HPE FlexNetwork 10500 SERIES Configuration manual

Category
Networking
Type
Configuration manual
HPE FlexNetwork 10500 Switch Series
Network Management and Monitoring
Configuration Guide
P
art number: 5200-1904a
Software
version: 10500-CMW710-R7557P01
Document version: 6W101-20171020
© Copyright 2017 Hewlett Packard Enterprise Development LP
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard
Enterprise products and services are set forth in the express warranty statements accompanying such
products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett
Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or
copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s
standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise
website.
Acknowledgments
Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the
United States and other countries.
Microsoft® and Windows® are trademarks of the Microsoft group of companies.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java and Oracle are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
i
Contents
Using ping, tracert, and system debugging ···················································· 1
Ping ···································································································································································· 1
Using a ping command to test network connectivity ·················································································· 1
Ping example ············································································································································· 1
Tracert ································································································································································ 3
Prerequisites ·············································································································································· 4
Using a tracert command to identify failed or all nodes in a path ······························································· 4
Tracert example ········································································································································· 4
System debugging ············································································································································· 6
Debugging information control switches ···································································································· 6
Debugging a feature module ······················································································································ 6
Configuring NQA ··························································································· 8
Overview ···························································································································································· 8
NQA operation ··········································································································································· 8
Collaboration ·············································································································································· 9
Threshold monitoring ································································································································· 9
NQA configuration task list ······························································································································· 10
Configuring the NQA server ····························································································································· 10
Enabling the NQA client ··································································································································· 11
Configuring NQA operations on the NQA client ······························································································· 11
NQA operation configuration task list ······································································································· 11
Configuring the ICMP echo operation ······································································································ 12
Configuring the ICMP jitter operation ······································································································· 13
Configuring the DHCP operation·············································································································· 13
Configuring the DNS operation ················································································································ 14
Configuring the FTP operation ················································································································· 15
Configuring the HTTP operation ·············································································································· 16
Configuring the UDP jitter operation ········································································································ 17
Configuring the SNMP operation ············································································································· 18
Configuring the TCP operation ················································································································· 19
Configuring the UDP echo operation ······································································································· 20
Configuring the UDP tracert operation ····································································································· 20
Configuring the voice operation ··············································································································· 22
Configuring the DLSw operation ·············································································································· 24
Configuring the path jitter operation ········································································································· 24
Configuring optional parameters for the NQA operation ·········································································· 25
Configuring the collaboration feature ······································································································· 26
Configuring threshold monitoring ············································································································· 27
Configuring the NQA statistics collection feature ····················································································· 30
Configuring the saving of NQA history records ························································································ 30
Scheduling the NQA operation on the NQA client ··················································································· 31
Configuring NQA templates on the NQA client ································································································ 31
NQA template configuration task list ········································································································ 32
Configuring the ICMP template ················································································································ 32
Configuring the DNS template ················································································································· 33
Configuring the TCP template ·················································································································· 34
Configuring the TCP half open template ·································································································· 35
Configuring the UDP template ················································································································· 36
Configuring the HTTP template ················································································································ 37
Configuring the HTTPS template ············································································································· 38
Configuring the FTP template ·················································································································· 39
Configuring the RADIUS template ··········································································································· 40
Configuring the SSL template ·················································································································· 41
Configuring optional parameters for the NQA template ··········································································· 42
Displaying and maintaining NQA ····················································································································· 43
NQA configuration examples ··························································································································· 43
ii
ICMP echo operation configuration example ··························································································· 43
ICMP jitter operation configuration example ···························································································· 45
DHCP operation configuration example ··································································································· 47
DNS operation configuration example ····································································································· 48
FTP operation configuration example ······································································································ 50
HTTP operation configuration example ···································································································· 51
UDP jitter operation configuration example······························································································ 52
SNMP operation configuration example ··································································································· 54
TCP operation configuration example ······································································································ 56
UDP echo operation configuration example····························································································· 57
UDP tracert operation configuration example ·························································································· 58
Voice operation configuration example ···································································································· 60
DLSw operation configuration example ··································································································· 62
Path jitter operation configuration example ······························································································ 63
NQA collaboration configuration example ································································································ 65
ICMP template configuration example ····································································································· 67
DNS template configuration example ······································································································· 68
TCP template configuration example ······································································································· 69
TCP half open template configuration example ······················································································· 70
UDP template configuration example ······································································································· 70
HTTP template configuration example ····································································································· 71
HTTPS template configuration example ·································································································· 72
FTP template configuration example ······································································································· 72
RADIUS template configuration example ································································································· 73
SSL template configuration example ······································································································· 74
Configuring NTP ·························································································· 76
Overview ·························································································································································· 76
How NTP works ······································································································································· 76
NTP architecture ······································································································································ 77
Association modes ··································································································································· 78
NTP security ············································································································································· 80
NTP for MPLS L3VPN instances ············································································································· 81
Protocols and standards ·························································································································· 82
Configuration restrictions and guidelines ········································································································· 82
Configuration task list ······································································································································· 82
Enabling the NTP service································································································································· 82
Configuring NTP association mode·················································································································· 82
Configuring NTP in client/server mode ···································································································· 83
Configuring NTP in symmetric active/passive mode ················································································ 83
Configuring NTP in broadcast mode ········································································································ 84
Configuring NTP in multicast mode ·········································································································· 85
Configuring access control rights ····················································································································· 85
Configuring NTP authentication ······················································································································· 86
Configuring NTP authentication in client/server mode ············································································· 86
Configuring NTP authentication in symmetric active/passive mode ························································ 88
Configuring NTP authentication in broadcast mode ················································································· 90
Configuring NTP authentication in multicast mode ·················································································· 92
Configuring NTP optional parameters ·············································································································· 94
Specifying the source interface for NTP messages ················································································· 94
Disabling an interface to receive NTP messages ···················································································· 95
Configuring the maximum number of dynamic associations ···································································· 95
Setting a DSCP value for NTP packets···································································································· 96
Configuring the local clock as a reference source ··························································································· 96
Displaying and maintaining NTP ······················································································································ 97
NTP configuration examples ···························································································································· 97
NTP client/server mode configuration example ······················································································· 97
IPv6 NTP client/server mode configuration example ··············································································· 98
NTP symmetric active/passive mode configuration example ··································································· 99
IPv6 NTP symmetric active/passive mode configuration example ························································· 100
NTP broadcast mode configuration example ························································································· 102
NTP multicast mode configuration example ··························································································· 103
iii
IPv6 NTP multicast mode configuration example ·················································································· 106
Configuration example for NTP client/server mode with authentication················································· 109
Configuration example for NTP broadcast mode with authentication ···················································· 110
Configuration example for MPLS L3VPN network time synchronization in client/server mode ············· 113
Configuration example for MPLS L3VPN network time synchronization in symmetric active/passive mode
······························································································································································· 114
Configuring SNTP ······················································································ 117
Configuration restrictions and guidelines ······································································································· 117
Configuration task list ····································································································································· 117
Enabling the SNTP service ···························································································································· 117
Specifying an NTP server for the device ········································································································ 117
Configuring SNTP authentication ··················································································································· 118
Displaying and maintaining SNTP·················································································································· 119
SNTP configuration example ························································································································· 119
Network requirements ···························································································································· 119
Configuration procedure ························································································································· 119
Configuring SNMP ····················································································· 121
Overview ························································································································································ 121
SNMP framework ··································································································································· 121
MIB and view-based MIB access control ······························································································· 121
SNMP operations ··································································································································· 122
Protocol versions ···································································································································· 122
Access control modes ···························································································································· 122
FIPS compliance ············································································································································ 122
Configuring SNMP basic parameters ············································································································· 123
Configuring SNMPv1 or SNMPv2c basic parameters ············································································ 123
Configuring SNMPv3 basic parameters ································································································· 125
Configuring SNMP logging ····························································································································· 129
Configuring SNMP notifications ····················································································································· 130
Enabling SNMP notifications ·················································································································· 130
Configuring the SNMP agent to send notifications to a host ·································································· 130
Displaying the SNMP settings ························································································································ 132
SNMPv1/SNMPv2c configuration example ···································································································· 132
Network requirements ···························································································································· 132
Configuration procedure ························································································································· 133
Verifying the configuration ······················································································································ 133
SNMPv3 configuration example ····················································································································· 134
Network requirements ···························································································································· 134
Configuration procedure ························································································································· 134
Verifying the configuration ······················································································································ 136
Configuring RMON ···················································································· 137
Overview ························································································································································ 137
RMON groups ········································································································································ 137
Sample types for the alarm group and the private alarm group ····························································· 139
Protocols and standards ························································································································ 139
Configuring the RMON statistics function ······································································································ 139
Creating an RMON Ethernet statistics entry ·························································································· 139
Creating an RMON history control entry ································································································ 139
Configuring the RMON alarm function ··········································································································· 140
Displaying and maintaining RMON settings ··································································································· 141
RMON configuration examples ······················································································································ 141
Ethernet statistics group configuration example ···················································································· 141
History group configuration example ······································································································ 142
Alarm function configuration example ···································································································· 143
Configuring NETCONF ·············································································· 145
Overview ························································································································································ 145
NETCONF structure ······························································································································· 145
NETCONF message format ··················································································································· 146
iv
How to use NETCONF ··························································································································· 147
Protocols and standards ························································································································ 147
FIPS compliance ············································································································································ 148
NETCONF configuration task list ··················································································································· 148
Configuring NETCONF over SOAP ··············································································································· 148
Enabling NETCONF over SSH ······················································································································ 149
Enabling NETCONF logging ·························································································································· 149
Configuring NETCONF to use module-specific namespaces ········································································ 150
About module-specific namespaces for NETCONF ··············································································· 150
Configuration restrictions and guidelines ······························································································· 151
Configuration procedure ························································································································· 151
Establishing a NETCONF session ················································································································· 151
Setting the NETCONF session idle timeout time ··················································································· 151
Entering XML view ································································································································· 152
Exchanging capabilities ·························································································································· 152
