issue, execute the following commands on Device A and Device C:
Execute the debugging ip icmp command and verify that Device A and Device C can
send and receive the correct ICMP packets.
Execute the display ip routing-table command to verify that Device A and Device
C have a route to each other.
System debugging
About system debugging
The device supports debugging for the majority of protocols and features, and provides debugging
information to help users diagnose errors.
The following switches control the display of debugging information:
6
Module debugging switchControls whether to generate the module-specific debugging
information.
Screen output switchControls whether to display the debugging information on a certain
screen. Use terminal monitor and terminal logging level commands to turn on
the screen output switch. For more information about these two commands, see Network
Management and Monitoring Command Reference.
As shown in Figure 5, the device can provide debugging for the three modules 1, 2, and 3. The
debugging information can be output on a terminal only when both the module debugging switch and
the screen output switch are turned on.
Debugging information is typically displayed on a console. You can also send debugging information
to other destinations. For more information, see "Configuring the information center."
Figure 5 Relationship between the module and screen output switch
Configuring debugging
Restrictions and guidelines
CAUTION:
Output of excessive debugging messages increases the CPU usage and
downgrades the system
performance.
To gua
rantee system performance, enable debugging only for modules that are in an
exceptional condition.
Enable debugging for modules for troubleshooting purposes. When debugging is complete, use the
undo debugging all command to disable all the debugging functions.
Procedure
1. Enable debugging for a module.
debugging module-name [ option ]
By default, debugging is disabled for all modules.
This command is available in user view.
13
123
13
13
Debugging
information
Protocol
debugging
switch
Screen
output switch
Debugging
information
Protocol
debugging
switch
Screen
output switch
ON OFF ON
OFF
1 2 3
ON OFF ON
ON
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407
  • Page 408 408
  • Page 409 409
  • Page 410 410
  • Page 411 411
  • Page 412 412
  • Page 413 413
  • Page 414 414
  • Page 415 415
  • Page 416 416
  • Page 417 417
  • Page 418 418
  • Page 419 419
  • Page 420 420
  • Page 421 421
  • Page 422 422
  • Page 423 423
  • Page 424 424
  • Page 425 425
  • Page 426 426
  • Page 427 427
  • Page 428 428
  • Page 429 429
  • Page 430 430
  • Page 431 431
  • Page 432 432
  • Page 433 433
  • Page 434 434
  • Page 435 435
  • Page 436 436
  • Page 437 437
  • Page 438 438
  • Page 439 439
  • Page 440 440
  • Page 441 441
  • Page 442 442
  • Page 443 443
  • Page 444 444
  • Page 445 445
  • Page 446 446
  • Page 447 447
  • Page 448 448
  • Page 449 449
  • Page 450 450
  • Page 451 451
  • Page 452 452
  • Page 453 453
  • Page 454 454
  • Page 455 455
  • Page 456 456
  • Page 457 457
  • Page 458 458
  • Page 459 459
  • Page 460 460
  • Page 461 461
  • Page 462 462
  • Page 463 463
  • Page 464 464
  • Page 465 465
  • Page 466 466
  • Page 467 467
  • Page 468 468
  • Page 469 469
  • Page 470 470
  • Page 471 471
  • Page 472 472
  • Page 473 473
  • Page 474 474
  • Page 475 475
  • Page 476 476
  • Page 477 477
  • Page 478 478
  • Page 479 479
  • Page 480 480
  • Page 481 481
  • Page 482 482
  • Page 483 483
  • Page 484 484
  • Page 485 485
  • Page 486 486
  • Page 487 487
  • Page 488 488
  • Page 489 489
  • Page 490 490
  • Page 491 491
  • Page 492 492
  • Page 493 493
  • Page 494 494
  • Page 495 495
  • Page 496 496
  • Page 497 497
  • Page 498 498
  • Page 499 499
  • Page 500 500
  • Page 501 501
  • Page 502 502
  • Page 503 503
  • Page 504 504

Aruba JH691A Configuration Guide

Category
Software
Type
Configuration Guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI