HPE FlexNetwork 10500 SERIES Configuration manual

  • Hello! I am an AI chatbot trained to assist you with the HPE FlexNetwork 10500 SERIES Configuration manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
HPE FlexNetwork 10500 Switch Series
Network Management and Monitoring
Configuration Guide
P
art number: 5200-1904a
Software
version: 10500-CMW710-R7557P01
Document version: 6W101-20171020
© Copyright 2017 Hewlett Packard Enterprise Development LP
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard
Enterprise products and services are set forth in the express warranty statements accompanying such
products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett
Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or
copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s
standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise
website.
Acknowledgments
Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the
United States and other countries.
Microsoft® and Windows® are trademarks of the Microsoft group of companies.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java and Oracle are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
i
Contents
Using ping, tracert, and system debugging ···················································· 1
Ping ···································································································································································· 1
Using a ping command to test network connectivity ·················································································· 1
Ping example ············································································································································· 1
Tracert ································································································································································ 3
Prerequisites ·············································································································································· 4
Using a tracert command to identify failed or all nodes in a path ······························································· 4
Tracert example ········································································································································· 4
System debugging ············································································································································· 6
Debugging information control switches ···································································································· 6
Debugging a feature module ······················································································································ 6
Configuring NQA ··························································································· 8
Overview ···························································································································································· 8
NQA operation ··········································································································································· 8
Collaboration ·············································································································································· 9
Threshold monitoring ································································································································· 9
NQA configuration task list ······························································································································· 10
Configuring the NQA server ····························································································································· 10
Enabling the NQA client ··································································································································· 11
Configuring NQA operations on the NQA client ······························································································· 11
NQA operation configuration task list ······································································································· 11
Configuring the ICMP echo operation ······································································································ 12
Configuring the ICMP jitter operation ······································································································· 13
Configuring the DHCP operation·············································································································· 13
Configuring the DNS operation ················································································································ 14
Configuring the FTP operation ················································································································· 15
Configuring the HTTP operation ·············································································································· 16
Configuring the UDP jitter operation ········································································································ 17
Configuring the SNMP operation ············································································································· 18
Configuring the TCP operation ················································································································· 19
Configuring the UDP echo operation ······································································································· 20
Configuring the UDP tracert operation ····································································································· 20
Configuring the voice operation ··············································································································· 22
Configuring the DLSw operation ·············································································································· 24
Configuring the path jitter operation ········································································································· 24
Configuring optional parameters for the NQA operation ·········································································· 25
Configuring the collaboration feature ······································································································· 26
Configuring threshold monitoring ············································································································· 27
Configuring the NQA statistics collection feature ····················································································· 30
Configuring the saving of NQA history records ························································································ 30
Scheduling the NQA operation on the NQA client ··················································································· 31
Configuring NQA templates on the NQA client ································································································ 31
NQA template configuration task list ········································································································ 32
Configuring the ICMP template ················································································································ 32
Configuring the DNS template ················································································································· 33
Configuring the TCP template ·················································································································· 34
Configuring the TCP half open template ·································································································· 35
Configuring the UDP template ················································································································· 36
Configuring the HTTP template ················································································································ 37
Configuring the HTTPS template ············································································································· 38
Configuring the FTP template ·················································································································· 39
Configuring the RADIUS template ··········································································································· 40
Configuring the SSL template ·················································································································· 41
Configuring optional parameters for the NQA template ··········································································· 42
Displaying and maintaining NQA ····················································································································· 43
NQA configuration examples ··························································································································· 43
ii
ICMP echo operation configuration example ··························································································· 43
ICMP jitter operation configuration example ···························································································· 45
DHCP operation configuration example ··································································································· 47
DNS operation configuration example ····································································································· 48
FTP operation configuration example ······································································································ 50
HTTP operation configuration example ···································································································· 51
UDP jitter operation configuration example······························································································ 52
SNMP operation configuration example ··································································································· 54
TCP operation configuration example ······································································································ 56
UDP echo operation configuration example····························································································· 57
UDP tracert operation configuration example ·························································································· 58
Voice operation configuration example ···································································································· 60
DLSw operation configuration example ··································································································· 62
Path jitter operation configuration example ······························································································ 63
NQA collaboration configuration example ································································································ 65
ICMP template configuration example ····································································································· 67
DNS template configuration example ······································································································· 68
TCP template configuration example ······································································································· 69
TCP half open template configuration example ······················································································· 70
UDP template configuration example ······································································································· 70
HTTP template configuration example ····································································································· 71
HTTPS template configuration example ·································································································· 72
FTP template configuration example ······································································································· 72
RADIUS template configuration example ································································································· 73
SSL template configuration example ······································································································· 74
Configuring NTP ·························································································· 76
Overview ·························································································································································· 76
How NTP works ······································································································································· 76
NTP architecture ······································································································································ 77
Association modes ··································································································································· 78
NTP security ············································································································································· 80
NTP for MPLS L3VPN instances ············································································································· 81
Protocols and standards ·························································································································· 82
Configuration restrictions and guidelines ········································································································· 82
Configuration task list ······································································································································· 82
Enabling the NTP service································································································································· 82
Configuring NTP association mode·················································································································· 82
Configuring NTP in client/server mode ···································································································· 83
Configuring NTP in symmetric active/passive mode ················································································ 83
Configuring NTP in broadcast mode ········································································································ 84
Configuring NTP in multicast mode ·········································································································· 85
Configuring access control rights ····················································································································· 85
Configuring NTP authentication ······················································································································· 86
Configuring NTP authentication in client/server mode ············································································· 86
Configuring NTP authentication in symmetric active/passive mode ························································ 88
Configuring NTP authentication in broadcast mode ················································································· 90
Configuring NTP authentication in multicast mode ·················································································· 92
Configuring NTP optional parameters ·············································································································· 94
Specifying the source interface for NTP messages ················································································· 94
Disabling an interface to receive NTP messages ···················································································· 95
Configuring the maximum number of dynamic associations ···································································· 95
Setting a DSCP value for NTP packets···································································································· 96
Configuring the local clock as a reference source ··························································································· 96
Displaying and maintaining NTP ······················································································································ 97
NTP configuration examples ···························································································································· 97
NTP client/server mode configuration example ······················································································· 97
IPv6 NTP client/server mode configuration example ··············································································· 98
NTP symmetric active/passive mode configuration example ··································································· 99
IPv6 NTP symmetric active/passive mode configuration example ························································· 100
NTP broadcast mode configuration example ························································································· 102
NTP multicast mode configuration example ··························································································· 103
iii
IPv6 NTP multicast mode configuration example ·················································································· 106
Configuration example for NTP client/server mode with authentication················································· 109
Configuration example for NTP broadcast mode with authentication ···················································· 110
Configuration example for MPLS L3VPN network time synchronization in client/server mode ············· 113
Configuration example for MPLS L3VPN network time synchronization in symmetric active/passive mode
······························································································································································· 114
Configuring SNTP ······················································································ 117
Configuration restrictions and guidelines ······································································································· 117
Configuration task list ····································································································································· 117
Enabling the SNTP service ···························································································································· 117
Specifying an NTP server for the device ········································································································ 117
Configuring SNTP authentication ··················································································································· 118
Displaying and maintaining SNTP·················································································································· 119
SNTP configuration example ························································································································· 119
Network requirements ···························································································································· 119
Configuration procedure ························································································································· 119
Configuring SNMP ····················································································· 121
Overview ························································································································································ 121
SNMP framework ··································································································································· 121
MIB and view-based MIB access control ······························································································· 121
SNMP operations ··································································································································· 122
Protocol versions ···································································································································· 122
Access control modes ···························································································································· 122
FIPS compliance ············································································································································ 122
Configuring SNMP basic parameters ············································································································· 123
Configuring SNMPv1 or SNMPv2c basic parameters ············································································ 123
Configuring SNMPv3 basic parameters ································································································· 125
Configuring SNMP logging ····························································································································· 129
Configuring SNMP notifications ····················································································································· 130
Enabling SNMP notifications ·················································································································· 130
Configuring the SNMP agent to send notifications to a host ·································································· 130
Displaying the SNMP settings ························································································································ 132
SNMPv1/SNMPv2c configuration example ···································································································· 132
Network requirements ···························································································································· 132
Configuration procedure ························································································································· 133
Verifying the configuration ······················································································································ 133
SNMPv3 configuration example ····················································································································· 134
Network requirements ···························································································································· 134
Configuration procedure ························································································································· 134
Verifying the configuration ······················································································································ 136
Configuring RMON ···················································································· 137
Overview ························································································································································ 137
RMON groups ········································································································································ 137
Sample types for the alarm group and the private alarm group ····························································· 139
Protocols and standards ························································································································ 139
Configuring the RMON statistics function ······································································································ 139
Creating an RMON Ethernet statistics entry ·························································································· 139
Creating an RMON history control entry ································································································ 139
Configuring the RMON alarm function ··········································································································· 140
Displaying and maintaining RMON settings ··································································································· 141
RMON configuration examples ······················································································································ 141
Ethernet statistics group configuration example ···················································································· 141
History group configuration example ······································································································ 142
Alarm function configuration example ···································································································· 143
Configuring NETCONF ·············································································· 145
Overview ························································································································································ 145
NETCONF structure ······························································································································· 145
NETCONF message format ··················································································································· 146
iv
How to use NETCONF ··························································································································· 147
Protocols and standards ························································································································ 147
FIPS compliance ············································································································································ 148
NETCONF configuration task list ··················································································································· 148
Configuring NETCONF over SOAP ··············································································································· 148
Enabling NETCONF over SSH ······················································································································ 149
Enabling NETCONF logging ·························································································································· 149
Configuring NETCONF to use module-specific namespaces ········································································ 150
About module-specific namespaces for NETCONF ··············································································· 150
Configuration restrictions and guidelines ······························································································· 151
Configuration procedure ························································································································· 151
Establishing a NETCONF session ················································································································· 151
Setting the NETCONF session idle timeout time ··················································································· 151
Entering XML view ································································································································· 152
Exchanging capabilities ·························································································································· 152
Subscribing to event notifications··················································································································· 152
Subscription procedure ·························································································································· 153
Example for subscribing to event notifications ······················································································· 154
Locking/unlocking the configuration ··············································································································· 155
Locking the configuration ······················································································································· 155
Unlocking the configuration ···················································································································· 155
Example for locking the configuration ···································································································· 156
Performing service operations ······················································································································· 157
Performing the get/get-bulk operation ···································································································· 157
Performing the get-config/get-bulk-config operation ·············································································· 159
Performing the edit-config operation ······································································································ 159
All-module configuration data retrieval example ···················································································· 160
Syslog configuration data retrieval example ·························································································· 162
Example for retrieving a data entry for the interface table ····································································· 163
Example for changing the value of a parameter ···················································································· 164
Saving, rolling back, and loading the configuration ························································································ 165
Saving the configuration ························································································································· 165
Rolling back the configuration based on a configuration file ·································································· 165
Rolling back the configuration based on a rollback point ······································································· 166
Loading the configuration ······················································································································· 170
Example for saving the configuration ····································································································· 170
Filtering data ·················································································································································· 171
Table-based filtering ······························································································································· 171
Column-based filtering ··························································································································· 171
Example for filtering data with regular expression match ······································································· 174
Example for filtering data by conditional match ······················································································ 175
Performing CLI operations through NETCONF······························································································ 176
Configuration procedure ························································································································· 177
CLI operation example ··························································································································· 177
Retrieving NETCONF information ·················································································································· 178
Retrieving YANG file content ························································································································· 179
Retrieving NETCONF session information····································································································· 180
Terminating another NETCONF session ······································································································· 181
Configuration procedure ························································································································· 181
Configuration example ··························································································································· 181
Returning to the CLI ······································································································································· 182
Appendix ··································································································· 183
Appendix A Supported NETCONF operations ······························································································· 183
Configuring EAA ························································································ 193
Overview ························································································································································ 193
EAA framework ······································································································································ 193
Elements in a monitor policy ·················································································································· 194
EAA environment variables ···················································································································· 195
Configuring a user-defined EAA environment variable ·················································································· 196
Configuring a monitor policy··························································································································· 197
v
Configuration restrictions and guidelines ······························································································· 197
Configuring a monitor policy from the CLI ······························································································ 197
Configuring a monitor policy by using Tcl ······························································································ 199
Suspending monitor policies ·························································································································· 200
Displaying and maintaining EAA settings······································································································· 201
EAA configuration examples ·························································································································· 201
CLI event monitor policy configuration example ···················································································· 201
Track event monitor policy configuration example ················································································· 202
CLI-defined policy with EAA environment variables configuration example ·········································· 204
Tcl-defined policy configuration example ······························································································· 205
Monitoring and maintaining processes ······················································· 207
Displaying and maintaining processes ··········································································································· 207
Displaying and maintaining user processes ··································································································· 208
Monitoring kernel threads······························································································································· 209
Configuring kernel thread deadloop detection ······················································································· 209
Configuring kernel thread starvation detection······················································································· 211
Displaying and maintaining kernel threads ···························································································· 211
Configuring samplers ················································································· 214
Creating a sampler ········································································································································· 214
Displaying and maintaining a sampler ··········································································································· 214
Sampler configuration example for IPv4 NetStream ······················································································ 214
Network requirements ···························································································································· 214
Configuration procedure ························································································································· 215
Verifying the configuration ······················································································································ 215
Configuring port mirroring ·········································································· 216
Overview ························································································································································ 216
Terminology ··········································································································································· 216
Port mirroring classification and implementation ···················································································· 217
Configuring local port mirroring ······················································································································ 220
Local port mirroring configuration task list······························································································ 220
Creating a local mirroring group ············································································································· 220
Configuring source ports for the local mirroring group ··········································································· 220
Configuring source CPUs for the local mirroring group·········································································· 221
Configuring the monitor port for the local mirroring group ······································································ 222
Configuring Layer 2 remote port mirroring ····································································································· 222
Layer 2 remote port mirroring with configurable reflector port configuration task list ····························· 223
Layer 2 remote port mirroring with egress port configuration task list ···················································· 223
Configuring a remote destination group on the destination device ························································ 224
Configuring a remote source group on the source device ····································································· 225
Configuring Layer 3 remote port mirroring ····································································································· 228
Layer 3 remote port mirroring configuration task list ·············································································· 229
Configuration prerequisites ···················································································································· 229
Configuring local mirroring groups ········································································································· 229
Configuring source ports for a local mirroring group ·············································································· 229
Configuring source CPUs for a local mirroring group············································································· 230
Configuring the monitor port for a local mirroring group ········································································· 231
Displaying and maintaining port mirroring ······································································································ 231
Port mirroring configuration examples ··········································································································· 232
Local port mirroring configuration example (in source port mode) ························································· 232
Local port mirroring configuration example (in source CPU mode) ······················································· 233
Layer 2 remote port mirroring configuration example (reflector port configurable) ································ 234
Layer 2 remote port mirroring configuration example (with egress port) ················································ 236
Layer 3 remote port mirroring configuration example ············································································ 238
Configuring flow mirroring ·········································································· 241
Flow mirroring configuration task list ·············································································································· 241
Configuring match criteria ······························································································································ 241
Configuring a traffic behavior ························································································································· 241
Configuring a QoS policy ······························································································································· 242
vi
Applying a QoS policy ···································································································································· 242
Applying a QoS policy to an interface ···································································································· 242
Applying a QoS policy to a VLAN ··········································································································· 242
Applying a QoS policy globally ··············································································································· 243
Applying a QoS policy to the control plane ···························································································· 243
Flow mirroring configuration example ············································································································ 243
Network requirements ···························································································································· 243
Configuration procedure ························································································································· 244
Verifying the configuration ······················································································································ 245
Configuring NetStream ·············································································· 246
Overview ························································································································································ 246
NetStream architecture ·························································································································· 246
Flow aging ·············································································································································· 247
NetStream data export ··························································································································· 247
NetStream filtering ································································································································· 249
NetStream sampling ······························································································································· 249
Protocols and standards ························································································································ 250
Feature and hardware compatibility ··············································································································· 250
NetStream configuration task list ··················································································································· 250
Enabling NetStream on an interface ·············································································································· 251
Configuring NetStream filtering ······················································································································ 252
Configuring NetStream sampling ··················································································································· 252
Configuring attributes of the NetStream data export ······················································································ 252
Configuring the NetStream data export format ······················································································ 252
Configuring the refresh rate for NetStream version 9 or version 10 template ········································ 254
Configuring NetStream flow aging ················································································································· 254
Flow aging methods ······························································································································· 254
Configuration procedure ························································································································· 254
Configuring the NetStream data export·········································································································· 255
Configuring the NetStream traditional data export ················································································· 255
Configuring the NetStream aggregation data export ·············································································· 255
Displaying and maintaining NetStream ·········································································································· 256
NetStream configuration examples ················································································································ 257
NetStream traditional data export configuration example ······································································ 257
NetStream aggregation data export configuration example ··································································· 259
Configuring IPv6 NetStream ······································································ 263
Overview ························································································································································ 263
IPv6 NetStream architecture ·················································································································· 263
Flow aging ·············································································································································· 264
IPv6 NetStream data export ··················································································································· 264
Protocols and standards ························································································································ 265
Feature and hardware compatibility ··············································································································· 265
IPv6 NetStream configuration task list ··········································································································· 266
Enabling IPv6 NetStream on an interface ······································································································ 267
Configuring attributes of the IPv6 NetStream data export ············································································· 267
Configuring the IPv6 NetStream data export format ·············································································· 267
Configuring the refresh rate for IPv6 NetStream version 9 or version 10 template ································ 268
Configuring IPv6 NetStream flow aging ········································································································· 268
Flow aging methods ······························································································································· 268
Configuration procedure ························································································································· 269
Configuring the IPv6 NetStream data export ································································································· 269
Configuring the IPv6 NetStream traditional data export ········································································· 269
Configuring the IPv6 NetStream aggregation data export ····································································· 270
Displaying and maintaining IPv6 NetStream ·································································································· 271
IPv6 NetStream configuration examples ········································································································ 272
IPv6 NetStream traditional data export configuration example ······························································ 272
IPv6 NetStream aggregation data export configuration example··························································· 273
Configuring sFlow ······················································································ 276
Protocols and standards ································································································································ 276
vii
Configuration restrictions and guidelines ······································································································· 276
sFlow configuration task list ··························································································································· 276
Configuring the sFlow agent and sFlow collector information ········································································ 277
Configuring flow sampling ······························································································································ 277
Configuring counter sampling ························································································································ 278
Displaying and maintaining sFlow ·················································································································· 278
sFlow configuration example·························································································································· 279
Network requirements ···························································································································· 279
Configuration procedure ························································································································· 279
Verifying the configurations ···················································································································· 280
Troubleshooting sFlow configuration ············································································································· 280
The remote sFlow collector cannot receive sFlow packets ···································································· 280
Configuring the information center ····························································· 282
Overview ························································································································································ 282
Log types ················································································································································ 282
Log levels ··············································································································································· 282
Log destinations ····································································································································· 283
Default output rules for logs ··················································································································· 283
Default output rules for diagnostic logs ·································································································· 283
Default output rules for security logs ······································································································ 283
Default output rules for hidden logs ······································································································· 284
Default output rules for trace logs ·········································································································· 284
Log formats ············································································································································ 284
FIPS compliance ············································································································································ 287
Information center configuration task list ······································································································· 287
Outputting logs to the console ······················································································································· 287
Outputting logs to the monitor terminal ·········································································································· 288
Outputting logs to log hosts···························································································································· 289
Outputting logs to the log buffer ····················································································································· 289
Saving logs to the log file ······························································································································· 290
Managing security logs ·································································································································· 291
Saving security logs to the security log file ···························································································· 291
Managing the security log file ················································································································· 291
Saving diagnostic logs to the diagnostic log file ····························································································· 292
Configuring the maximum size of the trace log file ························································································ 293
Setting the minimum storage period for log files and logs in the log buffer ··················································· 293
Logs in the log buffer ······························································································································ 293
Log files ·················································································································································· 294
Configuration procedure ························································································································· 294
Enabling synchronous information output ······································································································ 294
Enabling duplicate log suppression ··············································································································· 294
Configuring log suppression for a module······································································································ 295
Disabling an interface from generating link up or link down logs ··································································· 295
Enabling SNMP notifications for system logs································································································· 296
Displaying and maintaining information center ······························································································ 296
Information center configuration examples ···································································································· 296
Configuration example for outputting logs to the console ······································································ 296
Configuration example for outputting logs to a UNIX log host ······························································· 297
Configuration example for outputting logs to a Linux log host ······························································· 298
Configuring GOLD ····················································································· 301
Configuring monitoring diagnostics ················································································································ 301
Simulating test results ···································································································································· 302
Configuring the log buffer size ······················································································································· 302
Displaying and maintaining GOLD ················································································································· 302
GOLD configuration example ························································································································· 303
Network requirements ···························································································································· 303
Configuration procedure ························································································································· 303
Verifying the configuration ······················································································································ 304
viii
Configuring the packet capture ·································································· 305
Overview ························································································································································ 305
Packet capture modes ··························································································································· 305
Filter elements ········································································································································ 305
Building a capture filter ··························································································································· 311
Building a display filter ··························································································································· 312
Configuration restrictions and guidelines ······································································································· 312
Packet capture configuration task list············································································································· 313
Configuring local packet capture ···················································································································· 313
Configuring remote packet capture ················································································································ 313
Configuring feature image-based packet capture ·························································································· 314
Displaying the contents in a packet file ·········································································································· 315
Displaying and maintaining packet capture···································································································· 315
Packet capture configuration examples ········································································································· 315
Remote packet capture configuration example ······················································································ 315
Feature image-based packet capture configuration example ································································ 316
Packet file display configuration example ······························································································ 318
Configuring VCF fabric ·············································································· 319
Overview ························································································································································ 319
VCF fabric topology ································································································································ 319
Neutron concepts and components ······································································································· 320
Neutron deployment ······························································································································· 321
Automated VCF fabric provisioning and deployment ····················································································· 322
Topology discovery ································································································································ 323
Automated underlay network provisioning ····························································································· 323
Automated overlay network deployment ································································································ 325
Configuration restrictions and guidelines ······································································································· 325
VCF fabric configuration task list···················································································································· 326
Enabling VCF fabric topology discovery ········································································································ 326
Configuration restrictions and guidelines ······························································································· 326
Configuration procedure ························································································································· 326
Configuring automated underlay network provisioning ·················································································· 326
Configuration restrictions and guidelines ······························································································· 326
Configuration procedure ························································································································· 327
Configuring automated overlay network deployment ····················································································· 327
Configuration restrictions and guidelines ······························································································· 327
Configuration procedure ························································································································· 328
Displaying and maintaining VCF fabric ·········································································································· 329
Automated VCF fabric configuration example································································································ 329
Network requirements ···························································································································· 329
Configuration procedure ························································································································· 330
Verifying the configuration ······················································································································ 332
Configuring CWMP ···················································································· 336
Overview ························································································································································ 336
CWMP network framework ···················································································································· 336
Basic CWMP functions ··························································································································· 336
How CWMP works ································································································································· 337
Configuration task list ····································································································································· 339
Enabling CWMP from the CLI ························································································································ 340
Configuring ACS attributes····························································································································· 340
Configuring the preferred ACS attributes ······························································································· 340
Configuring the default ACS attributes from the CLI ·············································································· 342
Configuring CPE attributes····························································································································· 342
Configuring ACS authentication parameters ·························································································· 342
Configuring the provision code ··············································································································· 342
Configuring the CWMP connection interface ························································································· 343
Configuring autoconnect parameters ····································································································· 343
Enabling NAT traversal for the CPE ······································································································· 345
Specifying an SSL client policy for HTTPS connection to ACS ····························································· 345
ix
Displaying and maintaining CWMP ················································································································ 345
CWMP configuration example························································································································ 346
Network requirements ···························································································································· 346
Configuration procedure ························································································································· 347
Verifying the configuration ······················································································································ 355
Document conventions and icons ······························································ 356
Conventions ··················································································································································· 356
Network topology icons ·································································································································· 357
Support and other resources ····································································· 358
Accessing Hewlett Packard Enterprise Support····························································································· 358
Accessing updates ········································································································································· 358
Websites ················································································································································ 359
Customer self repair ······························································································································· 359
Remote support ······································································································································ 359
Documentation feedback ······················································································································· 359
Index ·········································································································· 361
1
Using ping, tracert, and system
debugging
This chapter covers ping, tracert, and information about debugging the system.
Ping
Use the ping utility to determine if an address is reachable.
Ping sends ICMP echo requests (ECHO-REQUEST) to the destination device. Upon receiving the
requests, the destination device responds with ICMP echo replies (ECHO-REPLY) to the source
device. The source device outputs statistics about the ping operation, including the number of
packets sent, number of echo replies received, and the round-trip time. You can measure the
network performance by analyzing these statistics.
Using a ping command to test network connectivity
Execute ping commands in any view.
Task
Command
Determine if an address in an IP network is
reachable.
When you configure the
ping
command for a low-speed
network, set a larger value for the timeout timer (indicated by
the
-t
keyword in the command).
For IPv4 networks:
ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i
interface-type interface-number | -m interval | -n | -p pad |
-q | -r | -s packet-size | -t timeout | -tos tos | -v |
-vpn-instance vpn-instance-name ] * host
For IPv6 networks:
ping ipv6 [ -a source-ipv6 | -c count | -i interface-type
interface-number | -m interval | -q | -s packet-size | -t
timeout | -v | -tc traffic-class | -vpn-instance
vpn-instance-name ] * host
For more information about the ping mpls command, see MPLS Command Reference.
Ping example
Network requirements
As shown in Figure 1, determine if Device A and Device C can reach each other. If they can reach
each other, get detailed information about routes from Device A to Device C.
2
Figure 1 Network diagram
Configuration procedure
# Use the ping command on Device A to test connectivity to Device C.
<DeviceA> ping 1.1.2.2
Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break
56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms
56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms
56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms
56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms
56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms
The output shows the following information:
Device A sends five ICMP packets to Device C and Device A receives five ICMP packets.
No ICMP packet is lost.
The route is reachable.
# Get detailed information about routes from Device A to Device C.
<DeviceA> ping -r 1.1.2.2
Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break
56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=4.685 ms
RR: 1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=4.834 ms (same route)
56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=4.770 ms (same route)
56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=4.812 ms (same route)
56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=4.704 ms (same route)
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 4.685/4.761/4.834/0.058 ms
The test procedure of ping –r is as shown in Figure 1:
Device A Device B Device C
1.1.1.1/24
1.1.1.2/24
ECHO-REQUEST
(NULL)
ECHO-REQUEST
1st=1.1.2.1
1.1.2.1/24
1.1.2.2/24
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
3rd1.1.1.2
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
3rd1.1.1.2
4th=1.1.1.1
3
1. The source device (Device A) sends an ICMP echo request to the destination device (Device C)
with the RR option blank.
2. The intermediate device (Device B) adds the IP address of its outbound interface (1.1.2.1) to
the RR option of the ICMP echo request, and forwards the packet.
3. Upon receiving the request, the destination device copies the RR option in the request and
adds the IP address of its outbound interface (1.1.2.2) to the RR option. Then the destination
device sends an ICMP echo reply.
4. The intermediate device adds the IP address of its outbound interface (1.1.1.2) to the RR option
in the ICMP echo reply, and then forwards the reply.
5. Upon receiving the reply, the source device adds the IP address of its inbound interface (1.1.1.1)
to the RR option. The detailed information of routes from Device A to Device C is formatted as:
1.1.1.1 <-> {1.1.1.2; 1.1.2.1} <-> 1.1.2.2.
Tracert
Tracert (also called Traceroute) enables retrieval of the IP addresses of Layer 3 devices in the path
to a destination. In the event of network failure, use tracert to test network connectivity and identify
failed nodes.
Figure 2 Tracert operation
Tracert uses received ICMP error messages to get the IP addresses of devices. Tracert works as
shown in Figure 2:
1. The source device sends a UDP packet with a TTL value of 1 to the destination device. The
destination UDP port is not used by any application on the destination device.
2. The first hop (Device B, the first Layer 3 device that receives the packet) responds by sending a
TTL-expired ICMP error message to the source, with its IP address (1.1.1.2) encapsulated. This
way, the source device can get the address of the first Layer 3 device (1.1.1.2).
3. The source device sends a packet with a TTL value of 2 to the destination device.
4. The second hop (Device C) responds with a TTL-expired ICMP error message, which gives the
source device the address of the second Layer 3 device (1.1.2.2).
5. This process continues until a packet sent by the source device reaches the ultimate
destination device. Because no application uses the destination port specified in the packet, the
destination device responds with a port-unreachable ICMP message to the source device, with
its IP address encapsulated. This way, the source device gets the IP address of the destination
device (1.1.3.2).
6. The source device determines that:
The packet has reached the destination device after receiving the port-unreachable ICMP
message.
Device A Device B Device D
Device C
1.1.1.1/24
1.1.1.2/24
Hop Lmit=1
TTL exceeded
1.1.2.1/24
1.1.3.1/24
1.1.2.2/24 1.1.3.2/24
Hop Lmit=2
TTL exceeded
UDP port unreachable
Hop Lmit=n
4
The path to the destination device is 1.1.1.2 to 1.1.2.2 to 1.1.3.2.
Prerequisites
Before you use a tracert command, perform the tasks in this section.
For an IPv4 network:
Enable sending of ICMP timeout packets on the intermediate devices (devices between the
source and destination devices). If the intermediate devices are HPE devices, execute the ip
ttl-expires enable command on the devices. For more information about this command, see
Layer 3IP Services Command Reference.
Enable sending of ICMP destination unreachable packets on the destination device. If the
destination device is an HPE device, execute the ip unreachables enable command. For more
information about this command, see Layer 3IP Services Command Reference.
For an IPv6 network:
Enable sending of ICMPv6 timeout packets on the intermediate devices (devices between the
source and destination devices). If the intermediate devices are HPE devices, execute the ipv6
hoplimit-expires enable command on the devices. For more information about this command,
see Layer 3IP Services Command Reference.
Enable sending of ICMPv6 destination unreachable packets on the destination device. If the
destination device is an HPE device, execute the ipv6 unreachables enable command. For
more information about this command, see Layer 3IP Services Command Reference.
Using a tracert command to identify failed or all nodes in a
path
Execute tracert commands in any view.
Task
Command
Display the routes from source
to destination.
For IPv4 networks:
tracert [ -a source-ip | -f first-ttl | -m max-ttl | -p port | -q
packet-number | -t tos | -vpn-instance vpn-instance-name
[ -resolve-as { global | none | vpn } ] | -w timeout ] * host
For IPv6 networks:
tracert ipv6 [ -f first-hop | -m max-hops | -p port | -q packet-number |
-t traffic-class | -vpn-instance vpn-instance-name [ -resolve-as
{ global | none | vpn } ] | -w timeout ] * host
For more information about the tracert mpls ipv4 command, see MPLS Command Reference.
Tracert example
Network requirements
As shown in Figure 3, Device A failed to Telnet to Device C.
Test the network connectivity between Device A and Device C. If they cannot reach each other,
locate the failed nodes in the network.
5
Figure 3 Network diagram
Configuration procedure
1. Configure the IP addresses for devices as shown in Figure 3.
2. Configure a static route on Device A.
<DeviceA> system-view
[DeviceA] ip route-static 0.0.0.0 0.0.0.0 1.1.1.2
[DeviceA] quit
3. Use the ping command to test connectivity between Device A and Device C.
<DeviceA> ping 1.1.2.2
Ping 1.1.2.2(1.1.2.2): 56 -data bytes, press CTRL_C to break
Request time out
Request time out
Request time out
Request time out
Request time out
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted,0 packet(s) received,100.0% packet loss
The output shows that Device A and Device C cannot reach each other.
4. Use the tracert command to identify failed nodes:
# Enable sending of ICMP timeout packets on Device B.
<DeviceB> system-view
[DeviceB] ip ttl-expires enable
# Enable sending of ICMP destination unreachable packets on Device C.
<DeviceC> system-view
[DeviceC] ip unreachables enable
# Execute the tracert command on Device A.
<DeviceA> tracert 1.1.2.2
traceroute to 1.1.2.2 (1.1.2.2) 30 hops at most,40 bytes each packet, press CTRL_C
to break
1 1.1.1.2 (1.1.1.2) 1 ms 2 ms 1 ms
2 * * *
3 * * *
4 * * *
5
<DeviceA>
The output shows that Device A can reach Device B but cannot reach Device C. An error has
occurred on the connection between Device B and Device C.
5. To identify the cause of the problem, execute the following commands on Device A and Device
C:
Execute the debugging ip icmp command and verify that Device A and Device C can send
and receive the correct ICMP packets.
Execute the display ip routing-table command to verify that Device A and Device C have a
route to each other.
Device A Device B
Device C
1.1.1.1/24 1.1.1.2/24 1.
1
.
2
.
1
/24
1.1.2.2/24
6
System debugging
The device supports debugging for the majority of protocols and features, and provides debugging
information to help users diagnose errors.
Debugging information control switches
The following switches control the display of debugging information:
Module debugging switchControls whether to generate the module-specific debugging
information.
Screen output switchControls whether to display the debugging information on a certain
screen. Use terminal monitor and terminal logging level commands to turn on the screen
output switch. For more information about these two commands, see Network Management
and Monitoring Command Reference.
As shown in Figure 4, the device can provide debugging for the three modules 1, 2, and 3. The
debugging information can be output on a terminal only when both the module debugging switch and
the screen output switch are turned on.
Debugging information is typically displayed on a console. You can also send debugging information
to other destinations. For more information, see "Configuring the information center."
Figure 4 Relationship between the module and screen output switch
Debugging a feature module
Output of debugging commands is memory intensive. To guarantee system performance, enable
debugging only for modules that are in an exceptional condition. When debugging is complete, use
the undo debugging all command to disable all the debugging functions.
To debug a feature module:
1. Enable debugging for a
module in user view.
debugging
module-name
[ option ]
By default, all debugging
functions are disabled.
1
3
1 2
3
1
3
1
3
Debugging
information
Protocol
debugging
switch
Screen
output switch
Debugging
information
Protocol
debugging
switch
Screen
output switch
ON
OFF ON
OFF
1 2
3
ON
OFF
ON
ON
7
2. (Optional.) Display the
enabled debugging in any
view.
display
debugging
[ module-name ]
N/A
8
Configuring NQA
Overview
Network quality analyzer (NQA) allows you to measure network performance, verify the service
levels for IP services and applications, and troubleshoot network problems. It provides the following
types of operations:
ICMP echo.
ICMP jitter.
DHCP.
DLSw.
DNS.
FTP.
HTTP.
Path jitter.
SNMP.
TCP.
UDP echo.
UDP jitter.
UDP tracert.
Voice.
As shown in Figure 5, the NQA source device (NQA client) sends data to the NQA destination device
by simulating IP services and applications to measure network performance. The obtained
performance metrics include the one-way latency, jitter, packet loss, voice quality, application
performance, and server response time.
All types of NQA operations require the NQA client, but only the TCP, UDP echo, UDP jitter, and
voice operations require the NQA server. The NQA operations for services that are already provided
by the destination device such as FTP do not need the NQA server.
You can configure the NQA server to listen and respond to specific IP addresses and ports to meet
various test needs.
Figure 5 Network diagram
NQA operation
The following describes how NQA performs different types of operations:
A TCP or DLSw operation sets up a connection.
An ICMP jitter, UDP jitter, or voice operation sends a number of probe packets. The number of
probe packets is set by using the probe packet-number command.
An FTP operation uploads or downloads a file.
IP network
NQA source device/
NQA client
NQA destination device
9
An HTTP operation gets a Web page.
A DHCP operation gets an IP address through DHCP.
A DNS operation translates a domain name to an IP address.
An ICMP echo operation sends an ICMP echo request.
A UDP echo operation sends a UDP packet.
An SNMP operation sends one SNMPv1 packet, one SNMPv2c packet, and one SNMPv3
packet.
A path jitter operation is accomplished in the following steps:
a. The operation uses tracert to obtain the path from the NQA client to the destination. A
maximum of 64 hops can be detected.
b. The NQA client sends ICMP echo requests to each hop along the path. The number of
ICMP echo requests is set by using the probe packet-number command.
A UDP tracert operation determines the routing path from the source to the destination. The
number of the probe packets sent to each hop is set by using the probe count command.
Collaboration
NQA can collaborate with the Track module to notify application modules of state or performance
changes so that the application modules can take predefined actions.
Figure 6 Collaboration
The following describes how a static route destined for 192.168.0.88 is monitored through
collaboration:
1. NQA monitors the reachability to 192.168.0.88.
2. When 192.168.0.88 becomes unreachable, NQA notifies the Track module of the change.
3. The Track module notifies the static routing module of the state change.
4. The static routing module sets the static route to invalid according to a predefined action.
For more information about collaboration, see High Availability Configuration Guide.
Threshold monitoring
Threshold monitoring enables the NQA client to take a predefined action when the NQA operation
performance metrics violate the specified thresholds.
Table 1 describes the relationships between performance metrics and NQA operation types.
Application modulesDetection
modules
Sends the
detection results
Sends the track
entry status
Track
module
Associates with
a detection entry
Associates with
a track entry
VRRP
Static routing
PBR
NQA
Smart Link
/