H3C s5820x series Configuration manual

Category
Software
Type
Configuration manual

This manual is also suitable for

H3C S5820X&S5800 Series Ethernet Switches
Network Management and Monitoring
Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Document Version: 6W103-20100716
Product Version: Release 1110
Copyright © 2009-2010, Hangzhou H3C Technologies Co., Ltd. and its licensors
All Rights Reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior
written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C, , Aolynk, , H
3
Care,
, TOP G, , IRF, NetPilot, Neocean, NeoVTL,
SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V
2
G, V
n
G, PSPT,
XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co.,
Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners.
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Preface
The H3C S5800&S5820X documentation set includes 11 configuration guides, which describe the
software features for the S5800&S5820X Series Ethernet Switches and guide you through the software
configuration procedures. These configuration guides also provide configuration examples to help you
apply software features to different network scenarios.
The Network Management and Monitoring Configuration Guide describes network management and
monitoring fundamentals and configuration. It describes how to view the system information, collect
traffic statistics, sample packets, assess the network performance, synchronize time for all devices with
clocks in your network, supply power for the attached devices by using PoE, perform cluster
management for switches, and use the ping, tracert, and debug commands to check and debug the
current network connectivity.
This preface includes:
z Audience
z Document Organization
z Conventions
z About the H3C S5800&S5820X Documentation Set
z Obtaining Documentation
z Documentation Feedback
Audience
This documentation set is intended for:
z Network planners
z Field technical support and servicing engineers
z Network administrators working with the S5800 and S5820X series
Document Organization
The Network Management and Monitoring Configuration Guide comprises these parts:
System Maintenance and
Debugging
NQA Configuration NTP Configuration IPC Configuration
PoE Configuration SNMP Configuration MIB Configuration RMON Configuration
Cluster Management
Configuration
Sampler Configuration
Port Mirroring
Configuration
Traffic Mirroring
Configuration
NetStream Configuration
IPv6 NetStream
Configuration
sFlow Configuration
Information Center
Configuration
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
italic
Italic text represents arguments that you replace with actual values.
[ ]
Square brackets enclose syntax choices (keywords or arguments) that are
optional.
{ x | y | ... }
Braces enclose a set of required syntax choices separated by vertical bars,
from which you select one.
[ x | y | ... ]
Square brackets enclose a set of optional syntax choices separated by vertical
bars, from which you select one or none.
{ x | y | ... } *
Asterisk marked braces enclose a set of required syntax choices separated by
vertical bars, from which you select at least one.
[ x | y | ... ] *
Asterisk marked square brackets enclose optional syntax choices separated by
vertical bars, from which you may select multiple choices or none.
&<1-n>
The argument or keyword and argument combination before the ampersand (&)
sign can be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
Symbols
Convention Description
Means reader be extremely careful. Improper operation may cause bodily
injury.
Means reader be careful. Improper operation may cause data loss or damage to
equipment.
Means a complementary description.
About the H3C S5800&S5820X Documentation Set
The H3C S5800&S5820X documentation set also includes:
Category Documents Purposes
Marketing brochures Describe product specifications and benefits.
Product description and
specifications
Technology white papers
Provide an in-depth description of software features
and technologies.
PSR150-A [ PSR150-D ]
Power Modules User
Manual
Describes the appearances, features, specifications,
installation, and removal of the pluggable 150W power
modules available for the products.
Pluggable module
description
PSR300-12A
[ PSR300-12D1 ] Power
Modules User Manual
Describes the appearances, features, specifications,
installation, and removal of the pluggable 300W power
modules available for the products.
Category Documents Purposes
PSR750-A [ PSR750-D ]
Power Modules User
Manual
Describes the appearances, features, specifications,
installation, and removal of the pluggable 750W power
modules available for the products.
RPS User Manual
Describes the appearances, features, and
specifications of the RPS units available for the
products.
LSW1FAN and
LSW1BFAN Installation
Manual
Describes the appearances, specifications,
installation, and removal of the pluggable fan modules
available for the products.
LSW148POEM Module
User Manual
Describes the appearance, features, installation, and
removal of the pluggable PoE module available for the
products.
S5820X [ S5800 ] Series
Ethernet Switches
Interface Cards User
Manual
Describes the models, hardware specifications,
installation, and removal of the interface cards
available for the products.
H3C OAP Cards User
Manual
Describes the benefits, features, hardware
specifications, installation, and removal of the OAP
cards available for the products.
H3C Low End Series
Ethernet Switches
Pluggable Modules
Manual
Describes the models, appearances, and
specifications of the pluggable modules available for
the products.
S5800-60C-PWR
Ethernet Switch Hot
Swappable Power
Module Ordering Guide
Guides you through ordering the hot-swappable power
modules available for the S5800-60C-PWR switches
in different cases.
Power configuration
RPS Ordering
Information for H3C
Low-End Ethernet
Switches
Provides the RPS and switch compatibility matrix and
RPS cable specifications.
z S5800 Series
Ethernet Switches
Quick Start
z S5820X Series
Ethernet Switches
Quick Start
z S5800 Series
Ethernet Switches
CE DOC
z S5820X Series
Ethernet Switches
CE DOC
Provides regulatory information and the safety
instructions that must be followed during installation.
Hardware installation
z S5800 Series
Ethernet Switches
Quick Start
z S5820X Series
Ethernet Switches
Quick Start
Guides you through initial installation and setup
procedures to help you quickly set up and use your
device with the minimum configuration.
Category Documents Purposes
z S5800 Series
Ethernet Switches
Installation Manual
z S5820X Series
Ethernet Switches
Installation Manual
Provides a complete guide to hardware installation
and hardware specifications.
Pluggable
SFP[SFP+][XFP]
Transceiver Modules
Installation Guide
Guides you through installing SFP/SFP+/XFP
transceiver modules.
z S5800-60C-PWR
Switch Video
Installation Guide
z S5820X-28C Switch
Video Installation
Guide
Shows how to install the H3C S5800-60C-PWR and
H3C S5820X-28C Ethernet switches.
Configuration guide
Describe software features and configuration
procedures.
Software configuration
Command reference Provide a quick reference to all available commands.
H3C Series Ethernet
Switches Login
Password Recovery
Manual
Tells how to find the lost password or recover the
password when the login password is lost.
Operations and
maintenance
Release notes
Provide information about the product release,
including the version history, hardware and software
compatibility matrix, version upgrade information,
technical support information, and software upgrading.
Obtaining Documentation
You can access the most up-to-date H3C product documentation on the World Wide Web at
http://www.h3c.com.
Click the links on the top navigation bar to obtain different categories of product documentation:
[Technical Support & Documents > Technical Documents] – Provides hardware installation, software
upgrading, and software feature configuration and maintenance documentation.
[Products & Solutions] – Provides information about products and technologies, as well as solutions.
[Technical Support & Documents > Software Download] – Provides the documentation released with
the software version.
Documentation Feedback
You can e-mail your comments about product documentation to [email protected].
We appreciate your comments.
i
Table of Contents
1 System Maintenance and Debugging···································································································1-1
Ping······················································································································································1-1
Introduction···································································································································1-1
Configuring Ping···························································································································1-1
Ping Configuration Example·········································································································1-2
Tracert ·················································································································································1-4
Introduction···································································································································1-4
Configuring Tracert·······················································································································1-4
System Debugging·······························································································································1-5
Introduction to System Debugging·······························································································1-5
Configuring System Debugging····································································································1-6
Ping and Tracert Configuration Example·····························································································1-7
2 NQA Configuration·································································································································2-1
NQA Overview·····································································································································2-1
Introduction to NQA······················································································································2-1
Features of NQA ··························································································································2-1
Basic Concepts of NQA················································································································2-3
NQA Test Operation·····················································································································2-3
NQA Configuration Task List ···············································································································2-4
Configuring the NQA Server················································································································2-5
Enabling the NQA Client······················································································································2-5
Creating an NQA Test Group ··············································································································2-5
Configuring an NQA Test Group··········································································································2-6
Configuring an ICMP Echo Test···································································································2-6
Configuring a DHCP Test·············································································································2-7
Configuring a DNS Test ···············································································································2-8
Configuring an FTP Test ··············································································································2-9
Configuring an HTTP Test··········································································································2-11
Configuring a UDP Jitter Test·····································································································2-12
Configuring an SNMP Test·········································································································2-14
Configuring a TCP Test··············································································································2-15
Configuring a UDP Echo Test····································································································2-16
Configuring a DLSw Test ···········································································································2-18
Configuring the Collaboration Function ·····························································································2-19
Configuring Trap Delivery··················································································································2-20
Configuring the NQA Statistics Function ···························································································2-20
Configuring the History Records Saving Function·············································································2-21
Configuring Optional Parameters Common to an NQA Test Group··················································2-22
Scheduling an NQA Test Group ········································································································2-23
Displaying and Maintaining NQA·······································································································2-24
NQA Configuration Examples············································································································2-25
ii
ICMP Echo Test Configuration Example····················································································2-25
DHCP Test Configuration Example····························································································2-26
DNS Test Configuration Example ······························································································2-27
FTP Test Configuration Example ·······························································································2-28
HTTP Test Configuration Example·····························································································2-29
UDP Jitter Test Configuration Example······················································································2-30
SNMP Test Configuration Example····························································································2-33
TCP Test Configuration Example·······························································································2-34
UDP Echo Test Configuration Example ·····················································································2-35
DLSw Test Configuration Example ····························································································2-36
NQA Collaboration Configuration Example················································································2-37
3 NTP Configuration··································································································································3-1
NTP Overview······································································································································3-1
Applications of NTP······················································································································3-1
How NTP Works···························································································································3-2
NTP Message Format ··················································································································3-3
Operation Modes of NTP··············································································································3-5
NTP Configuration Task List················································································································3-7
Configuring the Operation Modes of NTP····························································································3-8
Configuring NTP Client/Server Mode···························································································3-8
Configuring the NTP Symmetric Peers Mode ··············································································3-9
Configuring NTP Broadcast Mode······························································································3-10
Configuring NTP Multicast Mode································································································3-11
Configuring Optional Parameters of NTP··························································································3-12
Specifying the Source Interface for NTP Messages···································································3-12
Disabling an Interface from Receiving NTP Messages······························································3-13
Configuring the Maximum Number of Dynamic Sessions Allowed ············································3-13
Configuring Access-Control Rights····································································································3-14
Configuration Prerequisites········································································································3-14
Configuration Procedure ············································································································3-14
Configuring NTP Authentication ········································································································3-15
Configuration Prerequisites········································································································3-15
Configuration Procedure ············································································································3-15
Displaying and Maintaining NTP········································································································3-17
NTP Configuration Examples ············································································································3-18
Configuring NTP Client/Server Mode·························································································3-18
Configuring the NTP Symmetric Mode·······················································································3-19
Configuring NTP Broadcast Mode······························································································3-20
Configuring NTP Multicast Mode································································································3-22
Configuring NTP Client/Server Mode with Authentication··························································3-25
Configuring NTP Broadcast Mode with Authentication ······························································3-26
4 IPC Configuration···································································································································4-1
IPC Overview·······································································································································4-1
Introduction to IPC························································································································4-1
Enabling IPC Performance Statistics Collection··················································································4-2
iii
Displaying and Maintaining IPC···········································································································4-3
5 PoE Configuration··································································································································5-1
PoE Overview······································································································································5-1
Introduction to PoE·······················································································································5-1
Protocol Specification···················································································································5-2
PoE Configuration Task List················································································································5-2
Enabling PoE·······································································································································5-4
Enabling PoE for a PoE Interface·································································································5-4
Detecting PDs······································································································································5-5
Enabling the PSE to Detect Non-Standard PDs···········································································5-5
Configuring a PD Disconnection Detection Mode········································································5-5
Configuring the Maximum PoE Interface Power··················································································5-6
Configuring PoE Power Management··································································································5-6
Configuring PoE Interface Power Management···········································································5-6
Configuring the PoE Monitoring Function····························································································5-8
Configuring PSE Power Monitoring······························································································5-8
Monitoring PD·······························································································································5-8
Configuring PoE Interface Through PoE Profile··················································································5-8
Configuring PoE Profile················································································································5-9
Applying PoE Profile·····················································································································5-9
Upgrading PSE Processing Software in Service ···············································································5-10
Displaying and Maintaining PoE········································································································5-11
PoE Configuration Example···············································································································5-11
Troubleshooting PoE ·························································································································5-12
6 SNMP Configuration ······························································································································6-1
SNMP Overview···································································································································6-1
SNMP Mechanism························································································································6-1
SNMP Protocol Version················································································································6-2
MIB Overview·······························································································································6-2
SNMP Configuration····························································································································6-3
Configuring SNMP Logging ·················································································································6-6
Introduction to SNMP Logging ·····································································································6-6
Enabling SNMP Logging ··············································································································6-6
Configuring SNMP Trap·······················································································································6-7
Enabling the Trap Function··········································································································6-7
Configuring Trap Parameters·······································································································6-8
Displaying and Maintaining SNMP ····································································································6-10
SNMPv1/SNMPv2c Configuration Example ······················································································6-11
SNMPv3 Configuration Example ·······································································································6-12
SNMP Logging Configuration Example ·····························································································6-13
7 MIB Style Configuration·························································································································7-1
Setting the MIB Style ···························································································································7-1
Displaying and Maintaining MIB ··········································································································7-1
iv
8 RMON Configuration······························································································································8-1
RMON Overview··································································································································8-1
Introduction···································································································································8-1
Working Mechanism·····················································································································8-1
RMON Groups······························································································································8-2
Configuring the RMON Statistics Collection························································································8-3
Configuring RMON Ethernet Statistics Collection········································································8-4
Configuring RMON History Statistics Collection···········································································8-4
Configuring the RMON Alarm Function ·······························································································8-5
Configuration Prerequisites··········································································································8-5
Configuration Procedure ··············································································································8-5
Displaying and Maintaining RMON······································································································8-7
Ethernet Statistics Group Configuration Example ···············································································8-7
History Group Configuration Example ·································································································8-8
Alarm Group Configuration Example·································································································8-10
9 Cluster Management Configuration ·····································································································9-1
Cluster Management Overview ···········································································································9-1
What is Cluster Management·······································································································9-1
Roles in a Cluster·························································································································9-1
How a Cluster Works····················································································································9-2
Cluster Configuration Task List············································································································9-6
Configuring the Management Device ··································································································9-7
Enabling NDP Globally and for Specific Ports··············································································9-7
Configuring NDP Parameters·······································································································9-8
Enabling NTDP Globally and for Specific Ports ···········································································9-9
Configuring NTDP Parameters·····································································································9-9
Manually Collecting Topology Information ·················································································9-10
Enabling the Cluster Function····································································································9-10
Establishing a Cluster·················································································································9-11
Enabling Management VLAN Auto-Negotiation ·········································································9-12
Configuring Communication Between the Management Device and the Member Devices·······9-12
Configuring Cluster Management Protocol Packets···································································9-13
Cluster Member Management····································································································9-13
Configuring the Member Devices ······································································································9-14
Enabling NDP·····························································································································9-14
Enabling NTDP···························································································································9-14
Manually Collecting Topology Information ·················································································9-14
Enabling the Cluster Function····································································································9-15
Deleting a Member Device from a Cluster ·················································································9-15
Configuring Access Between the Management Device and Member Devices··································9-15
Adding a Candidate Device to a Cluster····························································································9-16
Configuring Advanced Cluster Functions ··························································································9-16
Configuring Topology Management ···························································································9-16
Configuring Interaction for a Cluster ··························································································9-17
SNMP Configuration Synchronization························································································9-19
v
Configuring Web User Accounts in Batches ··············································································9-20
Displaying and Maintaining Cluster Management ·············································································9-20
Cluster Management Configuration Example····················································································9-21
10 Sampler Configuration·······················································································································10-1
Sampler Overview ·····························································································································10-1
Creating a Sampler····························································································································10-1
Displaying and Maintaining Sampler ·································································································10-2
Sampler Configuration Examples ······································································································10-2
Using the Sampler with NetStream····························································································10-2
11 Port Mirroring Configuration·············································································································11-1
Introduction to Port Mirroring·············································································································11-1
Classification of Port Mirroring ···································································································11-1
Implementing Port Mirroring·······································································································11-2
Configuring Local Port Mirroring········································································································11-4
Local Port Mirroring Configuration Task List··············································································11-4
Creating a Local Mirroring Group·······························································································11-5
Configuring Mirroring Ports for the Local Mirroring Group ·························································11-5
Configuring Mirroring CPUs for the Local Mirroring Group ························································11-6
Configuring the Monitor Port for the Local Mirroring Group ·······················································11-7
Configuring Layer 2 Remote Port Mirroring·······················································································11-8
Layer 2 Remote Port Mirroring Configuration Task List·····························································11-8
Configuration Prerequisites········································································································11-9
Configuring a Remote Source Mirroring Group (on the Source Device)····································11-9
Configuring a Remote Destination Mirroring Group (on the Destination Device)·····················11-12
Configuring Layer 3 Remote Port Mirroring·····················································································11-14
Layer 3 Remote Port Mirroring Configuration Task List···························································11-14
Configuration Prerequisites······································································································11-15
Configuring Local Mirroring Groups ·························································································11-15
Configuring Mirroring Ports for a Local Mirroring Group ··························································11-16
Configuring Mirroring CPUs for a Local Mirroring Group ·························································11-17
Configuring the Monitor Port for a Local Mirroring Group ························································11-17
Displaying and Maintaining Port Mirroring·······················································································11-18
Port Mirroring Configuration Examples····························································································11-18
Local Port Mirroring Configuration Example (in Mirroring Port Mode) ·····································11-18
Layer 2 Remote Port Mirroring Configuration Example····························································11-19
Layer 3 Remote Port Mirroring Configuration Example····························································11-21
12 Traffic Mirroring Configuration·········································································································12-1
Traffic Mirroring Overview··················································································································12-1
Configuring Traffic Mirroring··············································································································12-1
Mirroring Traffic to an Interface··································································································12-1
Mirroring Traffic to the CPU········································································································12-2
Applying a QoS Policy················································································································12-3
Displaying and Maintaining Traffic Mirroring······················································································12-5
Traffic Mirroring Configuration Examples ··························································································12-5
Example for Mirroring Traffic to an Interface··············································································12-5
vi
Configuration Procedure ············································································································12-5
13 NetStream Configuration···················································································································13-1
NetStream Overview··························································································································13-1
Basic Concepts of NetStream············································································································13-2
What Is a Flow····························································································································13-2
How NetStream Works···············································································································13-2
Key Technologies of NetStream········································································································13-3
Flow Aging··································································································································13-3
NetStream Data Export ··············································································································13-3
NetStream Export Formats·········································································································13-5
Introduction to NetStream Sampling and Filtering·············································································13-5
NetStream Sampling ··················································································································13-5
NetStream Filtering ····················································································································13-6
NetStream Configuration Task List····································································································13-6
Enabling NetStream···························································································································13-7
Configuring NetStream Filtering and Sampling ·················································································13-7
Configuring NetStream Filtering·································································································13-7
Configuring NetStream Sampling·······························································································13-9
Configuring NetStream Data Export ································································································13-10
Configuring NetStream Common Data Export ·········································································13-10
Configuring NetStream Aggregation Data Export ····································································13-11
Configuring Attributes of NetStream Export Data············································································13-13
Configuring NetStream Export Format·····················································································13-13
Configuring Refresh Rate for NetStream Version 9 Templates ···············································13-14
Configuring NetStream Flow Aging ·································································································13-15
Flow Aging Approaches ···········································································································13-15
Configuring NetStream Flow Aging··························································································13-16
Displaying and Maintaining NetStream····························································································13-16
NetStream Configuration Examples ································································································13-17
NetStream Common Data Export Configuration Example ·······················································13-17
NetStream Aggregation Data Export Configuration Example ··················································13-17
14 IPv6 NetStream Configuration ··········································································································14-1
IPv6 NetStream Overview ·················································································································14-1
Basic Concepts of IPv6 NetStream ···································································································14-2
What Is an IPv6 Flow ·················································································································14-2
How IPv6 NetStream Works·······································································································14-2
Key Technologies of IPv6 NetStream································································································14-3
Flow Aging··································································································································14-3
IPv6 NetStream Data Export······································································································14-3
IPv6 NetStream Export Formats ································································································14-4
Introduction to IPv6 NetStream Sampling and Filtering·····································································14-4
IPv6 NetStream Sampling··········································································································14-4
IPv6 NetStream Filtering ············································································································14-4
IPv6 NetStream Configuration Task List····························································································14-5
Enabling IPv6 NetStream ··················································································································14-5
vii
Configuring IPv6 NetStream Data Export··························································································14-6
Configuring IPv6 NetStream Common Data Export···································································14-6
Configuring IPv6 NetStream Aggregation Data Export······························································14-7
Configuring Attributes of IPv6 NetStream Data Export······································································14-9
Configuring IPv6 NetStream Export Format···············································································14-9
Configuring Refresh Rate for IPv6 NetStream Version 9 Templates·········································14-9
Displaying and Maintaining IPv6 NetStream ···················································································14-11
IPv6 NetStream Configuration Examples ························································································14-11
IPv6 NetStream Common Data Export Configuration Example···············································14-11
Pv6 NetStream Aggregation Data Export Configuration Example···········································14-12
15 sFlow Configuration···························································································································15-1
sFlow Overview ·································································································································15-1
Introduction to sFlow··················································································································15-1
Operation of sFlow·····················································································································15-1
Configuring sFlow······························································································································15-2
Displaying and Maintaining sFlow ·····································································································15-3
sFlow Configuration Example············································································································15-3
Troubleshooting sFlow Configuration································································································15-4
The Remote sFlow Collector Cannot Receive sFlow Packets ···················································15-4
16 Information Center Configuration·····································································································16-1
Information Center Overview·············································································································16-1
Introduction to Information Center······························································································16-1
Classification of System Information··························································································16-2
Eight Levels of System Information····························································································16-2
Eight Output Destinations and Ten Channels of System Information········································16-3
Outputting System Information by Source Module·····································································16-4
Default Output Rules of System Information··············································································16-4
System Information Format········································································································16-5
Configuring Information Center··········································································································16-7
Information Center Configuration Task List················································································16-7
Outputting System Information to the Console···········································································16-8
Outputting System Information to a Monitor Terminal································································16-9
Outputting System Information to a Log Host ··········································································16-10
Outputting System Information to the Trap Buffer····································································16-11
Outputting System Information to the Log Buffer·····································································16-12
Outputting System Information to the SNMP Module·······························································16-13
Outputting System Information to the Web Interface ·······························································16-15
Saving System Information to a Log File··················································································16-16
Configuring Synchronous Information Output··········································································16-17
Disabling a Port from Generating Link Up/Down Logging Information·····································16-17
Displaying and Maintaining Information Center···············································································16-18
Information Center Configuration Examples····················································································16-19
Outputting Log Information to a Unix Log Host········································································16-19
Outputting Log Information to a Linux Log Host·······································································16-21
Outputting Log Information to the Console···············································································16-22
viii
17 Index····················································································································································17-1
1-1
1 System Maintenance and Debugging
This chapter includes these sections:
z Ping
z Tracert
z System Debugging
z Ping and Tracert Configuration Example
You can use the ping command and the tracert command to verify the current network connectivity,
and use the debug command to enable debugging and thus to diagnose system faults based on the
debugging information.
Ping
Introduction
The ping command allows you to verify whether a device with a specified address is reachable, and
to examine network connectivity.
The ping function is implemented through the Internet Control Message Protocol (ICMP):
1) The source device sends an ICMP echo request to the destination device.
2) The source device determines whether the destination is reachable based on whether it
receives an ICMP echo reply; if the destination is reachable, the source device determines the
link quality based on the numbers of ICMP echo requests sent and replies received, determines
the distance between the source and destination based on the round trip time of ping packets.
Configuring Ping
Follow the step below to configure the ping function:
To do… Use the command… Remarks
ping
[
ip
] [ -
a
source-ip |
-c
count |
-f
| -
h
ttl | -
i
interface-type interface-number |
-m
interval |
-n
|
-p
pad |
-q
|
-r
|
-s
packet-size |
-t
timeout |
-tos
tos |
-v
|
-vpn-instance
vpn-instance-name ] * host
Check whether a specified
address in an IP network is
reachable
ping ipv6
[
-a
source-ipv6 |
-c
count |
-m
interval |
-s
packet-size |
-t
timeout ] * host
[
-i
interface-type interface-number ]
Required
Use either approach
The
ping
command is
applicable in an IPv4 network;
the
ping ipv6
command is
applicable in an IPv6 network.
Available in any view
1-2
z For a low-speed network, you are recommended to set a larger value for the timeout timer
(indicated by the -t parameter in the command) when configuring the ping command.
z Only the directly connected segment address can be pinged if the outgoing interface is
specified with the -i argument
Ping Configuration Example
Network requirements
As shown in Figure 1-1, check whether Device A and Device C can reach each other. If they can
reach each other, get the detailed information of routes from Device A to Device C.
Figure 1-1 Ping network diagram
Configuration procedure
# Use the ping command to display whether Device A and Device C can reach each other.
<DeviceA> ping 1.1.2.2
PING 1.1.2.2: 56 data bytes, press CTRL_C to break
Reply from 1.1.2.2: bytes=56 Sequence=1 ttl=254 time=205 ms
Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms
Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms
Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms
Reply from 1.1.2.2: bytes=56 Sequence=5 ttl=254 time=1 ms
--- 1.1.2.2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 1/41/205 ms
# Get the detailed information of routes from Device A to Device C.
<DeviceA> ping -r 1.1.2.2
PING 1.1.2.2: 56 data bytes, press CTRL_C to break
Reply from 1.1.2.2: bytes=56 Sequence=1 ttl=254 time=53 ms
Record Route:
1.1.2.1
1-3
1.1.2.2
1.1.1.2
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=2 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=3 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
Reply from 1.1.2.2: bytes=56 Sequence=5 ttl=254 time=1 ms
Record Route:
1.1.2.1
1.1.2.2
1.1.1.2
1.1.1.1
--- 1.1.2.2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 1/11/53 ms
The principle of ping –r is as shown in Figure 1-1.
1) The source (Device A) sends an ICMP echo request with the RR option being empty to the
destination (Device C).
2) The intermediate device (Device B) adds the IP address (1.1.2.1) of its outbound interface to
the RR option of the ICMP echo request, and forwards the packet.
3) Upon receiving the request, the destination device copies the RR option in the request and
adds the IP address (1.1.2.2) of its outbound interface to the RR option. Then the destination
device sends an ICMP echo reply.
4) The intermediate device adds the IP address (1.1.1.2) of its outbound interface to the RR option
in the ICMP echo reply, and then forwards the reply.
5) Upon receiving the reply, the source device adds the IP address (1.1.1.1) of its inbound
interface to the RR option. Finally, you can get the detailed information of routes from Device A
to Device C: 1.1.1.1 <-> {1.1.1.2; 1.1.2.1} <-> 1.1.2.2.
1-4
Tracert
Introduction
By using the tracert command, you can trace the Layer 3 devices involved in delivering an IP
packet from source to destination to check whether a network is available. This is useful for
identification of failed node(s) in the event of network failure.
Figure 1-2 Tracert diagram
The tracert function is implemented through ICMP, as shown in
Figure 1-2:
1) The source (Device A) sends a packet with a TTL value of 1 to the destination (Device D). The
UDP port of the packet is a port number that will not be used by any application of the
destination.
2) The first hop (Device B) (the Layer 3 device that first receives the packet) responds by sending
a TTL-expired ICMP error message to the source, with its IP address 1.1.1.2 encapsulated. In
this way, the source device can get the address (1.1.1.2) of the first Layer 3 device.
3) The source device sends a packet with a TTL value of 2 to the destination device.
4) The second hop (Device C) responds with a TTL-expired ICMP error message, which gives the
source device the address (1.1.2.2) of the second Layer 3 device.
5) The above process continues until the ultimate destination device is reached. No application of
the destination uses this UDP port. Therefore, the destination replies a port unreachable ICMP
error message with the destination IP address 1.1.3.2.
6) When the source device receives the port unreachable ICMP error message, it knows that the
packet has reached the destination, and it can get the addresses of all the Layer 3 devices
involved to get to the destination device (1.1.1.2, 1.1.2.2, 1.1.3.2).
Configuring Tracert
Configuration prerequisites
z Enable sending of ICMP timeout packets on the intermediate device (the device between the
source and destination devices). If the intermediate device is an H3C device, execute the ip
ttl-expires enable command on the device. For more information about this command, see IP
Performance Optimization Configuration Commands in the Layer 3 - IP Services Command
Reference.
1-5
z Enable sending of ICMP destination unreachable packets on the destination device. If the
destination device is an H3C device, execute the ip unreachables enable command. For more
information about this command, see IP Performance Optimization Configuration Commands in
the Layer 3 - IP Services Command Reference.
Tracert configuration
Follow these steps to configure tracert:
To do… Use the command… Remarks
Enter system view
system-view
—
tracert
[
-a
source-ip |
-f
first-ttl |
-m
max-ttl |
-p
port |
-q
packet-number |
-vpn-instance
vpn-instance-name |
-w
timeout ] * host
Display the routes from source
to destination
tracert ipv6
[
-f
first-ttl |
-m
max-ttl |
-p
port |
-q
packet-number |
-w
timeout ] *
host
Required
Use either approach
The
tracert
command is
applicable in an IPv4 network;
the
tracert ipv6
command is
applicable in an IPv6 network.
Available in any view
System Debugging
Introduction to System Debugging
The device provides various debugging functions. For the majority of protocols and features
supported, the system provides corresponding debugging information to help users diagnose errors.
The following two switches control the display of debugging information:
z Protocol debugging switch, which controls protocol-specific debugging information.
z Screen output switch, which controls whether to display the debugging information on a certain
screen.
As
Figure 1-3 illustrates, assume the device can provide debugging for the three modules 1, 2, and
3. The debugging information can be output on a terminal only when both the protocol debugging
switch and the screen output switch are turned on.
1-6
Figure 1-3 The relationship between the protocol and screen output switch
Debugging
information
Protocol
debugging
switch
switch
Screen output
OFF
ON
OFF
ON
1
3
1 2 3
OFF
ON
ON
1
3
1 2 3
1
3
ON
Debugging
information
switch
Screen output
Protocol
switch
debugging
Configuring System Debugging
Output of the debugging information may reduce system efficiency. Administrators usually use the
debugging commands to diagnose network failure. After completing the debugging, disable the
corresponding debugging function, or use the undo debugging all command to disable all the
debugging functions.
Output of debugging information depends on the configurations of the information center and the
debugging commands of each protocol and functional module. Displaying the debugging
information on a terminal (including console or VTY) is a common way to output debugging
information. You can also output debugging information to other destinations. For more information,
see Information Center Configuration Commands in the Network Management and Monitoring
Command Reference. By default, you can output debugging information to a terminal by following
these steps:
To do… Use the command… Remarks
Enable the terminal monitoring of
system information
terminal monitor
Optional
The terminal monitoring on the
console is enabled by default and
that on the monitoring terminal is
disabled by default.
Available in user view
Enable the terminal display of
debugging information
terminal debugging
Required
Disabled by default
Available in user view
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252

H3C s5820x series Configuration manual

Category
Software
Type
Configuration manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI