Aruba JG619A Configuration Guide

Category
Software
Type
Configuration Guide
HPE FlexFabric 12900E Switch Series
Network Management and Monitoring
Configuration Guide
Software
version: Release 5210
Document version: 6W100-20230424
© Copyright 2023 Hewlett Packard Enterprise Development LP
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard
Enterprise products and services are set forth in the express warranty statements accompanying such
products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett
Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or
copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s
standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise
website.
Acknowledgments
Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the
United States and other countries.
Microsofand Windows® are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java and Oracle are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
i
Contents
Using ping and tracert ···················································································· 1
Ping ···································································································································································· 1
About ping ·················································································································································· 1
Using a ping command to test network connectivity ·················································································· 1
Example: Using the ping utility ··················································································································· 2
Tracert ································································································································································ 2
About tracert ··············································································································································· 2
Prerequisites ·············································································································································· 3
Using a tracert command to identify failed or all nodes in a path ······························································· 4
Example: Using the tracert utility ················································································································ 4
Configuring system debugging ······································································ 6
About system debugging···································································································································· 6
Debugging a feature module ······························································································································ 6
Configuring NQA ··························································································· 8
About NQA ························································································································································· 8
NQA operating mechanism ························································································································ 8
Collaboration with Track ····························································································································· 8
Threshold monitoring ································································································································· 9
Restrictions and guidelines: NQA configuration ································································································· 9
NQA tasks at a glance ······································································································································· 9
Configuring the NQA server ····························································································································· 10
Restrictions and guidelines ······················································································································ 10
Enabling and configuring the NQA server ································································································ 10
Displaying the NQA server status ············································································································ 10
Enabling the NQA client ··································································································································· 10
Configuring NQA operations on the NQA client ······························································································· 11
NQA operations tasks at a glance············································································································ 11
Configuring the ICMP echo operation ······································································································ 11
Configuring the ICMP jitter operation ······································································································· 13
Configuring the DHCP operation·············································································································· 14
Configuring the DNS operation ················································································································ 14
Configuring the FTP operation ················································································································· 15
Configuring the HTTP operation ·············································································································· 16
Configuring the SNMP operation ············································································································· 17
Configuring the TCP operation ················································································································· 18
Configuring the UDP echo operation ······································································································· 19
Configuring the DLSw operation ·············································································································· 20
Configuring optional parameters for the NQA operation ·········································································· 21
Configuring the collaboration feature ······································································································· 22
Configuring threshold monitoring ············································································································· 22
Configuring the NQA statistics collection feature ····················································································· 24
Configuring the saving of NQA history records ························································································ 24
Scheduling the NQA operation on the NQA client ··················································································· 25
Configuring NQA templates on the NQA client ································································································ 25
Restrictions and guidelines ······················································································································ 25
NQA template tasks at a glance··············································································································· 25
Configuring the ARP template ·················································································································· 26
Configuring the ICMP template ················································································································ 27
Configuring the IMAP template ················································································································ 28
Configuring the DNS template ················································································································· 29
Configuring the POP3 template ··············································································································· 31
Configuring the SMTP template ··············································································································· 32
Configuring the TCP template ·················································································································· 32
Configuring the TCP half open template ·································································································· 34
Configuring the UDP template ················································································································· 36
ii
Configuring the HTTP template ················································································································ 38
Configuring the HTTPS template ············································································································· 40
Configuring the FTP template ·················································································································· 43
Configuring the RADIUS authentication template ···················································································· 44
Configuring the RADIUS accounting template ························································································· 45
Configuring the RTSP template ··············································································································· 46
Configuring the SIP template ··················································································································· 47
Configuring the SNMP template ··············································································································· 48
Configuring the SNMP DCA template ······································································································ 49
Configuring the SSL template ·················································································································· 50
Configuring the WAP template ················································································································· 51
Configuring optional parameters for the NQA template ··········································································· 52
Verifying and maintaining NQA ························································································································ 53
NQA configuration examples ··························································································································· 54
Example: Configuring the ICMP echo operation ······················································································ 54
Example: Configuring the ICMP jitter operation ······················································································· 56
Example: Configuring the DHCP operation ······························································································ 58
Example: Configuring the DNS operation ································································································ 59
Example: Configuring the FTP operation ································································································· 60
Example: Configuring the HTTP operation ······························································································ 61
Example: Configuring the SNMP operation ····························································································· 63
Example: Configuring the TCP operation································································································· 64
Example: Configuring the UDP echo operation ······················································································· 65
Example: Configuring the DLSw operation ······························································································ 67
Example: Configuring NQA collaboration ································································································· 68
Example: Configuring the ARP template ·································································································· 70
Example: Configuring the ICMP template ································································································ 71
Example: Configuring the IMAP template ································································································ 72
Example: Configuring the DNS template ································································································· 73
Example: Configuring the POP3 template ······························································································· 73
Example: Configuring RTSP template ····································································································· 74
Example: Configuring SMTP template ····································································································· 75
Example: Configuring the TCP template ·································································································· 76
Example: Configuring the TCP half open template ·················································································· 76
Example: Configuring the UDP template ································································································· 77
Example: Configuring the HTTP template································································································ 78
Example: Configuring the HTTPS template ····························································································· 79
Example: Configuring the FTP template ·································································································· 79
Example: Configuring the RADIUS authentication template ···································································· 80
Example: Configuring the RADIUS accounting template ········································································· 81
Example: Configuring the SNMP template ······························································································· 82
Example: Configuring the SIP template ··································································································· 83
Example: Configuring SNMP DCA template ···························································································· 83
Example: Configuring the SSL template ·································································································· 84
Example: Configuring the WAP template ································································································· 85
Configuring TWAMP Light ··········································································· 87
About TWAMP Light········································································································································· 87
TWAMP Light architecture ······················································································································· 87
TWAMP Light operating mechanism ········································································································ 87
Threshold monitoring ······························································································································· 88
Protocols and standards ·························································································································· 88
Restrictions and guidelines: TWAMP Light configuration ················································································ 88
TWAMP Light tasks at a glance ······················································································································· 88
Configuring the TWAMP Light server··············································································································· 89
Configuring the TWAMP Light client ················································································································ 89
Configuring threshold monitoring ····················································································································· 91
Start the test on the TWAMP Light sender ······································································································ 92
Stop the test on the TWAMP Light sender ······································································································· 92
Display and maintenance commands for TWAMP Light ·················································································· 92
TWAMP Light configuration examples ············································································································· 93
Example: Configuring TWAMP Light test ································································································· 93
iii
Configuring NTP ·························································································· 95
About NTP························································································································································ 95
NTP application scenarios ······················································································································· 95
NTP working mechanism ························································································································· 95
NTP architecture ······································································································································ 96
NTP association modes ··························································································································· 97
NTP security ············································································································································· 98
NTP for MPLS L3VPN instances ············································································································· 99
Protocols and standards ························································································································ 100
Restrictions and guidelines: NTP configuration ····························································································· 100
NTP tasks at a glance ···································································································································· 100
Enabling the NTP service······························································································································· 101
Configuring NTP association mode················································································································ 101
Configuring NTP in client/server mode ·································································································· 101
Configuring NTP in symmetric active/passive mode ·············································································· 102
Configuring NTP in broadcast mode ······································································································ 103
Configuring NTP in multicast mode ········································································································ 104
Configuring the local clock as the reference source ······················································································ 105
Configuring access control rights ··················································································································· 106
Configuring NTP authentication ····················································································································· 107
Configuring NTP authentication in client/server mode ··········································································· 107
Configuring NTP authentication in symmetric active/passive mode ······················································ 108
Configuring NTP authentication in broadcast mode ··············································································· 110
Configuring NTP authentication in multicast mode ················································································ 111
Controlling NTP packet sending and receiving ······························································································ 113
Specifying the source address for NTP messages ················································································ 113
Disabling an interface from receiving NTP messages ··········································································· 114
Configuring the maximum number of dynamic associations ·································································· 114
Setting a DSCP value for NTP packets·································································································· 115
Specifying the NTP time-offset thresholds for log and trap outputs ······························································· 115
Verifying and maintaining NTP ······················································································································ 115
Verifying NTP service status ·················································································································· 115
Displaying session information about the NTP service ·········································································· 115
Displaying brief information about the NTP servers from the local device back to the primary NTP server
······························································································································································· 116
NTP configuration examples ·························································································································· 116
Example: Configuring NTP client/server association mode ··································································· 116
Example: Configuring IPv6 NTP client/server association mode ··························································· 117
Example: Configuring NTP symmetric active/passive association mode··············································· 119
Example: Configuring IPv6 NTP symmetric active/passive association mode ····································· 120
Example: Configuring NTP broadcast association mode ······································································· 121
Example: Configuring NTP multicast association mode ········································································ 123
Example: Configuring IPv6 NTP multicast association mode ································································ 126
Example: Configuring NTP client/server association mode with authentication ···································· 129
Example: Configuring NTP broadcast mode with authentication ··························································· 130
Configuring SNTP ······················································································ 134
About SNTP ··················································································································································· 134
SNTP working mode ······························································································································ 134
Protocols and standards ························································································································ 134
Restrictions and guidelines: SNTP configuration ··························································································· 134
SNTP tasks at a glance·································································································································· 134
Enabling the SNTP service ···························································································································· 134
Specifying an NTP server for the device ········································································································ 135
Configuring SNTP authentication ··················································································································· 135
Specifying the SNTP time-offset thresholds for log and trap outputs····························································· 136
Verifying and maintaining SNTP ···················································································································· 136
SNTP configuration examples ······················································································································· 137
Example: Configuring SNTP ·················································································································· 137
iv
Configuring PTP ························································································ 139
About PTP ······················································································································································ 139
Basic concepts ······································································································································· 139
Grandmaster clock selection and master-member/subordinate relationship establishment ·················· 142
Synchronization mechanism ·················································································································· 143
Protocols and standards ························································································································ 145
Restrictions and guidelines: PTP configuration······························································································ 145
PTP tasks at a glance ···································································································································· 146
Configuring PTP (IEEE 1588 version 2) Configuring PTP (ITU-T G.8275.1) ········································· 146
Configuring PTP (IEEE 802.1AS) Configuring PTP (ITU-T G.8275.1) ··················································· 148
Enabling the device to ignore the synchronizationUncertain flag··························································· 149
Enabling the device to ignore the synchronizationUncertain flag··························································· 151
Configuring PTP (SMPTE ST 2059-2) Configuring PTP (ITU-T G.8275.1) ··········································· 152
Enabling the device to ignore the synchronizationUncertain flag··························································· 153
Enabling the device to ignore the synchronizationUncertain flag··························································· 155
Configuring PTP (AES67-2015) Configuring PTP (ITU-T G.8275.1) ····················································· 156
Enabling the device to ignore the synchronizationUncertain flag··························································· 157
Enabling the device to ignore the synchronizationUncertain flag··························································· 159
Configuring PTP (ITU-T G.8275.1) Configuring PTP (ITU-T G.8275.1) ················································· 160
Enabling the device to ignore the synchronizationUncertain flag··························································· 161
Enabling the device to ignore the synchronizationUncertain flag··························································· 163
Configuring PTP (ITU-T G.8275.1) ········································································································ 163
Enabling the device to ignore the synchronizationUncertain flag··························································· 164
Specifying PTP for obtaining the time ············································································································ 165
Specifying a PTP profile ································································································································· 165
Configuring clock nodes ································································································································· 165
Specifying a clock node type ·················································································································· 165
Configuring an OC to operate only as a member clock ········································································· 166
Specifying a PTP domain ······························································································································· 166
Specifying a PTP technical standard ············································································································· 167
Enabling the PTP clock state feature ············································································································· 167
Enabling PTP on a port ·································································································································· 168
Configuring PTP ports ···································································································································· 168
Configuring the role of a PTP port ·········································································································· 168
Configuring the mode for carrying timestamps ······················································································ 169
Specifying a delay measurement mechanism for a BC or an OC ·························································· 169
Configuring one of the ports on a TC+OC clock as an OC-type port ····················································· 170
Enabling NotSlave on a PTP port ·········································································································· 170
Enabling unicast negotiation on PTP ports ···························································································· 171
Configuring PTP message transmission and receipt ····················································································· 171
Setting the interval for sending announce messages and the timeout multiplier for receiving announce
messages ··············································································································································· 171
Setting the interval for sending Pdelay_Req messages ········································································· 172
Setting the interval for sending Sync messages ···················································································· 173
Setting the minimum interval for sending Delay_Req messages ··························································· 173
Setting the interval for sending Delay-Resp messages ········································································· 174
Configuring parameters for PTP messages ··································································································· 174
Specifying the IPv4 UDP transport protocol for PTP messages ···························································· 174
Configuring a source IP address for multicast PTP messages transmitted over IPv4 UDP ·················· 175
Configuring a destination IP address for unicast PTP messages transmitted over IPv4 UDP ··············· 175
Configuring the MAC address for non-Pdelay messages ······································································ 176
Setting a DSCP value for PTP messages transmitted over UDP ·························································· 176
Specifying a VLAN tag for PTP messages ····························································································· 177
Disabling PTP path tracing ····················································································································· 177
Specifying the maximum number of removed steps (clock nodes) from the GM to the device ····················· 177
Enabling the device to notify the downstream nodes of its time synchronization state·································· 178
Adjusting and correcting clock synchronization ····························································································· 178
Setting the delay correction value ·········································································································· 178
Calculating the TAI based on the UTC time ··························································································· 179
Configuring ToD input or output ············································································································· 179
Configuring the PTP offset threshold and PTP synchronization suppressions ······································ 180
v
Enabling the device to ignore the synchronizationUncertain flag··························································· 180
Setting clock source parameters ···················································································································· 181
Configuring a priority for a clock····················································································································· 182
Configuring a priority for a clock (IEEE 1588 version 2, SMPTE ST 2059-2, AES67-2015, and IEEE
802.1AS) ················································································································································ 182
Configuring a priority for a clock (ITU-T G.8275.1 and ITU-T G.8275.2) ··············································· 183
Configuring PTP logging ································································································································ 183
Display and maintenance commands for PTP ······························································································· 184
PTP configuration examples ·························································································································· 185
Example: Configuring PTP (IEEE 1588 version 2, IEEE 802.3/Ethernet transport, multicast transmission)
······························································································································································· 185
Example: Configuring PTP (IEEE 1588 version 2, IPv4 UDP transport, multicast transmission) ·········· 188
Example: Configuring PTP (IEEE 1588 version 2, IPv4 UDP transport, unicast transmission) ············· 191
Example: Configuring PTP (IEEE 802.1AS, IEEE 802.3/Ethernet transport, multicast transmission) ··· 195
Example: Configuring PTP (SMPTE ST 2059-2, IPv4 UDP transport, multicast transmission) ············· 198
Example: Configuring PTP (SMPTE ST 2059-2, IPv4 UDP transport, unicast transmission) ················ 201
Example: Configuring PTP (ITU-T G.8275.1, IEEE 802.3/Ethernet encapsulation, multicast transmission)
······························································································································································· 205
Example: Configuring PTP (ITU-T G.8275.2, IPv4 UDP encapsulation, unicast transmission) ············· 208
Configuring SNMP ····················································································· 212
About SNMP ·················································································································································· 212
SNMP framework ··································································································································· 212
MIB and view-based MIB access control ······························································································· 212
SNMP operations ··································································································································· 213
Protocol versions ···································································································································· 213
Access control modes ···························································································································· 213
SNMP silence ········································································································································· 213
SNMP one-click diagnosis ····················································································································· 214
SNMP tasks at a glance ································································································································· 214
Enabling the SNMP agent ······························································································································ 214
Enabling SNMP versions ······························································································································· 215
Configuring SNMP common parameters ······································································································· 215
Restrictions and guidelines ···················································································································· 215
Procedure ··············································································································································· 215
Displaying SNMP common parameters ································································································· 216
Configuring an SNMPv1 or SNMPv2c community ························································································· 217
About configuring an SNMPv1 or SNMPv2c community ······································································· 217
Restrictions and guidelines for configuring an SNMPv1 or SNMPv2c community································· 217
Configuring an SNMPv1/v2c community by a community name ··························································· 217
Configuring an SNMPv1/v2c community by creating an SNMPv1/v2c user ·········································· 217
Displaying information about SNMPv1 or SNMPv2c communities ························································ 218
Configuring an SNMPv3 group and user ······································································································· 218
Restrictions and guidelines for configuring an SNMPv3 group and user ··············································· 218
Configuring an SNMPv3 group and user ······························································································· 219
Displaying information about SNMP groups and users ··································································· 219
Configuring SNMP notifications ····················································································································· 219
About SNMP notifications ······················································································································ 219
Enabling SNMP notifications ·················································································································· 220
Configuring parameters for sending SNMP notifications ······································································· 220
Clearing all records from the SNMP trap buffer ····················································································· 222
Configuring SNMP logging ····························································································································· 222
Enabling VA interface query and configuration by using MIB objects ···························································· 223
Displaying SNMP statistics ···················································································································· 223
SNMP configuration examples ······················································································································· 223
Example: Configuring SNMPv1/SNMPv2c····························································································· 223
Example: Configuring SNMPv3·············································································································· 224
Configuring RMON ···················································································· 228
About RMON ·················································································································································· 228
RMON working mechanism ··················································································································· 228
RMON groups ········································································································································ 228
vi
Sample types for the alarm group and the private alarm group ····························································· 230
Protocols and standards ························································································································ 230
Configuring the RMON statistics function ······································································································ 230
About the RMON statistics function ······································································································· 230
Creating an RMON Ethernet statistics entry ·························································································· 230
Creating an RMON history control entry ································································································ 231
Configuring the RMON alarm function ··········································································································· 231
RMON configuration examples ······················································································································ 233
Example: Configuring the Ethernet statistics function ············································································ 233
Example: Configuring the history statistics function ··············································································· 234
Example: Configuring the alarm function ······························································································· 235
Configuring the Event MIB ········································································· 237
About the Event MIB ······································································································································ 237
Trigger ···················································································································································· 237
Monitored objects ··································································································································· 237
Trigger test ············································································································································· 237
Event actions ·········································································································································· 238
Object list ··············································································································································· 238
Object owner ·········································································································································· 239
Restrictions and guidelines: Event MIB configuration ···················································································· 239
Event MIB tasks at a glance··························································································································· 239
Prerequisites for configuring the Event MIB ··································································································· 239
Configuring the Event MIB global sampling parameters ················································································ 240
Configuring Event MIB object lists ················································································································· 240
Configuring an event ······································································································································ 240
Creating an event ··································································································································· 240
Configuring a set action for an event ····································································································· 241
Configuring a notification action for an event ························································································· 241
Enabling the event ································································································································· 242
Displaying event information ·················································································································· 242
Configuring a trigger······································································································································· 242
Creating a trigger and configuring its basic parameters ········································································· 242
Configuring a Boolean trigger test·········································································································· 243
Configuring an existence trigger test ······································································································ 244
Configuring a threshold trigger test ········································································································ 244
Enabling trigger sampling ······················································································································· 245
Displaying trigger information ················································································································· 245
Enabling SNMP notifications for the Event MIB module ················································································ 246
Verifying and maintaining Event MIB ············································································································· 246
Event MIB configuration examples················································································································· 246
Example: Configuring an existence trigger test ······················································································ 246
Example: Configuring a Boolean trigger test ·························································································· 248
Example: Configuring a threshold trigger test ························································································ 251
Configuring samplers ················································································· 255
About sampler ················································································································································ 255
Creating a sampler ········································································································································· 255
Verifying and maintaining a sampler ·············································································································· 255
Samplers and IPv4 NetStream configuration examples················································································· 255
Example: Configuring samplers and IPv4 NetStream ············································································ 255
Configuring port mirroring ·········································································· 257
About port mirroring ······································································································································· 257
Terminology ··········································································································································· 257
Port mirroring classification ···················································································································· 258
Local port mirroring (SPAN) ··················································································································· 258
Layer 2 remote port mirroring (RSPAN) ································································································· 258
Layer 3 remote port mirroring (ERSPAN) ······························································································ 260
Restrictions and guidelines: Port mirroring configuration ··············································································· 261
Configuring local port mirroring (SPAN) ········································································································· 261
Restrictions and guidelines for local port mirroring configuration ··························································· 261
vii
Local port mirroring tasks at a glance ···································································································· 261
Creating a local mirroring group ············································································································· 262
Configuring mirroring sources ················································································································ 262
Configuring the monitor port ··················································································································· 262
Configuring local port mirroring group with multiple monitoring devices ························································ 263
Configuring local port mirroring group with multiple monitoring devices ························································ 264
Configuring Layer 2 remote port mirroring (RSPAN) ····················································································· 266
Restrictions and guidelines for Layer 2 remote port mirroring configuration ·········································· 266
Layer 2 remote port mirroring with configurable reflector port configuration task list ····························· 266
Layer 2 remote port mirroring with egress port configuration task list ···················································· 266
Creating a remote destination group ······································································································ 267
Configuring the monitor port ··················································································································· 267
Configuring the remote probe VLAN ······································································································ 268
Assigning the monitor port to the remote probe VLAN··········································································· 268
Creating a remote source group ············································································································ 268
Configuring mirroring sources ················································································································ 269
Configuring the reflector port ·················································································································· 269
Configuring the egress port ···················································································································· 270
Configuring Layer 3 remote port mirroring (ERSPAN in tunnel mode) ·························································· 271
Restrictions and guidelines for Layer 3 remote port mirroring configuration ·········································· 271
Layer 3 remote port mirroring tasks at a glance ····················································································· 271
Prerequisites for Layer 3 remote port mirroring ····················································································· 272
Configuring local mirroring groups ········································································································· 272
Configuring mirroring sources ················································································································ 272
Configuring the monitor port ··················································································································· 273
Verifying and maintaining port mirroring ········································································································ 273
Port mirroring configuration examples ··········································································································· 274
Example: Configuring local port mirroring (SPAN in source port mode) ················································ 274
Example: Configuring local port mirroring (SPAN in source CPU mode)··············································· 275
Example: Configuring local port mirroring with multiple monitoring devices ·········································· 276
Example: Configuring Layer 2 remote port mirroring (RSPAN with reflector port) ································· 277
Example: Configuring Layer 2 remote port mirroring (RSPAN with egress port) ··································· 279
Example: Configuring Layer 3 remote port mirroring (ERSPAN in tunnel mode) ·································· 281
Configuring flow mirroring ·········································································· 284
About flow mirroring ······································································································································· 284
Flow-mirroring ERSPAN ································································································································ 284
About flow-mirroring ERSPAN ··············································································································· 284
Restrictions and guidelines: Flow mirroring configuration ·············································································· 284
Flow mirroring tasks at a glance ···················································································································· 284
Configuring a traffic class ······························································································································· 285
Configuring a traffic behavior ························································································································· 285
Configuring a QoS policy ······························································································································· 286
Applying a QoS policy ···································································································································· 287
Applying a QoS policy to an interface ···································································································· 287
Applying a QoS policy to a VLAN ··········································································································· 287
Applying a QoS policy globally ··············································································································· 287
Applying a QoS policy to the control plane ···························································································· 288
Verifying and maintaining flow mirroring ········································································································ 288
Flow mirroring configuration examples ·········································································································· 288
Example: Configuring flow mirroring ······································································································ 288
Configuring NetStream ·············································································· 291
About NetStream············································································································································ 291
NetStream architecture ·························································································································· 291
NetStream flow aging ····························································································································· 292
NetStream data export ··························································································································· 293
NetStream filtering ································································································································· 295
NetStream sampling ······························································································································· 295
Protocols and standards ························································································································ 295
Restrictions: Hardware compatibility with NetStream ···················································································· 295
NetStream tasks at a glance ·························································································································· 295
viii
Enabling NetStream on an interface ·············································································································· 296
Setting the NetStream flow classification key fields ······················································································· 296
Configuring NetStream filtering ······················································································································ 297
Configuring NetStream sampling on an interface ·························································································· 298
Specifying the RFC 7011-compliant template format····················································································· 298
Configuring the NetStream data export format ······························································································ 299
Configuring the refresh rate for NetStream version 9 or version 10 template ················································ 300
Configuring MPLS-aware NetStream ············································································································· 300
Configuring VXLAN-aware NetStream ··········································································································· 301
Enabling NetStream statistics collection for the payload packets in GRE-tunneled packets ························· 301
Configuring NetStream flow aging ················································································································· 301
Configuring periodical flow aging ··········································································································· 301
Configuring forced flow aging ················································································································· 302
Configuring the NetStream data export·········································································································· 302
Configuring the NetStream traditional data export ················································································· 302
Configuring the NetStream aggregation data export ·············································································· 303
Verifying and maintaining NetStream············································································································· 303
Verifying NetStream configuration and status information ····································································· 303
Displaying NetStream data export information······················································································· 304
Clearing NetStream statistics ················································································································· 304
NetStream configuration examples ················································································································ 304
Example: Configuring NetStream traditional data export ······································································· 304
Example: Configuring NetStream aggregation data export ···································································· 306
Configuring IPv6 NetStream ······································································ 310
About IPv6 NetStream ··································································································································· 310
IPv6 NetStream architecture ·················································································································· 310
IPv6 NetStream flow aging ····················································································································· 311
IPv6 NetStream data export ··················································································································· 312
IPv6 NetStream filtering ························································································································· 313
IPv6 NetStream sampling ······················································································································ 313
Protocols and standards ························································································································ 313
Restrictions: Hardware compatibility with IPv6 NetStream ············································································ 313
IPv6 NetStream tasks at a glance ·················································································································· 314
Enabling IPv6 NetStream ······························································································································· 314
Configuring IPv6 NetStream filtering ·············································································································· 314
Configuring IPv6 NetStream sampling on an interface ·················································································· 315
Configuring the IPv6 NetStream data export format ······················································································ 315
Configuring the refresh rate for IPv6 NetStream version 9 or version 10 template········································ 317
Configuring MPLS-aware IPv6 NetStream····································································································· 317
Enabling IPv6 NetStream statistics collection for the payload packets in GRE-tunneled packets ················· 318
Configuring IPv6 NetStream flow aging ········································································································· 318
Configuring periodical flow aging ··········································································································· 318
Configuring forced flow aging ················································································································· 318
Configuring the IPv6 NetStream data export ································································································· 319
Configuring the IPv6 NetStream traditional data export ········································································· 319
Configuring the IPv6 NetStream aggregation data export ····································································· 319
Verifying and maintaining IPv6 NetStream ···································································································· 320
Verifying IPv6 NetStream configuration and status information ····························································· 320
Displaying IPv6 NetStream data export statistics ·················································································· 320
Clearing IPv6 NetStream statistics ········································································································· 320
IPv6 NetStream configuration examples ········································································································ 321
Example: Configuring IPv6 NetStream traditional data export ······························································· 321
Example: Configuring IPv6 NetStream aggregation data export ··························································· 322
Configuring NetAnalysis ············································································ 326
About NetAnalysis ·········································································································································· 326
NetAnalysis architecture ························································································································ 326
NetAnalysis workflow ····························································································································· 326
Configuring NetAnalysis for RoCEv2 traffic ················································ 328
About NetAnalysis for RoCEv2 traffic ············································································································ 328
ix
RoCEv2 packet format ··························································································································· 328
CM connection setup ····························································································································· 329
RoCEv2 flow analysis ···························································································································· 330
RoCEv2 flow aging ································································································································· 330
RoCEv2 flow filtering ······························································································································ 330
NetAnalysis for RoCEv2 traffic tasks at a glance ··························································································· 330
Setting the mode of RoCEv2 traffic analysis ·································································································· 330
Enabling RoCEv2 traffic statistics collection ·································································································· 331
Enabling RoCEv2 packet loss analysis globally····························································································· 332
Setting the interval for reporting RoCEv2 traffic statistics to the NDA ··························································· 332
Setting the aging timer for inactive RoCEv2 flows ························································································· 332
Display and maintenance commands for NetAnalysis for RoCEv2 traffic······················································ 333
NetAnalysis for RoCEv2 traffic configuration examples ················································································· 333
Example: Configuring NetAnalysis to analyze RoCEv2 traffic ······························································· 333
Configuring sFlow ······················································································ 335
About sFlow ··················································································································································· 335
Protocols and standards ································································································································ 335
Restrictions and guidelines: sFlow configuration ··························································································· 335
Configuring basic sFlow information ·············································································································· 336
Configuring flow sampling ······························································································································ 336
Configuring counter sampling ························································································································ 337
Verifying and maintaining sFlow ···················································································································· 337
sFlow configuration examples ························································································································ 338
Example: Configuring sFlow ·················································································································· 338
Troubleshooting sFlow ··································································································································· 339
The remote sFlow collector cannot receive sFlow packets ···································································· 339
Configuring the packet capture ·································································· 341
About packet capture ····································································································································· 341
Packet capture modes ··························································································································· 341
Filter rule elements ································································································································· 341
Building a capture filter rule···························································································································· 342
Capture filter rule keywords ··················································································································· 342
Capture filter rule operators ··················································································································· 343
Capture filter rule expressions ··············································································································· 344
Building a display filter rule ···························································································································· 345
Display filter rule keywords ···················································································································· 345
Display filter rule operators ···················································································································· 347
Display filter rule expressions ················································································································ 348
Restrictions and guidelines ···························································································································· 348
Configuring local packet capture ···················································································································· 348
Configuring remote packet capture ················································································································ 349
Configuring feature image-based packet capture ·························································································· 349
Restrictions and guidelines ···················································································································· 349
Prerequisites ·········································································································································· 349
Saving captured packets to a file ··········································································································· 349
Displaying specific captured packets ····································································································· 350
Stopping packet capture ································································································································ 350
Displaying the content of a packet file············································································································ 350
Displaying the status of the packet capture ··································································································· 351
Packet capture configuration examples ········································································································· 351
Example: Configuring remote packet capture ························································································ 351
Example: Configuring feature image-based packet capture ·································································· 352
Document conventions and icons ······························································ 354
Conventions ··················································································································································· 354
Network topology icons ·································································································································· 355
Support and other resources ····································································· 356
Accessing Hewlett Packard Enterprise Support····························································································· 356
Accessing updates ········································································································································· 356
x
Websites ················································································································································ 357
Customer self repair ······························································································································· 357
Remote support ······································································································································ 357
Documentation feedback ······················································································································· 357
Index ·········································································································· 359
1
Using ping and tracert
Ping
About ping
Use the ping utility to determine if an address is reachable.
Ping sends ICMP echo requests (ECHO-REQUEST) to the destination device. Upon receiving the
requests, the destination device responds with ICMP echo replies (ECHO-REPLY) to the source
device. The source device outputs statistics about the ping operation, including the number of
packets sent, number of echo replies received, and the round-trip time. You can measure the
network performance by analyzing these statistics.
You can use the ping –r command to display the routers through which ICMP echo requests have
passed. The test procedure of ping –r is as shown in Figure 1:
1. The source device (Device A) sends an ICMP echo request to the destination device (Device C)
with the RR option empty.
2. The intermediate device (Device B) adds the IP address of its outbound interface (1.1.2.1) to
the RR option of the ICMP echo request, and forwards the packet.
3. Upon receiving the request, the destination device copies the RR option in the request and
adds the IP address of its outbound interface (1.1.2.2) to the RR option. Then the destination
device sends an ICMP echo reply.
4. The intermediate device adds the IP address of its outbound interface (1.1.1.2) to the RR option
in the ICMP echo reply, and then forwards the reply.
5. Upon receiving the reply, the source device adds the IP address of its inbound interface (1.1.1.1)
to the RR option. The detailed information of routes from Device A to Device C is formatted as:
1.1.1.1 <-> {1.1.1.2; 1.1.2.1} <-> 1.1.2.2.
Figure 1 Ping operation
Using a ping command to test network connectivity
Examine whether an IP address is reachable in any view:
IPv4 network:
ping [ ip ] [ -a source-ip | -c count | -f | -h ttl | -i interface-type
interface-number | -m interval | -n | -p pad | -q | -r | -s packet-size | -t
timeout | -tos tos | -v | -vpn-instance vpn-instance-name ] * host
Device A Device B Device C
1.1.1.1/24
1.1.1.2/24
ECHO-REQUEST
(NULL) ECHO-REQUEST
1st=1.1.2.1
1.1.2.1/24
1.1.2.2/24
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
3rd1.1.1.2
ECHO-REPLY
1st=1.1.2.1
2nd=1.1.2.2
3rd1.1.1.2
4th=1.1.1.1
2
IPv6 network:
ping ipv6 [ -a source-ipv6 | -c count | -i interface-type interface-number
| -m interval | -q | -s packet-size | -t timeout | -tc traffic-class | -v
| -vpn-instance vpn-instance-name ] * host
Increase the timeout time (indicated by the -t keyword) on a low-speed network.
Example: Using the ping utility
Network configuration
As shown in Figure 2, determine if Device A and Device C can reach each other.
Figure 2 Network diagram
Procedure
# Test the connectivity between Device A and Device C.
<DeviceA> ping 1.1.2.2
Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break
56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms
56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms
56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms
56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms
56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms
The output shows the following information:
Device A sends five ICMP packets to Device C and Device A receives five ICMP packets.
No ICMP packet is lost.
The route is reachable.
Tracert
About tracert
Tracert (also called Traceroute) enables retrieval of the IP addresses of Layer 3 devices in the path
to a destination. In the event of network failure, use tracert to test network connectivity and identify
failed nodes.
Device A Device B Device C
1.1.1.1/24 1.1.1.2/24 1.1.2.1/24 1.1.2.2/24
3
Figure 3 Tracert operation
Tracert uses received ICMP error messages to get the IP addresses of devices. Tracert works as
shown in Figure 3:
1. The source device sends a UDP packet with a TTL value of 1 to the destination device. The
destination UDP port is not used by any application on the destination device.
2. The first hop (Device B, the first Layer 3 device that receives the packet) responds by sending a
TTL-expired ICMP error message to the source, with its IP address (1.1.1.2) encapsulated. This
way, the source device can get the address of the first Layer 3 device (1.1.1.2).
3. The source device sends a packet with a TTL value of 2 to the destination device.
4. The second hop (Device C) responds with a TTL-expired ICMP error message, which gives the
source device the address of the second Layer 3 device (1.1.2.2).
5. This process continues until a packet sent by the source device reaches the ultimate
destination device. Because no application uses the destination port specified in the packet, the
destination device responds with a port-unreachable ICMP message to the source device, with
its IP address encapsulated. This way, the source device gets the IP address of the destination
device (1.1.3.2).
6. The source device determines that:
The packet has reached the destination device after receiving the port-unreachable ICMP
message.
The path to the destination device is 1.1.1.2 to 1.1.2.2 to 1.1.3.2.
Prerequisites
Before you use a tracert command, perform the tasks in this section.
IPv4:
Enable sending of ICMP timeout packets on the intermediate devices (devices between the
source and destination devices). If the intermediate devices are HPE devices, execute the ip
ttl-expires enable command on the devices.
Enable sending of ICMP destination unreachable packets on the destination device. If the
destination device is an HPE device, execute the ip unreachables enable command.
For more information about the ip ttl-expires enable and ip unreachables enable
commands, see IP performance optimization commands in Layer 3IP Services Command
Reference.
IPv6:
Device A Device B Device D
Device C
1.1.1.1/24
1.1.1.2/24
Hop Limit=1
TTL exceeded
1.1.2.1/24 1.1.3.1/24
1.1.2.2/24 1.1.3.2/24
Hop Limit=2
TTL exceeded
UDP port unreachable
Hop Limit=n
4
Enable sending of ICMPv6 timeout packets on the intermediate devices (devices between the
source and destination devices). If the intermediate devices are HPE devices, execute the
ipv6 hoplimit-expires enable command on the devices.
Enable sending of ICMPv6 destination unreachable packets on the destination device. If the
destination device is an HPE device, execute the ipv6 unreachables enable command.
For more information about the ipv6 hoplimit-expires enable and ipv6 unreachables
enable commands, see IPv6 basics commands in Layer 3IP Services Command Reference.
Using a tracert command to identify failed or all nodes in a
path
Trace the route to an IP destination in any view:
IPv4 network:
tracert [ -a source-ip | -f first-ttl | -i interface-type interface-number
| -m max-ttl | -p port | -q packet-number | -t tos | -vpn-instance
vpn-instance-name [ -resolve-as { global | none | vpn } ] | -w timeout ] * host
IPv6 network:
tracert ipv6 [ -a source-ipv6 | -f first-hop | -i interface-type
interface-number | -m max-hops | -p port | -q packet-number | -t
traffic-class | -vpn-instance vpn-instance-name [ -resolve-as { global |
none | vpn } ] | -w timeout ] * host
Example: Using the tracert utility
Network configuration
As shown in Figure 4, Device A failed to Telnet to Device C.
Test the network connectivity between Device A and Device C. If they cannot reach each other,
locate the failed nodes in the network.
Figure 4 Network diagram
Procedure
1. Configure IP addresses for the devices as shown in Figure 4.
2. Configure a static route on Device A.
<DeviceA> system-view
[DeviceA] ip route-static 0.0.0.0 0.0.0.0 1.1.1.2
3. Test connectivity between Device A and Device C.
[DeviceA] ping 1.1.2.2
Ping 1.1.2.2(1.1.2.2): 56 -data bytes, press CTRL_C to break
Request time out
Request time out
Request time out
Request time out
Request time out
Device A Device B Device C
1.1.1.1/24 1.1.1.2/24 1.1.2.1/24 1.1.2.2/24
5
--- Ping statistics for 1.1.2.2 ---
5 packet(s) transmitted,0 packet(s) received,100.0% packet loss
The output shows that Device A and Device C cannot reach each other.
4. Identify failed nodes:
# Enable sending of ICMP timeout packets on Device B.
<DeviceB> system-view
[DeviceB] ip ttl-expires enable
# Enable sending of ICMP destination unreachable packets on Device C.
<DeviceC> system-view
[DeviceC] ip unreachables enable
# Identify failed nodes.
[DeviceA] tracert 1.1.2.2
traceroute to 1.1.2.2 (1.1.2.2) 30 hops at most,40 bytes each packet, press CTRL_C
to break
1 1.1.1.2 (1.1.1.2) 1 ms 2 ms 1 ms
2 * * *
3 * * *
4 * * *
5
[DeviceA]
The output shows that Device A can reach Device B but cannot reach Device C. An error has
occurred on the connection between Device B and Device C.
5. To identify the cause of the issue, execute the following commands on Device A and Device C:
Execute the debugging ip icmp command and verify that Device A and Device C can
send and receive the correct ICMP packets.
Execute the display ip routing-table command to verify that Device A and Device
C have a route to each other.
6
Configuring system debugging
About system debugging
The device supports debugging for the majority of protocols and features, and provides debugging
information to help users diagnose errors.
The following switches control the display of debugging information:
Module debugging switchControls whether to generate the module-specific debugging
information.
Screen output switchControls whether to display the debugging information on a certain
screen. Use terminal monitor and terminal logging level commands to turn on
the screen output switch. For more information about these two commands, see information
center commands in System Management Command Reference.
As shown in Figure 5, the device can provide debugging for the three modules 1, 2, and 3. The
debugging information can be output on a terminal only when both the module debugging switch and
the screen output switch are turned on.
Debugging information is typically displayed on a console. You can also send debugging information
to other destinations. For more information, see information center configuration in System
Management Configuration Guide.
Figure 5 Relationship between the module and screen output switch
Debugging a feature module
Restrictions and guidelines
CAUTION:
Output of excessive debugging messages increases the CPU usage and downgrades the system
performance.
To guarantee system performance, enable debugging only for modules that are in an
exceptional condition.
13
123
13
13
Debugging
information
Protocol
debugging
switch
Screen
output switch
Debugging
information
Protocol
debugging
switch
Screen
output switch
ON OFF ON
OFF
123
ON OFF ON
ON
7
When debugging is complete, use the undo debugging all command to disable all the
debugging functions.
Procedure
1. Enable debugging for a module.
debugging module-name [ option ]
By default, debugging is disabled for all modules.
This command is available in user view.
2. (Optional.) Display the enabled debugging features.
display debugging [ module-name ]
This command is available in any view.
8
Configuring NQA
About NQA
Network quality analyzer (NQA) allows you to measure network performance, verify the service
levels for IP services and applications, and troubleshoot network problems.
NQA operating mechanism
An NQA operation contains a set of parameters such as the operation type, destination IP address,
and port number to define how the operation is performed. Each NQA operation is identified by the
combination of the administrator name and the operation tag. You can configure the NQA client to
run the operations at scheduled time periods.
As shown in Figure 6, the NQA source device (NQA client) sends data to the NQA destination device
by simulating IP services and applications to measure network performance.
All types of NQA operations require the NQA client, but only the TCP and UDP echo operations
require the NQA server. The NQA operations for services that are already provided by the destination
device such as FTP do not need the NQA server. You can configure the NQA server to listen and
respond to specific IP addresses and ports to meet various test needs.
Figure 6 Network diagram
After starting an NQA operation, the NQA client periodically performs the operation at the interval
specified by using the frequency command.
You can set the number of probes the NQA client performs in an operation by using the probe
count command.
Collaboration with Track
NQA can collaborate with the Track module to notify application modules of state or performance
changes so that the application modules can take predefined actions.
The NQA + Track collaboration is available for the following application modules:
VRRP.
Static routing.
Policy-based routing.
Smart Link.
The following describes how a static route destined for 192.168.0.88 is monitored through
collaboration:
1. NQA monitors the reachability to 192.168.0.88.
2. When 192.168.0.88 becomes unreachable, NQA notifies the Track module of the change.
3. The Track module notifies the static routing module of the state change.
4. The static routing module sets the static route to invalid according to a predefined action.
IP network
NQA source device/
NQA client NQA destination device
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401

Aruba JG619A Configuration Guide

Category
Software
Type
Configuration Guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI