s5800 series

H3C s5800 series, s5820x series Configuration manual

  • Hello! I am an AI chatbot trained to assist you with the H3C s5800 series Configuration manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
H3C S5820X&S5800 Series Ethernet Switches
Network Management and Monitoring
Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Document Version: 6W103-20100716
Product Version: Release 1110
Copyright © 2009-2010, Hangzhou H3C Technologies Co., Ltd. and its licensors
All Rights Reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior
written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C, , Aolynk, , H
3
Care,
, TOP G, , IRF, NetPilot, Neocean, NeoVTL,
SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V
2
G, V
n
G, PSPT,
XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co.,
Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners.
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Preface
The H3C S5800&S5820X documentation set includes 11 configuration guides, which describe the
software features for the S5800&S5820X Series Ethernet Switches and guide you through the software
configuration procedures. These configuration guides also provide configuration examples to help you
apply software features to different network scenarios.
The Network Management and Monitoring Configuration Guide describes network management and
monitoring fundamentals and configuration. It describes how to view the system information, collect
traffic statistics, sample packets, assess the network performance, synchronize time for all devices with
clocks in your network, supply power for the attached devices by using PoE, perform cluster
management for switches, and use the ping, tracert, and debug commands to check and debug the
current network connectivity.
This preface includes:
z Audience
z Document Organization
z Conventions
z About the H3C S5800&S5820X Documentation Set
z Obtaining Documentation
z Documentation Feedback
Audience
This documentation set is intended for:
z Network planners
z Field technical support and servicing engineers
z Network administrators working with the S5800 and S5820X series
Document Organization
The Network Management and Monitoring Configuration Guide comprises these parts:
System Maintenance and
Debugging
NQA Configuration NTP Configuration IPC Configuration
PoE Configuration SNMP Configuration MIB Configuration RMON Configuration
Cluster Management
Configuration
Sampler Configuration
Port Mirroring
Configuration
Traffic Mirroring
Configuration
NetStream Configuration
IPv6 NetStream
Configuration
sFlow Configuration
Information Center
Configuration
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
italic
Italic text represents arguments that you replace with actual values.
[ ]
Square brackets enclose syntax choices (keywords or arguments) that are
optional.
{ x | y | ... }
Braces enclose a set of required syntax choices separated by vertical bars,
from which you select one.
[ x | y | ... ]
Square brackets enclose a set of optional syntax choices separated by vertical
bars, from which you select one or none.
{ x | y | ... } *
Asterisk marked braces enclose a set of required syntax choices separated by
vertical bars, from which you select at least one.
[ x | y | ... ] *
Asterisk marked square brackets enclose optional syntax choices separated by
vertical bars, from which you may select multiple choices or none.
&<1-n>
The argument or keyword and argument combination before the ampersand (&)
sign can be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
Symbols
Convention Description
Means reader be extremely careful. Improper operation may cause bodily
injury.
Means reader be careful. Improper operation may cause data loss or damage to
equipment.
Means a complementary description.
About the H3C S5800&S5820X Documentation Set
The H3C S5800&S5820X documentation set also includes:
Category Documents Purposes
Marketing brochures Describe product specifications and benefits.
Product description and
specifications
Technology white papers
Provide an in-depth description of software features
and technologies.
PSR150-A [ PSR150-D ]
Power Modules User
Manual
Describes the appearances, features, specifications,
installation, and removal of the pluggable 150W power
modules available for the products.
Pluggable module
description
PSR300-12A
[ PSR300-12D1 ] Power
Modules User Manual
Describes the appearances, features, specifications,
installation, and removal of the pluggable 300W power
modules available for the products.
Category Documents Purposes
PSR750-A [ PSR750-D ]
Power Modules User
Manual
Describes the appearances, features, specifications,
installation, and removal of the pluggable 750W power
modules available for the products.
RPS User Manual
Describes the appearances, features, and
specifications of the RPS units available for the
products.
LSW1FAN and
LSW1BFAN Installation
Manual
Describes the appearances, specifications,
installation, and removal of the pluggable fan modules
available for the products.
LSW148POEM Module
User Manual
Describes the appearance, features, installation, and
removal of the pluggable PoE module available for the
products.
S5820X [ S5800 ] Series
Ethernet Switches
Interface Cards User
Manual
Describes the models, hardware specifications,
installation, and removal of the interface cards
available for the products.
H3C OAP Cards User
Manual
Describes the benefits, features, hardware
specifications, installation, and removal of the OAP
cards available for the products.
H3C Low End Series
Ethernet Switches
Pluggable Modules
Manual
Describes the models, appearances, and
specifications of the pluggable modules available for
the products.
S5800-60C-PWR
Ethernet Switch Hot
Swappable Power
Module Ordering Guide
Guides you through ordering the hot-swappable power
modules available for the S5800-60C-PWR switches
in different cases.
Power configuration
RPS Ordering
Information for H3C
Low-End Ethernet
Switches
Provides the RPS and switch compatibility matrix and
RPS cable specifications.
z S5800 Series
Ethernet Switches
Quick Start
z S5820X Series
Ethernet Switches
Quick Start
z S5800 Series
Ethernet Switches
CE DOC
z S5820X Series
Ethernet Switches
CE DOC
Provides regulatory information and the safety
instructions that must be followed during installation.
Hardware installation
z S5800 Series
Ethernet Switches
Quick Start
z S5820X Series
Ethernet Switches
Quick Start
Guides you through initial installation and setup
procedures to help you quickly set up and use your
device with the minimum configuration.
Category Documents Purposes
z S5800 Series
Ethernet Switches
Installation Manual
z S5820X Series
Ethernet Switches
Installation Manual
Provides a complete guide to hardware installation
and hardware specifications.
Pluggable
SFP[SFP+][XFP]
Transceiver Modules
Installation Guide
Guides you through installing SFP/SFP+/XFP
transceiver modules.
z S5800-60C-PWR
Switch Video
Installation Guide
z S5820X-28C Switch
Video Installation
Guide
Shows how to install the H3C S5800-60C-PWR and
H3C S5820X-28C Ethernet switches.
Configuration guide
Describe software features and configuration
procedures.
Software configuration
Command reference Provide a quick reference to all available commands.
H3C Series Ethernet
Switches Login
Password Recovery
Manual
Tells how to find the lost password or recover the
password when the login password is lost.
Operations and
maintenance
Release notes
Provide information about the product release,
including the version history, hardware and software
compatibility matrix, version upgrade information,
technical support information, and software upgrading.
Obtaining Documentation
You can access the most up-to-date H3C product documentation on the World Wide Web at
http://www.h3c.com.
Click the links on the top navigation bar to obtain different categories of product documentation:
[Technical Support & Documents > Technical Documents] – Provides hardware installation, software
upgrading, and software feature configuration and maintenance documentation.
[Products & Solutions] – Provides information about products and technologies, as well as solutions.
[Technical Support & Documents > Software Download] – Provides the documentation released with
the software version.
Documentation Feedback
You can e-mail your comments about product documentation to [email protected].
We appreciate your comments.
i
Table of Contents
1 System Maintenance and Debugging···································································································1-1
Ping······················································································································································1-1
Introduction···································································································································1-1
Configuring Ping···························································································································1-1
Ping Configuration Example·········································································································1-2
Tracert ·················································································································································1-4
Introduction···································································································································1-4
Configuring Tracert·······················································································································1-4
System Debugging·······························································································································1-5
Introduction to System Debugging·······························································································1-5
Configuring System Debugging····································································································1-6
Ping and Tracert Configuration Example·····························································································1-7
2 NQA Configuration·································································································································2-1
NQA Overview·····································································································································2-1
Introduction to NQA······················································································································2-1
Features of NQA ··························································································································2-1
Basic Concepts of NQA················································································································2-3
NQA Test Operation·····················································································································2-3
NQA Configuration Task List ···············································································································2-4
Configuring the NQA Server················································································································2-5
Enabling the NQA Client······················································································································2-5
Creating an NQA Test Group ··············································································································2-5
Configuring an NQA Test Group··········································································································2-6
Configuring an ICMP Echo Test···································································································2-6
Configuring a DHCP Test·············································································································2-7
Configuring a DNS Test ···············································································································2-8
Configuring an FTP Test ··············································································································2-9
Configuring an HTTP Test··········································································································2-11
Configuring a UDP Jitter Test·····································································································2-12
Configuring an SNMP Test·········································································································2-14
Configuring a TCP Test··············································································································2-15
Configuring a UDP Echo Test····································································································2-16
Configuring a DLSw Test ···········································································································2-18
Configuring the Collaboration Function ·····························································································2-19
Configuring Trap Delivery··················································································································2-20
Configuring the NQA Statistics Function ···························································································2-20
Configuring the History Records Saving Function·············································································2-21
Configuring Optional Parameters Common to an NQA Test Group··················································2-22
Scheduling an NQA Test Group ········································································································2-23
Displaying and Maintaining NQA·······································································································2-24
NQA Configuration Examples············································································································2-25
ii
ICMP Echo Test Configuration Example····················································································2-25
DHCP Test Configuration Example····························································································2-26
DNS Test Configuration Example ······························································································2-27
FTP Test Configuration Example ·······························································································2-28
HTTP Test Configuration Example·····························································································2-29
UDP Jitter Test Configuration Example······················································································2-30
SNMP Test Configuration Example····························································································2-33
TCP Test Configuration Example·······························································································2-34
UDP Echo Test Configuration Example ·····················································································2-35
DLSw Test Configuration Example ····························································································2-36
NQA Collaboration Configuration Example················································································2-37
3 NTP Configuration··································································································································3-1
NTP Overview······································································································································3-1
Applications of NTP······················································································································3-1
How NTP Works···························································································································3-2
NTP Message Format ··················································································································3-3
Operation Modes of NTP··············································································································3-5
NTP Configuration Task List················································································································3-7
Configuring the Operation Modes of NTP····························································································3-8
Configuring NTP Client/Server Mode···························································································3-8
Configuring the NTP Symmetric Peers Mode ··············································································3-9
Configuring NTP Broadcast Mode······························································································3-10
Configuring NTP Multicast Mode································································································3-11
Configuring Optional Parameters of NTP··························································································3-12
Specifying the Source Interface for NTP Messages···································································3-12
Disabling an Interface from Receiving NTP Messages······························································3-13
Configuring the Maximum Number of Dynamic Sessions Allowed ············································3-13
Configuring Access-Control Rights····································································································3-14
Configuration Prerequisites········································································································3-14
Configuration Procedure ············································································································3-14
Configuring NTP Authentication ········································································································3-15
Configuration Prerequisites········································································································3-15
Configuration Procedure ············································································································3-15
Displaying and Maintaining NTP········································································································3-17
NTP Configuration Examples ············································································································3-18
Configuring NTP Client/Server Mode·························································································3-18
Configuring the NTP Symmetric Mode·······················································································3-19
Configuring NTP Broadcast Mode······························································································3-20
Configuring NTP Multicast Mode································································································3-22
Configuring NTP Client/Server Mode with Authentication··························································3-25
Configuring NTP Broadcast Mode with Authentication ······························································3-26
4 IPC Configuration···································································································································4-1
IPC Overview·······································································································································4-1
Introduction to IPC························································································································4-1
Enabling IPC Performance Statistics Collection··················································································4-2
iii
Displaying and Maintaining IPC···········································································································4-3
5 PoE Configuration··································································································································5-1
PoE Overview······································································································································5-1
Introduction to PoE·······················································································································5-1
Protocol Specification···················································································································5-2
PoE Configuration Task List················································································································5-2
Enabling PoE·······································································································································5-4
Enabling PoE for a PoE Interface·································································································5-4
Detecting PDs······································································································································5-5
Enabling the PSE to Detect Non-Standard PDs···········································································5-5
Configuring a PD Disconnection Detection Mode········································································5-5
Configuring the Maximum PoE Interface Power··················································································5-6
Configuring PoE Power Management··································································································5-6
Configuring PoE Interface Power Management···········································································5-6
Configuring the PoE Monitoring Function····························································································5-8
Configuring PSE Power Monitoring······························································································5-8
Monitoring PD·······························································································································5-8
Configuring PoE Interface Through PoE Profile··················································································5-8
Configuring PoE Profile················································································································5-9
Applying PoE Profile·····················································································································5-9
Upgrading PSE Processing Software in Service ···············································································5-10
Displaying and Maintaining PoE········································································································5-11
PoE Configuration Example···············································································································5-11
Troubleshooting PoE ·························································································································5-12
6 SNMP Configuration ······························································································································6-1
SNMP Overview···································································································································6-1
SNMP Mechanism························································································································6-1
SNMP Protocol Version················································································································6-2
MIB Overview·······························································································································6-2
SNMP Configuration····························································································································6-3
Configuring SNMP Logging ·················································································································6-6
Introduction to SNMP Logging ·····································································································6-6
Enabling SNMP Logging ··············································································································6-6
Configuring SNMP Trap·······················································································································6-7
Enabling the Trap Function··········································································································6-7
Configuring Trap Parameters·······································································································6-8
Displaying and Maintaining SNMP ····································································································6-10
SNMPv1/SNMPv2c Configuration Example ······················································································6-11
SNMPv3 Configuration Example ·······································································································6-12
SNMP Logging Configuration Example ·····························································································6-13
7 MIB Style Configuration·························································································································7-1
Setting the MIB Style ···························································································································7-1
Displaying and Maintaining MIB ··········································································································7-1
iv
8 RMON Configuration······························································································································8-1
RMON Overview··································································································································8-1
Introduction···································································································································8-1
Working Mechanism·····················································································································8-1
RMON Groups······························································································································8-2
Configuring the RMON Statistics Collection························································································8-3
Configuring RMON Ethernet Statistics Collection········································································8-4
Configuring RMON History Statistics Collection···········································································8-4
Configuring the RMON Alarm Function ·······························································································8-5
Configuration Prerequisites··········································································································8-5
Configuration Procedure ··············································································································8-5
Displaying and Maintaining RMON······································································································8-7
Ethernet Statistics Group Configuration Example ···············································································8-7
History Group Configuration Example ·································································································8-8
Alarm Group Configuration Example·································································································8-10
9 Cluster Management Configuration ·····································································································9-1
Cluster Management Overview ···········································································································9-1
What is Cluster Management·······································································································9-1
Roles in a Cluster·························································································································9-1
How a Cluster Works····················································································································9-2
Cluster Configuration Task List············································································································9-6
Configuring the Management Device ··································································································9-7
Enabling NDP Globally and for Specific Ports··············································································9-7
Configuring NDP Parameters·······································································································9-8
Enabling NTDP Globally and for Specific Ports ···········································································9-9
Configuring NTDP Parameters·····································································································9-9
Manually Collecting Topology Information ·················································································9-10
Enabling the Cluster Function····································································································9-10
Establishing a Cluster·················································································································9-11
Enabling Management VLAN Auto-Negotiation ·········································································9-12
Configuring Communication Between the Management Device and the Member Devices·······9-12
Configuring Cluster Management Protocol Packets···································································9-13
Cluster Member Management····································································································9-13
Configuring the Member Devices ······································································································9-14
Enabling NDP·····························································································································9-14
Enabling NTDP···························································································································9-14
Manually Collecting Topology Information ·················································································9-14
Enabling the Cluster Function····································································································9-15
Deleting a Member Device from a Cluster ·················································································9-15
Configuring Access Between the Management Device and Member Devices··································9-15
Adding a Candidate Device to a Cluster····························································································9-16
Configuring Advanced Cluster Functions ··························································································9-16
Configuring Topology Management ···························································································9-16
Configuring Interaction for a Cluster ··························································································9-17
SNMP Configuration Synchronization························································································9-19
v
Configuring Web User Accounts in Batches ··············································································9-20
Displaying and Maintaining Cluster Management ·············································································9-20
Cluster Management Configuration Example····················································································9-21
10 Sampler Configuration·······················································································································10-1
Sampler Overview ·····························································································································10-1
Creating a Sampler····························································································································10-1
Displaying and Maintaining Sampler ·································································································10-2
Sampler Configuration Examples ······································································································10-2
Using the Sampler with NetStream····························································································10-2
11 Port Mirroring Configuration·············································································································11-1
Introduction to Port Mirroring·············································································································11-1
Classification of Port Mirroring ···································································································11-1
Implementing Port Mirroring·······································································································11-2
Configuring Local Port Mirroring········································································································11-4
Local Port Mirroring Configuration Task List··············································································11-4
Creating a Local Mirroring Group·······························································································11-5
Configuring Mirroring Ports for the Local Mirroring Group ·························································11-5
Configuring Mirroring CPUs for the Local Mirroring Group ························································11-6
Configuring the Monitor Port for the Local Mirroring Group ·······················································11-7
Configuring Layer 2 Remote Port Mirroring·······················································································11-8
Layer 2 Remote Port Mirroring Configuration Task List·····························································11-8
Configuration Prerequisites········································································································11-9
Configuring a Remote Source Mirroring Group (on the Source Device)····································11-9
Configuring a Remote Destination Mirroring Group (on the Destination Device)·····················11-12
Configuring Layer 3 Remote Port Mirroring·····················································································11-14
Layer 3 Remote Port Mirroring Configuration Task List···························································11-14
Configuration Prerequisites······································································································11-15
Configuring Local Mirroring Groups ·························································································11-15
Configuring Mirroring Ports for a Local Mirroring Group ··························································11-16
Configuring Mirroring CPUs for a Local Mirroring Group ·························································11-17
Configuring the Monitor Port for a Local Mirroring Group ························································11-17
Displaying and Maintaining Port Mirroring·······················································································11-18
Port Mirroring Configuration Examples····························································································11-18
Local Port Mirroring Configuration Example (in Mirroring Port Mode) ·····································11-18
Layer 2 Remote Port Mirroring Configuration Example····························································11-19
Layer 3 Remote Port Mirroring Configuration Example····························································11-21
12 Traffic Mirroring Configuration·········································································································12-1
Traffic Mirroring Overview··················································································································12-1
Configuring Traffic Mirroring··············································································································12-1
Mirroring Traffic to an Interface··································································································12-1
Mirroring Traffic to the CPU········································································································12-2
Applying a QoS Policy················································································································12-3
Displaying and Maintaining Traffic Mirroring······················································································12-5
Traffic Mirroring Configuration Examples ··························································································12-5
Example for Mirroring Traffic to an Interface··············································································12-5
vi
Configuration Procedure ············································································································12-5
13 NetStream Configuration···················································································································13-1
NetStream Overview··························································································································13-1
Basic Concepts of NetStream············································································································13-2
What Is a Flow····························································································································13-2
How NetStream Works···············································································································13-2
Key Technologies of NetStream········································································································13-3
Flow Aging··································································································································13-3
NetStream Data Export ··············································································································13-3
NetStream Export Formats·········································································································13-5
Introduction to NetStream Sampling and Filtering·············································································13-5
NetStream Sampling ··················································································································13-5
NetStream Filtering ····················································································································13-6
NetStream Configuration Task List····································································································13-6
Enabling NetStream···························································································································13-7
Configuring NetStream Filtering and Sampling ·················································································13-7
Configuring NetStream Filtering·································································································13-7
Configuring NetStream Sampling·······························································································13-9
Configuring NetStream Data Export ································································································13-10
Configuring NetStream Common Data Export ·········································································13-10
Configuring NetStream Aggregation Data Export ····································································13-11
Configuring Attributes of NetStream Export Data············································································13-13
Configuring NetStream Export Format·····················································································13-13
Configuring Refresh Rate for NetStream Version 9 Templates ···············································13-14
Configuring NetStream Flow Aging ·································································································13-15
Flow Aging Approaches ···········································································································13-15
Configuring NetStream Flow Aging··························································································13-16
Displaying and Maintaining NetStream····························································································13-16
NetStream Configuration Examples ································································································13-17
NetStream Common Data Export Configuration Example ·······················································13-17
NetStream Aggregation Data Export Configuration Example ··················································13-17
14 IPv6 NetStream Configuration ··········································································································14-1
IPv6 NetStream Overview ·················································································································14-1
Basic Concepts of IPv6 NetStream ···································································································14-2
What Is an IPv6 Flow ·················································································································14-2
How IPv6 NetStream Works·······································································································14-2
Key Technologies of IPv6 NetStream································································································14-3
Flow Aging··································································································································14-3
IPv6 NetStream Data Export······································································································14-3
IPv6 NetStream Export Formats ································································································14-4
Introduction to IPv6 NetStream Sampling and Filtering·····································································14-4
IPv6 NetStream Sampling··········································································································14-4
IPv6 NetStream Filtering ············································································································14-4
IPv6 NetStream Configuration Task List····························································································14-5
Enabling IPv6 NetStream ··················································································································14-5
vii
Configuring IPv6 NetStream Data Export··························································································14-6
Configuring IPv6 NetStream Common Data Export···································································14-6
Configuring IPv6 NetStream Aggregation Data Export······························································14-7
Configuring Attributes of IPv6 NetStream Data Export······································································14-9
Configuring IPv6 NetStream Export Format···············································································14-9
Configuring Refresh Rate for IPv6 NetStream Version 9 Templates·········································14-9
Displaying and Maintaining IPv6 NetStream ···················································································14-11
IPv6 NetStream Configuration Examples ························································································14-11
IPv6 NetStream Common Data Export Configuration Example···············································14-11
Pv6 NetStream Aggregation Data Export Configuration Example···········································14-12
15 sFlow Configuration···························································································································15-1
sFlow Overview ·································································································································15-1
Introduction to sFlow··················································································································15-1
Operation of sFlow·····················································································································15-1
Configuring sFlow······························································································································15-2
Displaying and Maintaining sFlow ·····································································································15-3
sFlow Configuration Example············································································································15-3
Troubleshooting sFlow Configuration································································································15-4
The Remote sFlow Collector Cannot Receive sFlow Packets ···················································15-4
16 Information Center Configuration·····································································································16-1
Information Center Overview·············································································································16-1
Introduction to Information Center······························································································16-1
Classification of System Information··························································································16-2
Eight Levels of System Information····························································································16-2
Eight Output Destinations and Ten Channels of System Information········································16-3
Outputting System Information by Source Module·····································································16-4
Default Output Rules of System Information··············································································16-4
System Information Format········································································································16-5
Configuring Information Center··········································································································16-7
Information Center Configuration Task List················································································16-7
Outputting System Information to the Console···········································································16-8
Outputting System Information to a Monitor Terminal································································16-9
Outputting System Information to a Log Host ··········································································16-10
Outputting System Information to the Trap Buffer····································································16-11
Outputting System Information to the Log Buffer·····································································16-12
Outputting System Information to the SNMP Module·······························································16-13
Outputting System Information to the Web Interface ·······························································16-15
Saving System Information to a Log File··················································································16-16
Configuring Synchronous Information Output··········································································16-17
Disabling a Port from Generating Link Up/Down Logging Information·····································16-17
Displaying and Maintaining Information Center···············································································16-18
Information Center Configuration Examples····················································································16-19
Outputting Log Information to a Unix Log Host········································································16-19
Outputting Log Information to a Linux Log Host·······································································16-21
Outputting Log Information to the Console···············································································16-22
viii
17 Index····················································································································································17-1
1-1
1 System Maintenance and Debugging
This chapter includes these sections:
z Ping
z Tracert
z System Debugging
z Ping and Tracert Configuration Example
You can use the ping command and the tracert command to verify the current network connectivity,
and use the debug command to enable debugging and thus to diagnose system faults based on the
debugging information.
Ping
Introduction
The ping command allows you to verify whether a device with a specified address is reachable, and
to examine network connectivity.
The ping function is implemented through the Internet Control Message Protocol (ICMP):
1) The source device sends an ICMP echo request to the destination device.
2) The source device determines whether the destination is reachable based on whether it
receives an ICMP echo reply; if the destination is reachable, the source device determines the
link quality based on the numbers of ICMP echo requests sent and replies received, determines
the distance between the source and destination based on the round trip time of ping packets.
Configuring Ping
Follow the step below to configure the ping function:
To do… Use the command… Remarks
ping
[
ip
] [ -
a
source-ip |
-c
count |
-f
| -
h
ttl | -
i
interface-type interface-number |
-m
interval |
-n
|
-p
pad |
-q
|
-r
|
-s
packet-size |
-t
timeout |
-tos
tos |
-v
|
-vpn-instance
vpn-instance-name ] * host
Check whether a specified
address in an IP network is
reachable
ping ipv6
[
-a
source-ipv6 |
-c
count |
-m
interval |
-s
packet-size |
-t
timeout ] * host
[
-i
interface-type interface-number ]
Required
Use either approach
The
ping
command is
applicable in an IPv4 network;
the
ping ipv6
command is
applicable in an IPv6 network.
Available in any view
1-2
z For a low-speed network, you are recommended to set a larger value for the timeout timer
(indicated by the -t parameter in the command) when configuring the ping command.
z Only the directly connected segment address can be pinged if the outgoing interface is
specified with the -i argument
Ping Configuration Example
Network requirements
As shown in Figure 1-1, check whether Device A and Device C can reach each other. If they can
reach each other, get the detailed information of routes from Device A to Device C.
Figure 1-1 Ping network diagram
Configuration procedure
# Use the ping command to display whether Device A and Device C can reach each other.
<DeviceA> ping 1.1.2.2
PING 1.1.2.2: 56 data bytes, press CTRL_C to break
Reply from 1.1.2.2: bytes=56 Sequence=1 ttl=254 time=205 ms
Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms
Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms
Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms
Reply from 1.1.2.2: bytes=56 Sequence=5 ttl=254 time=1 ms
--- 1.1.2.2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 1/41/205 ms
# Get the detailed information of routes from Device A to Device C.
<DeviceA> ping -r 1.1.2.2
PING 1.1.2.2: 56 data bytes, press CTRL_C to break
Reply from 1.1.2.2: bytes=56 Sequence=1 ttl=254 time=53 ms
Record Route:
1.1.2.1
1-3
1.1.2.2
1.1.1.2
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=5 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
--- 1.1.2.2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 1/11/53 ms
The principle of ping –r is as shown in Figure 1-1.
1) The source (Device A) sends an ICMP echo request with the RR option being empty to the
destination (Device C).
2) The intermediate device (Device B) adds the IP address (1.1.2.1) of its outbound interface to
the RR option of the ICMP echo request, and forwards the packet.
3) Upon receiving the request, the destination device copies the RR option in the request and
adds the IP address (1.1.2.2) of its outbound interface to the RR option. Then the destination
device sends an ICMP echo reply.
4) The intermediate device adds the IP address (1.1.1.2) of its outbound interface to the RR option
in the ICMP echo reply, and then forwards the reply.
5) Upon receiving the reply, the source device adds the IP address (1.1.1.1) of its inbound
interface to the RR option. Finally, you can get the detailed information of routes from Device A
to Device C: 1.1.1.1 <-> {1.1.1.2; 1.1.2.1} <-> 1.1.2.2.
1-4
Tracert
Introduction
By using the tracert command, you can trace the Layer 3 devices involved in delivering an IP
packet from source to destination to check whether a network is available. This is useful for
identification of failed node(s) in the event of network failure.
Figure 1-2 Tracert diagram
The tracert function is implemented through ICMP, as shown in
Figure 1-2:
1) The source (Device A) sends a packet with a TTL value of 1 to the destination (Device D). The
UDP port of the packet is a port number that will not be used by any application of the
destination.
2) The first hop (Device B) (the Layer 3 device that first receives the packet) responds by sending
a TTL-expired ICMP error message to the source, with its IP address 1.1.1.2 encapsulated. In
this way, the source device can get the address (1.1.1.2) of the first Layer 3 device.
3) The source device sends a packet with a TTL value of 2 to the destination device.
4) The second hop (Device C) responds with a TTL-expired ICMP error message, which gives the
source device the address (1.1.2.2) of the second Layer 3 device.
5) The above process continues until the ultimate destination device is reached. No application of
the destination uses this UDP port. Therefore, the destination replies a port unreachable ICMP
error message with the destination IP address 1.1.3.2.
6) When the source device receives the port unreachable ICMP error message, it knows that the
packet has reached the destination, and it can get the addresses of all the Layer 3 devices
involved to get to the destination device (1.1.1.2, 1.1.2.2, 1.1.3.2).
Configuring Tracert
Configuration prerequisites
z Enable sending of ICMP timeout packets on the intermediate device (the device between the
source and destination devices). If the intermediate device is an H3C device, execute the ip
ttl-expires enable command on the device. For more information about this command, see IP
Performance Optimization Configuration Commands in the Layer 3 - IP Services Command
Reference.
1-5
z Enable sending of ICMP destination unreachable packets on the destination device. If the
destination device is an H3C device, execute the ip unreachables enable command. For more
information about this command, see IP Performance Optimization Configuration Commands in
the Layer 3 - IP Services Command Reference.
Tracert configuration
Follow these steps to configure tracert:
To do… Use the command… Remarks
Enter system view
system-view
—
tracert
[
-a
source-ip |
-f
first-ttl |
-m
max-ttl |
-p
port |
-q
packet-number |
-vpn-instance
vpn-instance-name |
-w
timeout ] * host
Display the routes from source
to destination
tracert ipv6
[
-f
first-ttl |
-m
max-ttl |
-p
port |
-q
packet-number |
-w
timeout ] *
host
Required
Use either approach
The
tracert
command is
applicable in an IPv4 network;
the
tracert ipv6
command is
applicable in an IPv6 network.
Available in any view
System Debugging
Introduction to System Debugging
The device provides various debugging functions. For the majority of protocols and features
supported, the system provides corresponding debugging information to help users diagnose errors.
The following two switches control the display of debugging information:
z Protocol debugging switch, which controls protocol-specific debugging information.
z Screen output switch, which controls whether to display the debugging information on a certain
screen.
As
Figure 1-3 illustrates, assume the device can provide debugging for the three modules 1, 2, and
3. The debugging information can be output on a terminal only when both the protocol debugging
switch and the screen output switch are turned on.
1-6
Figure 1-3 The relationship between the protocol and screen output switch
Debugging
information
Protocol
debugging
switch
switch
Screen output
OFF
ON
OFF
ON
1
3
1 2 3
OFF
ON
ON
1
3
1 2 3
1
3
ON
Debugging
information
switch
Screen output
Protocol
switch
debugging
Configuring System Debugging
Output of the debugging information may reduce system efficiency. Administrators usually use the
debugging commands to diagnose network failure. After completing the debugging, disable the
corresponding debugging function, or use the undo debugging all command to disable all the
debugging functions.
Output of debugging information depends on the configurations of the information center and the
debugging commands of each protocol and functional module. Displaying the debugging
information on a terminal (including console or VTY) is a common way to output debugging
information. You can also output debugging information to other destinations. For more information,
see Information Center Configuration Commands in the Network Management and Monitoring
Command Reference. By default, you can output debugging information to a terminal by following
these steps:
To do… Use the command… Remarks
Enable the terminal monitoring of
system information
terminal monitor
Optional
The terminal monitoring on the
console is enabled by default and
that on the monitoring terminal is
disabled by default.
Available in user view
Enable the terminal display of
debugging information
terminal debugging
Required
Disabled by default
Available in user view
/