HPE FlexFabric 12900E Switch Series Network Reference guide

  • Hello! I've reviewed the HPE FlexFabric 12900E Command Reference and I'm ready to assist you with any questions you might have. This document covers a range of commands for network management, such as network diagnostics (ping, tracert), network quality analysis (NQA), and time synchronization (NTP, PTP). Feel free to ask me about specific commands or features.
  • What command is used to test network connectivity?
    How can I trace the path of a network packet?
    What is the purpose of NQA commands?
    What commands are available for time synchronization?
HPE FlexFabric 12900E Switch Series
Ne
twork Management and Monitoring
Command Reference
Software
version: Release 5210
Document version: 6W100-20230424
© Copyright 2023 Hewlett Packard Enterprise Development LP
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard
Enterprise products and services are set forth in the express warranty statements accompanying such
products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett
Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or
copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s
standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise
website.
Acknowledgments
Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the
United States and other countries.
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java and Oracle are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
i
Contents
Ping and tracert commands ··········································································· 1
ping ···························································································································································· 1
ping ipv6 ····················································································································································· 4
tracert ························································································································································· 6
tracert ipv6 ················································································································································· 8
System debugging commands ····································································· 11
debugging ················································································································································ 11
display debugging ···································································································································· 11
NQA commands ·························································································· 13
NQA client commands ····································································································································· 13
agent-type ················································································································································ 13
community read ········································································································································ 14
cpu ··························································································································································· 15
data-fill ······················································································································································ 16
data-size ··················································································································································· 16
description ················································································································································ 17
destination ip ············································································································································ 18
destination ipv6 ········································································································································ 19
destination mac ········································································································································ 19
destination port ········································································································································· 20
disconnect-mode ······································································································································ 21
disk ··························································································································································· 21
display nqa history ··································································································································· 22
display nqa reaction counters ·················································································································· 23
display nqa result ····································································································································· 25
display nqa statistics ································································································································ 29
display nqa twamp-light client ·················································································································· 33
display nqa twamp-light client statistics ··································································································· 37
display nqa twamp-light client test-session reaction counters ································································· 40
expect { data | hex-data } ························································································································· 42
expect { failed-data | hex-failed-data } ······································································································ 44
expect failed-status ·································································································································· 45
expect ip ··················································································································································· 46
expect ipv6 ··············································································································································· 47
expect status ············································································································································ 47
filename ···················································································································································· 48
frequency ················································································································································· 49
frequency-adjustment ······························································································································· 49
hex-data-fill ··············································································································································· 50
history-record enable ······························································································································· 51
history-record keep-time ·························································································································· 52
history-record number ······························································································································ 52
key ···························································································································································· 53
mailbox ····················································································································································· 54
memory ···················································································································································· 54
mode ························································································································································ 55
next-hop ip ··············································································································································· 56
next-hop ipv6 ············································································································································ 56
nqa ··························································································································································· 57
nqa agent enable ····································································································································· 58
nqa schedule ············································································································································ 58
nqa template ············································································································································ 59
nqa twamp-light client ······························································································································ 60
nqa twamp-light sender ···························································································································· 61
oid ···························································································································································· 62
ii
operation (FTP operation view) ················································································································ 62
operation (HTTP operation view/HTTPS template view) ········································································· 63
out interface ············································································································································· 64
password ·················································································································································· 65
port-detect enable ···································································································································· 66
priority 8021p ··········································································································································· 67
probe count ·············································································································································· 67
probe packet-interval ································································································································ 68
probe packet-number ······························································································································· 69
probe packet-timeout ······························································································································· 69
probe timeout ··········································································································································· 70
proxy-url ··················································································································································· 70
raw-request ·············································································································································· 71
reaction checked-element { jitter-ds | jitter-sd } ························································································ 72
reaction checked-element { owd-ds | owd-sd } ························································································ 74
reaction checked-element packet-loss ····································································································· 75
reaction checked-element probe-duration································································································ 76
reaction checked-element probe-fail (for trap) ························································································· 77
reaction checked-element probe-fail (for trigger) ····················································································· 78
reaction checked-element rtt ···················································································································· 79
reaction checked-element two-way-delay ································································································ 81
reaction checked-element two-way-jitter ·································································································· 82
reaction checked-element two-way-loss ·································································································· 83
reaction trap ············································································································································· 84
reaction trigger per-probe ························································································································· 85
reaction trigger probe-fail ························································································································· 86
reaction trigger probe-pass ······················································································································ 86
request-method ········································································································································ 87
reset nqa twamp-light statistics ················································································································ 88
resolve-target ··········································································································································· 88
resolve-type ·············································································································································· 89
resource-release { data-fill | hex-data-fill } ································································································ 90
route-option bypass-route ························································································································ 90
source interface (ICMP echo operation view) ·························································································· 91
source interface (TWAMP Light client-session view) ··············································································· 92
source ip ··················································································································································· 93
source mac ··············································································································································· 94
source port ··············································································································································· 94
start (TWAMP Light sender view) ············································································································ 95
statistics hold-time ···································································································································· 97
statistics interval ······································································································································· 98
statistics max-group ································································································································· 99
stop (TWAMP Light sender view) ············································································································· 99
test-session (TWAMP Light client view) ································································································· 100
timestamp-format ··································································································································· 101
tos ·························································································································································· 101
transparent enable ································································································································· 102
transport-protocol ··································································································································· 103
ttl ···························································································································································· 103
type ························································································································································ 104
url ··························································································································································· 105
username ··············································································································································· 106
Version (HTTP/HTTPS operation view/HTTPS template view) ····························································· 107
version (SNMP DCA template view) ······································································································ 107
vlan ························································································································································· 108
vpn-instance ··········································································································································· 109
NQA server commands ·································································································································· 109
display nqa server ·································································································································· 110
display nqa twamp-light responder ········································································································ 111
nqa server enable ·································································································································· 113
nqa server tcp-connect ··························································································································· 113
nqa server udp-echo ······························································································································ 114
iii
nqa twamp-light responder ····················································································································· 115
test-session (TWAMP Light responder view) ························································································· 116
NTP commands ························································································· 118
display ntp-service ipv6 sessions ··········································································································· 118
display ntp-service sessions ·················································································································· 122
display ntp-service status ······················································································································· 126
display ntp-service trace ························································································································ 128
ntp-service acl ········································································································································ 129
ntp-service authentication enable ·········································································································· 130
ntp-service authentication-keyid ············································································································· 131
ntp-service broadcast-client ··················································································································· 133
ntp-service broadcast-server ·················································································································· 133
ntp-service dscp ····································································································································· 134
ntp-service enable ·································································································································· 135
ntp-service inbound enable ···················································································································· 135
ntp-service ipv6 acl ································································································································ 136
ntp-service ipv6 dscp ····························································································································· 137
ntp-service ipv6 inbound enable ············································································································ 138
ntp-service ipv6 multicast-client ············································································································· 138
ntp-service ipv6 multicast-server ············································································································ 139
ntp-service ipv6 source ·························································································································· 140
ntp-service ipv6 time-server enable ································································································ 141
ntp-service ipv6 unicast-peer ················································································································· 141
ntp-service ipv6 unicast-server ·············································································································· 143
ntp-service max-dynamic-sessions ········································································································ 145
ntp-service multicast-client ····················································································································· 145
ntp-service multicast-server ··················································································································· 146
ntp-service noquery enable ···················································································································· 147
ntp-service refclock-master ···················································································································· 148
ntp-service reliable authentication-keyid ································································································ 149
ntp-service source ·································································································································· 150
ntp-service time-offset-threshold ············································································································ 151
ntp-service time-server enable ········································································································ 151
ntp-service unicast-peer ························································································································· 152
ntp-service unicast-server ······················································································································ 154
SNTP commands······················································································· 156
display sntp ipv6 sessions ······················································································································ 156
display sntp sessions ····························································································································· 156
sntp authentication enable ····················································································································· 157
sntp authentication-keyid ······················································································································· 158
sntp enable ············································································································································· 159
sntp ipv6 unicast-server ························································································································· 160
sntp reliable authentication-keyid ··········································································································· 161
sntp time-offset-threshold ······················································································································· 162
sntp unicast-server ································································································································· 162
PTP commands ························································································· 165
display ptp clock ····································································································································· 165
display ptp corrections ··························································································································· 167
display ptp foreign-masters-record ········································································································· 168
display ptp interface ······························································································································· 169
display ptp parent ··································································································································· 172
display ptp path-trace ····························································································································· 173
display ptp statistics ······························································································································· 174
display ptp time-property ························································································································ 175
ptp { tod0 | tod1 } ··························································································································· 177
ptp active force-state ······························································································································ 178
ptp alarm-threshold { time-lock | time-unlock } ····································································· 179
ptp alarm-threshold clock-source-class ·································································································· 180
ptp alarm-threshold time-offset ·············································································································· 181
iv
ptp alarm-threshold time-offset-sum pk-pk····························································································· 181
ptp announce-interval ····························································································································· 182
ptp announce-timeout ···························································································································· 183
ptp asymmetry-correction ······················································································································· 184
ptp clock-source ····································································································································· 185
PTP clock-state enable ················································································································ 190
ptp clock-step ········································································································································· 190
ptp delay-mechanism ····························································································································· 191
ptp delay-resp-interval ···························································································································· 192
ptp destination-mac ································································································································ 193
ptp domain ············································································································································· 194
ptp dscp ·················································································································································· 195
ptp enable ·············································································································································· 196
ptp force-state ········································································································································ 197
ptp ignore sync-uncertain ······················································································································· 198
ptp local-priority ······································································································································ 199
ptp max-steps-removed ···················································································································· 200
ptp min-delayreq-interval ························································································································ 201
ptp mode ················································································································································ 202
ptp notslave disable ······························································································································· 204
ptp path-trace disable ····························································································································· 205
ptp pdelay-req-interval ··························································································································· 205
ptp port-mode ········································································································································· 206
ptp priority ·············································································································································· 207
ptp profile ··············································································································································· 208
ptp slave-only ········································································································································· 209
ptp source ·············································································································································· 210
ptp syn-interval ······································································································································· 211
ptp sync-uncertain enable ······················································································································ 212
ptp technical-standard ···························································································································· 213
ptp time-offset ········································································································································ 214
ptp transport-protocol ····························································································································· 215
ptp unicast-destination ··························································································································· 216
ptp unicast-negotiate ······························································································································ 216
ptp utc ···················································································································································· 217
ptp utc offset ··········································································································································· 219
ptp vlan ··················································································································································· 219
reset ptp statistics ·································································································································· 220
SNMP commands ······················································································ 222
display snmp-agent community ·············································································································· 222
display snmp-agent context ··················································································································· 224
display snmp-agent group ······················································································································ 224
display snmp-agent local-engineid ········································································································· 225
display snmp-agent mib-node ················································································································ 226
display snmp-agent mib-view ················································································································· 230
display snmp-agent remote ···················································································································· 231
display snmp-agent statistics ················································································································· 232
display snmp-agent sys-info ··················································································································· 234
display snmp-agent trap queue ·············································································································· 235
display snmp-agent trapbuffer drop ······································································································· 235
display snmp-agent trapbuffer send ······································································································· 236
display snmp-agent trap-list ··················································································································· 236
display snmp-agent usm-user ················································································································ 237
enable snmp trap updown ······················································································································ 239
reset snmp-agent trapbuffer ··················································································································· 239
snmp virtual-access visible ···················································································································· 240
snmp-agent ············································································································································ 241
snmp-agent { inform | trap } source ········································································································ 241
snmp-agent calculate-password ············································································································ 242
snmp-agent community ·························································································································· 244
snmp-agent community-map ·················································································································· 247
v
snmp-agent context ································································································································ 247
snmp-agent group ·································································································································· 248
snmp-agent local-engineid ····················································································································· 250
snmp-agent log ······································································································································ 251
snmp-agent mib-view ····························································································································· 252
snmp-agent packet max-size ················································································································· 253
snmp-agent packet response dscp ········································································································ 254
snmp-agent port ····································································································································· 254
snmp-agent remote ································································································································ 255
snmp-agent sys-info contact ·················································································································· 256
snmp-agent sys-info location ················································································································· 256
snmp-agent sys-info version ·················································································································· 257
snmp-agent target-host ·························································································································· 258
snmp-agent trap enable ························································································································· 260
snmp-agent trap format ·························································································································· 261
snmp-agent trap if-mib link extended ····································································································· 261
snmp-agent trap life ······························································································································· 262
snmp-agent trap log ······························································································································· 263
snmp-agent trap queue-size ·················································································································· 263
snmp-agent trap withsn ·························································································································· 264
snmp-agent usm-user { v1 | v2c } ·········································································································· 264
snmp-agent usm-user v3 ······················································································································· 266
snmp-agent usm-user v3 user-role ········································································································ 270
RMON commands ····················································································· 272
display rmon alarm ································································································································· 272
display rmon event ································································································································· 273
display rmon eventlog ···························································································································· 274
display rmon history ······························································································································· 276
display rmon prialarm ····························································································································· 278
display rmon statistics ···························································································································· 279
rmon alarm ············································································································································· 281
rmon event ············································································································································· 283
rmon history ··········································································································································· 284
rmon prialarm ········································································································································· 285
rmon statistics ········································································································································ 287
Event MIB commands ················································································ 289
action ······················································································································································ 289
comparison ············································································································································· 290
context (action-set view) ························································································································ 291
context (trigger view) ······························································································································ 291
delta falling ············································································································································· 292
delta rising ·············································································································································· 293
description (event view) ························································································································· 294
description (trigger view) ························································································································ 294
display snmp mib event ·························································································································· 295
display snmp mib event event ················································································································ 297
display snmp mib event object list ·········································································································· 298
display snmp mib event trigger ·············································································································· 299
event (trigger-Boolean view) ·················································································································· 302
event (trigger-existence view) ················································································································ 303
event enable ··········································································································································· 304
falling ······················································································································································ 304
frequency ··············································································································································· 305
object list (action-notification view)········································································································· 306
object list (trigger view) ·························································································································· 307
object list (trigger-Boolean view) ············································································································ 308
object list (trigger-existence view) ·········································································································· 308
object list (trigger-threshold view) ·········································································································· 309
oid (action-notification view) ··················································································································· 310
oid (action-set view) ······························································································································· 310
vi
oid (trigger view) ····································································································································· 311
rising ······················································································································································· 312
sample ···················································································································································· 313
snmp mib event ······································································································································ 313
snmp mib event object list ······················································································································ 314
snmp mib event sample instance maximum ·························································································· 315
snmp mib event sample minimum ·········································································································· 316
snmp mib event trigger ··························································································································· 316
snmp-agent trap enable event-mib ········································································································ 317
startup (trigger-existence view) ·············································································································· 318
startup (trigger-threshold view) ·············································································································· 319
startup enable ········································································································································ 319
test ························································································································································· 320
trigger enable ········································································································································· 321
type ························································································································································ 322
value (action-set view) ··························································································································· 322
value (trigger-Boolean view) ·················································································································· 323
wildcard context (action-set view) ·········································································································· 324
wildcard context (trigger view) ················································································································ 324
wildcard oid (action-set view) ················································································································· 325
wildcard oid (trigger view) ······················································································································ 326
Sampler commands ··················································································· 327
display sampler ······································································································································ 327
sampler ·················································································································································· 327
Port mirroring commands ··········································································· 329
display mirroring-group ·························································································································· 329
mirroring-group ······································································································································· 330
mirroring-group mirroring-cpu ················································································································ 331
mirroring-group mirroring-port (interface view) ······················································································· 332
mirroring-group mirroring-port (system view) ························································································· 333
mirroring-group monitor-egress ·············································································································· 334
mirroring-group monitor-port (interface view) ························································································· 335
mirroring-group monitor-port (system view) ··························································································· 336
mirroring-group reflector-port ················································································································· 338
mirroring-group remote-probe vlan ········································································································ 339
Flow mirroring commands ·········································································· 341
display monitoring-group ························································································································ 341
mirror-to cpu ··········································································································································· 342
mirror-to ifa-processor ···························································································································· 343
mirror-to interface ··································································································································· 343
mirror-to monitoring-group ····················································································································· 344
mirroring erspanv3 switch-id ·················································································································· 345
monitoring-group ···································································································································· 345
monitoring-port ······································································································································· 346
truncation enable ···································································································································· 349
NetStream commands ··············································································· 350
display ip netstream cache ····················································································································· 350
display ip netstream export ···················································································································· 356
display ip netstream template ················································································································ 358
enable ···················································································································································· 362
ip netstream ··········································································································································· 363
ip netstream aggregation ······················································································································· 363
ip netstream export host ························································································································· 365
ip netstream export rate ························································································································· 366
ip netstream export source ····················································································································· 367
ip netstream export template refresh-rate ······························································································ 368
ip netstream export version ···················································································································· 369
ip netstream filter ···································································································································· 370
vii
ip netstream gre inner-packet ················································································································ 371
ip netstream max-entry ·························································································································· 371
ip netstream mpls ··································································································································· 372
ip netstream sampler ······························································································································ 373
ip netstream template rfc7011 ················································································································ 374
ip netstream timeout active ···················································································································· 375
ip netstream timeout inactive ················································································································· 375
ip netstream vxlan udp-port ···················································································································· 376
netstream key ········································································································································· 377
reset ip netstream statistics ···················································································································· 379
IPv6 NetStream commands ······································································· 380
display ipv6 netstream cache ················································································································· 380
display ipv6 netstream export ················································································································ 385
display ipv6 netstream template ············································································································· 386
enable ···················································································································································· 389
ipv6 netstream ········································································································································ 389
ipv6 netstream aggregation ···················································································································· 390
ipv6 netstream export host ····················································································································· 391
ipv6 netstream export rate ····················································································································· 392
ipv6 netstream export source ················································································································· 393
ipv6 netstream export template refresh-rate ·························································································· 394
ipv6 netstream export version ················································································································ 394
ipv6 netstream filter ································································································································ 395
ipv6 netstream gre inner-packet············································································································· 396
ipv6 netstream max-entry ······················································································································· 397
ipv6 netstream sampler ·························································································································· 398
ipv6 netstream timeout active ················································································································ 398
ipv6 netstream timeout inactive·············································································································· 399
reset ipv6 netstream statistics ················································································································ 400
NetAnalysis commands ············································································· 401
display netanalysis rocev2 cache··········································································································· 401
display netanalysis rocev2 statistics ······································································································ 404
netanalysis rocev2 drop global··············································································································· 405
netanalysis rocev2 mode ······················································································································· 406
netanalysis rocev2 report-interval ·········································································································· 407
netanalysis rocev2 statistics ··················································································································· 407
netanalysis rocev2 timeout inactive ······································································································· 408
reset netanalysis rocev2 statistics ·········································································································· 409
sFlow commands ······················································································· 410
display sflow ··········································································································································· 410
sflow agent ············································································································································· 411
sflow collector ········································································································································· 412
sflow counter collector ···························································································································· 413
sflow counter interval ····························································································································· 414
sflow flow collector ································································································································· 414
sflow flow max-header ··························································································································· 415
sflow sampling-direction ························································································································· 415
sflow sampling-mode ····························································································································· 416
sflow sampling-rate ································································································································ 417
sflow source ··········································································································································· 418
Packet capture commands ········································································ 419
display packet-capture status················································································································· 419
packet-capture interface ························································································································· 419
packet-capture local interface ················································································································ 423
packet-capture read ······························································································································· 424
packet-capture remote interface ············································································································ 425
packet-capture stop ································································································································ 426
viii
Document conventions and icons ······························································ 427
Conventions ··················································································································································· 427
Network topology icons ·································································································································· 428
Support and other resources ····································································· 429
Accessing Hewlett Packard Enterprise Support····························································································· 429
Accessing updates ········································································································································· 429
Websites ················································································································································ 430
Customer self repair ······························································································································· 430
Remote support ······································································································································ 430
Documentation feedback ······················································································································· 430
Index ·········································································································· 432
1
Ping and tracert commands
ping
Use ping to test the reachability of the destination IP address and display ping statistics.
Syntax
ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i interface-type
interface-number | -m interval | -n | -p pad | -q | -r | -s packet-size | -t
timeout | -tos tos | -v | -vpn-instance vpn-instance-name ] * host
Views
Any view
Predefined user roles
network-admin
Parameters
ip: Distinguishes between a destination host name and the ping command keywords if the name of
the destination host is i, ip, ipv, ipv6, l, ls, or lsp. For example, you must use the command in the
form of ping ip ip instead of ping ip if the destination host name is ip.
-a source-ip: Specifies an IP address of the device as the source IP address of ICMP echo
requests. If this option is not specified, the source IP address of ICMP echo requests is the primary
IP address of the outbound interface.
-c count: Specifies the number of ICMP echo requests that are sent to the destination. The value
range is 1 to 4294967295, and the default is 5.
-f: Sets the "Don’t Fragment" bit in the IP header.
-h ttl: Specifies the TTL value of ICMP echo requests. The value range is 1 to 255, and the default
is 255.
-i interface-type interface-number: Specifies the source interface for ICMP echo
requests. If you do not specify this option, the system uses the primary IP address of the matching
route's egress interface as the source interface for ICMP echo requests.
-m interval: Specifies the interval (in milliseconds) to send ICMP echo requests. The value range
is 1 to 65535, and the default is 200.
-n: Disables domain name resolution for the host argument. If the host argument represents the
host name of the destination, and if this keyword is not specified, the device translates host into an
address.
-p pad: Specifies the value of the pad field in an ICMP echo request, in hexadecimal format, 1 to 8
bits. The pad argument is in the range of 0 to ffffffff. If the specified value is less than 8 bits, 0s are
added in front of the value to extend it to 8 bits. For example, if pad is configured as 0x2f, then the
packets are padded with 0x0000002f to make the total length of the packet meet the requirements of
the device. By default, the padded value starts from 0x01 up to 0xff, where another round starts
again if necessary, such as 0x010203…feff01….
-q: Displays only the summary statistics. If this keyword is not specified, the system displays all the
ping statistics.
-r: Records the addresses of the hops (up to 9) the ICMP echo requests passed. If this keyword is
not specified, the addresses of the hops that the ICMP echo requests passed are not recorded.
2
-s packet-size: Specifies the length (in bytes) of ICMP echo requests (excluding the IP packet
header and the ICMP packet header). The value range is 20 to 9600, and the default is 56.
-t timeout: Specifies the timeout time (in milliseconds) of an ICMP echo reply. The value range is
0 to 65535, and the default is 2000. If the source does not receive an ICMP echo reply within the
timeout, it considers the ICMP echo reply timed out.
-tos tos: Specifies the ToS value of ICMP echo requests. The value range is 0 to 255, and the
default is 0.
-v: Displays non-ICMP echo reply packets. If this keyword is not specified, the system does not
display non-ICMP echo reply packets.
-vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance to which the
destination belongs. The vpn-instance-name argument represents the VPN instance name, a
case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify
this option.
host: Specifies the IP address or host name of the destination. The host name is a case-insensitive
string of 1 to 253 characters. It can contain letters, digits, and special characters such as hyphen (-),
underscore (_), and dot (.).
Usage guidelines
To ping a device identified by its host name, configure the DNS settings on the device first. If the DNS
settings are not configured, the ping operation fails.
To abort the ping operation during the execution of the command, press Ctrl+C.
Examples
# Test whether the device with an IP address of 1.1.2.2 is reachable.
<Sysname> ping 1.1.2.2
Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break
56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms
56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms
56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms
56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms
56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms
# Test whether the device with an IP address of 1.1.2.2 in VPN instance vpn1 is reachable.
<Sysname> ping -vpn-instance vpn1 1.1.2.2
Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break
56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms
56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms
56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms
56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms
56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms
--- Ping statistics for 1.1.2.2 in VPN instance vpn1 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms
# Test whether the device with an IP address of 1.1.2.2 is reachable. Only results are displayed.
<Sysname> ping -q 1.1.2.2
3
Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.962/2.196/2.665/0.244 ms
# Test whether the device with an IP address of 1.1.2.2 is reachable. The IP addresses of the hops
that the ICMP packets passed in the path are displayed.
<Sysname> ping -r 1.1.2.2
Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break
56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=4.685 ms
RR: 1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=4.834 ms (same route)
56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=4.770 ms (same route)
56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=4.812 ms (same route)
56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=4.704 ms (same route)
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 4.685/4.761/4.834/0.058 ms
The output shows the following information:
•
The destination is reachable.
•
The route is 1.1.1.1 <-> {1.1.1.2; 1.1.2.1} <-> 1.1.2.2.
Table 1 Command output
Field
Description
Ping 1.1.2.2 (1.1.2.2): 56 data
bytes, press CTRL_C to break
Test whether the device with IP address 1.1.2.2 is reachable. There
are 56 bytes in each ICMP echo request. Press Ctrl+C to abort the
ping operation.
56 bytes from 1.1.2.2: icmp_seq=0
ttl=254 time=4.685 ms
Received ICMP echo replies from the device whose IP address is
1.1.2.2. If no echo reply is received within the timeout period, no
information is displayed.
• bytes—Number of bytes in the ICMP echo reply.
• icmp_seq—Packet sequence, used to determine whether a
segment is lost, disordered or repeated.
• ttl—TTL value in the ICMP echo reply.
• time—Response time.
RR: Routers through which the ICMP echo request passed. They are
displayed in inversed order, which means the router with a smaller
distance to the destination is displayed first.
--- Ping statistics for 1.1.2.2 --- Statistics on data received and sent in the ping operation.
--- Ping statistics for 1.1.2.2 in VPN
instance vpn1 --- Ping statistics for a device in a VPN instance.
5 packet(s) transmitted Number of ICMP echo requests sent.
5 packet(s) received Number of ICMP echo replies received.
0.0% packet loss Percentage of unacknowledged packets to the total packets sent.
4
Field
Description
round-trip min/avg/max/std-dev =
4.685/4.761/4.834/0.058 ms Minimum/average/maximum/standard deviation response time, in
milliseconds.
ping ipv6
Use ping ipv6 to test the reachability of the destination IPv6 address and display IPv6 ping
statistics.
Syntax
ping ipv6 [ -a source-ipv6 | -c count | -i interface-type interface-number
| -m interval | -q | -s packet-size | -t timeout | -tc traffic-class | -v
| -vpn-instance vpn-instance-name ] * host
Views
Any view
Predefined user roles
network-admin
Parameters
-a source-ipv6: Specifies an IPv6 address of the device as the source IP address of ICMP echo
requests. If this option is not specified, the source IPv6 address of ICMP echo requests is the IPv6
address of the outbound interface. See RFC 3484 for information about the address selection rule.
-c count: Specifies the number of ICMPv6 echo requests that are sent to the destination. The
value range is 1 to 4294967295, and the default is 5.
-i interface-type interface-number: Specifies the source interface for ICMPv6 echo
requests. This option must be specified when the destination address is a multicast address or a link
local address. If you do not specify this option, the system uses the primary IP address of the
matching route's egress interface as the source interface for ICMPv6 echo requests.
-m interval: Specifies the interval (in milliseconds) to send an ICMPv6 echo reply. The value
range is 1 to 65535, and the default is 1000.
-q: Displays only the summary statistics. If you do not specify this keyword, the system displays all
the ping statistics.
-s packet-size: Specifies the length (in bytes) of ICMPv6 echo requests (excluding the IPv6
packet header and the ICMPv6 packet header). The value range is 20 to 9600, and the default is 56.
-t timeout: Specifies the timeout time (in milliseconds) of an ICMPv6 echo reply. The value range
is 0 to 65535, and the default is 2000.
-tc traffic-class: Specifies the traffic class value in an ICMPv6 packet. The value range is 0
to 255 and the default is 0.
-v: Displays detailed information (including the dst field and the idx field) about ICMPv6 echo
replies. If this keyword is not specified, the system only displays brief information (not including the
dst field and the idx field) about ICMPv6 echo replies.
-vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance to which the
destination belongs. The vpn-instance-name argument represents the VPN instance name, a
case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify
this option.
host: Specifies the IPv6 address or host name of the destination. The host name is a
case-insensitive string of 1 to 253 characters. It can contain letters, digits, and special characters
such as hyphen (-), underscore (_), and dot (.).
5
Usage guidelines
To ping a device identified by its host name, configure the DNS settings on the device first. If the DNS
settings are not configured, the IPv6 ping operation fails.
To abort the IPv6 ping operation during the execution of the command, press Ctrl+C.
Examples
# Test whether the IPv6 address (3001::2) is reachable.
<Sysname> ping ipv6 3001::2
Ping6(56 data bytes) 3001::1 --> 3001::2, press CTRL_C to break
56 bytes from 3001::2, icmp_seq=0 hlim=64 time=62.000 ms
56 bytes from 3001::2, icmp_seq=1 hlim=64 time=23.000 ms
56 bytes from 3001::2, icmp_seq=2 hlim=64 time=20.000 ms
56 bytes from 3001::2, icmp_seq=3 hlim=64 time=4.000 ms
56 bytes from 3001::2, icmp_seq=4 hlim=64 time=16.000 ms
--- Ping6 statistics for 3001::2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 4.000/25.000/62.000/20.000 ms
# Test whether the IPv6 address (3001::2) is reachable. Only the statistics are displayed.
<Sysname> ping ipv6 –q 3001::2
Ping6(56 data bytes) 3001::1 --> 3001::2, press CTRL_C to break
--- Ping6 statistics for 3001::2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 4.000/25.000/62.000/20.000 ms
# Test whether the IPv6 address (3001::2) is reachable. Detailed ping information is displayed.
<Sysname> ping ipv6 –v 3001::2
Ping6(56 data bytes) 3001::1 --> 3001::2, press CTRL_C to break
56 bytes from 3001::2, icmp_seq=0 hlim=64 dst=3001::1 idx=3 time=62.000 ms
56 bytes from 3001::2, icmp_seq=1 hlim=64 dst=3001::1 idx=3 time=23.000 ms
56 bytes from 3001::2, icmp_seq=2 hlim=64 dst=3001::1 idx=3 time=20.000 ms
56 bytes from 3001::2, icmp_seq=3 hlim=64 dst=3001::1 idx=3 time=4.000 ms
56 bytes from 3001::2, icmp_seq=4 hlim=64 dst=3001::1 idx=3 time=16.000 ms
--- Ping6 statistics for 3001::2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 4.000/25.000/62.000/20.000 ms
Table 2 Command output
Field
Description
Ping6(56 data bytes)
3001::1 --> 3001::2, press CTRL_C
to break
An ICMPv6 echo reply with a data length of 56 bytes is sent from
3001::1 to 3001::2.
Press Ctrl+C to abort the IPv6 ping operation.
6
Field
Description
56 bytes from 3001::2,
icmp_seq=1 hlim=64 dst=3001::1
idx=3 time=62.000 ms
Received ICMPv6 echo replies from the device whose IPv6 address
is 3001::2.
• The number of data bytes is 56.
• The packet sequence is 1.
• The hop limit value is 64.
• The destination address is 3001::1. Specify the -v keyword to
display this field.
• The index for the packet inbound interface is 3. Specify the -v
keyword to display this field.
• The response time is 62 milliseconds.
--- Ping6 statistics for 3001::2 ------ Statistics on data received and sent in an IPv6 ping operation.
5 packet(s) transmitted Number of ICMPv6 echo requests sent.
5 packet(s) received Number of ICMPv6 echo replies received.
0.0% packet loss Percentage of unacknowledged packets to the total packets sent.
round-trip min/avg/max/ std-dev
=4.000/25.000/62.000/20.000 ms Minimum/average/maximum/standard deviation response time, in
milliseconds.
tracert
Use tracert to trace the path that the packets traverse from source to destination.
Syntax
tracert [ -a source-ip | -f first-ttl | -i interface-type interface-number
| -m max-ttl | -p port | -q packet-number | -t tos | -vpn-instance
vpn-instance-name [ -resolve-as { global | none | vpn } ] | -w timeout ] * host
Views
Any view
Predefined user roles
network-admin
Parameters
-a source-ip: Specifies an IP address of the device as the source IP address of probe packets. If
this option is not specified, the source IP address of probe packets is the primary IP address of the
outbound interface.
-f first-ttl: Specifies the TTL of the first packet sent to the destination. The value range is 1 to
255, and the default is 1. It must be no greater than the value of the max-ttl argument.
-i interface-type interface-number: Specifies the source interface of probe packets. If
you do not specify this option, the system looks up the routing table or forwarding table for a
matching route and uses the output interface of that route as the source interface of probe packets.
-m max-ttl: Specifies the maximum number of hops allowed for a probe packet. The value range
is 1 to 255, and the default is 30. It must be no smaller than the value of the first-ttl argument.
-p port: Specifies an invalid UDP port of the destination. The value range is 1 to 65535, and the
default is 33434.
-q packet-number: Specifies the number of probe packets to send per hop. The value range is 1
to 65535, and the default is 3.
7
-t tos: Specifies the ToS value of probe packets. The value range is 0 to 255, and the default is 0.
-vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance to which the
destination belongs. The vpn-instance-name argument represents the VPN instance name, a
case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify
this option.
-resolve-as: Specifies a routing table for autonomous system (AS) resolution. Tracert searches
the specified routing table for the AS that each hop along the path belongs to. If you do not specify
this keyword, the global routing table is used. If the AS information is found, this command displays
the AS number next to the address of the hop in the probe result.
•
global: Specifies the global routing table.
•
none: Disables AS resolution.
•
vpn: Specifies the VPN routing table.
-w timeout: Specifies the timeout time in milliseconds of the reply packet for a probe packet. The
value range is 1 to 65535, and the default is 5000.
host: Specifies the IP address or host name of the destination. The host name is a case-insensitive
string of 1 to 253 characters. It can contain letters, digits, and special characters such as hyphen (-),
underscore (_), and dot (.).
Usage guidelines
After identifying network failure with the ping command, use the tracert command to locate
failed nodes.
If the destination address is on the public network, you do not need to specify the -resolve-as
keyword to obtain the AS information. The device automatically uses the global routing table for AS
resolution.
If the destination address is on a private network, address information of intermediate hops might be
stored in either the global routing table or the VPN routing table. To learn the AS path that the
packets traverse, execute the tracert command twice, once with the -resolve-as global
keywords and again with the -resolve-as vpn keywords.
The output from the tracert command includes IP addresses of all the Layer 3 devices that the
packets traverse from source to destination. Asterisks (* * *) are displayed if the device cannot reply
with an ICMP error message. The reason might be the destination is unreachable or sending ICMP
timeout/destination unreachable packets is disabled.
Before starting a tracert operation, you must enable sending of ICMP destination unreachable
messages on the intermediate devices between the source and destination. The tracert operation
stops if any one of the following ICMP destination unreachable messages is received:
•
!N—Network unreachable.
•
!H—Destination host unreachable.
•
!P—Protocol unreachable. The protocol number is unknown.
•
!F—Fragmentation needed. This message indicates that packet fragmentation is needed but
the "Don’t Fragment" bit is set on an immediate device.
•
!W—Destination host unknown.
•
!Q—Network unreachable for ToS.
•
!T—Host unreachable for ToS.
•
!X—Communication administratively prohibited by filtering policies.
•
!V—Host precedence violation.
•
!C—Precedence cutoff in effect.
To abort the tracert operation during the execution of the command, press Ctrl+C.
8
Examples
# Display the path that the packets traverse from source to destination (1.1.2.2).
<Sysname> tracert 1.1.2.2
traceroute to 1.1.2.2 (1.1.2.2), 30 hops at most, 40 bytes each packet, press CTRL_C to
break
1 1.1.1.2 (1.1.1.2) 673 ms 425 ms 30 ms
2 1.1.2.2 (1.1.2.2) [AS 100] 580 ms 470 ms 80 ms
# Display the path that the packets traverse from source to destination (1.1.3.2) in VPN instance
vpn1, as well as the AS information of the hops along the path.
<Sysname> tracert –vpn-instance vpn1 –resolve-as vpn 1.1.3.2
traceroute to 1.1.3.2 (1.1.3.2), 30 hops at most, 40 bytes each packet, press CTRL_C to
break
1 1.1.1.2 (1.1.1.2) 673 ms 425 ms 30 ms
2 1.1.2.2 (1.1.2.2) 580 ms 470 ms 80 ms
3 1.1.3.2 (1.1.3.2) [AS 65535] 530 ms 472 ms 380 ms
Table 3 Command output
Field
Description
traceroute to 1.1.2.2 (1.1.2.2) Display the route that
the IP packets traverse from the current device to the
device whose IP address is 1.1.2.2.
hops at most Maximum number of hops of the probe packets, which can be set by the
-m
keyword.
bytes each packet Number of bytes of a probe packet.
press CTRL_C to break During the execution of the command, press Ctrl+C to abort the tracert
operation.
2 1.1.2.2 (1.1.2.2) [AS 100]
580 ms 470 ms 80 ms
Probe result of the probe packets that contain a TTL value of 2, including
the following information about the second hop:
• Domain name of the hop. If no domain name is configured, the IP
address is displayed as the domain name.
• IP address of the hop. The IP address is displayed in parentheses.
• Number of the AS that the hop belongs to. The AS number appears
only when it is found for the hop in the specified routing table.
• The round-trip time of the probe packets.
The number of packets that can be sent in each probe can be set by using
the
-q
keyword.
tracert ipv6
Use tracert ipv6 to display the path that the IPv6 packets traverse from source to destination.
Syntax
tracert ipv6 [ -a source-ipv6 | -f first-hop | -i interface-type
interface-number | -m max-hops | -p port | -q packet-number | -t
traffic-class | -vpn-instance vpn-instance-name [ -resolve-as { global |
none | vpn } ] | -w timeout ] * host
Views
Any view
9
Predefined user roles
network-admin
Parameters
-a source-ipv6: Specifies a valid IPv6 address on the device as the source IPv6 address of the
probe packets. If you do not specify a source IPv6 address, the source IPv6 address of the probe
packets is the IPv6 address of the outbound interface.
-f first-hop: Specifies the TTL value of the first packet. The value range is 1 to 255, and the
default is 1. The value must be no greater than the value of the max-hops argument.
-i interface-type interface-number: Specifies the source interface of probe packets. If
you do not specify this option, the system looks up the routing table or forwarding table for a
matching route and uses the output interface of that route as the source interface of probe packets.
You must specify this option if the destination address is a multicast address or a link-local address.
-m max-hops: Specifies the maximum number of hops allowed for a packet. The value range is 1
to 255, and the default is 30. The value must be no smaller than the value of the first-hop
argument.
-p port: Specifies an invalid UDP port of the destination. The value range is 1 to 65535, and the
default is 33434.
-q packet-number: Specifies the number of probe packets sent each time. The value range is 1
to 65535, and the default is 3.
-t traffic-class: Specifies the traffic class value in an IPv6 probe packet. The value range is 0
to 255, and the default is 0.
-vpn-instance vpn-instance-name: Specifies an MPLS L3VPN instance to which the
destination belongs. The vpn-instance-name argument represents the VPN instance name, a
case-sensitive string of 1 to 31 characters. If the destination is on the public network, do not specify
this option.
-resolve-as: Specifies a routing table for AS resolution. Tracert searches the specified routing
table for the AS that each hop along the path belongs to. If you do not specify this keyword, the global
routing table is used. If the AS information is found, this command displays the AS number next to
the address of the hop in the probe result.
•
global: Specifies the global routing table.
•
none: Disables AS resolution.
•
vpn: Specifies the VPN routing table.
-w timeout: Specifies the timeout time (in milliseconds) of the reply packet of a probe packet. The
value range is 1 to 65535, and the default is 5000.
host: Specifies the IPv6 address or host name of the destination. The host name is a
case-insensitive string of 1 to 253 characters. It can contain letters, digits, and special characters
such as hyphen (-), underscore (_), and dot (.).
Usage guidelines
After identifying network failure with the ping ipv6 command, you can use the tracert ipv6
command to locate failed nodes.
If the destination address is on the public network, you do not need to specify the -resolve-as
keyword to obtain the AS information. The device automatically uses the global routing table for AS
resolution.
If the destination address is on a private network, address information of intermediate hops might be
stored in either the global routing table or the VPN routing table. To learn the AS path that the
packets traverse, execute the tracert ipv6 command twice, once with the -resolve-as
global keywords and again with the -resolve-as vpn keywords.
10
The output from the tracert ipv6 command includes IPv6 addresses of all the Layer 3 devices
that the packets traverse from source to destination. Asterisks (* * *) are displayed if the device
cannot reply with an ICMP error message. The reason might be the destination is unreachable or
sending ICMP timeout/destination unreachable packets is disabled.
Before starting an IPv6 tracert operation, you must enable sending of ICMPv6 destination
unreachable messages on the intermediate devices between the source and destination. The IPv6
tracert operation stops if any one of the following ICMPv6 destination unreachable messages is
received:
•
!N—No route to destination.
•
!P—Communication with destination administratively prohibited by filtering policies.
•
!A—Address unreachable. The unreachable reason is unknown.
•
!S—Beyond scope of source address. This message is displayed if the probe packet has a
link-local source address and a non-link-local destination address. Such a packet cannot be
delivered to the destination without leaving the scope of the source address.
To abort the tracert operation during the execution of the command, press Ctrl+C.
Examples
# Display the path that the packets traverse from source to destination (3001:3::2).
<Sysname> tracert ipv6 3001:3::2
traceroute to 3001:3::2(3001:3::2), 30 hops at most, 60 byte packets, press CTRL_C to break
1 3001:1::2 0.661 ms 0.618 ms 0.579 ms
2 3001:2::2 [AS 100] 0.861 ms 0.718 ms 0.679 ms
3 3001:3::2 [AS 200] 0.822 ms 0.731 ms 0.708 ms
# Display the path that the packets traverse from source to destination (3001:3::2) in VPN instance
vpn1, as well as the AS information of the hops along the path.
<Sysname> tracert ipv6 –vpn-instance vpn1 –resolve-as vpn 3001:3::2
traceroute to 3001:3::2(3001:3::2), 30 hops at most, 60 byte packets , press CTRL_C to
break
1 3001:1::2 0.661 ms 0.618 ms 0.579 ms
2 3001:2::2 0.861 ms 0.718 ms 0.679 ms
3 3001:3::2 [AS 65535] 0.822 ms 0.731 ms 0.708 ms
Table 4 Command output
Description
traceroute to 3001:3::2 Display the route that the IPv6 packets traverse from the current device
to the device whose IP address is 3001:3:2.
hops at most Maximum number of hops of the probe packets, which can be set by the
-m
keyword.
byte packets Number of bytes of a probe packet.
2 3001:2::2 [AS 100] 0.861 ms
0.718 ms 0.679 ms
Probe result of the probe packets that contain a hoplimit value of 2,
including the following information about the second hop:
• IPv6 address of the hop.
• Number of the AS the hop belongs to. The AS number appears
only when it is found for the hop in the specified routing table.
• The round-trip time of the probe packets.
The number of packets that can be sent in each probe can be set by
using the
-q
keyword.
/