Subscribing to event notifications··················································································································· 152
Subscription procedure ·························································································································· 153
Example for subscribing to event notifications ······················································································· 154
Locking/unlocking the configuration ··············································································································· 155
Locking the configuration ······················································································································· 155
Unlocking the configuration ···················································································································· 155
Example for locking the configuration ···································································································· 156
Performing service operations ······················································································································· 157
Performing the get/get-bulk operation ···································································································· 157
Performing the get-config/get-bulk-config operation ·············································································· 159
Performing the edit-config operation ······································································································ 159
All-module configuration data retrieval example ···················································································· 160
Syslog configuration data retrieval example ·························································································· 162
Example for retrieving a data entry for the interface table ····································································· 163
Example for changing the value of a parameter ···················································································· 164
Saving, rolling back, and loading the configuration ························································································ 165
Saving the configuration ························································································································· 165
Rolling back the configuration based on a configuration file ·································································· 165
Rolling back the configuration based on a rollback point ······································································· 166
Loading the configuration ······················································································································· 170
Example for saving the configuration ····································································································· 170
Filtering data ·················································································································································· 171
Table-based filtering ······························································································································· 171
Column-based filtering ··························································································································· 171
Example for filtering data with regular expression match ······································································· 174
Example for filtering data by conditional match ······················································································ 175
Performing CLI operations through NETCONF······························································································ 176
Configuration procedure ························································································································· 177
CLI operation example ··························································································································· 177
Retrieving NETCONF information ·················································································································· 178
Retrieving YANG file content ························································································································· 179
Retrieving NETCONF session information····································································································· 180
Terminating another NETCONF session ······································································································· 181
Configuration procedure ························································································································· 181
Configuration example ··························································································································· 181
Returning to the CLI ······································································································································· 182
Appendix ··································································································· 183
Appendix A Supported NETCONF operations ······························································································· 183
Configuring EAA ························································································ 193
Overview ························································································································································ 193
EAA framework ······································································································································ 193
Elements in a monitor policy ·················································································································· 194
EAA environment variables ···················································································································· 195
Configuring a user-defined EAA environment variable ·················································································· 196
Configuring a monitor policy··························································································································· 197
v
Configuration restrictions and guidelines ······························································································· 197
Configuring a monitor policy from the CLI ······························································································ 197
Configuring a monitor policy by using Tcl ······························································································ 199
Suspending monitor policies ·························································································································· 200
Displaying and maintaining EAA settings······································································································· 201
EAA configuration examples ·························································································································· 201
CLI event monitor policy configuration example ···················································································· 201
Track event monitor policy configuration example ················································································· 202
CLI-defined policy with EAA environment variables configuration example ·········································· 204
Tcl-defined policy configuration example ······························································································· 205
Monitoring and maintaining processes ······················································· 207
Displaying and maintaining processes ··········································································································· 207
Displaying and maintaining user processes ··································································································· 208
Monitoring kernel threads······························································································································· 209
Configuring kernel thread deadloop detection ······················································································· 209
Configuring kernel thread starvation detection······················································································· 211
Displaying and maintaining kernel threads ···························································································· 211
Configuring samplers ················································································· 214
Creating a sampler ········································································································································· 214
Displaying and maintaining a sampler ··········································································································· 214
Sampler configuration example for IPv4 NetStream ······················································································ 214
Network requirements ···························································································································· 214
Configuration procedure ························································································································· 215
Verifying the configuration ······················································································································ 215
Configuring port mirroring ·········································································· 216
Overview ························································································································································ 216
Terminology ··········································································································································· 216
Port mirroring classification and implementation ···················································································· 217
Configuring local port mirroring ······················································································································ 220
Local port mirroring configuration task list······························································································ 220
Creating a local mirroring group ············································································································· 220
Configuring source ports for the local mirroring group ··········································································· 220
Configuring source CPUs for the local mirroring group·········································································· 221
Configuring the monitor port for the local mirroring group ······································································ 222
Configuring Layer 2 remote port mirroring ····································································································· 222
Layer 2 remote port mirroring with configurable reflector port configuration task list ····························· 223
Layer 2 remote port mirroring with egress port configuration task list ···················································· 223
Configuring a remote destination group on the destination device ························································ 224
Configuring a remote source group on the source device ····································································· 225
Configuring Layer 3 remote port mirroring ····································································································· 228
Layer 3 remote port mirroring configuration task list ·············································································· 229
Configuration prerequisites ···················································································································· 229
Configuring local mirroring groups ········································································································· 229
Configuring source ports for a local mirroring group ·············································································· 229
Configuring source CPUs for a local mirroring group············································································· 230
Configuring the monitor port for a local mirroring group ········································································· 231
Displaying and maintaining port mirroring ······································································································ 231
Port mirroring configuration examples ··········································································································· 232
Local port mirroring configuration example (in source port mode) ························································· 232
Local port mirroring configuration example (in source CPU mode) ······················································· 233
Layer 2 remote port mirroring configuration example (reflector port configurable) ································ 234
Layer 2 remote port mirroring configuration example (with egress port) ················································ 236
Layer 3 remote port mirroring configuration example ············································································ 238
Configuring flow mirroring ·········································································· 241
Flow mirroring configuration task list ·············································································································· 241
Configuring match criteria ······························································································································ 241
Configuring a traffic behavior ························································································································· 241
Configuring a QoS policy ······························································································································· 242
vi
Applying a QoS policy ···································································································································· 242
Applying a QoS policy to an interface ···································································································· 242
Applying a QoS policy to a VLAN ··········································································································· 242
Applying a QoS policy globally ··············································································································· 243
Applying a QoS policy to the control plane ···························································································· 243
Flow mirroring configuration example ············································································································ 243
Network requirements ···························································································································· 243
Configuration procedure ························································································································· 244
Verifying the configuration ······················································································································ 245
Configuring NetStream ·············································································· 246
Overview ························································································································································ 246
NetStream architecture ·························································································································· 246
Flow aging ·············································································································································· 247
NetStream data export ··························································································································· 247
NetStream filtering ································································································································· 249
NetStream sampling ······························································································································· 249
Protocols and standards ························································································································ 250
Feature and hardware compatibility ··············································································································· 250
NetStream configuration task list ··················································································································· 250
Enabling NetStream on an interface ·············································································································· 251
Configuring NetStream filtering ······················································································································ 252
Configuring NetStream sampling ··················································································································· 252
Configuring attributes of the NetStream data export ······················································································ 252
Configuring the NetStream data export format ······················································································ 252
Configuring the refresh rate for NetStream version 9 or version 10 template ········································ 254
Configuring NetStream flow aging ················································································································· 254
Flow aging methods ······························································································································· 254
Configuration procedure ························································································································· 254
Configuring the NetStream data export·········································································································· 255
Configuring the NetStream traditional data export ················································································· 255
Configuring the NetStream aggregation data export ·············································································· 255
Displaying and maintaining NetStream ·········································································································· 256
NetStream configuration examples ················································································································ 257
NetStream traditional data export configuration example ······································································ 257
NetStream aggregation data export configuration example ··································································· 259
Configuring IPv6 NetStream ······································································ 263
Overview ························································································································································ 263
IPv6 NetStream architecture ·················································································································· 263
Flow aging ·············································································································································· 264
IPv6 NetStream data export ··················································································································· 264
Protocols and standards ························································································································ 265
Feature and hardware compatibility ··············································································································· 265
IPv6 NetStream configuration task list ··········································································································· 266
Enabling IPv6 NetStream on an interface ······································································································ 267
Configuring attributes of the IPv6 NetStream data export ············································································· 267
Configuring the IPv6 NetStream data export format ·············································································· 267
Configuring the refresh rate for IPv6 NetStream version 9 or version 10 template ································ 268
Configuring IPv6 NetStream flow aging ········································································································· 268
Flow aging methods ······························································································································· 268
Configuration procedure ························································································································· 269
Configuring the IPv6 NetStream data export ································································································· 269
Configuring the IPv6 NetStream traditional data export ········································································· 269
Configuring the IPv6 NetStream aggregation data export ····································································· 270
Displaying and maintaining IPv6 NetStream ·································································································· 271
IPv6 NetStream configuration examples ········································································································ 272
IPv6 NetStream traditional data export configuration example ······························································ 272
IPv6 NetStream aggregation data export configuration example··························································· 273
Configuring sFlow ······················································································ 276
Protocols and standards ································································································································ 276
vii
Configuration restrictions and guidelines ······································································································· 276
sFlow configuration task list ··························································································································· 276
Configuring the sFlow agent and sFlow collector information ········································································ 277
Configuring flow sampling ······························································································································ 277
Configuring counter sampling ························································································································ 278
Displaying and maintaining sFlow ·················································································································· 278
sFlow configuration example·························································································································· 279
Network requirements ···························································································································· 279
Configuration procedure ························································································································· 279
Verifying the configurations ···················································································································· 280
Troubleshooting sFlow configuration ············································································································· 280
The remote sFlow collector cannot receive sFlow packets ···································································· 280
Configuring the information center ····························································· 282
Overview ························································································································································ 282
Log types ················································································································································ 282
Log levels ··············································································································································· 282
Log destinations ····································································································································· 283
Default output rules for logs ··················································································································· 283
Default output rules for diagnostic logs ·································································································· 283
Default output rules for security logs ······································································································ 283
Default output rules for hidden logs ······································································································· 284
Default output rules for trace logs ·········································································································· 284
Log formats ············································································································································ 284
FIPS compliance ············································································································································ 287
Information center configuration task list ······································································································· 287
Outputting logs to the console ······················································································································· 287
Outputting logs to the monitor terminal ·········································································································· 288
Outputting logs to log hosts···························································································································· 289
Outputting logs to the log buffer ····················································································································· 289
Saving logs to the log file ······························································································································· 290
Managing security logs ·································································································································· 291
Saving security logs to the security log file ···························································································· 291
Managing the security log file ················································································································· 291
Saving diagnostic logs to the diagnostic log file ····························································································· 292
Configuring the maximum size of the trace log file ························································································ 293
Setting the minimum storage period for log files and logs in the log buffer ··················································· 293
Logs in the log buffer ······························································································································ 293
Log files ·················································································································································· 294
Configuration procedure ························································································································· 294
Enabling synchronous information output ······································································································ 294
Enabling duplicate log suppression ··············································································································· 294
Configuring log suppression for a module······································································································ 295
Disabling an interface from generating link up or link down logs ··································································· 295
Enabling SNMP notifications for system logs································································································· 296
Displaying and maintaining information center ······························································································ 296
Information center configuration examples ···································································································· 296
Configuration example for outputting logs to the console ······································································ 296
Configuration example for outputting logs to a UNIX log host ······························································· 297
Configuration example for outputting logs to a Linux log host ······························································· 298
Configuring GOLD ····················································································· 301
Configuring monitoring diagnostics ················································································································ 301
Simulating test results ···································································································································· 302
Configuring the log buffer size ······················································································································· 302
Displaying and maintaining GOLD ················································································································· 302
GOLD configuration example ························································································································· 303
Network requirements ···························································································································· 303
Configuration procedure ························································································································· 303
Verifying the configuration ······················································································································ 304
viii
Configuring the packet capture ·································································· 305
Overview ························································································································································ 305
Packet capture modes ··························································································································· 305
Filter elements ········································································································································ 305
Building a capture filter ··························································································································· 311
Building a display filter ··························································································································· 312
Configuration restrictions and guidelines ······································································································· 312
Packet capture configuration task list············································································································· 313
Configuring local packet capture ···················································································································· 313
Configuring remote packet capture ················································································································ 313
Configuring feature image-based packet capture ·························································································· 314
Displaying the contents in a packet file ·········································································································· 315
Displaying and maintaining packet capture···································································································· 315
Packet capture configuration examples ········································································································· 315
Remote packet capture configuration example ······················································································ 315
Feature image-based packet capture configuration example ································································ 316
Packet file display configuration example ······························································································ 318
Configuring VCF fabric ·············································································· 319
Overview ························································································································································ 319
VCF fabric topology ································································································································ 319
Neutron concepts and components ······································································································· 320
Neutron deployment ······························································································································· 321
Automated VCF fabric provisioning and deployment ····················································································· 322
Topology discovery ································································································································ 323
Automated underlay network provisioning ····························································································· 323
Automated overlay network deployment ································································································ 325
Configuration restrictions and guidelines ······································································································· 325
VCF fabric configuration task list···················································································································· 326
Enabling VCF fabric topology discovery ········································································································ 326
Configuration restrictions and guidelines ······························································································· 326
Configuration procedure ························································································································· 326
Configuring automated underlay network provisioning ·················································································· 326
Configuration restrictions and guidelines ······························································································· 326
Configuration procedure ························································································································· 327
Configuring automated overlay network deployment ····················································································· 327
Configuration restrictions and guidelines ······························································································· 327
Configuration procedure ························································································································· 328
Displaying and maintaining VCF fabric ·········································································································· 329
Automated VCF fabric configuration example································································································ 329
Network requirements ···························································································································· 329
Configuration procedure ························································································································· 330
Verifying the configuration ······················································································································ 332
Configuring CWMP ···················································································· 336
Overview ························································································································································ 336
CWMP network framework ···················································································································· 336
Basic CWMP functions ··························································································································· 336
How CWMP works ································································································································· 337
Configuration task list ····································································································································· 339
Enabling CWMP from the CLI ························································································································ 340
Configuring ACS attributes····························································································································· 340
Configuring the preferred ACS attributes ······························································································· 340
Configuring the default ACS attributes from the CLI ·············································································· 342
Configuring CPE attributes····························································································································· 342
Configuring ACS authentication parameters ·························································································· 342
Configuring the provision code ··············································································································· 342
Configuring the CWMP connection interface ························································································· 343
Configuring autoconnect parameters ····································································································· 343
Enabling NAT traversal for the CPE ······································································································· 345
Specifying an SSL client policy for HTTPS connection to ACS ····························································· 345
ix
Displaying and maintaining CWMP ················································································································ 345
CWMP configuration example························································································································ 346
Network requirements ···························································································································· 346
Configuration procedure ························································································································· 347
Verifying the configuration ······················································································································ 355
Document conventions and icons ······························································ 356
Conventions ··················································································································································· 356
Network topology icons ·································································································································· 357
Support and other resources ····································································· 358
Accessing Hewlett Packard Enterprise Support····························································································· 358
Accessing updates ········································································································································· 358
Websites ················································································································································ 359
Customer self repair ······························································································································· 359
Remote support ······································································································································ 359
Documentation feedback ······················································································································· 359
Index ·········································································································· 361
1
Using ping, tracert, and system
debugging
This chapter covers ping, tracert, and information about debugging the system.
Ping
Use the ping utility to determine if an address is reachable.
Ping sends ICMP echo requests (ECHO-REQUEST) to the destination device. Upon receiving the
requests, the destination device responds with ICMP echo replies (ECHO-REPLY) to the source
device. The source device outputs statistics about the ping operation, including the number of
packets sent, number of echo replies received, and the round-trip time. You can measure the
network performance by analyzing these statistics.
Using a ping command to test network connectivity
Execute ping commands in any view.
Task
Command
Determine if an address in an IP network is
reachable.
When you configure the
ping
command for a low-speed
network, set a larger value for the timeout timer (indicated by
the
-t
keyword in the command).
For IPv4 networks:
ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i
interface-type interface-number | -m interval | -n | -p pad |
-q | -r | -s packet-size | -t timeout | -tos tos | -v |
-vpn-instance vpn-instance-name ] * host
For IPv6 networks:
ping ipv6 [ -a source-ipv6 | -c count | -i interface-type
interface-number | -m interval | -q | -s packet-size | -t
timeout | -v | -tc traffic-class | -vpn-instance
vpn-instance-name ] * host
For more information about the ping mpls command, see MPLS Command Reference.
Ping example
Network requirements
As shown in Figure 1, determine if Device A and Device C can reach each other. If they can reach
each other, get detailed information about routes from Device A to Device C.
2
Figure 1 Network diagram
Configuration procedure
# Use the ping command on Device A to test connectivity to Device C.
<DeviceA> ping 1.1.2.2
Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break
56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms
56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms
56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms
56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms
56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms
The output shows the following information:
Device A sends five ICMP packets to Device C and Device A receives five ICMP packets.
No ICMP packet is lost.
The route is reachable.
# Get detailed information about routes from Device A to Device C.
<DeviceA> ping -r 1.1.2.2
Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break
56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=4.685 ms
RR: 1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=4.834 ms (same route)
56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=4.770 ms (same route)
56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=4.812 ms (same route)
56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=4.704 ms (same route)
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 4.685/4.761/4.834/0.058 ms
The test procedure of ping –r is as shown in Figure 1:
Device A Device B Device C
1.1.1.1/24
1.1.1.2/24
ECHO-REQUEST
(NULL)
ECHO-REQUEST
1st=1.1.2.1
1.1.2.1/24
1.1.2.2/24
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
3rd1.1.1.2
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
3rd1.1.1.2
4th=1.1.1.1
3
1. The source device (Device A) sends an ICMP echo request to the destination device (Device C)
with the RR option blank.
2. The intermediate device (Device B) adds the IP address of its outbound interface (1.1.2.1) to
the RR option of the ICMP echo request, and forwards the packet.
3. Upon receiving the request, the destination device copies the RR option in the request and
adds the IP address of its outbound interface (1.1.2.2) to the RR option. Then the destination
device sends an ICMP echo reply.
4. The intermediate device adds the IP address of its outbound interface (1.1.1.2) to the RR option
in the ICMP echo reply, and then forwards the reply.
5. Upon receiving the reply, the source device adds the IP address of its inbound interface (1.1.1.1)
to the RR option. The detailed information of routes from Device A to Device C is formatted as:
1.1.1.1 <-> {1.1.1.2; 1.1.2.1} <-> 1.1.2.2.
Tracert
Tracert (also called Traceroute) enables retrieval of the IP addresses of Layer 3 devices in the path
to a destination. In the event of network failure, use tracert to test network connectivity and identify
failed nodes.
Figure 2 Tracert operation
Tracert uses received ICMP error messages to get the IP addresses of devices. Tracert works as
shown in Figure 2:
1. The source device sends a UDP packet with a TTL value of 1 to the destination device. The
destination UDP port is not used by any application on the destination device.
2. The first hop (Device B, the first Layer 3 device that receives the packet) responds by sending a
TTL-expired ICMP error message to the source, with its IP address (1.1.1.2) encapsulated. This
way, the source device can get the address of the first Layer 3 device (1.1.1.2).
3. The source device sends a packet with a TTL value of 2 to the destination device.
4. The second hop (Device C) responds with a TTL-expired ICMP error message, which gives the
source device the address of the second Layer 3 device (1.1.2.2).
5. This process continues until a packet sent by the source device reaches the ultimate
destination device. Because no application uses the destination port specified in the packet, the
destination device responds with a port-unreachable ICMP message to the source device, with
its IP address encapsulated. This way, the source device gets the IP address of the destination
device (1.1.3.2).
6. The source device determines that:
The packet has reached the destination device after receiving the port-unreachable ICMP
message.
Device A Device B Device D
Device C
1.1.1.1/24
1.1.1.2/24
Hop Lmit=1
TTL exceeded
1.1.2.1/24
1.1.3.1/24
1.1.2.2/24 1.1.3.2/24
Hop Lmit=2
TTL exceeded
UDP port unreachable
Hop Lmit=n
4
The path to the destination device is 1.1.1.2 to 1.1.2.2 to 1.1.3.2.
Prerequisites
Before you use a tracert command, perform the tasks in this section.
For an IPv4 network:
Enable sending of ICMP timeout packets on the intermediate devices (devices between the
source and destination devices). If the intermediate devices are HPE devices, execute the ip
ttl-expires enable command on the devices. For more information about this command, see
Layer 3IP Services Command Reference.
Enable sending of ICMP destination unreachable packets on the destination device. If the
destination device is an HPE device, execute the ip unreachables enable command. For more
information about this command, see Layer 3IP Services Command Reference.
For an IPv6 network:
Enable sending of ICMPv6 timeout packets on the intermediate devices (devices between the
source and destination devices). If the intermediate devices are HPE devices, execute the ipv6
hoplimit-expires enable command on the devices. For more information about this command,
see Layer 3IP Services Command Reference.
Enable sending of ICMPv6 destination unreachable packets on the destination device. If the
destination device is an HPE device, execute the ipv6 unreachables enable command. For
more information about this command, see Layer 3IP Services Command Reference.
Using a tracert command to identify failed or all nodes in a
path
Execute tracert commands in any view.
Task
Command
Display the routes from source
to destination.
For IPv4 networks:
tracert [ -a source-ip | -f first-ttl | -m max-ttl | -p port | -q
packet-number | -t tos | -vpn-instance vpn-instance-name
[ -resolve-as { global | none | vpn } ] | -w timeout ] * host
For IPv6 networks:
tracert ipv6 [ -f first-hop | -m max-hops | -p port | -q packet-number |
-t traffic-class | -vpn-instance vpn-instance-name [ -resolve-as
{ global | none | vpn } ] | -w timeout ] * host
For more information about the tracert mpls ipv4 command, see MPLS Command Reference.
Tracert example
Network requirements
As shown in Figure 3, Device A failed to Telnet to Device C.
Test the network connectivity between Device A and Device C. If they cannot reach each other,
locate the failed nodes in the network.
5
Figure 3 Network diagram
Configuration procedure
1. Configure the IP addresses for devices as shown in Figure 3.
2. Configure a static route on Device A.
<DeviceA> system-view
[DeviceA] ip route-static 0.0.0.0 0.0.0.0 1.1.1.2
[DeviceA] quit
3. Use the ping command to test connectivity between Device A and Device C.
<DeviceA> ping 1.1.2.2
Ping 1.1.2.2(1.1.2.2): 56 -data bytes, press CTRL_C to break
Request time out
Request time out
Request time out
Request time out
Request time out
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted,0 packet(s) received,100.0% packet loss
The output shows that Device A and Device C cannot reach each other.
4. Use the tracert command to identify failed nodes:
# Enable sending of ICMP timeout packets on Device B.
<DeviceB> system-view
[DeviceB] ip ttl-expires enable
# Enable sending of ICMP destination unreachable packets on Device C.
<DeviceC> system-view
[DeviceC] ip unreachables enable
# Execute the tracert command on Device A.
<DeviceA> tracert 1.1.2.2
traceroute to 1.1.2.2 (1.1.2.2) 30 hops at most,40 bytes each packet, press CTRL_C
to break
1 1.1.1.2 (1.1.1.2) 1 ms 2 ms 1 ms
2 * * *
3 * * *
4 * * *
5
<DeviceA>
The output shows that Device A can reach Device B but cannot reach Device C. An error has
occurred on the connection between Device B and Device C.
5. To identify the cause of the problem, execute the following commands on Device A and Device
C:
Execute the debugging ip icmp command and verify that Device A and Device C can send
and receive the correct ICMP packets.
Execute the display ip routing-table command to verify that Device A and Device C have a
route to each other.
Device A Device B
Device C
1.1.1.1/24 1.1.1.2/24 1.
1
.
2
.
1
/24
1.1.2.2/24
6
System debugging
The device supports debugging for the majority of protocols and features, and provides debugging
information to help users diagnose errors.
Debugging information control switches
The following switches control the display of debugging information:
Module debugging switchControls whether to generate the module-specific debugging
information.
Screen output switchControls whether to display the debugging information on a certain
screen. Use terminal monitor and terminal logging level commands to turn on the screen
output switch. For more information about these two commands, see Network Management
and Monitoring Command Reference.
As shown in Figure 4, the device can provide debugging for the three modules 1, 2, and 3. The
debugging information can be output on a terminal only when both the module debugging switch and
the screen output switch are turned on.
Debugging information is typically displayed on a console. You can also send debugging information
to other destinations. For more information, see "Configuring the information center."
Figure 4 Relationship between the module and screen output switch
Debugging a feature module
Output of debugging commands is memory intensive. To guarantee system performance, enable
debugging only for modules that are in an exceptional condition. When debugging is complete, use
the undo debugging all command to disable all the debugging functions.
To debug a feature module:
1. Enable debugging for a
module in user view.
debugging
module-name
[ option ]
By default, all debugging
functions are disabled.
1
3
1 2
3
1
3
1
3
Debugging
information
Protocol
debugging
switch
Screen
output switch
Debugging
information
Protocol
debugging
switch
Screen
output switch
ON
OFF ON
OFF
1 2
3
ON
OFF
ON
ON
7
2. (Optional.) Display the
enabled debugging in any
view.
display
debugging
[ module-name ]
N/A
8
Configuring NQA
Overview
Network quality analyzer (NQA) allows you to measure network performance, verify the service
levels for IP services and applications, and troubleshoot network problems. It provides the following
types of operations:
ICMP echo.
ICMP jitter.
DHCP.
DLSw.
DNS.
FTP.
HTTP.
Path jitter.
SNMP.
TCP.
UDP echo.
UDP jitter.
UDP tracert.
Voice.
As shown in Figure 5, the NQA source device (NQA client) sends data to the NQA destination device
by simulating IP services and applications to measure network performance. The obtained
performance metrics include the one-way latency, jitter, packet loss, voice quality, application
performance, and server response time.
All types of NQA operations require the NQA client, but only the TCP, UDP echo, UDP jitter, and
voice operations require the NQA server. The NQA operations for services that are already provided
by the destination device such as FTP do not need the NQA server.
You can configure the NQA server to listen and respond to specific IP addresses and ports to meet
various test needs.
Figure 5 Network diagram
NQA operation
The following describes how NQA performs different types of operations:
A TCP or DLSw operation sets up a connection.
An ICMP jitter, UDP jitter, or voice operation sends a number of probe packets. The number of
probe packets is set by using the probe packet-number command.
An FTP operation uploads or downloads a file.
IP network
NQA source device/
NQA client
NQA destination device
9
An HTTP operation gets a Web page.
A DHCP operation gets an IP address through DHCP.
A DNS operation translates a domain name to an IP address.
An ICMP echo operation sends an ICMP echo request.
A UDP echo operation sends a UDP packet.
An SNMP operation sends one SNMPv1 packet, one SNMPv2c packet, and one SNMPv3
packet.
A path jitter operation is accomplished in the following steps:
a. The operation uses tracert to obtain the path from the NQA client to the destination. A
maximum of 64 hops can be detected.
b. The NQA client sends ICMP echo requests to each hop along the path. The number of
ICMP echo requests is set by using the probe packet-number command.
A UDP tracert operation determines the routing path from the source to the destination. The
number of the probe packets sent to each hop is set by using the probe count command.
Collaboration
NQA can collaborate with the Track module to notify application modules of state or performance
changes so that the application modules can take predefined actions.
Figure 6 Collaboration
The following describes how a static route destined for 192.168.0.88 is monitored through
collaboration:
1. NQA monitors the reachability to 192.168.0.88.
2. When 192.168.0.88 becomes unreachable, NQA notifies the Track module of the change.
3. The Track module notifies the static routing module of the state change.
4. The static routing module sets the static route to invalid according to a predefined action.
For more information about collaboration, see High Availability Configuration Guide.
Threshold monitoring
Threshold monitoring enables the NQA client to take a predefined action when the NQA operation
performance metrics violate the specified thresholds.
Table 1 describes the relationships between performance metrics and NQA operation types.
Application modulesDetection
modules
Sends the
detection results
Sends the track
entry status
Track
module
Associates with
a detection entry
Associates with
a track entry
VRRP
Static routing
PBR
NQA
Smart Link
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407

HPE FlexNetwork 10500 SERIES Configuration manual

Category
Networking
Type
Configuration manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI