H3C S3100V2-52TP Configuration manual

Category
Networking
Type
Configuration manual
H3C S3100V2-52TP Switch
Network Management and Monitoring
Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Software version: Release 2101
Document version: 6W100-20110905
Copyright © 2011, Hangzhou H3C Technologies Co., Ltd. and its licensors
All rights reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior
written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C,
, Aolynk, , H
3
Care,
, TOP G, , IRF, NetPilot, Neocean, NeoVTL,
SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V
2
G, V
n
G, PSPT,
XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co.,
Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Preface
The H3C S3100V2-52TP documentation set includes 10 configuration guides, which describe the
software features for the H3C S3100V2-52TP Switch Release 2101, and guide you through the software
configuration procedures. These configuration guides also provide configuration examples to help you
apply software features to different network scenarios.
The Network Management and Monitoring Configuration Guide describes network management and
monitoring fundamentals and configuration. It describes how to view the system information, collect
traffic statistics, assess the network performance, synchronize time for all devices with clocks in your
network, and use the ping, tracert, and debug commands to check and debug the current network
connectivity.
This preface includes:
• Audience
• Conventions
• About the S3100V2-52TP documentation set
• Obtaining documentation
• Technical support
• Documentation feedback
Audience
This documentation is intended for:
• Network planners
• Field technical support and servicing engineers
• Network administrators working with the S3100V2-52TP Switch
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[ ] Square brackets enclose syntax choices (keywords or arguments) that are optional.
{ x | y | ... }
Braces enclose a set of required syntax choices separated by vertical bars, from which
you select one.
[ x | y | ... ]
Square brackets enclose a set of optional syntax choices separated by vertical bars, from
which you select one or none.
Convention Description
{ x | y | ... } *
Asterisk marked braces enclose a set of required syntax choices separated by vertical
bars, from which you select at least one.
[ x | y | ... ] *
Asterisk marked square brackets enclose optional syntax choices separated by vertical
bars, from which you select one choice, multiple choices, or none.
&<1-n>
The argument or keyword and argument combination before the ampersand (&) sign can
be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
GUI conventions
Convention Description
Boldface
Window names, button names, field names, and menu items are in Boldface. For
example, the New User window appears; click OK.
> Multi-level menus are separated by angle brackets. For example, File > Create > Folder.
Symbols
Convention Description
WARNING
An alert that calls attention to important information that if not understood or followed can
result in personal injury.
CAUTION
An alert that calls attention to important information that if not understood or followed can
result in data loss, data corruption, or damage to hardware or software.
IMPORTANT
An alert that calls attention to essential information.
NOTE
An alert that contains additional or supplementary information.
TIP
An alert that provides helpful information.
Network topology icons
Represents a generic network device, such as a router, switch, or firewall.
Represents a routing-capable device, such as a router or Layer 3 switch.
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports
Layer 2 forwarding and other Layer 2 features.
Port numbering in examples
The port numbers in this document are for illustration only and might be unavailable on your device.
About the S3100V2-52TP documentation set
The H3C S3100V2-52TP documentation set includes:
Documents Purposes
Product description and specifications
Marketing brochures Describe product specifications and benefits.
Technology white papers
Provide an in-depth description of software features and
technologies.
Hardware specifications and installation
Compliance and safety manuals
CE DOCs
Provide regulatory information and the safety instructions that must be
followed during installation.
Installation quick starts
Guides you through initial installation and setup procedures to help
you quickly set up your device.
Installation guides Provides a complete guide to switch installation and specifications.
H3C Low End Series Ethernet Switches
Pluggable Modules Manual
Describes the specifications of pluggable transceiver modules.
Pluggable SFP[SFP+][XFP] Transceiver
Modules Installation Guide
Describe the installation, and replacement of SFP/SFP+/XFP
transceiver modules.
Software configuration
Configuration guides Describe software features and configuration procedures.
Command references Provide a quick reference to all available commands.
Operations and maintenance
H3C Series Ethernet Switches Login
Password Recovery Manual
Helps you deal with switch login password loss.
Release notes
Provide information about the product release, including the version
history, hardware and software compatibility matrix, version
upgrade information, technical support information, and software
upgrading.
Obtaining documentation
You can access the most up-to-date H3C product documentation on the World Wide Web at
http://www.h3c.com
.
Click the links on the top navigation bar to obtain different categories of product documentation:
[Technical Support & Documents > Technical Documents]
– Provides hardware installation, software
upgrading, and software feature configuration and maintenance documentation.
[Products & Solutions]
– Provides information about products and technologies, as well as solutions.
[Technical Support & Documents > Software Download]
– Provides the documentation released with the
software version.
Technical support
http://www.h3c.com
Documentation feedback
You can e-mail your comments about product documentation to info@h3c.com.
We appreciate your comments.
i
Contents
System maintenance and debugging ························································································································· 1
Ping·····················································································································································································1
Introduction ·······························································································································································1
Configuring ping ······················································································································································1
Ping configuration example ····································································································································1
Tracert ················································································································································································3
Introduction ·······························································································································································3
Configuring tracert ···················································································································································4
System debugging ····························································································································································5
Introduction to system debugging···························································································································5
Displaying debugging information·························································································································5
Configuring system debugging·······························································································································6
Ping and tracert configuration example ·························································································································7
NTP configuration ························································································································································ 9
NTP overview ····································································································································································9
Applications of NTP ·················································································································································9
Advantages of NTP ··················································································································································9
How NTP works····················································································································································· 10
NTP message format ············································································································································· 11
Operation modes of NTP ····································································································································· 12
NTP configuration task list············································································································································· 14
Configuring the operation modes of NTP ··················································································································· 15
Operation modes and static and dynamic associations··················································································· 15
Configuring NTP client/server mode ·················································································································· 15
Configuring the NTP symmetric peers mode······································································································ 16
Configuring NTP broadcast mode······················································································································· 16
Configuring NTP multicast mode ························································································································· 17
Configuring optional parameters of NTP ···················································································································· 18
Specifying the source interface for NTP messages···························································································· 18
Disabling an interface from receiving NTP messages······················································································· 18
Configuring the maximum number of dynamic sessions allowed···································································· 19
Configuring access-control rights ································································································································· 19
Configuration prerequisites ·································································································································· 19
Configuration procedure ······································································································································ 19
Configuring NTP authentication ··································································································································· 20
Configuration prerequisites ·································································································································· 20
Configuration procedure ······································································································································ 20
Displaying and maintaining NTP ································································································································· 22
NTP configuration examples········································································································································· 22
Configuring NTP client/server mode ·················································································································· 22
Configuring the NTP symmetric mode ················································································································ 23
Configuring NTP broadcast mode······················································································································· 25
Configuring NTP multicast mode ························································································································· 27
Configuring NTP client/server mode with authentication················································································· 29
Configuring NTP broadcast mode with authentication ····················································································· 30
Information center configuration·······························································································································34
Information center overview·········································································································································· 34
Introduction to information center························································································································ 34
ii
Classification of system information ···················································································································· 35
System information levels ····································································································································· 35
System information channels and output destinations······················································································· 35
Outputting system information by source module······························································································ 36
Default output rules of system information ·········································································································· 36
System information format···································································································································· 37
Configuring information center····································································································································· 40
Information center configuration task list ············································································································ 40
Outputting system information to the console····································································································· 40
Outputting system information to a monitor terminal ························································································ 41
Outputting system information to a log host······································································································· 42
Outputting system information to the trap buffer································································································ 43
Outputting system information to the log buffer································································································· 44
Outputting system information to the SNMP module························································································· 45
Outputting system information to the web interface ·························································································· 45
Saving system information to a log file··············································································································· 46
Saving security logs into the security log file······································································································ 47
Configuring synchronous information output ····································································································· 50
Disabling a port from generating link up/down logging information····························································· 51
Displaying and maintaining information center ········································································································· 51
Information center configuration examples ················································································································· 52
Outputting log information to a UNIX log host ·································································································· 52
Outputting log information to a Linux log host··································································································· 54
Outputting log information to the console ·········································································································· 55
Saving security logs into the security log file······································································································ 56
SNMP configuration ··················································································································································59
SNMP overview······························································································································································ 59
SNMP mechanism ················································································································································· 59
SNMP protocol versions ······································································································································· 60
SNMP configuration task list········································································································································· 60
Configuring basic SNMP settings ································································································································ 60
Configuring basic SNMPv3 settings ··················································································································· 60
Configuring basic SNMPv1 or SNMPv2c settings ···························································································· 62
Configuring network management-specific interface index ······················································································ 63
About the network management-specific interface index ················································································· 63
Switching the format of an NM-specific ifindex································································································· 63
Configuring SNMP logging ·········································································································································· 64
Introduction to SNMP logging ····························································································································· 64
Enabling SNMP logging······································································································································· 64
Configuring SNMP traps··············································································································································· 65
Introduction to SNMP traps ·································································································································· 65
Enabling SNMP traps ··········································································································································· 65
Configuring trap sending parameters················································································································· 66
Displaying and maintaining SNMP ····························································································································· 67
SNMP configuration examples····································································································································· 67
SNMPv1/SNMPv2c configuration example ······································································································ 67
SNMPv3 configuration example·························································································································· 69
SNMP logging configuration example ··············································································································· 71
MIB style configuration ··············································································································································73
Overview········································································································································································· 73
Setting the MIB style······················································································································································· 73
Displaying and maintaining MIB style························································································································· 73
iii
RMON configuration·················································································································································74
RMON overview ···························································································································································· 74
Introduction ···························································································································································· 74
Working mechanism············································································································································· 74
RMON groups ······················································································································································· 74
Configuring the RMON statistics function ··················································································································· 76
Configuring the RMON Ethernet statistics function···························································································· 77
Configuring the RMON history statistics function ······························································································ 77
Configuring the RMON alarm function ······················································································································· 77
Configuration prerequisites ·································································································································· 77
Configuration procedure ······································································································································ 78
Displaying and maintaining RMON ···························································································································· 78
Ethernet statistics group configuration example·········································································································· 79
History group configuration example ·························································································································· 80
Alarm group configuration example···························································································································· 82
Port mirroring configuration ······································································································································84
Introduction to port mirroring········································································································································ 84
Terminologies of port mirroring ··························································································································· 84
Port mirroring classification and implementation······························································································· 85
Configuring local port mirroring ·································································································································· 87
Local port mirroring configuration task list ········································································································· 87
Creating a local mirroring group ························································································································ 88
Configuring source ports for the local mirroring group ···················································································· 88
Configuring source CPUs for the local mirroring group···················································································· 89
Configuring the monitor port for the local mirroring group·············································································· 89
Using the remote probe VLAN to enable local mirroring to support multiple monitor ports························· 90
Configuring Layer 2 remote port mirroring ················································································································· 91
Layer 2 remote port mirroring configuration task list ························································································ 91
Configuring a remote source group (on the source device) ············································································· 92
Configuring a remote destination group (on the destination device) ······························································ 95
Configuring Layer 3 remote port mirroring ················································································································· 97
Layer 3 remote port mirroring configuration task list ························································································ 97
Configuration prerequisites ·································································································································· 97
Configuring local mirroring groups····················································································································· 97
Configuring source ports for a local mirroring group ······················································································· 98
Configuring source CPUs for a local mirroring group ······················································································ 98
Configuring the monitor port for a local mirroring group················································································· 99
Displaying and maintaining port mirroring················································································································· 99
Port mirroring configuration examples·······················································································································100
Local port mirroring configuration example ·····································································································100
Local port mirroring with multiple monitor ports configuration example·······················································101
Layer 2 remote port mirroring configuration example ····················································································102
Layer 3 remote port mirroring configuration example ····················································································104
Traffic mirroring configuration ······························································································································· 107
Introduction to traffic mirroring···································································································································107
Traffic mirroring configuration task list ······················································································································107
Configuring traffic mirroring·······································································································································107
Configuring match criteria ·································································································································107
Configuring traffic mirroring of different types ································································································108
Configuring a QoS policy ··································································································································109
Applying a QoS policy·······································································································································109
Configuring remote traffic mirroring ·················································································································110
Displaying and maintaining traffic mirroring············································································································111
iv
Traffic mirroring configuration example ····················································································································111
Traffic mirroring configuration example ···········································································································111
NQA configuration················································································································································· 114
NQA overview ·····························································································································································114
NQA features ······················································································································································114
NQA concepts·····················································································································································116
NQA probe operation procedure ·····················································································································117
NQA configuration task list ········································································································································117
Configuring the NQA server ······································································································································118
Enabling the NQA client·············································································································································118
Creating an NQA test group······································································································································119
Configuring an NQA test group ································································································································119
Configuring ICMP echo tests······························································································································119
Configuring DHCP tests ······································································································································120
Configuring DNS tests ········································································································································121
Configuring FTP tests···········································································································································122
Configuring HTTP tests ········································································································································123
Configuring UDP jitter tests·································································································································124
Configuring SNMP tests ·····································································································································126
Configuring TCP tests··········································································································································126
Configuring UDP echo tests································································································································127
Configuring voice tests ·······································································································································128
Configuring DLSw tests ·······································································································································130
Configuring the collaboration function ······················································································································131
Configuring threshold monitoring·······························································································································131
Configuring the NQA statistics collection function···································································································133
Configuring the history records saving function ·······································································································133
Configuring optional parameters for an NQA test group·······················································································134
Configuring a schedule for an NQA test group·······································································································135
Displaying and maintaining NQA·····························································································································136
NQA configuration examples ····································································································································136
ICMP echo test configuration example ·············································································································136
DHCP Test configuration example·····················································································································138
DNS test configuration example························································································································139
FTP test configuration example ··························································································································141
HTTP test configuration example························································································································142
UDP jitter test configuration example ················································································································143
SNMP test configuration example ·····················································································································146
TCP test configuration example ·························································································································147
UDP echo test configuration example ···············································································································149
Voice test configuration example ······················································································································150
DLSw test configuration example·······················································································································153
NQA collaboration configuration example······································································································154
sFlow configuration················································································································································· 157
sFlow overview·····························································································································································157
Introduction to sFlow ···········································································································································157
sFlow operation ···················································································································································157
Configuring sFlow························································································································································158
Configuring the sFlow agent and sFlow collector····························································································158
Configuring flow sampling·································································································································158
Configuring counter sampling····························································································································159
Displaying and maintaining sFlow·····························································································································159
sFlow configuration example······································································································································159
v
Troubleshooting sFlow configuration ·························································································································161
IPC configuration····················································································································································· 162
IPC overview·································································································································································162
Node·····································································································································································162
Link········································································································································································162
Channel ································································································································································162
Packet sending modes ········································································································································163
Enabling IPC performance statistics ···························································································································163
Displaying and maintaining IPC·································································································································164
Cluster management configuration························································································································ 165
Cluster management overview ···································································································································165
Why cluster management···································································································································165
Roles in a cluster··················································································································································165
How a cluster works············································································································································166
Cluster management configuration task list···············································································································169
Configuring the management switch ·························································································································170
Enabling NDP globally and for specific ports··································································································170
Configuring NDP parameters ····························································································································171
Enabling NTDP globally and for specific ports································································································171
Configuring NTDP parameters···························································································································172
Manually collecting topology information ········································································································173
Enabling the cluster function ······························································································································173
Establishing a cluster···········································································································································173
Enabling management VLAN auto-negotiation································································································174
Configuring communication between the management switch and the member switches within a cluster
··············································································································································································175
Configuring cluster management protocol packets ·························································································175
Cluster member management ····························································································································176
Configuring the member switches ······························································································································177
Enabling NDP ······················································································································································177
Enabling NTDP ····················································································································································177
Manually collecting topology information ········································································································177
Enabling the cluster function ······························································································································177
Deleting a member switch from a cluster··········································································································177
Configuring access between the management switch and its member switches··················································177
Adding a candidate switch to a cluster·····················································································································178
Configuring advanced cluster management functions ·····························································································178
Configuring topology management ··················································································································178
Configuring interaction for a cluster··················································································································179
SNMP configuration synchronization function·································································································180
Configuring web user accounts in batches ······································································································181
Displaying and maintaining cluster management ····································································································182
Cluster management configuration example ············································································································182
Stack configuration ················································································································································· 186
Stack configuration overview······································································································································186
Introduction to stack ············································································································································186
Establishing a stack·············································································································································187
Stack configuration task list·········································································································································187
Configuring the master device of a stack··················································································································187
Configuring a private IP address pool for a stack···························································································187
Configuring stack ports·······································································································································188
Creating a stack ··················································································································································188
Configuring stack ports of a slave device ·················································································································188
vi
Logging in to the CLI of a slave from the master ······································································································189
Displaying and maintaining stack configuration ······································································································189
Stack configuration example ······································································································································189
CWMP configuration·············································································································································· 191
CWMP overview··························································································································································191
CWMP network framework································································································································191
Basic functions of CWMP ···········································································································································192
Automatic configuration file deployment ··········································································································192
CPE system file management ·····························································································································192
CPE status and performance monitoring···········································································································193
CWMP mechanism ······················································································································································193
Auto-connection between the ACS and a CPE ································································································193
Configuration parameter deployment ···············································································································194
RPC methods ························································································································································194
Active and standby ACS switchover ·················································································································195
CWMP configuration tasks ·········································································································································196
Configuring the DHCP server·····························································································································196
Configuring the DNS server·······························································································································197
Configuring the ACS server ·······························································································································197
Configuring CPEs ················································································································································197
Enabling CWMP ··························································································································································197
Configuring the ACS server ········································································································································198
Configuring the ACS URL ···································································································································198
Configuring the ACS username and password ·······························································································198
Configuring CPE attributes ··········································································································································199
Configuring the CPE username and password ································································································199
Configuring the CWMP connection interface ··································································································200
Sending Inform messages···································································································································200
Configuring the maximum number of attempts made to retry a connection·················································201
Configuring the close-wait timer of the CPE ·····································································································201
Displaying and maintaining CWMP··························································································································202
CWMP configuration example···································································································································202
Network requirements·········································································································································202
Configuration procedure ····································································································································203
Index ········································································································································································ 211
1
System maintenance and debugging
You can use the ping command and the tracert command to verify network connectivity, and use the
debug command to enable debugging and thus to diagnose system faults based on the debugging
information.
Ping
Introduction
The ping command allows you to verify whether a device with a specified address is reachable, and to
examine network connectivity.
The ping function is implemented through the Internet Control Message Protocol (ICMP):
1. The source device sends an ICMP echo request to the destination device.
2. The source device determines whether the destination is reachable based on whether it receives an
ICMP echo reply. If the destination is reachable, the source device determines the following:
{ The link quality, based on the numbers of ICMP echo requests sent and replies received.
{ The distance between the source and destination, based on the round trip time of ping packets.
Configuring ping
Follow the step below to configure the ping function:
To do… Use the command… Remarks
IPv4 network:
ping [ ip ] [ -a source-ip | -c count | -f | -h ttl |
-i interface-type interface-number | -m interval
| -n | -p pad | -q | -r | -s packet-size | -t
timeout | -tos tos | -v ] * host
Check whether a specified
address in an IP network is
reachable
IPv6 network:
ping ipv6 [ -a source-ipv6 | -c count | -m
interval | -s packet-size | -t timeout ] * host [ -i
interface-type interface-number ]
Required
Use one of the commands
Available in any view
NOTE:
When configuring the ping command for a low-speed network, H3C recommends that you set a
larger value for the timeout timer (indicated by the -t parameter in the command).
Ping configuration example
Network requirements
As shown in Figure 1, check whether Device A and Device C can reach each other. If they can reach each
other, obtain the detailed information about routes from Device A to Device C.
2
Figure 1 Network diagram
Configuration procedure
# Use the ping command to display whether Device A and Device C can reach each other.
<DeviceA> ping 1.1.2.2
PING 1.1.2.2: 56 data bytes, press CTRL_C to break
Reply from 1.1.2.2: bytes=56 Sequence=1 ttl=254 time=205 ms
Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms
Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms
Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms
Reply from 1.1.2.2: bytes=56 Sequence=5 ttl=254 time=1 ms
--- 1.1.2.2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 1/41/205 ms
# Get the detailed information about routes from Device A to Device C.
<DeviceA> ping -r 1.1.2.2
PING 1.1.2.2: 56 data bytes, press CTRL_C to break
Reply from 1.1.2.2: bytes=56 Sequence=1 ttl=254 time=53 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
3
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=5 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
--- 1.1.2.2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 1/11/53 ms
The principle of ping -r is as shown in Figure 1.
1. The source (Device A) sends an ICMP echo request with the RR option being empty to the
destination (Device C).
2. The intermediate device (Device B) adds the IP address (1.1.2.1) of its outbound interface to the RR
option of the ICMP echo request, and forwards the packet.
3. Upon receiving the request, the destination device copies the RR option in the request and adds the
IP address (1.1.2.2) of its outbound interface to the RR option. Then the destination device sends
an ICMP echo reply.
4. The intermediate device adds the IP address (1.1.1.2) of its outbound interface to the RR option in
the ICMP echo reply, and then forwards the reply.
5. Upon receiving the reply, the source device adds the IP address (1.1.1.1) of its inbound interface
to the RR option. Finally, you can get the detailed information of routes from Device A to Device C:
1.1.1.1 <-> {1.1.1.2; 1.1.2.1} <-> 1.1.2.2.
Tracert
Introduction
To check whether a network is available, you can use the tracert command to trace the Layer 3 device
involved in delivering an IP packet from source to destination. This is useful for identification of failed
nodes in the event of network failure.
4
Figure 2 Network diagram
The tracert function is implemented through ICMP, as shown in Figure 2:
1. The source (Device A) sends a packet with a TTL value of 1 to the destination (Device D). The UDP
port of the packet is a port number that will not be used by any application of the destination.
2. The first hop (Device B) (the Layer 3 device that first receives the packet) responds by sending a
TTL-expired ICMP error message to the source, with its IP address 1.1.1.2 encapsulated. In this
way, the source device receives the address (1.1.1.2) of the first Layer 3 device.
3. The source device sends a packet with a TTL value of 2 to the destination device.
4. The second hop (Device C) responds with a TTL-expired ICMP error message, which gives the
source device the address (1.1.2.2) of the second Layer 3 device.
5. The above process continues until the ultimate destination device is reached. No application of the
destination uses this UDP port. Therefore, the destination replies a port unreachable ICMP error
message with the destination IP address 1.1.3.2.
6. When the source device receives the port unreachable ICMP error message, it knows that the
packet has reached the destination, and that it has received the addresses of all the Layer 3
devices involved in delivering the packet to the destination device (1.1.1.2, 1.1.2.2, 1.1.3.2).
Configuring tracert
Configuration prerequisites
For an IPv4 network:
• Enable sending of ICMP timeout packets on the intermediate device (the device between the source
and destination devices). If the intermediate device is an H3C device, execute the ip ttl-expires
enable command on the device. For more information about this command, see Layer 3—IP
Services Command Reference.
• Enable sending of ICMP destination unreachable packets on the destination device. If the
destination device is an H3C device, execute the ip unreachables enable command. For more
information about this command, see Layer 3—IP Services Command Reference.
For an IPv6 network:
• Enable sending of ICMPv6 timeout packets on the intermediate device (the device between the
source and destination devices). If the intermediate device is an H3C device, execute the ipv6
hoplimit-expires enable command on the device. For more information about this command, see
Layer 3—IP Services Command Reference.
5
• Enable sending of ICMPv6 destination unreachable packets on the destination device. If the
destination device is an H3C device, execute the ipv6 unreachables enable command. For more
information about this command, see Layer 3—IP Services Command Reference.
Tracert configuration
Follow the step below to configure tracert:
To do… Use the command… Remarks
IPv4 network:
tracert [ -a source-ip | -f first-ttl | -m
max-ttl | -p port | -q packet-number
| -w timeout ] * host
Display the routes from source to
destination
IPv6 network:
tracert ipv6 [ -f first-ttl | -m max-ttl |
-p port | -q packet-number | -w
timeout ] * host
Required
Use one of the commands
Available in any view
System debugging
Introduction to system debugging
The device provides various debugging functions. For the majority of protocols and features supported,
the system provides debugging information to help users diagnose errors.
The following two switches control the display of debugging information:
• Protocol debugging switch: Controls protocol-specific debugging information.
• Screen output switch: Controls whether to display the debugging information on a certain screen.
Displaying debugging information
As shown in Figure 3, assume that the device can provide debugging for the three modules 1, 2, and 3.
The debugging information can be output on a terminal only when both the protocol debugging switch
and the screen output switch are turned on.
6
Figure 3 The relationship between the protocol and screen output switch
Configuring system debugging
Administrators usually use the debugging commands to diagnose network failure. However, output of the
debugging information may reduce system efficiency. Therefore, when debugging is completed, disable
the debugging function that was used, or use the undo debugging all command to disable all the
debugging functions.
Output of debugging information depends on the configurations of the information center and the
debugging commands of each protocol and functional module. Debugging information is commonly
output to a terminal (including console or VTY) for display. You can also output debugging information
to other destinations. For more information, see Network Management and Monitoring Command
Reference. By default, you can output debugging information to a terminal by following these steps:
To do… Use the command… Remarks
Enable the terminal
monitoring of system
information
terminal monitor
Optional
The terminal monitoring on the console is
enabled by default and the terminal
monitoring on the monitoring terminal is
disabled by default.
Available in user view
Enable the terminal display of
debugging information
terminal debugging
Required
Disabled by default
Available in user view
Enable debugging for a
specified module
debugging { all [ timeout time ] |
module-name [ option ] }
Required
Disabled by default
Available in user view
7
To do… Use the command… Remarks
Display the enabled
debugging functions
display debugging [ interface
interface-type interface-number ]
[ module-name ] [ | { begin |
exclude | include }
regular-expression ]
Optional
Available in any view
NOTE:
You must configure the debugging, terminal debugging and terminal monitor commands before
you can display the detailed debugging information on the terminal. For more information about
the terminal debugging and terminal monitor commands, see
Network Management and
Monitoring Command Reference
.
Ping and tracert configuration example
Network requirements
As shown in Figure 4, Device A failed to telnet Device C. Determine whether Device A and Device C can
reach each other. If they cannot reach each other, locate the failed nodes in the network.
Figure 4 Network diagram
Configuration procedure
# Use the ping command to display whether Device A and Device C can reach each other.
<DeviceA> ping 1.1.2.2
PING 1.1.2.2: 56 data bytes, press CTRL_C to break
Request time out
Request time out
Request time out
Request time out
Request time out
--- 1.1.2.2 ping statistics ---
5 packet(s) transmitted
0 packet(s) received
100.00% packet loss
# Device A and Device C cannot reach each other. Use the tracert command to determine failed nodes.
<DeviceA> system-view
[DeviceA] ip ttl-expires enable
[DeviceA] ip unreachables enable
[DeviceA] tracert 1.1.2.2
traceroute to 1.1.2.2(1.1.2.2) 30 hops max,40 bytes packet, press CTRL_C to bre
ak
1 1.1.1.2 14 ms 10 ms 20 ms
8
2 * * *
3 * * *
4 * * *
5
<DeviceA>
The output shows that Device A and Device C cannot reach other, Device A and Device B can reach each
other, and an error has occurred on the connection between Device B and Device C. In this case, use the
debugging ip icmp command to enable ICMP debugging on Device A and Device C to check whether
the devices send or receive the specified ICMP packets, or use the display ip routing-table command to
display whether Device A and Device C can reach each other.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224

H3C S3100V2-52TP Configuration manual

Category
Networking
Type
Configuration manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI