HPE Networking Comware 5960 Switch Series Network Configuration Guide

Category
Networking
Type
Configuration Guide
HPE Networking Comware 5960 Switch Series
Network Management and Monitoring
Configuration Guide
Software
version: Release 9126P01 and later
Document version: 6W100-20230428
© Copyright 2023 Hewlett Packard Enterprise Development LP
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard
Enterprise products and services are set forth in the express warranty statements accompanying such
products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett
Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or
copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s
standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise
website.
Acknowledgments
Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the
United States and other countries.
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java and Oracle are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
i
Contents
Using ping and tracert ···················································································· 1
Ping ···································································································································································· 1
About ping ·················································································································································· 1
Using a ping command to test network connectivity ·················································································· 1
Example: Using the ping utility ··················································································································· 2
Tracert ································································································································································ 2
About tracert ··············································································································································· 2
Prerequisites ·············································································································································· 3
Using a tracert command to identify failed or all nodes in a path ······························································· 4
Example: Using the tracert utility ················································································································ 4
Configuring system debugging ······································································ 6
About system debugging···································································································································· 6
Debugging a feature module ······························································································································ 6
Configuring NQA ··························································································· 8
About NQA ························································································································································· 8
NQA operating mechanism ························································································································ 8
Threshold monitoring ································································································································· 8
Restrictions and guidelines: NQA configuration ································································································· 9
NQA tasks at a glance ······································································································································· 9
Configuring the NQA server ····························································································································· 10
Restrictions and guidelines ······················································································································ 10
Enabling and configuring the NQA server ································································································ 10
Displaying the NQA server status ············································································································ 10
Enabling the NQA client ··································································································································· 10
Configuring NQA operations on the NQA client ······························································································· 11
NQA operations tasks at a glance············································································································ 11
Configuring the ICMP echo operation ······································································································ 11
Configuring the ICMP jitter operation ······································································································· 13
Configuring the DHCP operation·············································································································· 14
Configuring the FTP operation ················································································································· 14
Configuring the HTTP operation ·············································································································· 15
Configuring the UDP jitter operation ········································································································ 17
Configuring the SNMP operation ············································································································· 19
Configuring the TCP operation ················································································································· 19
Configuring the UDP echo operation ······································································································· 20
Configuring the UDP tracert operation ····································································································· 22
Configuring the voice operation ··············································································································· 23
Configuring the DLSw operation ·············································································································· 25
Configuring the path jitter operation ········································································································· 26
Configuring optional parameters for the NQA operation ·········································································· 27
Configuring threshold monitoring ············································································································· 28
Configuring the NQA statistics collection feature ····················································································· 30
Configuring the saving of NQA history records ························································································ 31
Scheduling the NQA operation on the NQA client ··················································································· 32
Configuring NQA templates on the NQA client ································································································ 32
Restrictions and guidelines ······················································································································ 32
NQA template tasks at a glance··············································································································· 32
Configuring the ARP template ·················································································································· 33
Configuring the ICMP template ················································································································ 33
Configuring the IMAP template ················································································································ 34
Configuring the POP3 template ··············································································································· 35
Configuring the SMTP template ··············································································································· 36
Configuring the TCP template ·················································································································· 37
Configuring the TCP half open template ·································································································· 39
Configuring the UDP template ················································································································· 40
ii
Configuring the tracert template ··············································································································· 42
Configuring the HTTP template ················································································································ 44
Configuring the FTP template ·················································································································· 46
Configuring the RADIUS authentication template ···················································································· 47
Configuring the RADIUS accounting template ························································································· 48
Configuring the RTSP template ··············································································································· 50
Configuring the SIP template ··················································································································· 51
Configuring the SNMP template ··············································································································· 52
Configuring the SNMP DCA template ······································································································ 52
Configuring the WAP template ················································································································· 54
Configuring optional parameters for the NQA template ··········································································· 55
Verifying and maintaining NQA ························································································································ 56
NQA configuration examples ··························································································································· 56
Example: Configuring the ICMP echo operation ······················································································ 56
Example: Configuring the ICMP jitter operation ······················································································· 58
Example: Configuring the DHCP operation ······························································································ 60
Example: Configuring the FTP operation ································································································· 62
Example: Configuring the HTTP operation ······························································································ 63
Example: Configuring the UDP jitter operation ························································································ 64
Example: Configuring the SNMP operation ····························································································· 67
Example: Configuring the TCP operation································································································· 68
Example: Configuring the UDP echo operation ······················································································· 69
Example: Configuring the UDP tracert operation ····················································································· 70
Example: Configuring the voice operation ······························································································· 72
Example: Configuring the DLSw operation ······························································································ 75
Example: Configuring the path jitter operation ························································································· 76
Example: Configuring the ARP template ·································································································· 77
Example: Configuring the ICMP template ································································································ 78
Example: Configuring the IMAP template ································································································ 79
Example: Configuring the POP3 template ······························································································· 80
Example: Configuring RTSP template ····································································································· 80
Example: Configuring SMTP template ····································································································· 81
Example: Configuring the TCP template ·································································································· 82
Example: Configuring the TCP half open template ·················································································· 83
Example: Configuring the UDP template ································································································· 83
Example: Configuring the HTTP template································································································ 84
Example: Configuring the FTP template ·································································································· 85
Example: Configuring the RADIUS authentication template ···································································· 85
Example: Configuring the RADIUS accounting template ········································································· 86
Example: Configuring the SNMP template ······························································································· 87
Example: Configuring the SIP template ··································································································· 88
Example: Configuring SNMP DCA template ···························································································· 88
Example: Configuring the WAP template ································································································· 89
Configuring NTP ·························································································· 91
About NTP························································································································································ 91
NTP application scenarios ······················································································································· 91
NTP working mechanism ························································································································· 91
NTP architecture ······································································································································ 92
NTP association modes ··························································································································· 93
NTP security ············································································································································· 94
NTP for MPLS L3VPN instances ············································································································· 95
Protocols and standards ·························································································································· 96
Restrictions and guidelines: NTP configuration ······························································································· 96
NTP tasks at a glance ······································································································································ 96
Enabling the NTP service································································································································· 97
Configuring NTP association mode·················································································································· 97
Configuring NTP in client/server mode ···································································································· 97
Configuring NTP in symmetric active/passive mode ················································································ 98
Configuring NTP in broadcast mode ········································································································ 98
Configuring NTP in multicast mode ·········································································································· 99
Configuring the local clock as the reference source ······················································································ 100
iii
Configuring access control rights ··················································································································· 100
Configuring NTP authentication ····················································································································· 101
Configuring NTP authentication in client/server mode ··········································································· 101
Configuring NTP authentication in symmetric active/passive mode ······················································ 103
Configuring NTP authentication in broadcast mode ··············································································· 104
Configuring NTP authentication in multicast mode ················································································ 106
Controlling NTP packet sending and receiving ······························································································ 107
Specifying the source interface for NTP messages ··············································································· 107
Disabling an interface from receiving NTP messages ··········································································· 108
Configuring the maximum number of dynamic associations ·································································· 108
Setting a DSCP value for NTP packets·································································································· 109
Specifying the NTP time-offset thresholds for log and trap outputs ······························································· 109
Verifying and maintaining NTP ······················································································································ 109
Verifying NTP service status ·················································································································· 109
Displaying session information about the NTP service ·········································································· 110
Displaying brief information about the NTP servers from the local device back to the primary NTP server
······························································································································································· 110
NTP configuration examples ·························································································································· 110
Example: Configuring NTP client/server association mode ··································································· 110
Example: Configuring IPv6 NTP client/server association mode ··························································· 111
Example: Configuring NTP symmetric active/passive association mode··············································· 113
Example: Configuring IPv6 NTP symmetric active/passive association mode ····································· 114
Example: Configuring NTP broadcast association mode ······································································· 115
Example: Configuring NTP multicast association mode ········································································ 117
Example: Configuring IPv6 NTP multicast association mode ································································ 120
Example: Configuring NTP client/server association mode with authentication ···································· 123
Example: Configuring NTP broadcast association mode with authentication ········································ 125
Example: Configuring MPLS L3VPN network time synchronization in client/server mode ···················· 128
Example: Configuring MPLS L3VPN network time synchronization in symmetric active/passive mode 129
Configuring SNTP ······················································································ 132
About SNTP ··················································································································································· 132
SNTP working mode ······························································································································ 132
Protocols and standards ························································································································ 132
Restrictions and guidelines: SNTP configuration ··························································································· 132
SNTP tasks at a glance·································································································································· 132
Enabling the SNTP service ···························································································································· 132
Specifying an NTP server for the device ········································································································ 133
Configuring SNTP authentication ··················································································································· 133
Specifying the SNTP time-offset thresholds for log and trap outputs····························································· 134
Verifying and maintaining SNTP ···················································································································· 134
SNTP configuration examples ······················································································································· 135
Example: Configuring SNTP ·················································································································· 135
Configuring SNMP ····················································································· 137
About SNMP ·················································································································································· 137
SNMP framework ··································································································································· 137
MIB and view-based MIB access control ······························································································· 137
SNMP operations ··································································································································· 138
Protocol versions ···································································································································· 138
Access control modes ···························································································································· 138
SNMP silence ········································································································································· 138
SNMP tasks at a glance ································································································································· 139
Enabling the SNMP agent ······························································································································ 139
Enabling SNMP versions ······························································································································· 139
Configuring SNMP common parameters ······································································································· 140
Restrictions and guidelines ···················································································································· 140
Procedure ··············································································································································· 140
Displaying SNMP common parameters ································································································· 141
Configuring an SNMPv1 or SNMPv2c community ························································································· 142
About configuring an SNMPv1 or SNMPv2c community ······································································· 142
Restrictions and guidelines for configuring an SNMPv1 or SNMPv2c community································· 142
iv
Configuring an SNMPv1/v2c community by a community name ··························································· 142
Configuring an SNMPv1/v2c community by creating an SNMPv1/v2c user ·········································· 142
Displaying information about SNMPv1 or SNMPv2c communities ························································ 143
Configuring an SNMPv3 group and user ······································································································· 143
Restrictions and guidelines for configuring an SNMPv3 group and user ··············································· 143
Configuring an SNMPv3 group and user ······························································································· 143
Displaying information about SNMP groups and users ··································································· 144
Configuring SNMP notifications ····················································································································· 144
About SNMP notifications ······················································································································ 144
Enabling SNMP notifications ·················································································································· 145
Configuring parameters for sending SNMP notifications ······································································· 145
Clearing all records from the SNMP trap buffer ····················································································· 147
Configuring SNMP logging ····························································································································· 147
Enabling VA interface query and configuration by using MIB objects ···························································· 148
Displaying SNMP statistics ···················································································································· 148
SNMP configuration examples ······················································································································· 148
Example: Configuring SNMPv1/SNMPv2c····························································································· 148
Example: Configuring SNMPv3·············································································································· 149
Configuring samplers ················································································· 152
About sampler ················································································································································ 152
Creating a sampler ········································································································································· 152
Verifying and maintaining a sampler ·············································································································· 152
Configuring port mirroring ·········································································· 153
About port mirroring ······································································································································· 153
Terminology ··········································································································································· 153
Port mirroring classification ···················································································································· 153
Local port mirroring (SPAN) ··················································································································· 154
Layer 3 remote port mirroring (ERSPAN) ······························································································ 154
Restrictions and guidelines: Port mirroring configuration ··············································································· 155
Configuring local port mirroring (SPAN) ········································································································· 155
Restrictions and guidelines for local port mirroring configuration ··························································· 155
Local port mirroring tasks at a glance ···································································································· 155
Creating a local mirroring group ············································································································· 155
Configuring mirroring sources ················································································································ 156
Configuring the monitor port ··················································································································· 156
Configuring local port mirroring group with multiple monitoring devices ························································ 157
Configuring Layer 3 remote port mirroring (ERSPAN in encapsulation parameter mode) ····························· 158
Restrictions and guidelines for Layer 3 remote port mirroring in ERSPAN mode configuration ············ 158
Layer 3 remote port mirroring tasks at a glance ····················································································· 158
Creating a local mirroring group on the source device··········································································· 158
Configuring mirroring sources ················································································································ 159
Configuring the monitor port ··················································································································· 159
Verifying and maintaining port mirroring ········································································································ 160
Port mirroring configuration examples ··········································································································· 160
Example: Configuring local port mirroring (SPAN in source port mode) ················································ 160
Example: Configuring Layer 3 remote port mirroring (ERSPAN in encapsulation parameter mode) ····· 161
Configuring flow mirroring ·········································································· 163
About flow mirroring ······································································································································· 163
Flow mirroring ERSPAN································································································································· 163
About flow mirroring ERSPAN ··············································································································· 163
Operating mechanism ···························································································································· 163
Restrictions and guidelines: Flow mirroring configuration ·············································································· 165
Flow mirroring tasks at a glance ···················································································································· 165
Configuring a traffic class ······························································································································· 166
Configuring a traffic behavior ························································································································· 166
Configuring a QoS policy ······························································································································· 167
Applying a QoS policy ···································································································································· 167
Applying a QoS policy to an interface ···································································································· 167
Applying a QoS policy to a VLAN ··········································································································· 168
v
Applying a QoS policy globally ··············································································································· 168
Applying a QoS policy to the control plane ···························································································· 168
Flow mirroring configuration examples ·········································································································· 169
Example: Configuring flow mirroring ······································································································ 169
Configuring sFlow ······················································································ 171
About sFlow ··················································································································································· 171
Protocols and standards ································································································································ 171
Restrictions and guidelines: sFlow configuration ··························································································· 171
Configuring basic sFlow information ·············································································································· 171
Configuring flow sampling ······························································································································ 172
Configuring counter sampling ························································································································ 173
Verifying and maintaining sFlow ···················································································································· 173
sFlow configuration examples ························································································································ 173
Example: Configuring sFlow ·················································································································· 173
Troubleshooting sFlow ··································································································································· 175
The remote sFlow collector cannot receive sFlow packets ···································································· 175
Document conventions and icons ······························································ 176
Conventions ··················································································································································· 176
Network topology icons ·································································································································· 177
Support and other resources ····································································· 178
Accessing Hewlett Packard Enterprise Support····························································································· 178
Accessing updates ········································································································································· 178
Websites ················································································································································ 179
Customer self repair ······························································································································· 179
Remote support ······································································································································ 179
Documentation feedback ······················································································································· 179
Index ·········································································································· 181
1
Using ping and tracert
Ping
About ping
Use the ping utility to determine if an address is reachable.
Ping sends ICMP echo requests (ECHO-REQUEST) to the destination device. Upon receiving the
requests, the destination device responds with ICMP echo replies (ECHO-REPLY) to the source
device. The source device outputs statistics about the ping operation, including the number of
packets sent, number of echo replies received, and the round-trip time. You can measure the
network performance by analyzing these statistics.
You can use the ping –r command to display the routers through which ICMP echo requests have
passed. The test procedure of ping –r is as shown in Figure 1:
1. The source device (Device A) sends an ICMP echo request to the destination device (Device C)
with the RR option empty.
2. The intermediate device (Device B) adds the IP address of its outbound interface (1.1.2.1) to
the RR option of the ICMP echo request, and forwards the packet.
3. Upon receiving the request, the destination device copies the RR option in the request and
adds the IP address of its outbound interface (1.1.2.2) to the RR option. Then the destination
device sends an ICMP echo reply.
4. The intermediate device adds the IP address of its outbound interface (1.1.1.2) to the RR option
in the ICMP echo reply, and then forwards the reply.
5. Upon receiving the reply, the source device adds the IP address of its inbound interface (1.1.1.1)
to the RR option. The detailed information of routes from Device A to Device C is formatted as:
1.1.1.1 <-> {1.1.1.2; 1.1.2.1} <-> 1.1.2.2.
Figure 1 Ping operation
Using a ping command to test network connectivity
Examine whether an IP address is reachable in any view:
IPv4 network:
ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i interface-type
interface-number | -m interval | -n | -p pad | -q | -r | -s packet-size | -t
timeout | -tos tos | -v | -vpn-instance vpn-instance-name ] * host
Device A Device B Device C
1.1.1.1/24
1.1.1.2/24
ECHO-REQUEST
(NULL) ECHO-REQUEST
1st=1.1.2.1
1.1.2.1/24
1.1.2.2/24
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
3rd1.1.1.2
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
3rd1.1.1.2
4th=1.1.1.1
2
IPv6 network:
ping ipv6 [ -a source-ipv6 | -c count | -i interface-type interface-number
| -m interval | -q | -s packet-size | -t timeout | -tc traffic-class | -v
| -vpn-instance vpn-instance-name ] * host
Increase the timeout time (indicated by the -t keyword) on a low-speed network.
Example: Using the ping utility
Network configuration
As shown in Figure 2, determine if Device A and Device C can reach each other.
Figure 2 Network diagram
Procedure
# Test the connectivity between Device A and Device C.
<DeviceA> ping 1.1.2.2
Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break
56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms
56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms
56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms
56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms
56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms
The output shows the following information:
Device A sends five ICMP packets to Device C and Device A receives five ICMP packets.
No ICMP packet is lost.
The route is reachable.
Tracert
About tracert
Tracert (also called Traceroute) enables retrieval of the IP addresses of Layer 3 devices in the path
to a destination. In the event of network failure, use tracert to test network connectivity and identify
failed nodes.
Device A Device B Device C
1.1.1.1/24 1.1.1.2/24 1.1.2.1/24 1.1.2.2/24
3
Figure 3 Tracert operation
Tracert uses received ICMP error messages to get the IP addresses of devices. Tracert works as
shown in Figure 3:
1. The source device sends a UDP packet with a TTL value of 1 to the destination device. The
destination UDP port is not used by any application on the destination device.
2. The first hop (Device B, the first Layer 3 device that receives the packet) responds by sending a
TTL-expired ICMP error message to the source, with its IP address (1.1.1.2) encapsulated. This
way, the source device can get the address of the first Layer 3 device (1.1.1.2).
3. The source device sends a packet with a TTL value of 2 to the destination device.
4. The second hop (Device C) responds with a TTL-expired ICMP error message, which gives the
source device the address of the second Layer 3 device (1.1.2.2).
5. This process continues until a packet sent by the source device reaches the ultimate
destination device. Because no application uses the destination port specified in the packet, the
destination device responds with a port-unreachable ICMP message to the source device, with
its IP address encapsulated. This way, the source device gets the IP address of the destination
device (1.1.3.2).
6. The source device determines that:
The packet has reached the destination device after receiving the port-unreachable ICMP
message.
The path to the destination device is 1.1.1.2 to 1.1.2.2 to 1.1.3.2.
Prerequisites
Before you use a tracert command, perform the tasks in this section.
IPv4:
Enable sending of ICMP timeout packets on the intermediate devices (devices between the
source and destination devices). If the intermediate devices are HPE devices, execute the ip
ttl-expires enable command on the devices.
Enable sending of ICMP destination unreachable packets on the destination device. If the
destination device is an HPE device, execute the ip unreachables enable command.
For more information about the ip ttl-expires enable and ip unreachables enable
commands, see IP performance optimization commands in Layer 3—IP Services Command
Reference.
IPv6:
Device A Device B Device D
Device C
1.1.1.1/24
1.1.1.2/24
Hop Limit=1
TTL exceeded
1.1.2.1/24 1.1.3.1/24
1.1.2.2/24 1.1.3.2/24
Hop Limit=2
TTL exceeded
UDP port unreachable
Hop Limit=n
4
Enable sending of ICMPv6 timeout packets on the intermediate devices (devices between the
source and destination devices). If the intermediate devices are HPE devices, execute the
ipv6 hoplimit-expires enable command on the devices.
Enable sending of ICMPv6 destination unreachable packets on the destination device. If the
destination device is an HPE device, execute the ipv6 unreachables enable command.
For more information about the ipv6 hoplimit-expires enable and ipv6 unreachables
enable commands, see IPv6 basics commands in Layer 3IP Services Command Reference.
Using a tracert command to identify failed or all nodes in a
path
Trace the route to an IP destination in any view:
IPv4 network:
tracert [ -a source-ip | -f first-ttl | -m max-ttl | -p port | -q
packet-number | -t tos | -vpn-instance vpn-instance-name [ -resolve-as
{ global | none | vpn } ] | -w timeout ] * host
IPv6 network:
tracert ipv6 [ -a source-ipv6 | -f first-hop | -i interface-type
interface-number | -m max-hops | -p port | -q packet-number | -t
traffic-class | -vpn-instance vpn-instance-name [ -resolve-as { global |
none | vpn } ] | -w timeout ] * host
Example: Using the tracert utility
Network configuration
As shown in Figure 4, Device A failed to Telnet to Device C.
Test the network connectivity between Device A and Device C. If they cannot reach each other,
locate the failed nodes in the network.
Figure 4 Network diagram
Procedure
1. Configure IP addresses for the devices as shown in Figure 4.
2. Configure a static route on Device A.
<DeviceA> system-view
[DeviceA] ip route-static 0.0.0.0 0.0.0.0 1.1.1.2
3. Test connectivity between Device A and Device C.
[DeviceA] ping 1.1.2.2
Ping 1.1.2.2(1.1.2.2): 56 -data bytes, press CTRL_C to break
Request time out
Request time out
Request time out
Request time out
Request time out
Device A Device B Device C
1.1.1.1/24 1.1.1.2/24 1.1.2.1/24 1.1.2.2/24
5
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted,0 packet(s) received,100.0% packet loss
The output shows that Device A and Device C cannot reach each other.
4. Identify failed nodes:
# Enable sending of ICMP timeout packets on Device B.
<DeviceB> system-view
[DeviceB] ip ttl-expires enable
# Enable sending of ICMP destination unreachable packets on Device C.
<DeviceC> system-view
[DeviceC] ip unreachables enable
# Identify failed nodes.
[DeviceA] tracert 1.1.2.2
traceroute to 1.1.2.2 (1.1.2.2) 30 hops at most,40 bytes each packet, press CTRL_C
to break
1 1.1.1.2 (1.1.1.2) 1 ms 2 ms 1 ms
2 * * *
3 * * *
4 * * *
5
[DeviceA]
The output shows that Device A can reach Device B but cannot reach Device C. An error has
occurred on the connection between Device B and Device C.
5. To identify the cause of the issue, execute the following commands on Device A and Device C:
Execute the debugging ip icmp command and verify that Device A and Device C can
send and receive the correct ICMP packets.
Execute the display ip routing-table command to verify that Device A and Device
C have a route to each other.
6
Configuring system debugging
About system debugging
The device supports debugging for the majority of protocols and features, and provides debugging
information to help users diagnose errors.
The following switches control the display of debugging information:
Module debugging switchControls whether to generate the module-specific debugging
information.
Screen output switchControls whether to display the debugging information on a certain
screen. Use terminal monitor and terminal logging level commands to turn on
the screen output switch. For more information about these two commands, see information
center commands in System Management Command Reference.
As shown in Figure 5, the device can provide debugging for the three modules 1, 2, and 3. The
debugging information can be output on a terminal only when both the module debugging switch and
the screen output switch are turned on.
Debugging information is typically displayed on a console. You can also send debugging information
to other destinations. For more information, see information center configuration in System
Management Configuration Guide.
Figure 5 Relationship between the module and screen output switch
Debugging a feature module
Restrictions and guidelines
CAUTION:
Output of excessive debugging messages increases the CPU usage and downgrades the system
performance.
To guarantee system performance, enable debugging only for modules that are in an
exceptional condition.
13
1 2 3
13
13
Debugging
information
Protocol
debugging
switch
Screen
output switch
Debugging
information
Protocol
debugging
switch
Screen
output switch
ON OFF ON
OFF
123
ON OFF ON
ON
7
When debugging is complete, use the undo debugging all command to disable all the
debugging functions.
Procedure
1. Enable debugging for a module.
debugging module-name [ option ]
By default, debugging is disabled for all modules.
This command is available in user view.
2. (Optional.) Display the enabled debugging features.
display debugging [ module-name ]
This command is available in any view.
8
Configuring NQA
About NQA
Network quality analyzer (NQA) allows you to measure network performance, verify the service
levels for IP services and applications, and troubleshoot network problems.
NQA operating mechanism
An NQA operation contains a set of parameters such as the operation type, destination IP address,
and port number to define how the operation is performed. Each NQA operation is identified by the
combination of the administrator name and the operation tag. You can configure the NQA client to
run the operations at scheduled time periods.
As shown in Figure 6, the NQA source device (NQA client) sends data to the NQA destination device
by simulating IP services and applications to measure network performance.
All types of NQA operations require the NQA client, but only the TCP and UDP echo operations
require the NQA server. The NQA operations for services that are already provided by the destination
device such as FTP do not need the NQA server. You can configure the NQA server to listen and
respond to specific IP addresses and ports to meet various test needs.
Figure 6 Network diagram
After starting an NQA operation, the NQA client periodically performs the operation at the interval
specified by using the frequency command.
You can set the number of probes the NQA client performs in an operation by using the probe
count command.
Threshold monitoring
Threshold monitoring enables the NQA client to take a predefined action when the NQA operation
performance metrics violate the specified thresholds.
Table 1 describes the relationships between performance metrics and NQA operation types.
Table 1 Performance metrics and NQA operation types
Performance metric
Probe duration ICMP echo, DHCP, FTP, HTTP, SNMP, TCP, UDP echo,
and DLSw
Number of probe failures ICMP echo, DHCP, FTP, HTTP, SNMP, TCP, UDP echo,
and DLSw
Round-trip time ICMP jitter, UDP jitter, and voice
Number of discarded packets ICMP jitter, UDP jitter, and voice
One-way jitter (source-to-destination or
destination-to-source) ICMP jitter, UDP jitter, and voice
IP network
NQA source device/
NQA client NQA destination device
9
Performance metric
One-way delay (source-to-destination or
destination-to-source) ICMP jitter, UDP jitter, and voice
Calculated Planning Impairment Factor (ICPIF)
(see "Configuring the voice operation") Voice
Mean Opinion Scores (MOS) (see "Configuring
the voice operation") Voice
Restrictions and guidelines: NQA configuration
To avoid probe failures, follow these restrictions and guidelines when configuring the listening ports
on the NQA client and NQA server:
Do not specify a well-known port.
Make sure the specified port number is not used by any services on the device.
To obtain the IPv4 addresses and the port numbers in use on this device, see the Local
Addr:port field in the output from the display tcp and display udp commands.
To obtain the IPv6 addresses and the port numbers in use on this device, see the
LAddr->port field in the output from the display ipv6 tcp and display ipv6 udp
commands.
The destination port configured for the operation (with the destination port command) on the
NQA client must be the same as the listening port configured on the server.
For latency operation results to be accurate, synchronize time between the source and the
destination with an accuracy higher than or equal to the operation result calculation accuracy.
NQA tasks at a glance
To configure NQA, perform the following tasks:
1. Configuring the NQA server
Perform this task on the destination device before you configure the UDP echo, UDP jitter, TCP,
and voice operations.
2. Enabling the NQA client
3. Configuring NQA operations or NQA templates
Choose the following tasks as needed:
Configuring NQA operations on the NQA client
Configuring NQA templates on the NQA client
After you configure an NQA operation, you can schedule the NQA client to run the NQA
operation.
An NQA template does not run immediately after it is configured. The template creates and run
the NQA operation only when it is required by the feature to which the template is applied.
10
Configuring the NQA server
Restrictions and guidelines
To perform UDP echo, UDP jitter, TCP, and voice operations, you must configure the NQA server on
the destination device.
The NQA server listens and responds to requests on the specified IP addresses and ports.
You can configure multiple TCP or UDP listening services on an NQA server, where each
corresponds to a specific IP address and port number.
The IP address, port number, and VPN instance for a listening service must be unique on the NQA
server and match the configuration on the NQA client.
To perform a UDP jitter operation in high performance mode to the NQA server, enable the high
performance mode when configuring the UDP listening service on the NQA server. In this mode, the
NQA server cannot process probe packets of the UDP jitter operation if the packet size exceeds 100
bytes and the operation might fail as a result.
Enabling and configuring the NQA server
1. Enter system view.
system-view
2. Enable the NQA server.
nqa server enable
By default, the NQA server is disabled.
3. Configure a TCP listening service.
nqa server tcp-connect { ipv4-address | ipv6 ipv6-address }
port-number [ vpn-instance vpn-instance-name ] [ tos tos ]
This task is required for only TCP and DLSw operations. For the DLSw operation, the port
number for the TCP listening service must be 2065.
4. Configure a UDP listening service.
nqa server udp-echo { ipv4-address | ipv6 ipv6-address } port-number
[ vpn-instance vpn-instance-name ] [ tos tos ]
This task is required for only UDP echo operations.
Displaying the NQA server status
To display the NQA server status, execute the following command in any view:
display nqa server
Enabling the NQA client
1. Enter system view.
system-view
2. Enable the NQA client.
nqa agent enable
By default, the NQA client is enabled.
The NQA client configuration takes effect after you enable the NQA client.
11
Configuring NQA operations on the NQA client
NQA operations tasks at a glance
To configure NQA operations, perform the following tasks:
1. Configuring an NQA operation
Choose one of the following tasks:
Configuring the ICMP echo operation
Configuring the ICMP jitter operation
Configuring the DHCP operation
Configuring the FTP operation
Configuring the HTTP operation
Configuring the UDP jitter operation
Configuring the SNMP operation
Configuring the TCP operation
Configuring the UDP echo operation
Configuring the UDP tracert operation
Configuring the voice operation
Configuring the DLSw operation
Configuring the path jitter operation
2. (Optional.) Configuring optional parameters for the NQA operation
3. (Optional.) Configuring threshold monitoring
4. (Optional.) Configuring the NQA statistics collection feature
5. (Optional.) Configuring the saving of NQA history records
6. Scheduling the NQA operation on the NQA client
Configuring the ICMP echo operation
About this task
The ICMP echo operation measures the reachability of a destination device. It has the same function
as the ping command, but provides more output information. In addition, if multiple paths exist
between the source and destination devices, you can specify the next hop for the ICMP echo
operation.
The ICMP echo operation sends an ICMP echo request to the destination device per probe.
Procedure
1. Enter system view.
system-view
2. Create an NQA operation and enter NQA operation view.
nqa entry admin-name operation-tag
3. Specify the ICMP echo type and enter its view.
type icmp-echo
4. Specify the destination address for ICMP echo requests.
IPv4:
destination ip ip-address
12
By default, no destination address is specified.
IPv6:
destination ipv6 ipv6-address
By default, no destination address is specified.
5. Specify the destination IP address for ICMP echo requests.
destination ip ip-address
By default, no destination IP address is specified.
6. Specify the source address for ICMP echo requests. Choose one option as needed:
Use the IP address of the specified interface as the source IP address.
source interface interface-type interface-number
By default, the source IP address of ICMP echo requests is the primary IP address of their
output interface.
The specified source interface must be up.
Specify the source IPv4 address.
source ip ip-address
By default, the source IPv4 address of ICMP echo requests is the primary IPv4 address of
their output interface.
The specified source IPv4 address must be the IPv4 address of a local interface, and the
interface must be up. Otherwise, no probe packets can be sent out.
Specify the source IPv6 address.
source ipv6 ipv6-address
By default, the source IPv6 address of ICMP echo requests is the primary IPv6 address of
their output interface.
The specified source IPv6 address must be the IPv6 address of a local interface, and the
interface must be up. Otherwise, no probe packets can be sent out.
7. Specify the output interface or the next hop IP address for ICMP echo requests. Choose one
option as needed:
Specify the output interface.
out interface interface-type interface-number
By default, the output interface is not specified. The NQA client determines the output
interface based on the routing table lookup.
Specify the next hop IPv4 address.
next-hop ip ip-address
By default, no next hop IPv4 address is specified.
Specify the next hop IPv6 address.
next-hop ipv6 ipv6-address
By default, no next hop IPv6 address is specified.
8. (Optional.) Set the payload size for each ICMP echo request.
data-size size
The default payload size is 100 bytes.
9. (Optional.) Specify the payload fill string for ICMP echo requests.
data-fill string
The default payload fill string is the hexadecimal string 00010203040506070809.
13
Configuring the ICMP jitter operation
About this task
The ICMP jitter operation measures unidirectional and bidirectional jitters. The operation result helps
you to determine whether the network can carry jitter-sensitive services such as real-time voice and
video services.
The ICMP jitter operation works as follows:
1. The NQA client sends ICMP packets to the destination device.
2. The destination device time stamps each packet it receives, and then sends the packet back to
the NQA client.
3. Upon receiving the responses, the NQA client calculates the jitter according to the timestamps.
The ICMP jitter operation sends a number of ICMP packets to the destination device per probe. The
number of packets to send is determined by using the probe packet-number command.
Restrictions and guidelines
The display nqa history command does not display the results or statistics of the ICMP jitter
operation. To view the results or statistics of the operation, use the display nqa result or
display nqa statistics command.
Before starting the operation, make sure the network devices are time synchronized by using NTP.
For more information about NTP, see "Configuring NTP."
Procedure
1. Enter system view.
system-view
2. Create an NQA operation and enter NQA operation view.
nqa entry admin-name operation-tag
3. Specify the ICMP jitter type and enter its view.
type icmp-jitter
4. Specify the destination IP address for ICMP packets.
destination ip ip-address
By default, no destination IP address is specified.
5. Set the number of ICMP packets sent per probe.
probe packet-number number
The default setting is 10.
6. Set the interval for sending ICMP packets.
probe packet-interval interval
The default setting is 20 milliseconds.
7. Specify how long the NQA client waits for a response from the server before it regards the
response times out.
probe packet-timeout timeout
The default setting is 3000 milliseconds.
8. Specify the source IP address for ICMP packets.
source ip ip-address
By default, the source IP address of ICMP packets is the primary IP address of their output
interface.
The source IP address must be the IP address of a local interface, and the interface must be up.
Otherwise, no ICMP packets can be sent out.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205

HPE Networking Comware 5960 Switch Series Network Configuration Guide

Category
Networking
Type
Configuration Guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI