HPE Networking Comware 5120v3 Switch Series Network Configuration Guide

Category
Software
Type
Configuration Guide
HPE Networking Comware
5120v3 Switch
Series
Network Management and Monitoring Configuration
Guide
Software
version: Release 6352P02 and later
Document version: 6W100-20230715
© Copyright 2023 Hewlett Packard Enterprise Development LP
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard
Enterprise products and services are set forth in the express warranty statements accompanying such
products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett
Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or
copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s
standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise
website.
Acknowledgments
Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the
United States and other countries.
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java and Oracle are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
i
Contents
Using ping, tracert, and system debugging ···················································· 1
Ping ···································································································································································· 1
About ping ·················································································································································· 1
Using a ping command to test network connectivity ·················································································· 1
Example: Using the ping utility ··················································································································· 2
Tracert ································································································································································ 2
About tracert ··············································································································································· 2
Prerequisites ·············································································································································· 3
Using a tracert command to identify failed or all nodes in a path ······························································· 4
Example: Using the tracert utility ················································································································ 4
System debugging ············································································································································· 5
About system debugging ···························································································································· 5
Debugging a feature module ······················································································································ 6
Configuring NQA ··························································································· 7
About NQA ························································································································································· 7
NQA operating mechanism ························································································································ 7
Collaboration with Track ····························································································································· 7
Threshold monitoring ································································································································· 8
NQA templates ··········································································································································· 8
NQA tasks at a glance ······································································································································· 8
Configuring the NQA server ······························································································································· 9
Enabling the NQA client ····································································································································· 9
Configuring NQA operations on the NQA client ································································································· 9
NQA operations tasks at a glance·············································································································· 9
Configuring the ICMP echo operation ······································································································ 10
Configuring the ICMP jitter operation ······································································································· 11
Configuring the DHCP operation·············································································································· 12
Configuring the DNS operation ················································································································ 13
Configuring the FTP operation ················································································································· 14
Configuring the HTTP operation ·············································································································· 15
Configuring the UDP jitter operation ········································································································ 16
Configuring the SNMP operation ············································································································· 18
Configuring the TCP operation ················································································································· 18
Configuring the UDP echo operation ······································································································· 19
Configuring the UDP tracert operation ····································································································· 20
Configuring the voice operation ··············································································································· 22
Configuring the DLSw operation ·············································································································· 24
Configuring the path jitter operation ········································································································· 24
Configuring optional parameters for the NQA operation ·········································································· 26
Configuring the collaboration feature ······································································································· 27
Configuring threshold monitoring ············································································································· 27
Configuring the NQA statistics collection feature ····················································································· 29
Configuring the saving of NQA history records ························································································ 30
Scheduling the NQA operation on the NQA client ··················································································· 31
Configuring NQA templates on the NQA client ································································································ 31
Restrictions and guidelines ······················································································································ 31
NQA template tasks at a glance··············································································································· 31
Configuring the ICMP template ················································································································ 32
Configuring the DNS template ················································································································· 33
Configuring the TCP template ·················································································································· 34
Configuring the TCP half open template ·································································································· 35
Configuring the UDP template ················································································································· 36
Configuring the HTTP template ················································································································ 38
Configuring the HTTPS template ············································································································· 39
Configuring the FTP template ·················································································································· 41
Configuring the RADIUS template ··········································································································· 42
ii
Configuring the SSL template ·················································································································· 43
Configuring optional parameters for the NQA template ··········································································· 44
Display and maintenance commands for NQA ································································································ 45
NQA configuration examples ··························································································································· 46
Example: Configuring the ICMP echo operation ······················································································ 46
Example: Configuring the ICMP jitter operation ······················································································· 47
Example: Configuring the DHCP operation ······························································································ 50
Example: Configuring the DNS operation ································································································ 51
Example: Configuring the FTP operation ································································································· 52
Example: Configuring the HTTP operation ······························································································ 53
Example: Configuring the UDP jitter operation ························································································ 54
Example: Configuring the SNMP operation ····························································································· 57
Example: Configuring the TCP operation································································································· 58
Example: Configuring the UDP echo operation ······················································································· 59
Example: Configuring the UDP tracert operation ····················································································· 61
Example: Configuring the voice operation ······························································································· 62
Example: Configuring the DLSw operation ······························································································ 65
Example: Configuring the path jitter operation ························································································· 66
Example: Configuring NQA collaboration ································································································· 68
Example: Configuring the ICMP template ································································································ 70
Example: Configuring the DNS template ································································································· 71
Example: Configuring the TCP template ·································································································· 72
Example: Configuring the TCP half open template ·················································································· 72
Example: Configuring the UDP template ································································································· 73
Example: Configuring the HTTP template································································································ 74
Example: Configuring the HTTPS template ····························································································· 75
Example: Configuring the FTP template ·································································································· 75
Example: Configuring the RADIUS template ··························································································· 76
Example: Configuring the SSL template ·································································································· 77
Configuring NTP ·························································································· 79
About NTP························································································································································ 79
NTP application scenarios ······················································································································· 79
NTP working mechanism ························································································································· 79
NTP architecture ······································································································································ 80
NTP association modes ··························································································································· 81
NTP security ············································································································································· 82
Protocols and standards ·························································································································· 83
Restrictions and guidelines: NTP configuration ······························································································· 83
NTP tasks at a glance ······································································································································ 84
Enabling the NTP service································································································································· 84
Configuring NTP association mode·················································································································· 85
Configuring NTP in client/server mode ···································································································· 85
Configuring NTP in symmetric active/passive mode ················································································ 85
Configuring NTP in broadcast mode ········································································································ 86
Configuring NTP in multicast mode ·········································································································· 86
Configuring the local clock as the reference source ························································································ 87
Configuring access control rights ····················································································································· 88
Configuring NTP authentication ······················································································································· 88
Configuring NTP authentication in client/server mode ············································································· 88
Configuring NTP authentication in symmetric active/passive mode ························································ 90
Configuring NTP authentication in broadcast mode ················································································· 91
Configuring NTP authentication in multicast mode ·················································································· 93
Controlling NTP packet sending and receiving ································································································ 94
Specifying a source address for NTP messages ····················································································· 94
Disabling an interface from receiving NTP messages ············································································· 95
Configuring the maximum number of dynamic associations ···································································· 95
Setting a DSCP value for NTP packets···································································································· 96
Specifying the NTP time-offset thresholds for log and trap outputs ································································· 96
Display and maintenance commands for NTP ································································································· 97
NTP configuration examples ···························································································································· 97
Example: Configuring NTP client/server association mode ····································································· 97
iii
Example: Configuring IPv6 NTP client/server association mode ····························································· 98
Example: Configuring NTP symmetric active/passive association mode··············································· 100
Example: Configuring IPv6 NTP symmetric active/passive association mode ····································· 101
Example: Configuring NTP broadcast association mode ······································································· 102
Example: Configuring NTP multicast association mode ········································································ 104
Example: Configuring IPv6 NTP multicast association mode ································································ 107
Example: Configuring NTP client/server association mode with authentication ···································· 110
Example: Configuring NTP broadcast association mode with authentication ········································ 112
Configuring SNTP ······················································································ 115
About SNTP ··················································································································································· 115
SNTP working mode ······························································································································ 115
Protocols and standards ························································································································ 115
Restrictions and guidelines: SNTP configuration ··························································································· 115
SNTP tasks at a glance·································································································································· 115
Enabling the SNTP service ···························································································································· 115
Specifying an NTP server for the device ········································································································ 116
Configuring SNTP authentication ··················································································································· 116
Specifying the SNTP time-offset thresholds for log and trap outputs····························································· 117
Display and maintenance commands for SNTP ···························································································· 117
SNTP configuration examples ······················································································································· 118
Example: Configuring SNTP ·················································································································· 118
Configuring PoE ························································································ 120
About PoE ······················································································································································ 120
PoE system ············································································································································ 120
AI-driven PoE ········································································································································· 120
Protocols and standards ························································································································ 121
Restrictions: Hardware compatibility with PoE ······························································································· 121
Restrictions and guidelines: PoE configuration ······························································································ 121
PoE configuration tasks at a glance ··············································································································· 122
Prerequisites for configuring PoE ·················································································································· 122
Enabling PoE on a PI ····································································································································· 122
Enabling AI-driven PoE ·································································································································· 123
Enabling fast PoE for a PSE ·························································································································· 124
Configuring PoE delay ··································································································································· 124
Disabling PoE power supply on shutdown interfaces ···················································································· 124
Allowing inrush currents drawn by PDs·········································································································· 125
Enabling PI power cycling upon a system warm reboot ················································································ 125
Configuring PD detection ······························································································································· 126
Enabling nonstandard PD detection ······································································································· 126
Configuring a PD detection mode ·········································································································· 126
Configuring a PD disconnection detection mode ··························································································· 127
Configuring PoE power ·································································································································· 127
Configuring the maximum PI power ······································································································· 127
Setting the PoE guard band ··················································································································· 128
Configuring the PI priority policy ···················································································································· 128
Configuring PoE monitoring ··························································································································· 129
Configuring PSE power monitoring ········································································································ 129
Associating PoE with Track ···················································································································· 129
Configuring a PI by using a PoE profile ········································································································· 130
Restrictions and guidelines ···················································································································· 130
Configuring a PoE profile ······················································································································· 130
Applying a PoE profile ···························································································································· 131
Upgrading PSE firmware in service ··············································································································· 131
Enabling forced PoE power supply ················································································································ 132
Configuring the TMPDO for the MPS ············································································································· 132
Ignoring the PD power class ·························································································································· 133
Display and maintenance commands for PoE ······························································································· 133
PoE configuration examples ·························································································································· 134
Example: Configuring PoE ····················································································································· 134
Troubleshooting PoE······································································································································ 135
iv
Failure to set the priority of a PI to critical ······························································································ 135
Failure to apply a PoE profile to a PI······································································································ 135
Configuring SNMP ····················································································· 136
About SNMP ·················································································································································· 136
SNMP framework ··································································································································· 136
MIB and view-based MIB access control ······························································································· 136
SNMP operations ··································································································································· 137
Protocol versions ···································································································································· 137
Access control modes ···························································································································· 137
FIPS compliance ············································································································································ 137
SNMP tasks at a glance ································································································································· 138
Enabling the SNMP agent ······························································································································ 138
Enabling SNMP versions ······························································································································· 138
Configuring SNMP common parameters ······································································································· 139
Configuring an SNMPv1 or SNMPv2c community ························································································· 140
About configuring an SNMPv1 or SNMPv2c community ······································································· 140
Restrictions and guidelines for configuring an SNMPv1 or SNMPv2c community································· 140
Configuring an SNMPv1/v2c community by a community name ··························································· 140
Configuring an SNMPv1/v2c community by creating an SNMPv1/v2c user ·········································· 141
Configuring an SNMPv3 group and user ······································································································· 141
Restrictions and guidelines for configuring an SNMPv3 group and user ··············································· 141
Configuring an SNMPv3 group and user in non-FIPS mode ································································· 142
Configuring an SNMPv3 group and user in FIPS mode········································································· 142
Configuring SNMP notifications ····················································································································· 143
About SNMP notifications ······················································································································ 143
Enabling SNMP notifications ·················································································································· 143
Configuring parameters for sending SNMP notifications ······································································· 144
Examining the system configuration for changes ·························································································· 145
Configuring SNMP logging ····························································································································· 146
Display and maintenance commands for SNMP ··························································································· 146
SNMP configuration examples ······················································································································· 147
Example: Configuring SNMPv1/SNMPv2c····························································································· 147
Example: Configuring SNMPv3·············································································································· 149
Configuring RMON ···················································································· 152
About RMON ·················································································································································· 152
RMON working mechanism ··················································································································· 152
RMON groups ········································································································································ 152
Sample types for the alarm group and the private alarm group ····························································· 154
Protocols and standards ························································································································ 154
Configuring the RMON statistics function ······································································································ 154
About the RMON statistics function ······································································································· 154
Creating an RMON Ethernet statistics entry ·························································································· 154
Creating an RMON history control entry ································································································ 154
Configuring the RMON alarm function ··········································································································· 155
Display and maintenance commands for RMON ··························································································· 156
RMON configuration examples ······················································································································ 157
Example: Configuring the Ethernet statistics function ············································································ 157
Example: Configuring the history statistics function ··············································································· 157
Example: Configuring the alarm function ······························································································· 158
Configuring NETCONF ·············································································· 161
About NETCONF ··········································································································································· 161
NETCONF structure ······························································································································· 161
NETCONF message format ··················································································································· 162
How to use NETCONF ··························································································································· 163
Protocols and standards ························································································································ 163
FIPS compliance ············································································································································ 163
NETCONF tasks at a glance ·························································································································· 164
Establishing a NETCONF session ················································································································· 164
Restrictions and guidelines for NETCONF session establishment ························································ 164
v
Setting NETCONF session attributes····································································································· 165
Establishing NETCONF over SOAP sessions ······················································································· 166
Establishing NETCONF over SSH sessions ·························································································· 167
Establishing NETCONF over Telnet or NETCONF over console sessions ··········································· 168
Exchanging capabilities ·························································································································· 168
Retrieving device configuration information ··································································································· 169
Restrictions and guidelines for device configuration retrieval ································································ 169
Retrieving device configuration and state information ··········································································· 169
Retrieving non-default settings··············································································································· 171
Retrieving NETCONF information ·········································································································· 172
Retrieving YANG file content ················································································································· 173
Retrieving NETCONF session information ····························································································· 173
Example: Retrieving a data entry for the interface table ········································································ 174
Example: Retrieving non-default configuration data ·············································································· 175
Example: Retrieving syslog configuration data ······················································································ 176
Example: Retrieving NETCONF session information············································································· 177
Filtering data ·················································································································································· 178
About data filtering ································································································································· 178
Restrictions and guidelines for data filtering ·························································································· 178
Table-based filtering ······························································································································· 179
Column-based filtering ··························································································································· 179
Example: Filtering data with regular expression match·········································································· 182
Example: Filtering data by conditional match························································································· 183
Locking or unlocking the running configuration ······························································································ 184
About configuration locking and unlocking ····························································································· 184
Restrictions and guidelines for configuration locking and unlocking ······················································ 184
Locking the running configuration ·········································································································· 184
Unlocking the running configuration ······································································································· 185
Example: Locking the running configuration ·························································································· 185
Modifying the configuration ···························································································································· 186
About the <edit-config> operation ·········································································································· 186
Procedure ··············································································································································· 186
Example: Modifying the configuration ···································································································· 187
Saving the running configuration ··················································································································· 188
About the <save> operation ··················································································································· 188
Restrictions and guidelines ···················································································································· 188
Procedure ··············································································································································· 188
Example: Saving the running configuration ···························································································· 189
Loading the configuration ······························································································································· 190
About the <load> operation ···················································································································· 190
Restrictions and guidelines ···················································································································· 190
Procedure ··············································································································································· 190
Rolling back the configuration ························································································································ 191
Restrictions and guidelines ···················································································································· 191
Rolling back the configuration based on a configuration file ·································································· 191
Rolling back the configuration based on a rollback point ······································································· 191
Performing CLI operations through NETCONF······························································································ 195
About CLI operations through NETCONF ······························································································ 195
Restrictions and guidelines ···················································································································· 195
Procedure ··············································································································································· 196
Example: Performing CLI operations ····································································································· 196
Subscribing to events ····································································································································· 197
About event subscription ························································································································ 197
Restrictions and guidelines ···················································································································· 197
Subscribing to syslog events ·················································································································· 197
Subscribing to events monitored by NETCONF····················································································· 198
Subscribing to events reported by modules ··························································································· 200
Canceling a subscription ························································································································ 201
Example: Subscribing to syslog events ·································································································· 201
Terminating NETCONF sessions ··················································································································· 202
About NETCONF session termination ··································································································· 202
Procedure ··············································································································································· 202
vi
Example: Terminating another NETCONF session ··············································································· 203
Returning to the CLI ······································································································································· 203
Supported NETCONF operations ······························································ 205
action ······················································································································································ 205
CLI ·························································································································································· 205
close-session ········································································································································· 206
edit-config: create ··································································································································· 206
edit-config: delete ··································································································································· 207
edit-config: merge ·································································································································· 207
edit-config: remove ································································································································· 207
edit-config: replace ································································································································· 208
edit-config: test-option ···················································································································· 208
edit-config: default-operation·················································································································· 209
edit-config: error-option ·························································································································· 210
edit-config: incremental ·························································································································· 211
get ·························································································································································· 211
get-bulk ·················································································································································· 212
get-bulk-config ········································································································································ 212
get-config ··············································································································································· 213
get-sessions ··········································································································································· 213
kill-session ·············································································································································· 213
load ························································································································································ 214
lock ························································································································································· 214
rollback ··················································································································································· 214
save ························································································································································ 215
unlock ····················································································································································· 215
Configuring CWMP ···················································································· 216
About CWMP ················································································································································· 216
CWMP network framework ···················································································································· 216
Basic CWMP functions ··························································································································· 216
How CWMP works ································································································································· 218
Restrictions and guidelines: CWMP configuration ························································································· 220
CWMP tasks at a glance ································································································································ 220
Enabling CWMP from the CLI ························································································································ 221
Configuring ACS attributes····························································································································· 221
About ACS attributes ······························································································································ 221
Configuring the preferred ACS attributes ······························································································· 221
Configuring the default ACS attributes from the CLI ·············································································· 222
Configuring CPE attributes····························································································································· 223
About CPE attributes ······························································································································ 223
Specifying an SSL client policy for HTTPS connection to ACS ····························································· 223
Configuring ACS authentication parameters ·························································································· 223
Configuring the provision code ··············································································································· 224
Configuring the CWMP connection interface ························································································· 224
Configuring autoconnect parameters ····································································································· 225
Setting the close-wait timer ···················································································································· 226
Enabling NAT traversal for the CPE ······································································································· 226
Display and maintenance commands for CWMP ·························································································· 226
CWMP configuration examples ······················································································································ 227
Example: Configuring CWMP ················································································································ 227
Configuring EAA ························································································ 235
About EAA······················································································································································ 235
EAA framework ······································································································································ 235
Elements in a monitor policy ·················································································································· 236
EAA environment variables ···················································································································· 237
Configuring a user-defined EAA environment variable ·················································································· 238
Configuring a monitor policy··························································································································· 238
Restrictions and guidelines ···················································································································· 238
Configuring a monitor policy from the CLI ······························································································ 239
vii
Configuring a monitor policy by using Tcl ······························································································ 240
Suspending monitor policies ·························································································································· 241
Display and maintenance commands for EAA ······························································································· 241
EAA configuration examples ·························································································································· 242
Example: Configuring a CLI event monitor policy by using Tcl ······························································ 242
Example: Configuring a CLI event monitor policy from the CLI ····························································· 243
Example: Configuring a CLI event monitor policy with EAA environment variables from the CLI ·········· 244
Monitoring and maintaining processes ······················································· 246
About monitoring and maintaining processes ································································································ 246
Process monitoring and maintenance tasks at a glance ················································································ 246
Monitoring and maintaining processes ·········································································································· 246
Monitoring and maintaining user processes ·································································································· 247
About monitoring and maintaining user processes ················································································ 247
Configuring core dump ··························································································································· 247
Display and maintenance commands for user processes······································································ 248
Monitoring and maintaining kernel threads ···································································································· 248
Configuring kernel thread deadloop detection ······················································································· 248
Configuring kernel thread starvation detection······················································································· 249
Display and maintenance commands for kernel threads ······································································· 250
Configuring port mirroring ·········································································· 251
About port mirroring ······································································································································· 251
Terminology ··········································································································································· 251
Port mirroring classification ···················································································································· 252
Local port mirroring ································································································································ 252
Layer 2 remote port mirroring ················································································································· 252
Restrictions and guidelines: Port mirroring configuration ··············································································· 254
Configuring local port mirroring ······················································································································ 254
Restrictions and guidelines for local port mirroring configuration ··························································· 254
Local port mirroring tasks at a glance ···································································································· 255
Creating a local mirroring group ············································································································· 255
Configuring mirroring sources ················································································································ 255
Configuring the monitor port ··················································································································· 256
Configuring local port mirroring group with multiple monitoring devices ························································ 256
Configuring Layer 2 remote port mirroring ····································································································· 257
Restrictions and guidelines for Layer 2 remote port mirroring configuration ·········································· 257
Layer 2 remote port mirroring with reflector port configuration task list ················································· 258
Layer 2 remote port mirroring with egress port configuration task list ···················································· 258
Creating a remote destination group ······································································································ 259
Configuring the monitor port ··················································································································· 259
Configuring the remote probe VLAN ······································································································ 259
Assigning the monitor port to the remote probe VLAN··········································································· 260
Creating a remote source group ············································································································ 260
Configuring mirroring sources ················································································································ 260
Configuring the reflector port ·················································································································· 261
Configuring the egress port ···················································································································· 262
Display and maintenance commands for port mirroring ················································································ 263
Port mirroring configuration examples ··········································································································· 263
Example: Configuring local port mirroring ······························································································ 263
Example: Configuring Layer 2 remote port mirroring (with reflector port) ·············································· 264
Example: Configuring Layer 2 remote port mirroring (with egress port) ················································ 267
Configuring flow mirroring ·········································································· 270
About flow mirroring ······································································································································· 270
Restrictions and guidelines: Flow mirroring configuration ·············································································· 270
Flow mirroring tasks at a glance ···················································································································· 270
Configuring a traffic class ······························································································································· 270
Configuring a traffic behavior ························································································································· 271
Configuring a QoS policy ······························································································································· 271
Applying a QoS policy ···································································································································· 272
Applying a QoS policy to an interface ···································································································· 272
viii
Applying a QoS policy to VLANs ············································································································ 272
Applying a QoS policy globally ··············································································································· 272
Flow mirroring configuration examples ·········································································································· 273
Example: Configuring flow mirroring ······································································································ 273
Configuring sFlow ······················································································ 275
About sFlow ··················································································································································· 275
Protocols and standards ································································································································ 275
Configuring basic sFlow information ·············································································································· 275
Configuring flow sampling ······························································································································ 276
Configuring counter sampling ························································································································ 277
Display and maintenance commands for sFlow ···························································································· 277
sFlow configuration examples ························································································································ 277
Example: Configuring sFlow ·················································································································· 277
Troubleshooting sFlow ··································································································································· 279
The remote sFlow collector cannot receive sFlow packets ···································································· 279
Configuring the information center ····························································· 280
About the information center ·························································································································· 280
Log types ················································································································································ 280
Log levels ··············································································································································· 280
Log destinations ····································································································································· 281
Default output rules for logs ··················································································································· 281
Default output rules for diagnostic logs ·································································································· 281
Default output rules for security logs ······································································································ 281
Default output rules for hidden logs ······································································································· 282
Default output rules for trace logs ·········································································································· 282
Log formats and field descriptions ········································································································· 282
FIPS compliance ············································································································································ 285
Information center tasks at a glance ·············································································································· 285
Managing standard system logs ············································································································ 285
Managing hidden logs ···························································································································· 285
Managing security logs ·························································································································· 286
Managing diagnostic logs ······················································································································· 286
Managing trace logs ······························································································································· 286
Enabling the information center ····················································································································· 286
Outputting logs to various destinations ·········································································································· 287
Outputting logs to the console················································································································ 287
Outputting logs to the monitor terminal ·································································································· 287
Outputting logs to log hosts ···················································································································· 288
Outputting logs to the log buffer ············································································································· 289
Saving logs to the log file ······················································································································· 290
Setting the minimum storage period for logs ································································································· 291
Enabling synchronous information output ······································································································ 291
Configuring log suppression··························································································································· 291
Enabling duplicate log suppression········································································································ 291
Configuring log suppression for a module ······························································································ 293
Disabling an interface from generating link up or link down logs ··························································· 294
Enabling SNMP notifications for system logs································································································· 294
Managing security logs ·································································································································· 295
Saving security logs to the security log file ···························································································· 295
Managing the security log file ················································································································· 296
Saving diagnostic logs to the diagnostic log file ····························································································· 296
Setting the maximum size of the trace log file································································································ 297
Display and maintenance commands for information center ········································································· 297
Information center configuration examples ···································································································· 298
Example: Outputting logs to the console································································································ 298
Example: Outputting logs to a UNIX log host ························································································· 298
Example: Outputting logs to a Linux log host ························································································· 300
Document conventions and icons ······························································ 302
Conventions ··················································································································································· 302
ix
Network topology icons ·································································································································· 303
Support and other resources ····································································· 304
Accessing Hewlett Packard Enterprise Support····························································································· 304
Accessing updates ········································································································································· 304
Websites ················································································································································ 305
Customer self repair ······························································································································· 305
Remote support ······································································································································ 305
Documentation feedback ······················································································································· 305
Index ·········································································································· 307
1
Using ping, tracert, and system
debugging
This chapter covers ping, tracert, and information about debugging the system.
Ping
About ping
Use the ping utility to determine if an address is reachable.
Ping sends ICMP echo requests (ECHO-REQUEST) to the destination device. Upon receiving the
requests, the destination device responds with ICMP echo replies (ECHO-REPLY) to the source
device. The source device outputs statistics about the ping operation, including the number of
packets sent, number of echo replies received, and the round-trip time. You can measure the
network performance by analyzing these statistics.
You can use the ping r command to display the routers through which ICMP echo requests have
passed. The test procedure of ping –r is as shown in Figure 1:
1. The source device (Device A) sends an ICMP echo request to the destination device (Device C)
with the RR option empty.
2. The intermediate device (Device B) adds the IP address of its outbound interface (1.1.2.1) to
the RR option of the ICMP echo request, and forwards the packet.
3. Upon receiving the request, the destination device copies the RR option in the request and
adds the IP address of its outbound interface (1.1.2.2) to the RR option. Then the destination
device sends an ICMP echo reply.
4. The intermediate device adds the IP address of its outbound interface (1.1.1.2) to the RR option
in the ICMP echo reply, and then forwards the reply.
5. Upon receiving the reply, the source device adds the IP address of its inbound interface (1.1.1.1)
to the RR option. The detailed information of routes from Device A to Device C is formatted as:
1.1.1.1 <-> {1.1.1.2; 1.1.2.1} <-> 1.1.2.2.
Figure 1 Ping operation
Using a ping command to test network connectivity
Perform the following tasks in any view:
Determine if an IPv4 address is reachable.
Device A Device B Device C
1.1.1.1/24
1.1.1.2/24
ECHO-REQUEST
(NULL) ECHO-REQUEST
1st=1.1.2.1
1.1.2.1/24
1.1.2.2/24
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
3rd1.1.1.2
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
3rd1.1.1.2
4th=1.1.1.1
2
ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i interface-type
interface-number | -m interval | -n | -p pad | -q | -r | -s packet-size | -t
timeout | -tos tos | -v ] * host
Increase the timeout time (indicated by the -t keyword) on a low-speed network.
Determine if an IPv6 address is reachable.
ping ipv6 [ -a source-ipv6 | -c count | -i interface-type
interface-number | -m interval | -q | -s packet-size | -t timeout | -tc
traffic-class | -v ] * host
Increase the timeout time (indicated by the -t keyword) on a low-speed network.
Example: Using the ping utility
Network configuration
As shown in Figure 2, determine if Device A and Device C can reach each other.
Figure 2 Network diagram
Procedure
# Test the connectivity between Device A and Device C.
<DeviceA> ping 1.1.2.2
Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break
56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms
56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms
56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms
56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms
56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms
The output shows the following information:
Device A sends five ICMP packets to Device C and Device A receives five ICMP packets.
No ICMP packet is lost.
The route is reachable.
Tracert
About tracert
Tracert (also called Traceroute) enables retrieval of the IP addresses of Layer 3 devices in the path
to a destination. In the event of network failure, use tracert to test network connectivity and identify
failed nodes.
Device A Device B Device C
1.1.1.1/24 1.1.1.2/24 1.1.2.1/24 1.1.2.2/24
3
Figure 3 Tracert operation
Tracert uses received ICMP error messages to get the IP addresses of devices. Tracert works as
shown in Figure 3:
1. The source device sends a UDP packet with a TTL value of 1 to the destination device. The
destination UDP port is not used by any application on the destination device.
2. The first hop (Device B, the first Layer 3 device that receives the packet) responds by sending a
TTL-expired ICMP error message to the source, with its IP address (1.1.1.2) encapsulated. This
way, the source device can get the address of the first Layer 3 device (1.1.1.2).
3. The source device sends a packet with a TTL value of 2 to the destination device.
4. The second hop (Device C) responds with a TTL-expired ICMP error message, which gives the
source device the address of the second Layer 3 device (1.1.2.2).
5. This process continues until a packet sent by the source device reaches the ultimate
destination device. Because no application uses the destination port specified in the packet, the
destination device responds with a port-unreachable ICMP message to the source device, with
its IP address encapsulated. This way, the source device gets the IP address of the destination
device (1.1.3.2).
6. The source device determines that:
The packet has reached the destination device after receiving the port-unreachable ICMP
message.
The path to the destination device is 1.1.1.2 to 1.1.2.2 to 1.1.3.2.
Prerequisites
Before you use a tracert command, perform the tasks in this section.
For an IPv4 network:
Enable sending of ICMP timeout packets on the intermediate devices (devices between the
source and destination devices). If the intermediate devices are HPE devices, execute the ip
ttl-expires enable command on the devices. For more information about this command,
see Layer 3IP Services Command Reference.
Enable sending of ICMP destination unreachable packets on the destination device. If the
destination device is an HPE device, execute the ip unreachables enable command. For
more information about this command, see Layer 3IP Services Command Reference.
For an IPv6 network:
Enable sending of ICMPv6 timeout packets on the intermediate devices (devices between the
source and destination devices). If the intermediate devices are HPE devices, execute the
Device A Device B Device D
Device C
1.1.1.1/24
1.1.1.2/24
Hop Limit=1
TTL exceeded
1.1.2.1/24 1.1.3.1/24
1.1.2.2/24 1.1.3.2/24
Hop Limit=2
TTL exceeded
UDP port unreachable
Hop Limit=n
4
ipv6 hoplimit-expires enable command on the devices. For more information about
this command, see Layer 3IP Services Command Reference.
Enable sending of ICMPv6 destination unreachable packets on the destination device. If the
destination device is an HPE device, execute the ipv6 unreachables enable command.
For more information about this command, see Layer 3IP Services Command Reference.
Using a tracert command to identify failed or all nodes in a
path
Perform the following tasks in any view:
Trace the route to an IPv4 destination.
tracert [ -a source-ip | -f first-ttl | -m max-ttl | -p port | -q
packet-number | -t tos | -w timeout ] * host
Trace the route to an IPv6 destination.
tracert ipv6 [ -f first-hop | -m max-hops | -p port | -q packet-number | -t
traffic-class | -w timeout ] * host
Example: Using the tracert utility
Network configuration
As shown in Figure 4, Device A failed to Telnet to Device C.
Test the network connectivity between Device A and Device C. If they cannot reach each other,
locate the failed nodes in the network.
Figure 4 Network diagram
Procedure
1. Configure IP addresses for the devices as shown in Figure 4.
2. Configure a static route on Device A.
<DeviceA> system-view
[DeviceA] ip route-static 0.0.0.0 0.0.0.0 1.1.1.2
3. Test connectivity between Device A and Device C.
[DeviceA] ping 1.1.2.2
Ping 1.1.2.2(1.1.2.2): 56 -data bytes, press CTRL_C to break
Request time out
Request time out
Request time out
Request time out
Request time out
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted,0 packet(s) received,100.0% packet loss
The output shows that Device A and Device C cannot reach each other.
4. Identify failed nodes:
Device A Device B Device C
1.1.1.1/24 1.1.1.2/24 1.1.2.1/24 1.1.2.2/24
5
# Enable sending of ICMP timeout packets on Device B.
<DeviceB> system-view
[DeviceB] ip ttl-expires enable
# Enable sending of ICMP destination unreachable packets on Device C.
<DeviceC> system-view
[DeviceC] ip unreachables enable
# Identify failed nodes.
[DeviceA] tracert 1.1.2.2
traceroute to 1.1.2.2 (1.1.2.2) 30 hops at most,40 bytes each packet, press CTRL_C
to break
1 1.1.1.2 (1.1.1.2) 1 ms 2 ms 1 ms
2 * * *
3 * * *
4 * * *
5
[DeviceA]
The output shows that Device A can reach Device B but cannot reach Device C. An error has
occurred on the connection between Device B and Device C.
5. To identify the cause of the issue, execute the following commands on Device A and Device C:
Execute the debugging ip icmp command and verify that Device A and Device C can
send and receive the correct ICMP packets.
Execute the display ip routing-table command to verify that Device A and Device
C have a route to each other.
System debugging
About system debugging
The device supports debugging for the majority of protocols and features, and provides debugging
information to help users diagnose errors.
The following switches control the display of debugging information:
Module debugging switchControls whether to generate the module-specific debugging
information.
Screen output switchControls whether to display the debugging information on a certain
screen. Use terminal monitor and terminal logging level commands to turn on
the screen output switch. For more information about these two commands, see Network
Management and Monitoring Command Reference.
As shown in Figure 5, the device can provide debugging for the three modules 1, 2, and 3. The
debugging information can be output on a terminal only when both the module debugging switch and
the screen output switch are turned on.
Debugging information is typically displayed on a console. You can also send debugging information
to other destinations. For more information, see "Configuring the information center."
6
Figure 5 Relationship between the module and screen output switch
Debugging a feature module
Restrictions and guidelines
CAUTION:
Output of excessive debugging messages increases the CPU usage and
downgrades the system
performance.
To guarantee system performance, enable debugging only for modules that are in an
exceptional condition.
Enable debugging for modules for troubleshooting purposes. When debugging is complete, use the
undo debugging all command to disable all the debugging functions.
Procedure
1. Enable debugging for a module.
debugging module-name [ option ]
By default, debugging is disabled for all modules.
This command is available in user view.
2. (Optional.) Display the enabled debugging features.
display debugging [ module-name ]
This command is available in any view.
13
123
13
13
Debugging
information
Protocol
debugging
switch
Screen
output switch
Debugging
information
Protocol
debugging
switch
Screen
output switch
ON OFF ON
OFF
123
ON OFF ON
ON
7
Configuring NQA
About NQA
Network quality analyzer (NQA) allows you to measure network performance, verify the service
levels for IP services and applications, and troubleshoot network problems.
NQA operating mechanism
An NQA operation contains a set of parameters such as the operation type, destination IP address,
and port number to define how the operation is performed. Each NQA operation is identified by the
combination of the administrator name and the operation tag. You can configure the NQA client to
run the operations at scheduled time periods.
As shown in Figure 6, the NQA source device (NQA client) sends data to the NQA destination device
by simulating IP services and applications to measure network performance.
All types of NQA operations require the NQA client, but only the TCP, UDP echo, UDP jitter, and
voice operations require the NQA server. The NQA operations for services that are already provided
by the destination device such as FTP do not need the NQA server. You can configure the NQA
server to listen and respond to specific IP addresses and ports to meet various test needs.
Figure 6 Network diagram
After starting an NQA operation, the NQA client periodically performs the operation at the interval
specified by using the frequency command.
You can set the number of probes the NQA client performs in an operation by using the probe
count command. For the voice and path jitter operations, the NQA client performs only one probe
per operation and the probe count command is not available.
Collaboration with Track
NQA can collaborate with the Track module to notify application modules of state or performance
changes so that the application modules can take predefined actions.
The NQA + Track collaboration is available for the following application modules:
VRRP.
Static routing.
Policy-based routing.
Traffic redirecting.
Smart Link
The following describes how a static route destined for 192.168.0.88 is monitored through
collaboration:
1. NQA monitors the reachability to 192.168.0.88.
2. When 192.168.0.88 becomes unreachable, NQA notifies the Track module of the change.
IP network
NQA source device/
NQA client NQA destination device
8
3. The Track module notifies the static routing module of the state change.
4. The static routing module sets the static route to invalid according to a predefined action.
For more information about collaboration, see High Availability Configuration Guide.
Threshold monitoring
Threshold monitoring enables the NQA client to take a predefined action when the NQA operation
performance metrics violate the specified thresholds.
Table 1 describes the relationships between performance metrics and NQA operation types.
Table 1 Performance metrics and NQA operation types
Performance metric NQA operation types that can gather the
Probe duration All NQA operation types except UDP jitter, UDP
tracert, path jitter, and voice
Number of probe failures All NQA operation types except UDP jitter, UDP
tracert, path jitter, and voice
Round-trip time ICMP jitter, UDP jitter, and voice
Number of discarded packets ICMP jitter, UDP jitter, and voice
One-way jitter (source-to-destination or
destination-to-source) ICMP jitter, UDP jitter, and voice
One-way delay (source-to-destination or
destination-to-source) ICMP jitter, UDP jitter, and voice
Calculated Planning Impairment Factor (ICPIF) (see
"Configuring the voice operation") Voice
Mean Opinion Scores (MOS) (see "Configuring the
voice operation") Voice
NQA templates
An NQA template is a set of parameters (such as destination address and port number) that defines
how an NQA operation is performed. Features can use the NQA template to collect statistics.
You can create multiple NQA templates on the NQA client. Each template must be identified by a
unique template name.
NQA tasks at a glance
To configure NQA, perform the following tasks:
1. Configuring the NQA server
Perform this task on the destination device before you configure the TCP, UDP echo, UDP jitter,
and voice operations.
2. Enabling the NQA client
3. Configuring NQA operations or NQA templates
Choose the following tasks as needed:
Configuring NQA operations on the NQA client
Configuring NQA templates on the NQA client
9
After you configure an NQA operation, you can schedule the NQA client to run the NQA
operation.
An NQA template does not run immediately after it is configured. The template creates and run
the NQA operation only when it is required by the feature (such as load balancing) to which the
template is applied.
Configuring the NQA server
Restrictions and guidelines
To perform TCP, UDP echo, UDP jitter, and voice operations, you must configure the NQA server on
the destination device. The NQA server listens and responds to requests on the specified IP
addresses and ports.
You can configure multiple TCP or UDP listening services on an NQA server, where each
corresponds to a specific IP address and port number.
The IP address and port number for a listening service must be unique on the NQA server and match
the configuration on the NQA client.
Procedure
1. Enter system view.
system-view
2. Enable the NQA server.
nqa server enable
By default, the NQA server is disabled.
3. Configure a TCP listening service.
nqa server tcp-connect ip-address port-number [ tos tos ]
This task is required for only TCP operations.
4. Configure a UDP listening service.
nqa server udp-echo ip-address port-number [ tos tos ]
This task is required for only UDP echo, UDP jitter, and voice operations.
Enabling the NQA client
1. Enter system view.
system-view
2. Enable the NQA client.
nqa agent enable
By default, the NQA client is enabled.
The NQA client configuration takes effect after you enable the NQA client.
Configuring NQA operations on the NQA client
NQA operations tasks at a glance
To configure NQA operations, perform the following tasks:
1. Configuring an NQA operation
Configuring the ICMP echo operation
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347

HPE Networking Comware 5120v3 Switch Series Network Configuration Guide

Category
Software
Type
Configuration Guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI