HP MSR1003-8S Command Reference Manual

HP MSR1003-8S Command Reference Manual

Msr series network management and monitoring
Hide thumbs Also See for MSR1003-8S:
Table of Contents

Advertisement

HP MSR Router Series
Network Management and Monitoring
Command Reference(V7)
Part number: 5998-7743b
Software version: CMW710-R0304
Document version: 6PW104-20150914
i

Advertisement

Table of Contents
loading

Summary of Contents for HP MSR1003-8S

  • Page 1 HP MSR Router Series Network Management and Monitoring Command Reference(V7) Part number: 5998-7743b Software version: CMW710-R0304 Document version: 6PW104-20150914...
  • Page 2 The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an...
  • Page 3: Table Of Contents

    Contents Ping, tracert, and system debugging commands ······································································································· 1   debugging ································································································································································· 1   display debugging ··················································································································································· 2   ping ············································································································································································ 2   ping ipv6 ··································································································································································· 5   tracert ········································································································································································· 8   tracert ipv6 ································································································································································ 9   NQA commands ························································································································································ 12  ...
  • Page 4 reaction checked-element { owd-ds | owd-sd } ·································································································· 55   reaction checked-element icpif ····························································································································· 56   reaction checked-element mos ····························································································································· 57   reaction checked-element packet-loss ·················································································································· 58   reaction checked-element probe-duration ··········································································································· 59   reaction checked-element probe-fail (for trap) ···································································································· 61  ...
  • Page 5 ntp-service multicast-server ·································································································································· 110   ntp-service refclock-master ·································································································································· 111   ntp-service reliable authentication-keyid ··········································································································· 112   ntp-service source ················································································································································ 112   ntp-service unicast-peer ······································································································································· 113   ntp-service unicast-server ···································································································································· 115   SNTP commands ····················································································································································· 117   display sntp ipv6 sessions ·································································································································· 117  ...
  • Page 6 display snmp-agent trap-list ································································································································ 172   display snmp-agent usm-user ······························································································································ 172   enable snmp trap updown ································································································································· 174   snmp-agent ··························································································································································· 175   snmp-agent calculate-password ························································································································· 176   snmp-agent community ······································································································································· 177   snmp-agent community-map ······························································································································· 180   snmp-agent context ·············································································································································· 181  ...
  • Page 7 display snmp mib event trigger ·························································································································· 237   event enable ························································································································································· 240   event owner (trigger-Boolean view) ··················································································································· 241   event owner (trigger-existence view) ················································································································· 241   falling ···································································································································································· 242   frequency ······························································································································································ 243   object list owner (action-notification view) ········································································································ 244  ...
  • Page 8 cwmp cpe password ··········································································································································· 278   cwmp cpe provision-code ··································································································································· 279   cwmp cpe stun enable ········································································································································ 280   cwmp cpe username ··········································································································································· 281   cwmp cpe wait timeout ······································································································································· 281   cwmp enable ······················································································································································· 282   display cwmp configuration ······························································································································· 283  ...
  • Page 9 Sampler configuration commands ························································································································· 353   display sampler ··················································································································································· 353   sampler ································································································································································· 354   Port mirroring commands ······································································································································· 356   display mirroring-group ······································································································································ 356   mirroring-group ···················································································································································· 357   mirroring-group mirroring-port (interface view) ································································································ 357   mirroring-group mirroring-port (system view) ··································································································· 358  ...
  • Page 10 sFlow commands ····················································································································································· 408   display sflow ························································································································································ 408   sflow agent ··························································································································································· 409   sflow collector ······················································································································································ 410   sflow counter interval ·········································································································································· 411   sflow counter collector ········································································································································ 411   sflow flow collector ·············································································································································· 412   sflow flow max-header ········································································································································ 413  ...
  • Page 11 Packet capture commands ······································································································································ 448   packet-capture interface ····································································································································· 448   packet-capture read ············································································································································ 450   Support and other resources ·································································································································· 452   Contacting HP ······························································································································································ 452   Subscription service ············································································································································ 452   Related information ······················································································································································ 452   Documents ···························································································································································· 452  ...
  • Page 12: Ping, Tracert, And System Debugging Commands

    Ping, tracert, and system debugging commands debugging Use debugging to enable debugging for a module. Use undo debugging to disable debugging for a module. Syntax debugging { all [ timeout time ] | module-name [ option ] } undo debugging { all | module-name [ option ] } Default Debugging functions are disabled for all modules.
  • Page 13: Display Debugging

    display debugging Use display debugging to display the enabled debugging functions. Syntax display debugging [ module-name ] Views Any view Predefined user roles network-admin network-operator Parameters module-name: Specifies a module by its name. To display the current module name, use the display debugging ? command.
  • Page 14 -f: Sets the "do-not-fragment" bit in the IP header. -h ttl: Specifies the TTL value of ICMP echo requests. The value range is 1 to 255, and the default is 255. -i interface-type interface-number: Specifies the source interface for ICMP echo requests. If you do not specify this option, the system uses the primary IP address of the matching route's egress interface as the source interface for ICMP echo requests.
  • Page 15 <Sysname> ping 1.1.2.2 Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break 56 bytes from 1.1.2.2: icmp_seq=0 ttl=254 time=2.137 ms 56 bytes from 1.1.2.2: icmp_seq=1 ttl=254 time=2.051 ms 56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms 56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms 56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms --- Ping statistics for 1.1.2.2 --- 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss...
  • Page 16: Ping Ipv6

    The output shows that: • The destination is reachable. The route is 1.1.1.1 <-> {1.1.1.2; 1.1.2.1} <-> 1.1.2.2. • Table 1 Command output Field Description Test whether the device with IP address 1.1.2.2 is reachable. There are Ping 1.1.2.2 (1.1.2.2): 56 data 56 bytes in each ICMP echo request.
  • Page 17 -c count: Specifies the number of ICMPv6 echo requests that are sent to the destination. The value range is 1 to 4294967295, and the default is 5. -i interface-type interface-number: Specifies the source interface for ICMPv6 echo requests. This option must be specified when the destination address is a multicast address or a link local address.
  • Page 18 Ping6(56 data bytes) 2001::1 --> 2001::2, press CTRL_C to break --- Ping6 statistics for 2001::2 --- 5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 4.000/25.000/62.000/20.000 ms # Test whether the IPv6 address (2001::2) is reachable. Detailed ping information is displayed. <Sysname>...
  • Page 19: Tracert

    tracert Use tracert to trace the path the packets traverse from source to destination. Syntax tracert [ -a source-ip | -f first-ttl | -m max-ttl | -p port | -q packet-number | -t tos | { -topology topo-name |-vpn-instance vpn-instance-name } | -w timeout ] * host Views Any view Predefined user roles...
  • Page 20: Tracert Ipv6

    Examples # Display the path that the packets traverse from source to destination (1.1.2.2). <Sysname> tracert 1.1.2.2 traceroute to 1.1.2.2 (1.1.2.2), 30 hops at most, 40 bytes each packet, press CTRL_C to break 1.1.1.2 (1.1.1.2) 673 ms 425 ms 30 ms 1.1.2.2 (1.1.2.2) 580 ms 470 ms 80 ms # Trace the path to destination (192.168.0.46) over an MPLS network.
  • Page 21 Syntax tracert ipv6 [ -f first-hop | -m max-hops | -p port | -q packet-number | -t traffic-class | -vpn-instance vpn-instance-name | -w timeout ] * host Views Any view Predefined user roles network-admin Parameters -f first-hop: Specifies the TTL value of the first packet. The value range is 1 to 255, and the default is 1. The value must be no greater than the value of the max-hops argument.
  • Page 22 Table 4 Command output Field Description Display the route that the IPv6 packets traverse from the current device to traceroute to 2001:3::2 the device whose IP address is 2001:3:2. Maximum number of hops of the probe packets, which can be set by the hops at most -m keyword.
  • Page 23: Nqa Commands

    NQA commands NQA client commands advantage-factor Use advantage-factor to set the advantage factor to be used for calculation of Mean Opinion Scores (MOS) and Calculated Planning Impairment Factor (ICPIF) values. Use undo advantage-factor to restore the default. Syntax advantage-factor factor undo advantage-factor Default The advantage factor is 0.
  • Page 24: Community Read

    Syntax codec-type { g71 1a | g71 1u | g729a } undo codec-type Default The codec type for the voice operation is G.71 1 A-law. Views Voice operation view Predefined user roles network-admin Parameters g71 1a: Specifies G.71 1 A-law codec type. g71 1u: Specifies G.71 1 μ-law codec type g729a: Specifies G.729 A-law codec type.
  • Page 25: Data-Fill

    Usage guidelines Execute this command to specify the community name on the NQA client if the SNMP agent runs SNMPv1 or SNMPv2c. The specified community name must be the read-only community name that has been configured on the SNMP agent. If the SNMP agent runs SNMPv3, you do not need to specify the community name on the NQA client.
  • Page 26: Data-Size

    For the UDP jitter operation, the first 68 bytes of the payload of a UDP packet are for special • purpose. The string fills the remaining part of the payload. For the voice operation, the first 16 bytes of the payload of a UDP packet are for special purpose. •...
  • Page 27: Description (Any Nqa Operation Type View)

    Predefined user roles network-admin Parameters size: Specifies the payload size. Available value ranges include: • 20 to 8100 bytes for the ICMP echo, UDP echo, or UDP tracert operation. 68 to 8100 bytes for the UDP jitter or path jitter operation. •...
  • Page 28: Destination Ip

    destination ip Use destination ip to configure the destination IP address for the operation. Use undo destination ip to remove the destination IP address. Syntax destination ip ip-address undo destination ip Default No destination IP address is configured for the operation. Views DHCP/DLSw/DNS/SNMP/TCP/voice operation view ICMP/UDP echo operation view...
  • Page 29: Destination Port

    Parameters ipv6-address: Specifies the destination IPv6 address for the operation. IPv6 link-local addresses are not supported. Examples # Specify 1::1 as the destination IPv6 address for the ICMP echo operation. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] destination ipv6 1::1 destination port Use destination port to configure the destination port number for the operation.
  • Page 30 Syntax display nqa history [ admin-name operation-tag ] Views Any view Predefined user roles network-admin network-operator Parameters admin-name operation-tag: Specifies an NQA operation by its administrator name and operation tag. The admin-name argument represents the name of the administrator who creates the NQA operation. The operation-tag argument represents the operation tag.
  • Page 31: Display Nqa Reaction Counters

    Table 6 Command output Field Description History record ID. Index The history records in one UDP tracert operation have the same ID. TTL value in the probe packet. Round-trip time if the operation succeeds, timeout time upon timeout, or 0 if the Response operation cannot be completed, in milliseconds.
  • Page 32 Examples # Display the monitoring results of all reaction entries of the ICMP echo operation with the administrator name admin and the operation tag test. <Sysname> display nqa reaction counters admin test NQA entry (admin admin, tag test) reaction counters: Index Checked Element Threshold Type...
  • Page 33: Display Nqa Result

    Monitored Threshold performance Collect data in Checked Num Over-threshold Num type metric Packets sent after Number of packets with Number of sent the operation the one-way delay OWD-DS/OWD-SD packets. starts. exceeding the threshold. Packets sent after Number of sent packet-loss accumulate the operation Total packet loss.
  • Page 34 # Display the most recent result of the UDP jitter operation. <Sysname> display nqa result admin test NQA entry (admin admin, tag test) test results: Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 15/46/26 Square-Sum of round trip time: 8103 Last packet received time: 2011-05-29 10:56:38.7 Extended results: Packet loss ratio: 0%...
  • Page 35 Packets out of sequence: 0 Packets arrived late: 0 Voice results: RTT number: 0 Min positive SD: 0 Min positive DS: 0 Max positive SD: 0 Max positive DS: 0 Positive SD number: 0 Positive DS number: 0 Positive SD sum: 0 Positive DS sum: 0 Positive SD average: 0 Positive DS average: 0...
  • Page 36 Negative jitter number: 0 Min/Max/Average negative jitter: 0/0/0 Sum/Square-Sum negative jitter: 0/0 Hop IP 192.168.50.209 Basic Results: Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 1/1/1 Square-Sum of round trip time: 10 Extended Results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to internal error: 0 Failures due to other errors: 0...
  • Page 37 Field Description Square-Sum of round trip time Square sum of round-trip time. Time when the last successful probe was completed. If no probes are successful in an operation, the field displays 0. Last succeeded probe time This field is not available for UDP jitter, path jitter, and voice operations.
  • Page 38 Field Description Maximum absolute value among negative jitters from source to Max negative SD destination. Maximum absolute value among negative jitters from destination to Max negative DS source. Negative SD number Number of negative jitters from source to destination. Negative DS number Number of negative jitters from destination to source.
  • Page 39: Display Nqa Statistics

    Field Description Number of jitters. Jitter number This field is available only for the path jitter operation. Minimum/maximum/average jitter in milliseconds. Min/Max/Average jitter This field is available only for the path jitter operation. Number of positive jitter. Positive jitter number This field is available only for the path jitter operation.
  • Page 40 Usage guidelines The statistics are generated after the NQA operation completes. If you execute the display nqa statistics command before the operation completes, the statistics are displayed as all 0s. If a reaction entry is configured, the command displays the monitoring results of the reaction entry in the period specified by the statistics internal command.
  • Page 41 Positive SD number: 220 Positive DS number: 97 Positive SD sum: 283 Positive DS sum: 287 Positive SD average: 1 Positive DS average: 2 Positive SD square-sum: 709 Positive DS square-sum: 1937 Min negative SD: 2 Min negative DS: 1 Max negative SD: 10 Max negative DS: 1 Negative SD number: 81...
  • Page 42 Positive SD average: 6 Positive DS average: 1 Positive SD square-sum: 134 Positive DS square-sum: 2 Min negative SD: 3 Min negative DS: 1 Max negative SD: 9 Max negative DS: 1 Negative SD number: 4 Negative DS number: 2 Negative SD sum: 25 Negative DS sum: 2 Negative SD average: 6...
  • Page 43 Min/Max/Average negative jitter: 0/0/0 Sum/Square-Sum negative jitter: 0/0 Hop IP 192.168.50.209 Basic Results: Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 1/1/1 Square-Sum of round trip time: 10 Extended Results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0...
  • Page 44 Field Description UDP jitter operation results. UDP-jitter results This field is available only for the UDP jitter operation. Voice operation results. Voice results This field is available only for the voice operation. RTT number Number of response packets received. Min positive SD Minimum positive jitter from source to destination.
  • Page 45 Field Description Unidirectional delay result. One way results This field is available only for the UDP jitter and voice operations. Max SD delay Maximum delay from source to destination. Max DS delay Maximum delay from destination to source. Min SD delay Minimum delay from source to destination.
  • Page 46 Field Description Minimum/maximum/average positive jitter in milliseconds. Min/Max/Average jitter This field is available only for the path jitter operation. Number of positive jitters. Positive jitter number This field is available only for the path jitter operation. Minimum/maximum/average positive jitter in milliseconds. Min/Max/Average positive jitter This field is available only for the path jitter operation.
  • Page 47: Filename

    Monitored Threshold performance Collect data in Checked Num Over-threshold Num type metric Packets sent in Number of sent the counting packet-loss accumulate Number of packet loss. packets. interval. ICPIF Related commands statistics interval filename Use filename to specify a file to be transferred between the FTP server and the FTP client. Use undo filename to restore the default.
  • Page 48: History-Record Enable

    undo frequency Default In NQA operation view, the interval between two consecutive voice or path jitter operations is 60000 milliseconds. The interval between two consecutive operations of other types is 0 milliseconds. Only one operation is performed. Views Any NQA operation view Predefined user roles network-admin Parameters...
  • Page 49: History-Record Keep-Time

    The undo form of the command also removes existing history records of an NQA operation. Examples # Enable the saving of history records for the NQA operation. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] history-record enable Related commands display nqa history history-record keep-time...
  • Page 50: History-Record Number

    history-record number Use history-record number to set the maximum number of history records that can be saved for an NQA operation. Use undo history-record number to restore the default. Syntax history-record number number undo history-record number Default A maximum of 50 records can be saved for an NQA operation. Views DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP operation view ICMP/UDP echo operation view...
  • Page 51: Lsr-Path

    Views UDP tracert operation view Predefined user roles network-admin Parameters value: Specifies the TTL value in the range of 1 to 255. Examples # Set the TTL value to 5 for the UDP packets in the start round. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-tracert [Sysname-nqa-admin-test-udp-tracert] init-ttl 5...
  • Page 52: Max-Failure

    max-failure Use max-failure to set the maximum number of consecutive probe failures in a UDP tracert operation. Use undo max-failure to restore the default. Syntax max-failure value undo max-failure Default A UDP tracert operation stops and fails when it detects five consecutive probe failures. Views UDP tracert operation view Predefined user roles...
  • Page 53: Next-Hop

    Parameters active: Sets the data transmission mode to active. The FTP server initiates a connection request. passive: Sets the data transmission mode to passive. The FTP client initiates a connection request. Examples # Set the data transmission mode to passive for the FTP operation. <Sysname>...
  • Page 54: No-Fragment Enable

    Default No next hop IPv6 address is configured for the ICMP echo operation. Views ICMP echo operation view Predefined user roles network-admin Parameters ipv6-address: Specifies the IPv6 address of the next hop. IPv6 link-local addresses are not supported. Examples # Specify 10::1 as the next hop IPv6 address for the ICMP echo operation. <Sysname>...
  • Page 55: Nqa

    Use nqa to create an NQA operation and enter its view. Use undo nqa to remove the operation. Syntax nqa entry admin-name operation-tag undo nqa { all | entry admin-name operation-tag } Default No NQA operation is created. Views System view Predefined user roles network-admin Parameters...
  • Page 56: Nqa Schedule

    Views System view Predefined user roles network-admin Examples # Enable the NQA client. <Sysname> system-view [Sysname] nqa agent enable Related commands nqa server enable nqa schedule Use nqa schedule to configure scheduling parameters for an NQA operation. Use undo nqa schedule to stop the operation. Syntax nqa schedule admin-name operation-tag start-time { hh:mm:ss [ yyyy/mm/dd | mm/dd/yyyy ] | now } lifetime { lifetime | forever } [ recurring ]...
  • Page 57: Operation (Ftp Operation View)

    forever: Performs the operation until you stop it by using the undo nqa schedule command. recurring: Runs the operation automatically at the start time and for the specified duration. Usage guidelines You cannot enter the operation view or operation type view of a scheduled NQA operation. Specify a lifetime long enough for an operation to complete.
  • Page 58: Operation (Http Operation View)

    Examples # Set the operation type to put for the FTP operation. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] operation put operation (HTTP operation view) Use operation to specify the operation type for the HTTP operation. Use undo operation to restore the default.
  • Page 59: Password

    Syntax out interface interface-type interface-number undo out interface Default The output interface for probe packets is not specified. The NQA client determines the output interface based on the routing table lookup. Views DHCP operation view, ICMP echo operation view, UDP tracert operation view Predefined user roles network-admin Parameters...
  • Page 60: Probe Count

    password: Specifies the password string. This argument is case sensitive. If you specify the simple keyword, the password must be a string of 1 to 32 characters. If you specify the cipher keyword, the password must be a string of 1 to 73 characters. Usage guidelines For security purposes, all passwords, including passwords configured in plain text, are saved in cipher text.
  • Page 61: Probe Packet-Interval

    Usage guidelines The following describes how NQA performs different types of operations: A TCP or DLSw operation sets up a connection. • • A UDP jitter or voice operation sends a number of probe packets. The number of probe packets is set by using the probe packet-number command.
  • Page 62: Probe Packet-Number

    Views Path jitter operation view, UDP jitter operation view, voice operation view Predefined user roles network-admin Parameters packet-interval: Specifies the interval for sending packets, in the range of 10 to 60000 milliseconds. Examples # Configure the UDP jitter operation to send packets at an interval of 100 milliseconds. <Sysname>...
  • Page 63: Probe Packet-Timeout

    probe packet-timeout Use probe packet-timeout to set the timeout time for waiting for a response in the UDP jitter, path jitter, or voice operation. Use undo probe packet-timeout to restore the default. Syntax probe packet-timeout packet-timeout undo probe packet-timeout Default The response timeout time in the UDP jitter or path jitter operation is 3000 milliseconds.
  • Page 64: Raw-Request

    Predefined user roles network-admin Parameters timeout: Specifies the probe timeout time in milliseconds. Available value ranges include: • 10 to 86400000 for the FTP or HTTP operation. 10 to 3600000 for the DHCP, DNS, DLSw, ICMP echo, SNMP, TCP, UDP echo, or UDP tracert •...
  • Page 65: Reaction Checked-Element { Jitter-Ds | Jitter-Sd

    reaction checked-element { jitter-ds | jitter-sd } Use reaction checked-element { jitter-ds | jitter-sd } to configure a reaction entry for monitoring one-way jitter in the NQA operation. Use undo reaction to delete the specified reaction entry. Syntax reaction item-number checked-element { jitter-ds | jitter-sd } threshold-type { accumulate accumulate-occurrences | average } threshold-value upper-threshold lower-threshold [ action-type { none | trap-only } ] undo reaction item-number...
  • Page 66: Reaction Checked-Element { Owd-Ds | Owd-Sd

    Examples # Create reaction entry 1 for monitoring the average destination-to-source jitter of UDP jitter packets, and set the upper limit to 50 milliseconds and the lower limit to 5 milliseconds. Before the NQA operation starts, the initial state of the reaction entry is invalid. After the operation, the average destination-to-source jitter is checked against the threshold range.
  • Page 67: Reaction Checked-Element Icpif

    threshold-value: Specifies threshold range in milliseconds. upper-threshold: Specifies the upper limit in the range of 0 to 3600000. lower-threshold: Specifies the lower limit in the range of 0 to 3600000. It must not be greater than the upper limit. Usage guidelines You cannot edit a reaction entry after it is created.
  • Page 68: Reaction Checked-Element Mos

    upper-threshold: Specifies the upper limit in the range of 1 to 100. lower-threshold: Specifies the lower limit in the range of 1 to 100. It must not be greater than the upper limit. action-type: Specifies what action to be triggered. The default action is none. none: Specifies the action of displaying results on the terminal display.
  • Page 69: Reaction Checked-Element Packet-Loss

    upper-threshold: Specifies the upper limit in the range of 1 to 500. lower-threshold: Specifies the lower limit in the range of 1 to 500. It must not be greater than the upper limit. action-type: Specifies what action to be triggered. The default action is none. none: Specifies the action of displaying results on the terminal display.
  • Page 70: Reaction Checked-Element Probe-Duration

    threshold-type: Specifies a threshold type. accumulate accumulate-occurrences: Specifies the total number of lost packets in the operation. The value is in the range of 1 to 15000 for the UDP jitter operation and 1 to 60000 for the voice operation. action-type: Specifies what action to be triggered.
  • Page 71 threshold-type: Specifies a threshold type. accumulate accumulate-occurrences: Checks the total number of threshold violations. The value is in the range of 1 to 15. average: Checks the average probe duration. consecutive consecutive-occurrences: Specifies the number of consecutive threshold violations after the NQA operation starts.
  • Page 72: Reaction Checked-Element Probe-Fail (For Trap)

    initial state of the reaction entry is invalid. After the operation, the consecutive probe duration is checked against the threshold range. If the total number of consecutive threshold violations reaches or exceeds 10, the state of the entry is set to over-threshold. If it is below the lower threshold, the state of the entry is set to below-threshold.
  • Page 73: Reaction Checked-Element Probe-Fail (For Trigger)

    Examples # Create reaction entry 1 for monitoring the probe failures in ICMP echo operation. Before the NQA operation starts, the initial state of the reaction entry is invalid. If the total number of probe failures reaches or exceeds 10, the state of the entry is set to over-threshold. If it is below the threshold, the state of the entry is set to below-threshold.
  • Page 74: Reaction Checked-Element Rtt

    trigger-only: Triggers other modules to react to certain conditions. Usage guidelines You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use the undo reaction command to delete the entry, and then configure a new one. Examples # Create reaction entry 1.
  • Page 75: Reaction Trap

    lower-threshold: Specifies the lower limit in the range of 0 to 3600000. It must not be greater than the upper limit. action-type: Specifies what action to be triggered. The default action is none. none: Specifies the action of displaying results on the terminal display. trap-only: Specifies the action of displaying results on the terminal display and meanwhile sending SNMP trap messages to the NMS.
  • Page 76: Resolve-Target

    Views DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP/voice operation view ICMP/UDP echo operation view UDP jitter operation view UDP tracert operation view Predefined user roles network-admin Parameters path-change: Sends a trap when the UDP tracert operation detects a different path to the destination. probe-failure consecutive-probe-failures: Sends a trap to the NMS if the number of consecutive probe failures in an operation is greater than or equal to consecutive-probe-failures.
  • Page 77: Route-Option Bypass-Route

    Views DNS operation view Predefined user roles network-admin Parameters domain-name: Specifies the domain name to be resolved. It is a dot-separated case-sensitive string of 1 to 255 characters including letters, digits, hyphens (-), and underscores (_) (for example, aabbcc.com). Each part consists of 1 to 63 characters, and consecutive dots (.) are not allowed. Examples # Specify domain1 as the domain name to be resolved.
  • Page 78: Source Interface

    [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] route-option bypass-route source interface Use source interface to specify the IP address of the specified interface as the source IP address of probe packets. Use undo source interface to restore the default. Syntax source interface interface-type interface-number undo source interface...
  • Page 79: Source Ipv6

    Syntax source ip ip-address undo source ip Default No source IP address is configured for probe packets. Views DHCP/DLSw/FTP/HTTP/SNMP/TCP/voice operation view ICMP/UDP echo operation view Path/UDP jitter operation view UDP tracert operation view Predefined user roles network-admin Parameters ip-address: Specifies the source IP address for probe packets. Usage guidelines If you configure both the source interface and source ip commands for an ICMP echo or UDP tracert operation, the most recent configuration takes effect.
  • Page 80: Source Port

    Views ICMP echo operation view Predefined user roles network-admin Parameters ipv6-address: Specifies the source IPv6 address for probe packets. IPv6 link-local addresses are not supported. Usage guidelines If you configure both the source interface and source ipv6 commands for an ICMP echo operation, the most recent configuration takes effect.
  • Page 81: Statistics Hold-Time

    Examples # Set the source port number to 8000 for probe packets in the UDP echo operation. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type udp-echo [Sysname-nqa-admin-test-udp-echo] source port 8000 statistics hold-time Use statistics hold-time to set the hold time of statistics groups for an NQA operation. Use undo statistics hold-time to restore the default.
  • Page 82: Statistics Max-Group

    Default The interval is 60 minutes. Views DHCP/DLSw/DNS/FTP/HTTP/SNMP/TCP/voice operation view ICMP/UDP echo operation view Path/UDP jitter operation view Predefined user roles network-admin Parameters interval: Specifies the interval in minutes, in the range of 1 to 35791394. Usage guidelines NQA forms statistics within the same collection interval as a statistics group. To display information about the statistics groups, use the display nqa statistics command.
  • Page 83: Target-Only

    Usage guidelines When the maximum number of statistics groups is reached and a new statistics group is to be saved, the earliest statistics group is deleted. Examples # Configure the NQA to save up to five statistics groups for the ICMP operation. <Sysname>...
  • Page 84: Ttl

    Views Any operation view Predefined user roles network-admin Parameters value: Specifies the ToS value in the range of 0 to 255. Examples # Set the ToS value to 1 in the IP header for probe packets. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] tos 1 Use ttl to set the maximum number of hops that the probe packets can traverse.
  • Page 85: Type

    Examples # Set the maximum number of hops to 16 for probe packets. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] ttl 16 type Use type to specify the operation type of the NQA operation and enter operation type view. Syntax type { dhcp | dlsw | dns | ftp | http | icmp-echo | path-jitter | snmp | tcp | udp-echo | udp-jitter | udp-tracert | voice }...
  • Page 86: Url

    Use url to specify the URL of the destination HTTP or FTP server. Use undo url to remove the URL. Syntax url url undo url Default No URL is configured for the destination server. Views FTP/HTTP operation view Predefined user roles network-admin Parameters url: Specifies the URL of the destination server, a case-sensitive string of 1 to 255 characters.
  • Page 87: Version

    Views FTP/HTTP operation view Predefined user roles network-admin Parameters username: Specifies the username, a case-sensitive string of 1 to 32 characters. Examples # Set the FTP login username to administrator. <Sysname> system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] username administrator Related commands operation...
  • Page 88: Vpn-Instance

    vpn-instance Use vpn-instance to apply the operation to a VPN. Use undo vpn-instance to restore the default. Syntax vpn-instance vpn-instance-name undo vpn-instance Default The operation applies to the public network. Views Any operation view Predefined user roles network-admin Parameters vpn-instance-name: Specifies the name of a VPN instance, a case-sensitive string of 1 to 31 characters. Usage guidelines After you specify the VPN, the NQA operation tests the connectivity in the specified VPN.
  • Page 89: Nqa Server Enable

    network-operator Examples # Display NQA server status. <Sysname> display nqa server NQA server status: Enabled TCP connect: IP Address Port Vpn-instance 2.2.2.2 2000 UDP echo: IP Address Port Vpn-instance 3.3.3.3 3000 vpn1 Table 12 Command output Field Description NQA server status Whether the NQA server is enabled.
  • Page 90: Nqa Server Tcp-Connect

    Related commands display nqa server • nqa server tcp-connect • • nqa server udp-echo nqa server tcp-connect Use nqa server tcp-connect to configure a TCP listening service to enable the NQA server to listen and respond to the specified IP address and port. Use undo nqa server tcp-connect to remove a TCP listening service.
  • Page 91: Nqa Server Udp-Echo

    Related commands display nqa server • nqa server enable • nqa server udp-echo Use nqa server udp-echo to configure a UDP listening service to enable the NQA server to listen and respond on the specified IP address and port. Use undo nqa server udp-echo to remove the UDP listening service created. Syntax nqa server udp-echo ip-address port-number [ vpn-instance vpn-instance-name ] [ tos tos ] undo nqa server udp-echo ip-address port-number...
  • Page 92 Related commands display nqa server • nqa server enable •...
  • Page 93: Ntp Commands

    NTP commands NTP is supported on the following Layer 3 interfaces: Layer 3 Ethernet interfaces. • Layer 3 Ethernet subinterfaces. • Layer 3 aggregate interfaces. • • Layer 3 aggregate subinterfaces. VLAN interfaces. • Tunnel interfaces. • RPR logical interface. •...
  • Page 94 Table 13 Command output Field Description • 1—Clock source selected by the system (the current reference source). It has a system clock stratum level less than or equal to 15. • 2—The stratum level of the clock source is less than or equal to 15. [12345] •...
  • Page 95 # Display detailed information about all IPv6 NTP associations. <Sysname> display ntp-service ipv6 sessions verbose Clock source: 1::1 Session ID: 36144 Clock stratum: 16 Clock status: configured, insane, valid, unsynced Reference clock ID: INIT VPN instance: Not specified Local mode: sym_active, local poll interval: 6 Peer mode: unspec, peer poll interval: 10 Offset: 0.0000ms, roundtrip delay: 0.0000ms, dispersion: 15937ms...
  • Page 96 Field Description Status of the clock source corresponding to this association: • configured—The association was created at the CLI. • dynamic—The association is established dynamically. • master—The clock source is the primary reference source of the current system. • selected—The clock source has survived the clock selection algorithm.
  • Page 97 Field Description Operation mode of the peer device: • unspec—The mode is unspecified. • sym_active—Active mode. • sym_passive—Passive mode. peer mode • client—Client mode. • server—Server mode. • broadcast—Broadcast or multicast server mode. • bclient—Broadcast or multicast client mode. Polling interval for the peer device, in seconds. The value displayed peer poll interval is a power of 2.
  • Page 98: Display Ntp-Service Sessions

    display ntp-service sessions Use display ntp-service sessions to display information about all IPv4 NTP associations. Syntax display ntp-service sessions [ verbose ] Views Any view Predefined user roles network-admin network-operator Parameters verbose: Displays detailed information about all IPv4 NTP associations. If you do not specify this keyword, the command displays only brief information about the NTP associations.
  • Page 99 Field Description Reference clock ID of the NTP server: • If the reference clock is the local clock, the value of this field is related to the value of the stra field: When the value of the stra field is 0 or 1, this field displays LOCL. When the stra field has another value, this field displays the IP address reference of the local clock.
  • Page 100 Clock stratum: 2 Clock status: configured, master, sane, valid Reference clock ID: 127.127.1.0 VPN instance: Not specified Local mode: client, local poll interval: 6 Peer mode: server, peer poll interval: 6 Offset: 0.2862ms, roundtrip delay: 3.2653ms, dispersion: 4.5166ms Root roundtrip delay: 0.0000ms, root dispersion: 10.910ms Reachabilities:31, sync distance: 0.0194 Precision: 2^18, version: 3, source interface: Not specified Reftime: d17cbba5.1473de1e...
  • Page 101 Field Description Reference clock ID of the NTP server: • If the reference clock is the local clock, the value of this field is related to the value of the Clock stratum field: When the value of the Clock stratum field is 0 or 1, this field displays LOCL.
  • Page 102: Display Ntp-Service Status

    Field Description Maximum error of the system clock relative to the primary reference root dispersion clock, in milliseconds. Reachability count of the clock source. 0 indicates that the clock Reachabilities source is unreachable. Synchronization distance relative to the upper-level clock, in sync distance seconds, and calculated from dispersion and roundtrip delay values.
  • Page 103 Local mode: client Reference clock ID: 127.127.1.0 Leap indicator: 00 Clock jitter: 0.000977 s Stability: 0.000 pps Clock precision: 2^-10 Root delay: 0.00000 ms Root dispersion: 3.96367 ms Reference time: d0c5fc32.92c70b1e Wed, Dec 29 2010 18:28:02.573 # Display the NTP service status when time is not synchronized. <Sysname>...
  • Page 104: Display Ntp-Service Trace

    Field Description For an IPv4 NTP server: The field represents the IP address of the remote server when the local device is synchronized to a remote NTP server. The field represents the local clock when the local device uses the local clock as a reference source.
  • Page 105: Ntp-Service Acl

    Views Any view Predefined user roles network-admin network-operator Parameters source interface-type interface-number: Specifies the source interface from which NTP packets are sent for tracing back from the reference source to the primary reference source. The source IP address of the NTP packets is the IPv4/IPv6 address of the specified source interface.
  • Page 106 Use undo ntp-service acl to remove the configured NTP service access-control right. Syntax ntp-service { peer | query | server | synchronization } acl acl-number undo ntp-service { peer | query | server | synchronization } acl acl-number Default The access-control right for the peer devices to access the NTP services of the local device is peer. Views System view Predefined user roles...
  • Page 107: Ntp-Service Authentication Enable

    ntp-service authentication-keyid • • ntp-service reliable authentication-keyid ntp-service authentication enable Use ntp-service authentication enable to enable NTP authentication. Use undo ntp-service authentication enable to disable NTP authentication. Syntax ntp-service authentication enable undo ntp-service authentication enable Default NTP authentication is disabled. Views System view Predefined user roles...
  • Page 108: Ntp-Service Broadcast-Client

    Predefined user roles network-admin Parameters keyid: Specifies a key ID to identify an authentication key, in the range of 1 to 4294967295. authentication-mode md5 value: Uses the MD5 algorithm for key authentication. simple: Sets a plaintext authentication key. cipher: Sets a ciphertext authentication key. value: Specifies the MD5 authentication key string.
  • Page 109: Ntp-Service Broadcast-Server

    Predefined user roles network-admin Usage guidelines After you configure the command, the device listens to NTP messages sent by the NTP broadcast server and is synchronized based on the received NTP messages. If you have configured the device to operate in broadcast client mode on an interface with the command, do not add the interface to any aggregate group.
  • Page 110: Ntp-Service Dscp

    If you have configured the device to operate in broadcast server mode on an interface with the command, do not add the interface to any aggregate group. To add the interface to an aggregate group, remove the configuration of the command. Examples # Configure the device to operate in broadcast server mode and send NTP broadcast messages on GigabitEthernet 2/0/1, using key 4 for encryption.
  • Page 111: Ntp-Service Inbound Enable

    Syntax ntp-service enable undo ntp-service enable Default The NTP service is not enabled. Views System view Predefined user roles network-admin Examples # Enable the NTP service. <Sysname> system-view [Sysname] ntp-service enable ntp-service inbound enable Use ntp-service inbound enable to enable an interface to process NTP messages. Use undo ntp-service inbound enable to disable an interface from processing NTP messages.
  • Page 112: Ntp-Service Ipv6 Acl

    ntp-service ipv6 acl Use ntp-service ipv6 acl to configure the access-control right for the peer devices to access the IPv6 NTP services of the local device. Use undo ntp-service ipv6 acl to remove the configured NTP service access-control right. Syntax ntp-service ipv6 { peer | query | server | synchronization } acl acl-number undo ntp-service ipv6 { peer | query | server | synchronization } acl acl-number Default...
  • Page 113: Ntp-Service Ipv6 Dscp

    [Sysname-acl6-basic-2001] quit [Sysname] ntp-service ipv6 peer acl 2001 Related commands ntp-service authentication enable • ntp-service authentication-keyid • ntp-service reliable authentication-keyid • ntp-service ipv6 dscp Use ntp-server ipv6 dscp to configure a DSCP value for IPv6 NTP packets. Use undo ntp-server ipv6 dscp to restore the default. Syntax ntp-service ipv6 dscp dscp-value undo ntp-service ipv6 dscp...
  • Page 114: Ntp-Service Ipv6 Multicast-Client

    Views Interface view Predefined user roles network-admin Usage guidelines Execute the undo ntp-service ipv6 inbound enable command on an interface in the following cases: You do not want the interface to synchronize the peer devices in the corresponding subnet. • You do not want the device to be synchronized by the peer devices in the subnet corresponding to •...
  • Page 115: Ntp-Service Ipv6 Multicast-Server

    Examples # Configure the device to operate in IPv6 multicast client mode and receive IPv6 NTP multicast messages with the destination FF21::1 on GigabitEthernet 2/0/1. <Sysname> system-view [Sysname] interface gigabitethernet 2/0/1 [Sysname-GigabitEthernet2/0/1] ntp-service ipv6 multicast-client ff21::1 Related commands ntp-service ipv6 multicast-server ntp-service ipv6 multicast-server Use ntp-service ipv6 multicast-server to configure the device to operate in IPv6 NTP multicast server mode and use the current interface to send IPv6 NTP multicast packets.
  • Page 116: Ntp-Service Ipv6 Source

    [Sysname] interface gigabitethernet 2/0/1 [Sysname-GigabitEthernet2/0/1] ntp-service ipv6 multicast-server ff21::1 Related commands ntp-service ipv6 multicast-client ntp-service ipv6 source Use ntp-service ipv6 source to specify the source interface for IPv6 NTP messages. Use undo ntp-service ipv6 source to restore the default. Syntax ntp-service ipv6 source interface-type interface-number undo ntp-service ipv6 source Default...
  • Page 117: Ntp-Service Ipv6 Unicast-Peer

    ntp-service ipv6 unicast-peer Use ntp-service ipv6 unicast-peer to specify an IPv6 symmetric-passive peer for the device. Use undo ntp-service ipv6 unicast-peer to remove the IPv6 symmetric-passive peer specified for the device. Syntax ntp-service ipv6 unicast-peer { peer-name | ipv6-address } [ vpn-instance vpn-instance-name ] [ authentication-keyid keyid | priority | source interface-type interface-number ] * undo ntp-service ipv6 unicast-peer { peer-name | ipv6-address } [ vpn-instance vpn-instance-name ] Default...
  • Page 118: Ntp-Service Ipv6 Unicast-Server

    If you include the vpn-instance vpn-instance-name option in the undo ntp-service ipv6 unicast-peer command, the command removes the symmetric-passive peer with the IPv6 address of ipv6-address in the specified VPN. If you do not include the vpn-instance vpn-instance-name option in the command, the command removes the symmetric-passive peer with the IPv6 address of ipv6-address in the public network.
  • Page 119: Ntp-Service Max-Dynamic-Sessions

    source interface-type interface-number: Specifies the source interface for IPv6 NTP messages. If the specified IPv6 NTP server address is not a link local address, the source IPv6 address for IPv6 NTP messages sent by the local device to the NTP server is the IPv6 address of the specified source interface. If the specified IPv6 NTP server address is a link local address, the IPv6 NTP messages are sent from the specified source interface, and the source address of the messages is the link local address of the interface.
  • Page 120: Ntp-Service Multicast-Client

    Parameters number: Sets the maximum number of dynamic NTP associations allowed to be established, in the range of 0 to 100. Usage guidelines A single device can have a maximum of 128 concurrent associations, including static associations and dynamic associations. A static association refers to an association that a user has manually created by using an NTP command.
  • Page 121: Ntp-Service Multicast-Server

    <Sysname> system-view [Sysname] interface gigabitethernet 2/0/1 [Sysname-GigabitEthernet2/0/1] ntp-service multicast-client 224.0.1.1 Related commands ntp-service multicast-server ntp-service multicast-server Use ntp-service multicast-server to configure the device to operate in NTP multicast server mode and use the current interface to send NTP multicast packets. Use undo ntp-service multicast-server to remove the configuration.
  • Page 122: Ntp-Service Refclock-Master

    Use the local clock of the device as the reference clock to synchronize other devices in the network. • Use the command with caution to avoid time errors. Before you execute the command, HP recommends that you adjust the local system time.
  • Page 123: Ntp-Service Reliable Authentication-Keyid

    ntp-service reliable authentication-keyid Use ntp-service reliable authentication-keyid to specify the created authentication key as a trusted key. Use undo ntp-service reliable authentication-keyid to remove the configuration. Syntax ntp-service reliable authentication-keyid keyid undo ntp-service reliable authentication-keyid keyid Default No trust key is specified. Views System view Predefined user roles...
  • Page 124: Ntp-Service Unicast-Peer

    Syntax ntp-service source interface-type interface-number undo ntp-service source Default No source interface is specified for NTP messages. The device does the following: Searches the routing table for the outbound interface of NTP messages. • • Uses the primary IP address of the outbound interface as the source IP address for NTP messages. Views System view Predefined user roles...
  • Page 125 Default No symmetric-passive peer is specified for the device. Views System view Predefined user roles network-admin Parameters peer-name: Specifies the host name of the symmetric-passive peer, a case-insensitive string of 1 to 253 characters. ip-address: Specifies the IP address of the symmetric-passive peer. It must be a unicast address, rather than a broadcast address, a multicast address, or the IP address of the local clock.
  • Page 126: Ntp-Service Unicast-Server

    ntp-service authentication-keyid • • ntp-service reliable authentication-keyid ntp-service unicast-server Use ntp-service unicast-server to specify an NTP server for the device. Use undo ntp-service unicast-server to remove an NTP server specified for the device. Syntax ntp-service unicast-server { server-name | ip-address } [ vpn-instance vpn-instance-name ] [ authentication-keyid keyid | priority | source interface-type interface-number | version number ] * undo ntp-service unicast-server { server-name | ip-address } [ vpn-instance vpn-instance-name ] Default...
  • Page 127 If you do not include the vpn-instance vpn-instance-name option in the command, the command removes the NTP server with the IP address of ip-address in the public network. Examples # Specify NTP server 10.1.1.1 for the device, and configure the device to run NTP version 4. <Sysname>...
  • Page 128: Sntp Commands

    SNTP commands display sntp ipv6 sessions Use display sntp ipv6 sessions to display information about all IPv6 SNTP associations. Syntax display sntp ipv6 sessions Views Any view Predefined user roles network-admin network-operator Examples # Display information about all IPv6 SNTP associations. <Sysname>...
  • Page 129: Display Sntp Sessions

    display sntp sessions Use display sntp sessions to display information about all IPv4 SNTP associations. Syntax display sntp sessions Views Any view Predefined user roles network-admin network-operator Examples # Display information about all IPv4 SNTP associations. <Sysname> display sntp sessions SNTP server Stratum Version...
  • Page 130: Sntp Authentication-Keyid

    Usage guidelines You need to enable SNTP authentication in networks that require time synchronization security to make sure SNTP clients are synchronized only to authenticated NTP servers. To authenticate an NTP server, set an authentication key and specify it as a trusted key. Examples # Enable SNTP authentication.
  • Page 131: Sntp Enable

    After you configure an SNTP authentication key, use the sntp reliable authentication-keyid command to set it as a trusted key. The key automatically changes to untrusted after you delete the key. In this case, you do not need to execute the undo sntp-service reliable authentication-keyid command. You can set a maximum of 128 keys by executing the command.
  • Page 132 undo sntp ipv6 unicast-server { server-name | ipv6-address } [ vpn-instance vpn-instance-name ] Default No IPv6 NTP server is specified for the device. Views System view Predefined user roles network-admin Parameters server-name: Specifies the host name of the NTP server, a case-insensitive string of 1 to 253 characters. ipv6-address: Specifies the IPv6 address of the NTP server.
  • Page 133: Sntp Reliable Authentication-Keyid

    sntp reliable authentication-keyid • sntp reliable authentication-keyid Use sntp reliable authentication-keyid to specify the created authentication key as a trusted key. Use undo sntp reliable authentication-keyid to remove the specified trusted key. Syntax sntp reliable authentication-keyid keyid undo sntp reliable authentication-keyid keyid Default No trust key is specified.
  • Page 134 Syntax sntp unicast-server server-name ip-address vpn-instance vpn-instance-name [ authentication-keyid keyid | source interface-type interface-number | version number ] * undo sntp unicast-server { server-name | ip-address } [ vpn-instance vpn-instance-name ] Default No NTP server is specified for the device. Views System view Predefined user roles...
  • Page 135 sntp reliable authentication-keyid •...
  • Page 136: Poe Commands

    PoE commands This feature is supported only by PoE-capable switches installed with the following modules: SIC-4FSWP. • SIC-4GSW-PoE. • DSIC-9FSWP. • • HMIM-24GSW-PoE. PoE-capable switches include the following models: • MSR3012/3024/3044/3064. MSR4060/4080. • Commands and descriptions for centralized devices apply to the following routers: MSR1002-4/1003-8S.
  • Page 137: Apply Poe-Profile Interface

    [Sysname-GigabitEthernet2/0/1] apply poe-profile name forIPphone Related commands • apply poe-profile interface display poe-profile • apply poe-profile interface Use apply poe-profile interface to apply a PoE profile to PIs. Use undo apply poe-profile interface to remove the application of a PoE profile from PIs. Syntax apply poe-profile { index index | name profile-name } interface interface-range undo apply poe-profile { index index | name profile-name } interface interface-range...
  • Page 138: Display Poe Device

    display poe device Use display poe device to display general PSE information, including the ID, slot number, and status of PSEs. Syntax Distributed devices in standalone mode/centralized devices in standalone mode: display poe device Distributed devices in IRF mode: display poe device [ chassis chassis-number ] Centralized devices in IRF mode: display poe device [ slot slot-number ] Views...
  • Page 139: Display Poe Interface

    PSE ID Slot No. SSlot No. PortNum MaxPower(W) State Model LSBMPOEGV48TP LSBMPOEGV48TP Slot 2: PSE ID Slot No. SSlot No. PortNum MaxPower(W) State Model LSBMPOEGV48TP Table 21 Command output Field Description Chassis 1 Information for member device 1. (Distributed devices in IRF mode.) Slot 1 Information for member device 1.
  • Page 140 Power Priority : Critical Oper : On IEEE Class Detection Status : Delivering power Power Mode : Signal Current Power : 11592 Average Power : 11610 Peak Power : 11684 Max Power : 15400 Electric Current : 244 Voltage : 51.7 PD Description : IP Phone For Room 101 Table 22 Command output...
  • Page 141 Field Description Power transmission mode of a PI: • Power Mode Signal—Power is being supplied over signal cables. • Spare—Power is being supplied over spare cables. Current power of a PI, including PD consumption power and transmission loss. Current Power Typical transmission loss is within 1 watt.
  • Page 142: Display Poe Interface Power

    Field Description Operating status of a PI: • Off—PoE is disabled. • On—Power is being supplied to the PI correctly. • Power-lack—Remaining guaranteed power is insufficient for a critical Oper • Power-deny—The PSE refuses to supply power. The power required by the PD is higher than the configured power.
  • Page 143: Display Poe Power-Usage

    Examples # Display power information for GigabitEthernet 2/0/1. <Sysname> display poe interface power gigabitethernet 2/0/1 Interface Current Peak PD Description GE2/0/1 15.0 15.3 15.4 Access Point on Room 509 for Peter # Display power information for all PIs. <Sysname> display poe interface power Interface Current Peak...
  • Page 144 Predefined user roles network-admin network-operator Parameters chassis chassis-number: Specifies an IRF member device by its member ID. If you do not specify a member device, the command displays information about all PoE power supplies and PSEs in the IRF fabric. (Distributed devices in IRF mode.) slot slot-number: Specifies an IRF member device by its member ID.
  • Page 145 PSE ID Current Peak Average Remaining Powered Guaranteed(W) Ports # (Centralized devices in IRF mode.) Display power usage statistics for all PoE power supplies and PSEs. <Sysname> display poe power-usage Slot 1 : PoE Current Power : 600 PoE Max Power : 2000 PoE Max Guaranteed Power : 1000...
  • Page 146: Display Poe Pse

    Field Description PSE ID ID of the PSE. Maximum power of the PSE. Current Current power of the PSE. Peak Peak power of the PSE. Average Average power of the PSE. Remaining guaranteed power of the PSE = Maximum guaranteed power of the PSE –...
  • Page 147 PSE Software Version : 200 PSE Hardware Version : 100 Legacy PD Detection : Disabled Power Utilization Threshold : 80 PSE Power Policy : Disabled PD Power Policy : Disabled PD Disconnect-Detection Mode : DC # (Distributed devices in IRF mode.) Display detailed information about PSE 7. <Sysname>...
  • Page 148: Display Poe Pse Interface

    Field Description Current Power Current power of the PSE. Average Power Average power of the PSE. Peak Power Peak power of the PSE. Max Power Maximum power of the PSE. Remaining guaranteed power of the PSE = Maximum guaranteed power Remaining Guaranteed Power of the PSE –...
  • Page 149 GE2/0/2 Enabled Critical Power-lack Disabled GE2/0/3 Enabled Power-deny Disabled GE2/0/4 Enabled Critical Searching GE2/0/5 Enabled Power-limit Delivering Power GE2/0/6 Enabled Power-itself Disabled GE2/0/7 Disabled Fault On State Ports: 2; Used: 8.4(W); Remaining: 171.6 (W) Table 27 Command output Field Description Interface Interface name of a PI.
  • Page 150: Display Poe Pse Interface Power

    display poe pse interface power Use display poe pse interface power to display power information for PIs on a PSE. Syntax display poe pse pse-id interface power Views Any view Predefined user roles network-admin network-operator Parameters pse pse-id: Specifies a PSE by its ID. Usage guidelines To display PSE ID and slot mappings, use the display poe device command.
  • Page 151: Display Poe-Power

    display poe-power Use display poe-power to display PoE power information. Syntax Distributed devices in standalone mode/centralized devices in standalone mode: display poe-power Distributed devices in IRF mode: display poe-power [ chassis chassis-number ] Centralized devices in IRF mode: display poe-power [ slot slot-number ] Views Any view Predefined user roles...
  • Page 152 Status : Normal PoE Power Supply 2: Manufacturer : Tyco Electronics Com Type : PSE2500-B Status : Normal # (Distributed devices in IRF mode.) Display PoE power information. <Sysname> display poe-power Chassis 1 : PoE Current Power : 1870 PoE Average Power : 2100 PoE Peak Power : 2350...
  • Page 153 Status : Normal PoE Power Supply 2: Manufacturer : Tyco Electronics Com Type : PSE2500-B Status :Normal # (Centralized devices in IRF mode.) Display PoE power information. <Sysname> display poe-power Slot 1 : PoE Current Power : 1870 PoE Average Power : 2100 PoE Peak Power : 2350...
  • Page 154 Status : Normal PoE Power Supply 2: Manufacturer : Tyco Electronics Com Type : PSE2500-B Status : Normal Table 29 Command output Field Description Chassis 1 Information for member device 1. (Distributed devices in IRF mode.) Slot 1 Information for member device 1. (Centralized devices in IRF mode.) PoE Current Power Current PoE power.
  • Page 155: Display Poe-Profile

    display poe-profile Use display poe-profile to display information about the PoE profile. Syntax display poe-profile [ index index | name profile-name ] Views Any view Predefined user roles network-admin network-operator Parameters index index: Specifies a PoE profile by its index number in the range of 1 to 100. name profile-name: Specifies a PoE profile by its name, a case-sensitive string of 1 to 15 characters.
  • Page 156: Display Poe-Profile Interface

    Field Description Index Index number of the PoE profile. ApplyNum Number of PIs to which the PoE profile is applied. Interfaces Interface name of the PI to which the PoE configuration is applied. Configuration Configurations of the PoE profile. Total PoE profiles Number of PoE profiles.
  • Page 157: Poe Enable

    Views System view Predefined user roles network-admin Parameters ac: Specifies the PD disconnection detection mode as ac. dc: Specifies the PD disconnection detection mode as dc. Usage guidelines If you change the PD disconnection detection mode while the device is running, the connected PDs are powered off.
  • Page 158: Poe Enable Pse

    [Sysname-GigabitEthernet2/0/1] poe enable # Enable PoE on a PI in PoE profile view. <Sysname> system-view [Sysname] poe-profile abc [Sysname-poe-profile-abc-1] poe enable Related commands display poe interface • poe-profile • poe enable pse Use poe enable pse to enable PoE for a PSE. Use undo poe enable pse to restore the default.
  • Page 159: Poe Max-Power

    Default Nonstandard PD detection is disabled. Views System view Predefined user roles network-admin Parameters pse pse-id: Specifies a PSE by its ID. Examples # Enable PSE 7 to detect nonstandard PDs. <Sysname> system-view [Sysname] poe legacy enable pse 7 Related commands display poe pse poe max-power Use poe max-power to configure the maximum power for a PI.
  • Page 160: Poe Max-Power (System View)

    [Sysname-poe-profile-abc-1] poe max-power 12000 Related commands poe max-power(system view) poe max-power (system view) Use poe max-power to configure the maximum power for a PSE. Use undo poe max-power to restore the default. Syntax poe pse pse-id max-power max-power undo poe pse pse-id max-power Default The default maximum power of the PSE is 37 watts.
  • Page 161: Poe Pd-Policy Priority

    undo poe pd-description Default No description is available for the PD that connects to a PI. Views PI view Predefined user roles network-admin Parameters text: Configures a description for the PD connected to the PI, a case-sensitive string of 1 to 80 characters. Examples # Configure the description for the PD as IP Phone for Room 101.
  • Page 162: Poe Priority

    poe priority Use poe priority to configure a power supply priority for a PI. Use undo poe priority to restore the default. Syntax poe priority { critical | high | low } undo poe priority Default The power priority of a PI is low. Views PI view PoE profile view...
  • Page 163: Poe Priority (System View)

    poe priority (system view) Use poe priority to configure the power supply priority for the PSE. Use undo poe priority to restore the default. Syntax poe priority { critical | high | low } pse pse-id undo poe priority pse pse-id Default The power supply priority of the PSE is low.
  • Page 164: Poe Update

    Syntax poe pse-policy priority undo poe pse-policy priority Default PSE power management is disabled. Views System view Predefined user roles network-admin Usage guidelines If PSE power management is disabled, the system does not supply power to new PSEs when PoE power overload occurs.
  • Page 165: Poe-Profile

    Usage guidelines Typically, you can upgrade the firmware in refresh mode. Upgrade the firmware in full mode only in the following cases: You fail to upgrade the software in refresh mode. • • The current firmware is unavailable, and execution of all PoE commands fail. Examples # Upgrade the firmware of PSE 7 in service.
  • Page 166: Poe Utilization-Threshold

    [Sysname-poe-profile-def-1] Related commands • apply poe-profile poe enable • • poe max-power poe priority • poe utilization-threshold Use poe utilization-threshold to configure a power alarm threshold for a PSE. Use undo poe utilization-threshold to restore the default. Syntax poe utilization-threshold value pse pse-id undo poe utilization-threshold pse pse-id Default The power alarm threshold for the PSE is 80%.
  • Page 167: Snmp Commands

    SNMP commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. The SNMP agent sends notifications (traps and informs) to inform the NMS of significant events, such as link state changes and user logins or logouts.
  • Page 168 Community name: bb Role name: bb Storage-type: nonVolatile Community name: userv1 Group name: testv1 Storage type: nonvolatile Community name: cc Group name: cc ACL name: testacl Storage type: nonVolatile Table 31 Command output Field Description Community name created by using the snmp-agent community command or username Community name created by using the snmp-agent usm-user { v1 | v2c } command.
  • Page 169: Display Snmp-Agent Context

    Related commands snmp-agent community • • snmp-agent usm-user { v1 | v2c } display snmp-agent context Use display snmp-agent context to display an SNMP context. Syntax display snmp-agent context [ context-name ] Views Any view Predefined user roles network-admin network-operator Parameters context-name: Specifies an SNMP context by its name, a case-sensitive string of 1 to 32 characters.
  • Page 170: Display Snmp-Agent Local-Engineid

    Parameters group-name: Specifies an SNMPv1, SNMPv2c, or SNMPv3 group name in non-FIPS mode, and an SNMPv3 group name for high encryption in FIPS mode. It is a case-sensitive string of 1 to 32 characters. If no group is specified, this command displays information about all SNMP groups. Examples # Display information about all SNMP groups.
  • Page 171: Display Snmp-Agent Mib-Node

    Views Any view Predefined user roles network-admin network-operator Usage guidelines Every SNMP agent has one SNMP engine to provide services for sending and receiving messages, authenticating and encrypting messages, and controlling access to managed objects. The local SNMP engine ID uniquely identifies the SNMP engine of the SNMP agent in an SNMP domain. Examples # Display the local engine ID.
  • Page 172 Examples # Display SNMP MIB node information. <Sysname> display snmp-agent mib-node iso<1>(NA) |-std<1.0>(NA) |-iso8802<1.0.8802>(NA) |-ieee802dot1<1.0.8802.1>(NA) |-ieee802dot1mibs<1.0.8802.1.1>(NA) |-lldpMIB<1.0.8802.1.1.2>(NA) |-lldpNotifications<1.0.8802.1.1.2.0>(NA) |-lldpNotificationPrefix<1.0.8802.1.1.2.0.0>(NA) |-lldpRemTablesChange<1.0.8802.1.1.2.0.0.1>(NA) |-lldpObjects<1.0.8802.1.1.2.1>(NA) |-lldpConfiguration<1.0.8802.1.1.2.1.1>(NA) |-*lldpMessageTxInterval<1.0.8802.1.1.2.1.1.1>(RW) |-*lldpMessageTxHoldMultiplier<1.0.8802.1.1.2.1.1.2>(RW) |-*lldpReinitDelay<1.0.8802.1.1.2.1.1.3>(RW) Table 33 Command output Field Description -std MIB node name. <1.0> OID of a MIB node. Permissions to MIB nodes: •...
  • Page 173 |-*lldpTxDelay(4)(lldpNotificationInterval) |-*lldpNotificationInterval(5)(lldpPortConfigPortNum) |-lldpPortConfigTable(6)(lldpPortConfigPortNum) |-lldpPortConfigEntry(1)(lldpPortConfigPortNum) |-*lldpPortConfigPortNum(1)(lldpPortConfigAdminStatus) |-*lldpPortConfigAdminStatus(2)(lldpPortConfigNotificationEnable) |-*lldpPortConfigNotificationEnable(3)(lldpPortConfigTLVsTxEnable) |-*lldpPortConfigTLVsTxEnable(4)(lldpConfigManAddrPortsTxEnable) Table 34 Command output Field Description -std MIB node name. Last bit of a MIB OID string. (lldpMessageTxInterval) Name of a leaf node. Leaf node or MIB table node. # Display MIB table names, and node names and OIDs of MIB index nodes. <Sysname>...
  • Page 174 # Display names and OIDs of MIB notification nodes, and names and OIDs of notification objects. <Sysname> display snmp-agent mib-node trap-node Name |lldpRemTablesChange ||1.0.8802.1.1.2.0.0.1 Trap Object Name |||lldpStatsRemTablesInserts ||||1.0.8802.1.1.2.1.2.2 Name |||lldpStatsRemTablesDeletes ||||1.0.8802.1.1.2.1.2.3 Name |||lldpStatsRemTablesDrops ||||1.0.8802.1.1.2.1.2.4 Name |||lldpStatsRemTablesAgeouts ||||1.0.8802.1.1.2.1.2.5 Name |lldpXMedTopologyChangeDetected ||1.0.8802.1.1.2.1.5.4795.0.1 Trap Object Name...
  • Page 175 Parent ||lldpConfiguration First child Next leaf ||lldpPortConfigPortNum Next sibling ||lldpPortConfigTable Allow ||get/set/getnext Value range [5..3600] Name |lldpPortConfigTable ||1.0.8802.1.1.2.1.1.6 Properties ||NodeType: Table ||AccessType: NA ||DataType: ||MOR: 0x00000000 Parent ||lldpConfiguration First child ||lldpPortConfigEntry Next leaf ||lldpPortConfigPortNum Next sibling ||lldpConfigManAddrTable Name |lldpPortConfigEntry ||1.0.8802.1.1.2.1.1.6.1 Properties ||NodeType: ||AccessType: NA...
  • Page 176 ||DataType: Integer ||MOR: 0x020c1202 Parent ||lldpPortConfigEntry First child Next leaf ||lldpPortConfigNotificationEnable Next sibling ||lldpPortConfigNotificationEnable Allow ||get/set/getnext Index ||[indexImplied:0, indexLength:1]: Value range ['txOnly', 1] ['rxOnly', 2] ['txAndRx', 3] ['disabled', 4] Table 37 Command output Field Description Name MIB node name. OID of a MIB node. MIB node types: •...
  • Page 177: Display Snmp-Agent Mib-View

    Field Description Data types of MIB nodes: • Integer—An integer. • Integer32—A 32-bit integer. • Unsigned32—A 32-bit integer with no mathematical sign. • Gauge—A non-negative integer that might increase or decrease. • Gauge32—A 32-bit non-negative integer that might increase or decrease. •...
  • Page 178 Predefined user roles network-admin network-operator Parameters exclude: Displays the subtrees excluded from any MIB view. include: Displays the subtrees included in any MIB view. viewname view-name: Displays information about the specified MIB view. Usage guidelines If you do not specify any parameters, this command displays all MIB views. Examples # Display all MIB views.
  • Page 179: Display Snmp-Agent Remote

    Table 38 Command output Field Description View name MIB view name. MIB Subtree MIB subtree covered by the MIB view. Subtree mask MIB subtree mask. Storage-type Type of the medium (see Table 31) where the subtree view is stored. Access privilege for the MIB subtree in the MIB view: •...
  • Page 180: Display Snmp-Agent Statistics

    Examples # Display all remote SNMP engine IDs. <Sysname> display snmp-agent remote Remote engineID: 800063A28000A0FC00580400000001 IPv4 address: 1.1.1.1 VPN instance: vpn1 Table 39 Command output Field Description Remote engineID Remote SNMP engine ID you have configured using the snmp-agent remote command. IPv4 address of the remote SNMP entity.
  • Page 181 7 GetRequest-PDU accepted and processed. 7 GetNextRequest-PDU accepted and processed. 1653 GetBulkRequest-PDU accepted and processed. 1669 GetResponse-PDU accepted and processed. 2 SetRequest-PDU accepted and processed. 0 Trap PDUs accepted and processed. 0 alternate Response Class PDUs dropped silently. 0 forwarded Confirmed Class PDUs dropped silently. Table 40 Command output Field Description...
  • Page 182: Display Snmp-Agent Sys-Info

    Field Description Number of forwarded packets that have been forwarded Confirmed Class PDUs dropped silently dropped. display snmp-agent sys-info Use display snmp-agent sys-info to display SNMP agent system information. Syntax display snmp-agent sys-info [ contact | location | version ] * Views Any view Predefined user roles...
  • Page 183: Display Snmp-Agent Trap-List

    Views Any view Predefined user roles network-admin network-operator Examples # Display the trap queue configuration and usage status. <Sysname> display snmp-agent trap queue Queue size: 100 Message number: 6 Related commands • snmp-agent trap life snmp-agent trap queue-size • display snmp-agent trap-list Use display snmp-agent trap-list to display modules that can generate SNMP notifications and their notification function status (enable or disable).
  • Page 184 Views Any view Predefined user roles network-admin network-operator Parameters engineid engineid: Displays SNMPv3 user information for the SNMP engine ID identified by engineid. When an SNMPv3 user is created, the system records the local SNMP entity engine ID. The user becomes invalid when the engine ID changes, and it becomes valid again when the recorded engine ID is restored.
  • Page 185: Enable Snmp Trap Updown

    Engine ID: 800063A280000002BB0001 Storage type: nonVolatile User status: active Table 41 Command output Field Description Username SNMP username. Group name SNMP group name. Role name SNMP user role name. Engine ID Engine ID that the SNMP agent used when the SNMP user was created. Storage type: •...
  • Page 186: Snmp-Agent

    Syntax enable snmp trap updown undo enable snmp trap updown Default Link state notifications are enabled. Views Interface view Predefined user roles network-admin Usage guidelines For an interface to generate linkUp/linkDown notifications when its state changes, you must also enable the linkUp/linkDown notification function globally by using the snmp-agent trap enable standard [ linkdown | linkup ] * command.
  • Page 187: Snmp-Agent Calculate-Password

    Usage guidelines The snmp-agent command is optional for an SNMP configuration task. The SNMP agent is automatically enabled when you execute any command that begins with snmp-agent except for the snmp-agent calculate-password command. Examples # Enable the SNMP agent. <Sysname> system-view [Sysname] snmp-agent snmp-agent calculate-password Use snmp-agent calculate-password to calculate a digest for the ciphertext authentication or privacy key...
  • Page 188: Snmp-Agent Community

    specified-engineid engineid: Uses a user-defined engine ID to calculate the ciphertext key. The engineid argument specifies an SNMP engine ID as a hexadecimal string. It must contain an even number of hexadecimal characters, in the range of 10 to 64. All-zero and all-F strings are invalid. Usage guidelines Make sure the SNMP agent is enabled before you execute the snmp-agent calculate-password command.
  • Page 189 Parameters read: Assigns the specified community read-only access to MIB objects. A read-only community can only inquire MIB information. write: Assigns the specified community read and write access to MIB objects. A read and write community can configure MIB information. simple: Sets a community name in plain text and saves the community name in cipher text.
  • Page 190 The VACM mode requires only the access right from the NMS to MIB objects. • HP recommends the RBAC mode because it is more secure. Examples # Create the read-only community readaccess in plain text so an SNMPv1 or SNMPv2c NMS can use the community name readaccess to read the MIB objects in the default view ViewDefault.
  • Page 191: Snmp-Agent Community-Map

    <Sysname> system-view [Sysname] acl basic name testacl [Sysname-acl-ipv4-basic-testacl] rule permit source 1.1.1.2 0.0.0.0 [Sysname-acl-ipv4-basic-testacl] rule deny source any [Sysname-acl-ipv4-basic-testacl] quit [Sysname] snmp-agent sys-info version v2c [Sysname] snmp-agent community write simple writeaccess acl name testacl # Create the read and write community wr-sys-acc in plain text so an SNMPv1 or SNMPv2c NMS can use the community name wr-sys-acc to read or set the MIB objects in the system subtree (OID 1.3.6.1.2.1.1).
  • Page 192: Snmp-Agent Context

    Examples # Map SNMP community private to SNMP context trillcontext. <Sysname> system-view [Sysname] snmp-agent community-map private context trillcontext Related commands display snmp-agent community snmp-agent context Use snmp-agent context to create an SNMP context. Use undo snmp-agent context to delete an SNMP context. Syntax snmp-agent context context-name undo snmp-agent context context-name...
  • Page 193 snmp-agent group { v1 | v2c } group-name [ read-view view-name ] [ write-view view-name ] [ notify-view view-name ] [ acl { acl-number | name acl-name } | acl ipv6 { ipv6-acl-number | name ipv6-acl-name } ] * undo snmp-agent group { v1 | v2c } group-name SNMPv3 (non-FIPS mode): snmp-agent group v3 group-name [ authentication | privacy ] [ read-view read-view ] [ write-view write-view ] [ notify-view notify-view ] [ acl { acl-number | name acl-name } | acl ipv6 { ipv6-acl-number...
  • Page 194 If the specified ACL does not have any rules, no NMS in the SNMP community can access the SNMP agent. name acl-name: Specifies a basic IPv4 ACL by its name to filter NMSs by source IPv4 address. The acl-name argument represents an ACL name, a case-insensitive string of 1 to 63 characters. In the specified SNMP group, only NMSs with an IPv4 address permitted in the ACL can access the SNMP agent.
  • Page 195: Snmp-Agent Local-Engineid

    Examples # Create the SNMPv3 group group1, and assign the no authentication, no privacy security model to the group. <Sysname> system-view [Sysname] snmp-agent group v3 group1 Related commands display snmp-agent group • • snmp-agent mib-view snmp-agent usm-user • snmp-agent local-engineid Use snmp-agent local-engineid to change the SNMP engine ID of the local SNMP agent.
  • Page 196: Snmp-Agent Log

    snmp-agent log Use snmp-agent log to enable logging SNMP operations. Use undo snmp-agent log to disable logging SNMP operations. Syntax snmp-agent log { all | get-operation | set-operation } undo snmp-agent log { all | get-operation | set-operation } Default SNMP logging operations are disabled.
  • Page 197 Default The system creates the ViewDefault view when the SNMP agent is enabled. In this default MIB view, all MIB objects in the iso subtree but the snmpUsmMIB, snmpVacmMIB, and snmpModules.18 subtrees are accessible. Views System view Predefined user roles network-admin Parameters excluded: Denies access to any node in the specified MIB subtree.
  • Page 198: Snmp-Agent Packet Max-Size

    snmp-agent packet max-size Use snmp-agent packet max-size to set the maximum size (in bytes) of SNMP packets that the SNMP agent can receive or send. Use undo snmp-agent packet max-size to restore the default. Syntax snmp-agent packet max-size byte-count undo snmp-agent packet max-size Default An SNMP agent can handle a maximum SNMP packet size of 1500 bytes.
  • Page 199: Snmp-Agent Remote

    Parameters port-num: Specifies the UDP port for receiving SNMP packets, in the range of 1 to 65535. The default is 161. Usage guidelines After changing the port number for receiving SNMP packets, reconnect the device by using the port number for SNMP get and set operations. To display UDP port information, use the display current-configuration command.
  • Page 200: Snmp-Agent { Inform | Trap } Source

    The NMS accepts the SNMPv3 informs from the SNMP agent only if the engine ID in the informs is the same as its local engine ID. You can configure up to 20 remote SNMP engine IDs. Examples # Configure the SNMP engine ID (123456789A) of the SNMP manager (10.1.1.1). <Sysname>...
  • Page 201: Snmp-Agent Sys-Info Contact

    <Sysname> system-view [Sysname] snmp-agent trap source gigabitethernet 2/0/1 # Configure the primary IP address of GigabitEthernet 2/0/2 as the source address of SNMP informs. <Sysname> system-view [Sysname] snmp-agent inform source gigabitethernet 2/0/2 Related commands snmp-agent target-host • snmp-agent trap enable •...
  • Page 202: Snmp-Agent Sys-Info Version

    undo snmp-agent sys-info location Default The system location is Null. Views System view Predefined user roles network-admin Parameters sys-location: Specifies the system location, a string of 1 to 255 characters. Usage guidelines Configure the location of the device for system maintenance and management. Examples # Configure the system location as Room524-row1-3.
  • Page 203: Snmp-Agent Target-Host

    v2c: Specifies SNMPv2c. v3: Specifies SNMPv3. Usage guidelines SNMPv1 and SNMPv2c settings in this command are not supported in FIPS mode. Configure the SNMP agent with the same SNMP version as the NMS for successful communications between them. Examples # Enable SNMPv3. <Sysname>...
  • Page 204 Predefined user roles network-admin Parameters inform: Sends notifications as informs. trap: Sends notifications as traps. address: Specifies the destination address of SNMP notifications. udp-domain: Specifies UDP as the transport protocol. ip-address: Specifies the IPv4 address or host name of the target host as the destination of SNMP notifications.
  • Page 205: Snmp-Agent Trap Enable

    [Sysname] snmp-agent trap enable standard [Sysname] snmp-agent target-host trap address udp-domain 10.1.1.1 params securityname public v3 Related commands • snmp-agent { inform | trap } source snmp-agent trap enable • snmp-agent trap life • snmp-agent trap enable Use snmp-agent trap enable to enable SNMP notifications globally. Use undo snmp-agent trap enable to disable SNMP notifications globally.
  • Page 206: Snmp-Agent Trap If-Mib Link Extended

    system: Specifies system notifications sent when the system time is modified, the system reboots, or the main system software image is not available. Usage guidelines The snmp-agent trap enable command enables the device to generate notifications, including both informs and traps, even though the keyword trap is used in this command. You can use the snmp-agent target-host command to enable the device to send the notifications as informs or traps to a host.
  • Page 207: Snmp-Agent Trap Life

    snmp-agent trap life Use snmp-agent trap life to configure the lifetime of notifications in the SNMP notification queue. Use undo snmp-agent trap life to restore the default notification lifetime. Syntax snmp-agent trap life seconds undo snmp-agent trap life Default The SNMP notification lifetime is 120 seconds. Views System view Predefined user roles...
  • Page 208: Snmp-Agent Trap Queue-Size

    Predefined user roles network-admin Usage guidelines Use SNMP notification logging to record SNMP notifications sent by the SNMP agent for notification tracking. The SNMP agent sends logs to the information center. You can configure the information center to output the logs to a destination as needed. Examples # Enable SNMP notification logging.
  • Page 209: Snmp-Agent Usm-User { V1 | V2C

    snmp-agent usm-user { v1 | v2c } Use snmp-agent usm-user { v1 | v2c } to add a user to an SNMPv1 or SNMPv2c group. Use undo snmp-agent usm-user { v1 | v2c } to delete a user from an SNMPv1 or SNMPv2c group. Syntax snmp-agent usm-user { v1 | v2c } user-name group-name [ acl { acl-number | name acl-name } | acl ipv6 { ipv6-acl-number | name ipv6-acl-name } ] *...
  • Page 210 specified username to access the SNMP agent. If the specified ACL does not have any rules, no NMS in the SNMP community can access the SNMP agent. Usage guidelines This command is not supported in FIPS mode. When you create an SNMPv1 or SNMPv2c user, the system automatically creates a community that has the same name as the SNMPv1 or SNMPv2c username.
  • Page 211: Snmp-Agent Usm-User V3

    snmp-agent usm-user v3 Use snmp-agent usm-user v3 to add a user to an SNMPv3 group or create an SNMPv3 user. Use undo snmp-agent usm-user v3 to delete a user from an SNMPv3 group or remove an SNMPv3 user. Syntax Non-FIPS mode (in VACM mode): snmp-agent usm-user v3 user-name group-name [ remote { ip-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ] ] [ { cipher | simple } authentication-mode { md5 | sha } auth-password [ privacy-mode { aes128 | 3des | des56 } priv-password ] ] [ acl { acl-number | name...
  • Page 212 group-name: Specifies an SNMPv3 group name, a case-sensitive string of 1 to 32 characters. user-role role-name: Specifies a user role name, a case-sensitive string of 1 to 63 characters. remote { ip-address | ipv6 ipv6-address }: Specifies the IPv4 or IPv6 address of the remote SNMP entity. vpn-instance vpn-instance-name: Specifies the VPN for the target host receiving SNMP notifications.
  • Page 213 Authentication Encryption Hexadecimal string Non-hexadecimal string algorithm algorithm AES128 or 40 characters 53 characters DES-56 acl acl-number: Specifies a basic IPv4 ACL by its number to filter NMSs by source IPv4 address. The acl-number argument represents an ACL number in the range of 2000 to 2999. Only NMSs with an IPv4 address permitted in the ACL can use the specified username to access the SNMP agent.
  • Page 214 The VACM mode requires only the access right from the NMS to MIB objects. • HP recommends the RBAC mode because it is more secure. For security purposes, all keys, including keys configured in plain text, are saved in cipher text.
  • Page 215: Snmp-Agent Usm-User V3 User-Role

    plaintext authentication key 123456TESTauth&!, and the plaintext privacy key 123456TESTencr&! for the user. <Sysname> system-view [Sysname] snmp-agent group v3 testGroup privacy [Sysname] snmp-agent usm-user v3 testUser testGroup simple authentication-mode sha 123456TESTauth&! privacy-mode aes128 123456TESTencr&! # For an NMS to access the MIB objects in the default view ViewDefault, make sure the following configurations on the NMS are the same as the SNMP agent: SNMPv3 username.
  • Page 216 Use undo snmp-agent usm-user user-role to remove a user role. Syntax snmp-agent usm-user v3 user-name user-role role-name undo snmp-agent usm-user v3 user-name user-role role-name Default No SNMPv3 users are configured in RBAC mode. Views System view Predefined user roles network-admin Parameters user-name: Specifies an SNMPv3 username, a case-sensitive string of 1 to 32 characters.
  • Page 217: Rmon Commands

    RMON commands display rmon alarm Use display rmon alarm to display entries in the RMON alarm table. Syntax display rmon alarm [ entry-number ] Views Any view Predefined user roles network-admin network-operator Parameters entry-number: Specifies an alarm entry index in the range of 1 to 65535. If you do not specify an entry, the command displays all entries in the RMON alarm table.
  • Page 218 Field Description Sample type (MIB object alarmSampleType): • absolute—RMON compares the value of the variable with the rising and falling thresholds at the end of the sampling interval. Sample type • delta—RMON subtracts the value of the variable at the previous sample from the current value, and then compares the difference with the rising and falling thresholds.
  • Page 219: Display Rmon Event

    Related commands rmon alarm display rmon event Use display rmon event to display RMON event entries. Syntax display rmon event [ entry-number ] Views Any view Predefined user roles network-admin network-operator Parameters entry-number: Specifies an event entry index in the range of 1 to 65535. If you do not specify an entry, the command displays all event entries.
  • Page 220: Display Rmon Eventlog

    Table 47 Command output Field Description Event entry owner and status: • entry-number—Event entry index (MIB object eventIndex). • owner—Entry owner (MIB object eventOwner). • status—Entry status (MIB object eventStatus): EventEntry entry-number VALID—The entry is valid. owned by owner is status. UNDERCREATION—The entry is invalid.
  • Page 221 Usage guidelines If the log action is specified for an event, the system adds a record in the event log table each time the event occurs. Each record contains the log entry index, time when the event was logged (the amount of time that elapsed since system startup), and event description.
  • Page 222: Display Rmon History

    Related commands rmon event display rmon history Use display rmon history to display RMON history control entries and history samples of Ethernet statistics for Ethernet interfaces. Syntax display rmon history [ interface-type interface-number ] Views Any view Predefined user roles network-admin network-operator Parameters...
  • Page 223 fragments , jabbers collisions , utilization Sampling record 3 : dropevents , octets : 936 packets : 10 , broadcast packets multicast packets : 6 , CRC alignment errors : 0 undersize packets : 0 , oversize packets fragments , jabbers collisions , utilization HistoryControlEntry 7 owned by user1 is VALID.
  • Page 224: Display Rmon Prialarm

    Field Description Total number of octets received during the sampling interval (MIB object octets etherHistoryOctets). Total number of packets (including bad packets) received during the sampling packets interval (MIB object etherHistoryPkts). Number of broadcasts received during the sampling interval (MIB object broadcast packets etherHistoryBroadcastPkts).
  • Page 225 Parameters entry-number: Specifies an alarm entry index in the range of 1 to 65535. If you do not specify an entry, the command displays all private alarm entries. Examples # Display all private alarm entries. <Sysname> display rmon prialarm PrialarmEntry 1 owned by user1 is VALID. Sample type : absolute Variable formula...
  • Page 226 Field Description Alarm rising threshold (MIB node hh3cRmonExtAlarmRisingThreshold). A rising alarm is generated when the following conditions are all met: • The current sampled value is greater than or equal to this threshold. • The value at the previous sampling interval was less than this threshold. Rising threshold A rising alarm is also generated when the following conditions are all met: •...
  • Page 227: Display Rmon Statistics

    display rmon statistics Use display rmon statistics to display RMON statistics. Syntax display rmon statistics [ interface-type interface-number ] Views Any view Predefined user roles network-admin network-operator Parameters interface-type interface-number: Specifies an interface by its type and number. If you do not specify an interface, the command displays RMON statistics for all interfaces.
  • Page 228 Table 51 Command output Field Description Statistics entry owner and status: • entry-number—Statistics entry index (MIB object etherStatsIndex). • owner—Entry owner (MIB object etherStatsOwner). • status—Entry status (MIB object etherStatsStatus): VALID—The entry is valid. EtherStatsEntry entry-number UNDERCREATION—The entry is invalid. owned by owner is status.
  • Page 229: Rmon Alarm

    Field Description Incoming-packet statistics by packet length: • 64—Number of 64-byte packets. The value is stored in the MIB node etherStatsPkts64Octets. • 65-127—Number of 65- to 127-byte packets. The value is stored in the MIB node etherStatsPkts65to127Octets. • 128-255—Number of 128- to 255-byte packets. The value is stored in the Incoming packets by size: MIB node etherStatsPkts128to255Octets.
  • Page 230 Table 52 Alarm varilable formats Format Examples Dotted OID format: 1.3.6.1.2.1.2.1.10.1 entry.integer.instance etherStatsOctets.1 etherStatsPkts.1 etherStatsBroadcastPkts.1 Object name.instance ifInOctets.1 ifInUcastPkts.1 ifInNUcastPkts.1 sampling-interval: Sets the sampling interval in the range of 5 to 65535 seconds. absolute: Specifies absolute sampling. RMON compares the value of the variable with the rising and falling thresholds at the end of the sampling interval.
  • Page 231: Rmon Event

    RMON samples the monitored alarm variable at the specified sampling interval, compares the sampled value with the predefined thresholds, and does one of the following: Triggers the event associated with the rising alarm if the sampled value is equal to or greater than •...
  • Page 232: Rmon History

    description string: Configures an event description, a case-sensitive string of 1 to 127 characters. log: Logs the event when it occurs. log-trap: Logs the event and sends an SNMP notification when the event occurs. security-string: Represents the SNMP community name, a case-sensitive string of 1 to 127 characters. none: Performs no action when the event occurs.
  • Page 233: Rmon Prialarm

    Predefined user roles network-admin Parameters entry-number: Specifies a history control entry index in the range of 1 to 65535. buckets number: Specifies the expected maximum number of samples to be retained for the entry, in the range of 1 to 65535. RMON can retain a maximum of 50 samples for each history control entry. If the expected bucket size exceeds the available history table size, RMON sets the bucket size as closely to the expected bucket size as is possible.
  • Page 234 Predefined user roles network-admin Parameters entry-number: Specifies a private alarm entry index in the range of 1 to 65535. prialarm-formula: Configures a private alarm variable formula, a string of 1 to 255 characters. The variables in the formula must be represented in OID format that starts with a dot (.), for example, (.1.3.6.1.2.1.2.1.10.1)*8.
  • Page 235: Rmon Statistics

    Usage guidelines You can create a maximum of 50 private alarm entries. Each alarm entry must have a unique alarm variable, sampling interval, sample type, rising threshold, or falling threshold. You cannot create an alarm entry if all these parameters for the entry are the same as an existing entry.
  • Page 236 Use undo rmon statistics to remove an entry from the RMON statistics table. Syntax rmon statistics entry-number [ owner text ] undo rmon statistics entry-number Default No entry exists in the RMON statistics table. Views Ethernet interface view Predefined user roles network-admin Parameters entry-number: Specifies a statistics entry index in the range of 1 to 65535.
  • Page 237: Event Mib Commands

    Event MIB commands action Use action to set an action for an event. Use undo action to remove an action. Syntax action { notification | set } undo action { notification | set } Default An event does not have an action. Views Event view Predefined user roles...
  • Page 238: Comparison

    snmp mib event • comparison Use comparison to specify a Boolean comparison type. Use undo comparison to restore the default. Syntax comparison { equal | greater | greaterOrEqual | less | lessOrEqual | unequal } undo comparison Default The Boolean comparison type is unequal. Views Trigger-Boolean view Predefined user roles...
  • Page 239: Context (Action-Set View)

    Related commands snmp mib event trigger • test • context (action-set view) Use context to configure a context for the set action. Use undo context to restore the default. Syntax context context-name undo context Default A set action does not have a context. Views Action-set view Predefined user roles...
  • Page 240: Delta Falling

    Default A monitored object does not have a context. Views Trigger view Predefined user roles network-admin Parameters context-name: Specifies a context, a case-sensitive string of 1 to 32 characters. Usage guidelines To uniquely identify a monitored object, configure a context for the object. Examples # Configure the context contextname1 for a monitored object.
  • Page 241: Delta Rising

    Usage guidelines If the value of the monitored object crosses the falling threshold multiple times in succession, a falling event is triggered only for the first crossing. Examples # Set the delta falling threshold to 20. <Sysname> system-view [Sysname] snmp mib event trigger owner owner1 name triggerA [Sysname-trigger-owner1-triggerA] test threshold [Sysname-trigger-owner1-triggerA-threshold] delta falling value 20 Related commands...
  • Page 242: Description (Event View)

    [Sysname-trigger-owner1-triggerA] test threshold [Sysname-trigger-owner1-triggerA-threshold] delta rising value 50 [Sysname-trigger-owner1-triggerA-threshold] delta rising event owner owner1 name event1 Related commands sample • snmp mib event trigger • test • description (event view) Use description to configure a description for an event. Use undo description to restore the default. Syntax description event-description undo description...
  • Page 243: Display Snmp Mib Event

    Default A trigger does not have a description. Views Trigger view Predefined user roles network-admin Parameters trigger-description: Specifies a description, a case-sensitive string of 1 to 255 characters. Examples # Configure the description triggerA is configured for configured for network management events for the trigger with the owner owner1 and the name triggerA.
  • Page 244: Display Snmp Mib Event Event

    TriggerValueID : 1.3.6.1.2.1.2.2.1.7.3<ifAdminStatus.3> TriggerValueIDWildcard : false TriggerTargetTag : N/A TriggerContextName : context1 TriggerContextNameWildcard : true TriggerFrequency(in seconds): 600 TriggerEnabled : true Boolean entry: BoolCmp : unequal BoolValue BoolStartUp : true BoolObjOwner : owner1 BoolObjName : Objects1 BoolEvtOwner : N/A BoolEvtName : N/A Event entry eventA owned by owner2: EvtComment...
  • Page 245 Syntax display snmp mib event event [ owner event-owner name event-name ] Views Any view Predefined user roles network-admin network-operator Parameters owner event-owner name event-name: Specifies an event by its owner and name. If you do not specify an event, this command displays information about all events and event actions. Examples # Display information about the event with the owner owner2 and name eventA and the event actions.
  • Page 246: Display Snmp Mib Event Object List

    Field Description NotifyObjName Name of the object list to be added to the notification. Set entry SetObj OID of the set-action object. Wildcarding option for the OID: • SetObjWildcard false—Specifies an object by its OID. • true—Enables wildcarded search for the OID. SetValue Value of the set-action object.
  • Page 247: Display Snmp Mib Event Summary

    ObjID : 1.3.6.1.2.1.2.2.1.2.0<ifDescr.0> ObjIDWildcard : false Table 54 Command output Field Description ObjIndex Index of the object. ObjID OID of the object. Wildcarding option for the OID: • ObjIDWildcard false—Specifies the OID. • true—Enables wildcarded search for the OID. Related commands snmp mib event object list display snmp mib event summary Use display snmp mib event summary to display the Event MIB summary.
  • Page 248: Display Snmp Mib Event Trigger

    Field Description Maximum number of sampled instances. SampleInstancesHigh Number of sampling failures after the maximum number of sampling instances is SampleInstanceLacks reached. Related commands display snmp mib event display snmp mib event trigger Use display snmp mib event trigger to display information about a trigger and the trigger test. Syntax display snmp mib event trigger [ owner trigger-owner name trigger-name ] Views...
  • Page 249 ExiEvtOwner : owner1 ExiEvtName : event1 Boolean entry: BoolCmp : unequal BoolValue BoolStartUp : true BoolObjOwner : owner1 BoolObjName : Objects1 BoolEvtOwner : N/A BoolEvtName : N/A Threshold entry: ThresStartUp : falling ThresRising : 40 ThresFalling : 20 ThresDeltaRising : 40 ThresDeltaFalling : 20 ThresObjOwner...
  • Page 250 Field Description Wildcarding option for the context • TriggerContextNameWildcard false—Specifies the context. • true—Enables wildcarded search for the context. Trigger sampling interval. TriggerFrequency Owner of the trigger object, an SNMPv3 user. TriggerObjOwner TriggerObjName Name of the trigger object. Trigger status: •...
  • Page 251: Event Enable

    Field Description Threshold trigger test for the first sampling: • rising. ThresStartUp • falling. • risingOrFalling. ThresRising Rising threshold. ThresFalling Falling threshold. ThresDeltaRising Delta rising threshold. ThresDeltaFalling Delta falling threshold. ThresObjOwner Owner of the threshold test object. ThresObjName Name of the threshold test object. ThresRisEvtOwner Owner of the rising event.
  • Page 252: Event Owner (Trigger-Boolean View)

    Examples # Enable the event with the owner owner1 and the name EventA. <Sysname> system-view [Sysname] snmp mib event owner owner1 name EventA [Sysname-event-owner1-EventA] event enable Related commands action • snmp mib event • event owner (trigger-Boolean view) Use event owner to specify an event for a Boolean test. Use undo event to restore the default.
  • Page 253: Falling

    Syntax event owner event-owner name event-name undo event Default No event is specified for an existence test. Views Trigger-existence view Predefined user roles network-admin Parameters event owner event-owner: Specifies the owner of an event. Specify the trigger owner for the event-owner argument.
  • Page 254: Frequency

    name event-name: Specifies the name of an event, a case-sensitive string of 1 to 32 characters. value integer-value: Specifies a falling threshold. The value must be smaller than or equal to the rising threshold. Usage guidelines If the value of the monitored object crosses the falling threshold multiple times in succession, the event is triggered only for the first crossing.
  • Page 255: Object List Owner (Action-Notification View)

    Related commands snmp mib event sample minimum • snmp mib event trigger • object list owner (action-notification view) Use object list owner to specify an object list for a notification action. Use undo object list to restore the default. Syntax object list owner objects-owner name objects-name undo object list Default...
  • Page 256: Object List Owner (Trigger-Existence View)

    undo object list Default No object list is specified for a trigger-Boolean test. Views Trigger-Boolean view Predefined user roles network-admin Parameters owner objects-owner: Specifies the owner of an object list. Specify the trigger owner for the objects-owner argument. name objects-name: Specifies the name of an object list, a case-sensitive string of 1 to 32 characters. Usage guidelines The objects in the list are added to the notification when the monitored object meets the Boolean test condition and the notification action is triggered.
  • Page 257: Object List Owner (Trigger-Threshold View)

    Parameters owner objects-owner: Specifies the owner of an object list. Use the trigger owner for the objects-owner argument. name objects-name: Specifies the name of an object list, a case-sensitive string of 1 to 32 characters. Usage guidelines The objects in the list are added to the notification when the monitored object meets the existence test condition and the notification action is triggered.
  • Page 258: Object List Owner (Trigger View)

    [Sysname] snmp mib event trigger owner owner1 name triggerA [Sysname-trigger-owner1-triggerA] test threshold [Sysname-trigger-owner1-triggerA-threshold] object list owner owner1 name objectA Related commands snmp mib event trigger • test • object list owner (trigger view) Use object list owner to specify an object list for a trigger. Use undo object list to restore the default.
  • Page 259: Oid (Action-Notification View)

    oid (action-notification view) Use oid to specify a notification OID. Use undo oid to restore the default. Syntax oid object-identifier undo oid Default The OID is 0.0. No notification OID is specified. Views Action-notification view Predefined user roles network-admin Parameters object-identifier: Specifies a notification OID, which identifies a trap node.
  • Page 260: Oid (Trigger View)

    Views Action-set view Predefined user roles network-admin Parameters object-identifier: Specifies an object by its OID or name. Usage guidelines You can specify a table node, conceptual row node, table column node, leaf node, or parent leaf node by its OID for a set action. Examples # Specify the object with the OID 1.3.6.1.2.1.2.2.1.7.3 for the set action of an event with the owner owner1 and name EventA.
  • Page 261: Rising

    Examples # Specify the object with the OID 1.3.6.1.2.1.2.2.1.1.3 for trigger sampling. <Sysname> system-view [Sysname] snmp mib event trigger owner owner1 name triggerA [Sysname-trigger-owner1-triggerA] oid 1.3.6.1.2.1.2.2.1.1.3 Related commands snmp mib event trigger rising Use rising to specify a rising threshold. Use undo rising to restore the default.
  • Page 262: Sample

    snmp mib event trigger • • test sample Use sample to specify a sampling method. Use undo sample to restore the default. Syntax sample { absolute | delta } undo sample Default The sampling method is absolute. Views Trigger view Predefined user roles network-admin Parameters...
  • Page 263: Snmp Mib Event Object List

    undo snmp mib event owner event-owner name event-name Default No event exists. Views System view Predefined user roles network-admin Parameters event-owner: Specifies an owner for an event. Specify an existing SNMPv3 user for the argument. event-name: Specifies a name for an event, a case-sensitive string of 1 to 32 characters. Usage guidelines An event is identified by its owner and name.
  • Page 264: Snmp Mib Event Sample Instance Maximum

    Parameters owner objects-owner: Specifies the owner of an object list. Specify an existing SNMPv3 user for the objects-owner argument. name objects-name: Specifies the name of an object list, a case-sensitive string of 1 to 32 characters. oid objects-index argument: Specifies the index of an object list in the range of 1 to 4294967295. oid object-identifier: Specifies an object by its OID or name.
  • Page 265: Snmp Mib Event Sample Minimum

    Usage guidelines Changing the maximum number of sampling instances does not affect the existing instances. If the maximum number of sampling instances is changed to a value smaller than the number of existing instances, the existing instances will continue to be sampled. Examples # Set the maximum number of sampling instances to 10.
  • Page 266: Snmp Mib Event Trigger

    snmp mib event trigger Use snmp mib event trigger to create a trigger and enter trigger view. If the trigger exists, this command enters trigger view directly. Use undo snmp mib event trigger to remove a trigger. Syntax snmp mib event trigger owner trigger-owner name trigger-name undo snmp mib event trigger owner trigger-owner name trigger-name Default No trigger exists.
  • Page 267: Startup (Trigger-Existence View)

    Predefined user roles network-admin Usage guidelines After you enable the Event MIB trap feature, traps are generated when object sampling fails or a trigger condition is met and sent to the SNMP module. Traps include trigger trap, rising threshold break trap, falling threshold break trap, trigger-condition detection failure trap, and set-action trigger failure trap.
  • Page 268: Startup (Trigger-Threshold View)

    [Sysname-trigger-owner1-triggerA] test existence [Sysname-trigger-owner1-triggerA-existence] undo startup present Related commands type startup (trigger-threshold view) Use startup to specify a threshold trap type for the first sampling. Use undo startup to restore the default. Syntax startup { falling | rising | rising-or-falling } undo startup Default The threshold trap type for the first sampling is rising-or-falling.
  • Page 269: Startup Enable

    startup enable Use startup enable to trigger an event for the first Boolean sampling. Use undo startup enable to disable the feature. Syntax startup enable undo startup enable Default An event is triggered for the first Boolean sampling. Views Trigger-Boolean view Predefined user roles network-admin Usage guidelines...
  • Page 270: Trigger Enable

    Predefined user roles network-admin Parameters boolean: Specifies the Boolean test. This test compares the value of the monitored object with the reference value. existence: Specifies the existence test. This test monitors the absence, presence, and change of the monitored object. threshold: Specifies the threshold test.
  • Page 271: Type

    [Sysname] snmp mib event trigger owner owner1 name triggerA [Sysname-trigger-owner1-triggerA] oid 1.3.6.1.2.1.2.2.1.1.3 [Sysname-trigger-owner1-triggerA] frequency 360 [Sysname-trigger-owner1-triggerA] trigger enable Related commands snmp mib event trigger type Use type to specify an existence test type. Use undo type to remove the existence test type. Syntax type { absent | changed | present } undo type { absent | changed | present }...
  • Page 272: Value (Action-Set View)

    value (action-set view) Use value to set a value for a set-action object. Use undo value to restore the default. Syntax value integer-value undo value Default The value of a set-action object is 0. Views Action-set view Predefined user roles network-admin Parameters integer-value: Specifies a value for a set-action object.
  • Page 273: Wildcard Context (Action-Set View)

    Predefined user roles network-admin Parameters integer-value: Specifies a reference value. The value is an integer. Usage guidelines The Boolean test uses the reference value to compare with the sampled value. Examples # Set the reference value to 5 for the Boolean test. <Sysname>...
  • Page 274: Wildcard Context (Trigger View)

    Related commands action set • context • • snmp mib event owner wildcard context (trigger view) Use wildcard context to enable the context of an object to be wildcarded. Use undo wildcard context to restore the default. Syntax wildcard context undo wildcard context Default The context of an object is fully specified.
  • Page 275: Wildcard Oid (Trigger View)

    Default The set-action object OID is fully specified. Views Action-set view Predefined user roles network-admin Usage guidelines This command must be used in conjunction with the oid command. A wildcarded OID has two parts: the OID specified by the oid command and the wildcarded part. Examples # Enable the set-action object OID 1.3.6.1.2.1.2.2.1.7 to be wildcarded for the event with the owner owner1 and the name EventA.
  • Page 276 Examples # Specify the sampled object with the OID 1.3.6.1.2.1.1.6 for a trigger and enable the OID to be wildcarded. <Sysname>system-view [Sysname] snmp mib event trigger owner owner1 name triggerA [Sysname-trigger-owner1-triggerA] oid 1.3.6.1.2.1.1.6 [Sysname-trigger-owner1-triggerA] wildcard oid Related commands • snmp mib event trigger •...
  • Page 277: Netconf Commands

    NETCONF commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. netconf soap http enable Use netconf soap http enable to enable NETCONF over SOAP over HTTP.
  • Page 278: Netconf Ssh Server Enable

    Views System view Predefined user roles network-admin Usage guidelines This command enables the device to resolve NETCONF messages that are encapsulated with SOAP in HTTPS packets. Examples # Enable NETCONF over SOAP over HTTPS. <Sysname> system-view [Sysname] netconf soap https enable netconf ssh server enable Use netconf ssh server enable to enable NETCONF over SSH.
  • Page 279: Netconf Ssh Server Port

    netconf ssh server port Use netconf ssh server port to specify a port to listen for NETCONF-over-SSH connections. Use undo netconf ssh server port to restore the default. Syntax netconf ssh server port port-number undo netconf ssh server port Default Port 830 listens for NETCONF-over-SSH connections.
  • Page 280 Close-session NETCONF messages must comply with the XML format requirements and semantic and syntactic requirements in the NETCONF XML API reference for the device. To ensure successful configuration, HP recommends that you use third-party software to generate NETCONF messages. To quit XML view, use a NETCONF message instead of the quit command.
  • Page 281: Cwmp Commands

    CWMP commands cwmp Use cwmp to enter CWMP view. Syntax cwmp Views System view Predefined user roles network-admin Examples # Enter CWMP view. <Sysname> system-view [Sysname] cwmp Related commands cwmp enable cwmp acs default password Use cwmp acs default password to configure a password for authentication to the default ACS URL. Use undo cwmp acs default password to restore the default.
  • Page 282: Cwmp Acs Default Url

    password: Specifies the password string. This argument is case sensitive. If you specify the simple keyword, it must be a string of 1 to 255 characters. If you specify the cipher keyword, it must be a ciphertext string of 33 to 373 characters. Usage guidelines You can configure only one password for authentication to the default ACS URL.
  • Page 283: Cwmp Acs Default Username

    Examples # Specify the default ACS URL. <Sysname> system-view [Sysname] cwmp [Sysname-cwmp] cwmp acs default url http://www.acs.com:80/acs Related commands cwmp acs default password • cwmp acs default username • cwmp acs default username Use cwmp acs default username to configure the username for authentication to the default ACS. Use undo cwmp acs default username to restore the default.
  • Page 284: Cwmp Acs Url

    Use undo cwmp acs password to restore the default. Syntax cwmp acs password { cipher | simple } password undo cwmp acs password Default No password is configured for authentication to the preferred ACS URL. Views CWMP view Predefined user roles network-admin Parameters cipher: Specifies a password in ciphertext.
  • Page 285: Cwmp Acs Username

    Default No preferred ACS URL is specified. Views CWMP view Predefined user roles network-admin Parameters url: Specifies the preferred ACS URL, a string of 8 to 255 characters. The URL must use the http://host[:port]/path or https://host[:port]/path format. Usage guidelines The device supports only one preferred ACS URL. If you use the command multiple times, the final URL configuration takes effect.
  • Page 286: Cwmp Cpe Connect Interface

    Usage guidelines You can configure only one username for authentication to the preferred ACS URL. If you use the command multiple times, the final username configuration takes effect. For a successful connection, make sure the CPE has the same username setting as the ACS. Examples # Configure the username used for authentication to the preferred ACS URL.
  • Page 287: Cwmp Cpe Connect Retry

    <Sysname> system-view [Sysname] cwmp [Sysname-cwmp] cwmp cpe connect interface gigabitethernet 2/0/1 cwmp cpe connect retry Use cwmp cpe connect retry to configure the maximum number of attempts the CPE can make to retry a failed CWMP connection. Use undo cwmp cpe connect retry to restore the default. Syntax cwmp cpe connect retry times undo cwmp cpe connect retry...
  • Page 288: Cwmp Cpe Inform Interval Enable

    Views CWMP view Predefined user roles network-admin Parameters seconds: Sets the periodic Inform interval in the range of 10 to 86400 seconds. Usage guidelines This command sets the interval for the CPE to send Inform messages automatically to the ACS. For the command to take effect, you must configure the cwmp cpe inform interval enable command.
  • Page 289: Cwmp Cpe Inform Time

    Related commands cwmp cpe inform interval cwmp cpe inform time Use cwmp cpe inform time to schedule a connection initiation for the CPE to connect to the ACS. Use undo cwmp cpe inform time to restore the default. Syntax cwmp cpe inform time time undo cwmp cpe inform time Default No connection initiation has been scheduled.
  • Page 290: Cwmp Cpe Provision-Code

    Parameters cipher: Specifies a password in ciphertext. simple: Specifies a password in plain text. For security purposes, all passwords, including passwords configured in plain text, are saved in ciphertext. password: Specifies the password string. This argument is case sensitive. If you specify the simple keyword, it must be a string of 1 to 255 characters.
  • Page 291: Cwmp Cpe Stun Enable

    Usage guidelines The ACS can use the provision code to identify services assigned to each CPE. For correct configuration deployment, make sure the same provision code is configured on the CPE and the ACS. For information about the support of your ACS for provision code, see the ACS documentation. The CPE can have only one provision code.
  • Page 292: Cwmp Cpe Username

    [Sysname] cwmp [Sysname-cwmp] cwmp cpe stun enable cwmp cpe username Use cwmp cpe username to configure the username for the CPE to authenticate the ACS. Use undo cwmp cpe username to restore the default. Syntax cwmp cpe username username undo cwmp cpe username Default No username is configured for authenticating the ACS.
  • Page 293: Cwmp Enable

    Syntax cwmp cpe wait timeout seconds undo cwmp cpe wait timeout Default The close-wait timer is 30 seconds. Views CWMP view Predefined user roles network-admin Parameters seconds: Sets the close-wait timer, in the range of 30 to 1800 seconds. Usage guidelines The close-wait timer specifies the amount of time the connection to the ACS can be idle before it is terminated.
  • Page 294: Display Cwmp Configuration

    Usage guidelines CWMP configuration takes effect only after CWMP is enabled. Examples # Enable CWMP. <Sysname> system-view [Sysname] cwmp [Sysname-cwmp] cwmp enable Related commands cwmp display cwmp configuration Use display cwmp configuration to display the CWMP configuration. Syntax display cwmp configuration Views Any view Predefined user roles...
  • Page 295: Display Cwmp Status

    Field Description ACS username Username for the CPE to authenticate to the ACS. Default ACS URL. The CPE attempts to connect to the default ACS URL if no ACS URL has been ACS default URL assigned to it through the cwmp acs url command, ACS, or DHCP. This field displays Null if no default ACS URL has been configured.
  • Page 296: Ssl Client-Policy

    Examples # Display CWMP state information. <sysname> display cwmp status CWMP state : Enabled ACS URL of most recent connection : http://www.acs.com:80/acs ACS information source : User ACS username of most recent connection : newname Connection status : Disconnected Data transfer status : None Most recent successful connection attempt : None...
  • Page 297 Use undo ssl client-policy to remove the specified SSL client policy. Syntax ssl client-policy policy-name undo ssl client-policy Default No SSL client policy is specified for CWMP. Views CWMP view Predefined user roles network-admin Parameters policy-name: Specifies the name of an SSL client policy, a string of 1 to 31 characters. Usage guidelines CWMP uses HTTP or HTTPS for data transmission.
  • Page 298: Eaa Commands

    EAA commands Commands and descriptions for centralized devices apply to the following routers: MSR1002-4/1003-8S. • MSR2003. • MSR2004-24/2004-48. • • MSR3012/3024/3044/3064. Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers. action cli Use action cli to add a CLI action to a monitor policy. Use undo action to remove an action.
  • Page 299: Action Reboot

    Action to enter interface view. Action to shut down the interface. When you define an action, you can choose to specify a value or specify a variable name for an argument. For more information about using EAA environment variables, see "rtm environment."...
  • Page 300 slot slot-number: Specifies a card by its slot number. If you do not specify a card, this command reboots all cards. (Distributed devices in IRF mode.) slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, the command reboots all IRF member devices.
  • Page 301: Action Switchover

    action switchover Use action switchover to add an active/standby switchover action to a monitor policy. Use undo action to remove an action. Syntax action number switchover undo action number Default Monitor policies do not contain any actions. Views CLI-defined policy view Predefined user roles network-admin Parameters...
  • Page 302: Commit

    Views CLI-defined policy view Predefined user roles network-admin Parameters number: Specifies an action ID in the range of 0 to 231. priority level: Specifies the log severity level in the range of 0 to 7. A lower value represents a higher severity level.
  • Page 303: Display Rtm Environment

    Usage guidelines You must execute this command for a CLI-defined policy to take effect. After changing the settings in a policy that has been enabled, you must re-execute this command for the changes to take effect. Examples # Enable the CLI-defined policy test. <Sysname>...
  • Page 304 registered: Displays policies that have been created. policy-name: Specifies a policy by its name. If you do not specify a policy, the command displays all monitor policies that are running or have been created. verbose: Displays detailed information about monitor policies. Examples # Display all running monitor policies.
  • Page 305: Event Cli

    event cli Use event cli to configure a CLI event for a CLI-defined monitor policy. Use undo event to delete the event in a CLI-defined monitor policy. Syntax event cli { async [ skip ] | sync } mode { execute | help | tab } pattern regular-exp undo event Default No CLI events are configured.
  • Page 306: Event Hotplug

    [Sysname] rtm cli-policy test [Sysname-rmt-test] event cli async mode tab pattern dis inter brief # Configure a CLI-defined policy to monitor the use of the question mark (?) at command lines that contain the dis inter brief string. Enable the system to execute a policy-matching command line only if the actions in the policy are executed successfully when a question mark is entered at the command line.
  • Page 307: Event Interface

    Hardware Option compatibility MSR1002-4/1003-8S MSR2003 MSR2004-24/2004-48 MSR3012/3024/3044/3064 MSR4060/4080 Usage guidelines Use hotplug event monitor policies to monitor cards for card swapping performed while the device is operating. If you do not specify the remove or insert event, the hotplug event monitor policy monitors cards for both events.
  • Page 308 undo event Default No interface events are configured. Views CLI-defined policy view Predefined user roles network-admin Parameters interface-type interface-number: Specifies an interface by its type and number. monitor-obj monitor-obj: Specifies the traffic statistic to be monitored on the interface. For keywords available for the monitor-obj argument, see Table start-op start-op: Specifies the operator for comparing the monitored traffic statistic with the start...
  • Page 309: Event Process

    Comparison operator Description Greater than. Less than or equal to. Less than. Not equal to. Usage guidelines Use interface event monitor policies to monitor traffic statistics on an interface. You can configure only one event for a monitor policy. If the monitor policy already contains an event, the new event replaces the old event.
  • Page 310 undo event Distributed devices in IRF mode: event process { exception | restart | shutdown | start } [ name process-name [ instance instance-id ] ] [ chassis chassis-number [ slot slot-number ] ] undo event Default No process events are configured. Views CLI-defined policy view Predefined user roles...
  • Page 311: Event Snmp Oid

    Examples # Configure a CLI-defined policy to monitor all instances of the process snmpd for restart events. <Sysname>system-view [Sysname] rtm cli-policy test [Sysname-rtm-test] event process restart name snmpd event snmp oid Use event snmp oid to configure an SNMP event for a CLI-defined monitor policy. Use undo event to delete the event in a CLI-defined monitor policy.
  • Page 312: Event Snmp-Notification

    Usage guidelines Use SNMP event monitor policy to monitor value changes of MIB variables. You can configure only one event for a monitor policy. If the monitor policy already contains an event, the new event replaces the old event. An SNMP event occurs to trigger the policy when the monitored MIB variable's value crosses the start threshold in the following situations: •...
  • Page 313: Event Syslog

    Predefined user roles network-admin Parameters oid oid: Specifies the OID of the monitored MIB variable, a string of 1 to 256 characters. oid-val oid-val: Specifies the threshold to be compared with the sampled value. The oid-val argument can be any data type supported by SNMP, including numerals and character strings. The CLI online help system displays the value range as character strings of 1 to 512 characters.
  • Page 314: Rtm Cli-Policy

    3 to level 0. msg msg: Specifies a regular expression to match the message body, a string of 1 to 255 characters. The log message must use the HP format. For more information about log message formats, see "Configuring the information center."...
  • Page 315: Rtm Environment

    Parameters policy-name: Specifies the name of a CLI-defined monitor policy, a case-sensitive string of 1 to 63 characters. Usage guidelines You must create a CLI-defined monitor policy before you can use the CLI to configure settings in the policy. You can assign the same policy name to a CLI-defined policy and a Tcl-defined policy, but you cannot assign the same name to policies that are the same type.
  • Page 316: Rtm Scheduler Suspend

    Variable name Description Hotplug: _slot ID of the slot where a hot swap event occurs. _subslot ID of the subslot where a hot swap event occurs. Interface: _ifname Interface name. SNMP: _oid OID of the MIB variable where an SNMP operation is performed. _oid_value Value of the MIB variable.
  • Page 317: Rtm Tcl-Policy

    undo rtm scheduler suspend Views System view Predefined user roles network-admin Usage guidelines This command disables all CLI-defined and Tcl-defined monitor policies except for the monitor policies that are running. To revise the Tcl script of a policy, you must suspend all monitor policies first, and then resume the policies after you finish revising the script.
  • Page 318: Running-Time

    To bind a Tcl-defined policy to a different Tcl script file: Delete the Tcl policy. Create the Tcl policy again, and then bind it to the new Tcl script file. You can assign the same policy name to a CLI-defined policy and a Tcl-defined policy. However, you cannot assign the same name to policies that are the same type.
  • Page 319 Syntax user-role role-name undo user-role role-name Default A monitor policy contains user roles that its creator had at the time of policy creation. Views CLI-defined policy view Predefined user roles network-admin Parameters role-name: Specifies a user role, a string of 1 to 63 characters. Usage guidelines For EAA to execute an action in a monitor policy, you must assign the policy the user role that has access to the action-specific commands and resources.
  • Page 320: Process Monitoring And Maintenance Commands

    Process monitoring and maintenance commands Commands and descriptions for centralized devices apply to the following routers: • MSR1002-4/1003-8S. MSR2003. • MSR2004-24/2004-48. • • MSR3012/3024/3044/3064. Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers. The display memory, display process, display process cpu, monitor process and monitor thread commands display information about both processes and kernel threads.
  • Page 321 chassis chassis-number slot slot-number: Specifies an MPU on an IRF member device. If you do not specify this option, the command displays context information for process exceptions on the global active MPU. (Distributed devices in IRF mode.) cpu cpu-number: Specifies a CPU by its number. Usage guidelines The system generates a context information entry for each process exception.
  • Page 322 r10:0xffffffffffffffff r11:0x0000000000000246 r12:0x0000000000405b18 r13:0x00007fff88a5ff7a r14:0x00007fff88a5de30 r15:0x0000000000000000 rip:0x00007fae7dbad20c flag:0x0000000000000246 cs:0x0000000000000033 ss:0x000000000000002b ds:0x0000000000000000 es:0x0000000000000000 fs:0x0000000000000000 gs:0x0000000000000000 fs_base:0x00007fae80a5d6a0 gs_base:0x0000000000000000 orig_ax:0x00000000000000e8 # Display the exception context information on the PowerPC-based 32-bit device. <Sysname> display exception context Index 1 of 1 ------------------------------ Crashed PID: 133 (routed) Crash signal: SIGBUS Crash time: Wed Apr 10 15:47:49 2013 Core file path:...
  • Page 323 grp00: 0x00000000000000ee 0x00000fffffd04840 grp02: 0x00000fff80425c28 0x0000000000000004 grp04: 0x00000fffffd048c0 0x000000000000000a grp06: 0xffffffffffffffff 0x00000fff803c66b4 grp08: 0x000000008002d000 0x0000000000000000 grp10: 0x0000000000000000 0x0000000000000000 grp12: 0x0000000000000000 0x00000fff80a096b0 grp14: 0x000000007b964c00 0x000000007b7d0000 grp16: 0x0000000000000001 0x000000000000000b grp18: 0x0000000000000031 0x0000000000a205b8 grp20: 0x0000000000a20677 0x0000000000000000 grp22: 0x000000007bb91014 0x0000000000000000 grp24: 0xc0000000005ae1c8 0x0000000000000000 grp26: 0xc0000001f00bff20 0xc0000001f00b0000 grp28: 0x00000fffffd04a30 0x000000001001aed8 grp30: 0x00000fffffd04fae 0x00000fffffd04840 nip:0x00000fff803c66b4...
  • Page 324 Index 1 of 1 ------------------------------ Crashed PID: 270 (routed) Crash signal: SIGBUS Crash time: Wed Mar 27 12:39:12 2013 Core file path: flash:/core/node16_routed_270_10_20130327-123912_1364387952.core 0x0000005555a3bcb4 0x0000000120006c1c Backtrace stopped. Registers' content zero:0x0000000000000000 at:0x0000000000000014 v0:0x0000000000000004 v1:0x0000000000000003 a0:0x0000000000000003 a1:0x000000ffff899d90 a2:0x000000000000000a a3:0x0000000000000001 a4:0x0000005555a9b4e0 a5:0x0000000000000000 a6:0xffffffff8021349c a7:0x20696e206368616e t0:0x0000000000000000 t1:0xffffffff80105068...
  • Page 325: Display Exception Filepath

    Filed Description Core file path Directory where the core file is saved. Backtrace stopped All stack information has been displayed. Related commands reset exception context display exception filepath Use display exception filepath to display the core file directory. Syntax Centralized devices in standalone mode: display exception filepath Distributed devices in standalone mode/centralized devices in IRF mode: display exception filepath [ slot slot-number [ cpu cpu-number ] ]...
  • Page 326: Display Kernel Deadloop

    <Sysname> display exception filepath slot 1 The exception filepath on slot 1 is NULL. # (Distributed devices in IRF mode.) Display the core file directory on the global active MPU. <Sysname> display exception filepath The exception filepath on chassis 0 slot 1 is flash:. display kernel deadloop Use display kernel deadloop to display kernel thread deadloop information.
  • Page 327 Recorded at : 2013-05-01 11:16:00.823018 Occurred at : 2013-05-01 11:16:00.823018 Instruction address : 0x4004158c Thread : comsh (TID: 16306) Context : thread context Chassis Slot CPU ID Kernel module info : module name (mrpnc) module address (0xe332a000) module name (12500) module address (0xe00bd000) # Display detailed information about the latest kernel thread deadloop.
  • Page 328 Reg: cr, Val = 0x84000028 ; Reg: nip, Val = 0x057d9550 ; Reg: xer, Val = 0x00000000 ; Reg: lr, Val = 0x0186eff0 ; Reg: ctr, Val = 0x682f7344 ; Reg: msr, Val = 0x00784b5c ; Reg: trap, Val = 0x0000b030 ; Reg: dar, Val = 0x77777777 ;...
  • Page 329 Function Address = 0x8016ce0c Function Address = 0x801223a0 Instruction dump: 41a2fe9c 812300ec 800200ec 7f890000 409efe8c 80010014 540b07b9 40a2fe80 4bfffe6c 80780290 7f64db78 4804ea35 <807f002c> 38800000 38a00080 3863000c Table 65 Command output Field Description Description for the kernel thread deadloop, including the CPU number, Description thread running time, thread name, and thread number.
  • Page 330: Display Kernel Deadloop Configuration

    display kernel deadloop configuration Use display kernel deadloop configuration to display kernel thread deadloop detection configuration. Syntax Centralized devices in standalone mode: display kernel deadloop configuration Distributed devices in standalone mode/centralized devices in IRF mode: display kernel deadloop configuration [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: display kernel deadloop configuration [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] Views...
  • Page 331: Display Kernel Exception

    Field Description Kernel thread number. No thread is excluded from All kernel threads are monitored by kernel thread deadloop detection. monitoring display kernel exception Use display kernel exception to display kernel thread exception information. Syntax Centralized devices in standalone mode: display kernel exception show-number [ offset ] [ verbose ] Distributed devices in standalone mode/centralized devices in IRF mode: display kernel exception show-number [ offset ] [ verbose ] [ slot slot-number [ cpu cpu-number ] ]...
  • Page 332 Examples # Display brief information about the latest kernel thread exception. <Sysname> display kernel exception 1 ----------------- Exception record 1 ----------------- Description : Oops[#0] Recorded at : 2013-05-01 11:16:00.823018 Occurred at : 2013-05-01 11:16:00.823018 Instruction address : 0x4004158c Thread : comsh (TID: 16306) Context : thread context Chassis...
  • Page 333 Reg: r22, Val = 0x00002000 ; Reg: r23, Val = 0x0000002c ; Reg: r24, Val = 0x00000002 ; Reg: r25, Val = 0x24000024 ; Reg: r26, Val = 0x00000000 ; Reg: r27, Val = 0x057d9484 ; Reg: r28, Val = 0x0000002c ; Reg: r29, Val = 0x00000000 ;...
  • Page 334: Display Process

    Function Address = 0x80179b30 Function Address = 0x80127438 Function Address = 0x8012d734 Function Address = 0x80100a00 Function Address = 0xe0071004 Function Address = 0x8016ce0c Function Address = 0x801223a0 Instruction dump: 41a2fe9c 812300ec 800200ec 7f890000 409efe8c 80010014 540b07b9 40a2fe80 4bfffe6c 80780290 7f64db78 4804ea35 <807f002c> 38800000 38a00080 3863000c For detailed information about the command output, see Table Related commands...
  • Page 335 slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the command displays process state information for the master device. (Centralized devices in IRF mode.) chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device.
  • Page 336 Field Description Last started Time when the latest restart occurred. State of the process: • running—Running or waiting in the queue. • sleeping—Interruptible sleep. Process state • traced or stopped—Stopped. • uninterruptible sleep—Uninterruptible sleep. • zombie—The process has quit, but some resources are not released. Maximum number of core files that the process can create.
  • Page 337: Display Process Cpu

    00:00:00 [kswapd0] 00:00:00 [aio/0] 00:00:00 [scsi_eh_0] 00:00:00 [scsi_eh_1] 00:00:00 [scsi_eh_2] 00:00:00 [lipc_topology] ---- More ---- Table 68 Command output Field Description Job ID of a process. It never changes. Number of a process. %CPU CPU usage in percentage (%). %MEM Memory usage in percentage (%).
  • Page 338 network-operator Parameters slot slot-number: Specifies a card by its slot number. If you do not specify this option, the command displays CPU usage for all processes on the active MPU. (Distributed devices in standalone mode.) slot slot-number: Specifies an IRF member device by its member ID. If you do not specify a member device, this command displays information for the master device.
  • Page 339: Display Process Log

    Field Description 1Min CPU usage of the process within the last minute. 5Min CPU usage of the process within the last 5 minutes. Name of the process. If square brackets ([ ]) exist in a process name, the Name process is a kernel thread. display process log Use display process log to display log information for all processes.
  • Page 340: Display Process Memory

    pkg_update 2013-06-11 09:31:06 2013-06-11 09:31:06 autocfgd 2013-06-11 09:31:13 2013-06-11 09:31:13 comsh 2013-06-11 09:31:05 2013-06-11 09:31:13 Table 70 Command output Field Description Name Name of a process. Job ID of a process. ID of a process. Indicates whether the process exited abnormally: •...
  • Page 341 chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the member ID of the IRF member device. The slot-number argument represents the slot number of the card. If you do not specify a card, this command displays information for the global active MPU.
  • Page 342: Display Process Memory Heap

    display process memory heap Use display process memory heap to display heap memory usage for a process. Syntax Centralized devices in standalone mode: display process memory heap job job-id [ verbose ] Distributed devices in standalone mode/centralized devices in IRF mode: display process memory heap job job-id [ verbose ] [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: display process memory heap job job-id [ verbose ] [ chassis chassis-number slot slot-number [ cpu...
  • Page 343: Display Process Memory Heap Address

    Examples # Display brief information about heap memory usage for the process identified by job ID 148. <Sysname> display process memory heap job 148 Total virtual memory heap space(in bytes) : 2228224 Total physical memory heap space(in bytes) : 262144 Total allocated memory(in bytes) 161576 # Display detailed information about heap memory usage for the process identified by job ID 148.
  • Page 344 display process memory heap job job-id address starting-address length memory-length [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: display process memory heap job job-id address starting-address length memory-length [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] Views Any view Predefined user roles...
  • Page 345: Display Process Memory Heap Size

    display process memory heap size Use display process memory heap size to display the addresses of heap memory blocks with a specified size used by a process. Syntax Centralized devices in standalone mode: display process memory heap job job-id size memory-size [ offset offset-size ] Distributed devices in standalone mode/centralized devices in IRF mode: display process memory heap job job-id size memory-size [ offset offset-size ] [ slot slot-number [ cpu cpu-number ] ]...
  • Page 346: Exception Filepath

    <Sysname> display process memory heap job 1 size 16 0xb7e300c0 0xb7e300d0 0xb7e300e0 0xb7e300f0 0xb7e30100 0xb7e30110 0xb7e30120 0xb7e30130 0xb7e30140 0xb7e30150 0xb7e30160 0xb7e30170 0xb7e30180 0xb7e30190 0xb7e301a0 0xb7e301b0 0xb7e301c0 0xb7e301d0 0xb7e301e0 0xb7e301f0 0xb7e30200 0xb7e30210 0xb7e30220 0xb7e30230 # Display the addresses of 16-byte memory blocks starting from the fifth block used by process job 1. <Sysname>...
  • Page 347: Monitor Kernel Deadloop Enable

    Examples # Specify the directory for saving core files as flash:/. <Sysname> exception filepath flash:/ Related commands • display exception filepath process core • monitor kernel deadloop enable Use monitor kernel deadloop enable to enable kernel thread deadloop detection. Use undo monitor kernel deadloop enable to disable kernel thread deadloop detection. Syntax Centralized devices in standalone mode: monitor kernel deadloop enable...
  • Page 348: Monitor Kernel Deadloop Exclude-Thread

    The command enables the device to detect deadloops. If a thread occupies the CPU regularly, the device considers that a deadloop has occurred. It outputs a deadloop message and reboots to remove the deadloop. Inappropriate use of the command can cause service problems or system breakdown. Make sure you understand the impact of the command on your network before you use it.
  • Page 349: Monitor Kernel Deadloop Time

    Parameters tid: Specifies a kernel thread by its ID, in the range of 1 to 2147483647. If no kernel thread is specified for the undo command, the default is restored. slot slot-number: Specifies an MPU by its slot number. If you do not specify this option, the active MPU is specified.
  • Page 350: Monitor Process

    Default The interval for identifying a kernel thread deadloop is 8 seconds. Views System view Predefined user roles network-admin Parameters time interval: Specifies the interval for identifying a kernel thread deadloop, in the range of 1 to 65535 seconds. slot slot-number: Specifies an MPU by its slot number. If you do not specify this option, the active MPU is specified.
  • Page 351 Distributed devices in IRF mode: monitor process [ dumbtty ] [ iteration number ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] Views Any view Predefined user roles network-admin Parameters dumbtty: Specifies dumbtty mode. In this mode, the command displays process statistics in descending order of CPU usage without refreshing statistics.
  • Page 352 Commands Description Sorts processes by the number of open files in descending order. Files are identified by file descriptors (FDs). Kills a process. Because the command can impact system operation, be cautious to use it. Refreshes the screen. Sorts processes by memory usage in descending order. Changes the maximum number of processes displayed within a screen, in the range of 0 to 2147483647.
  • Page 353 1092K 00:00:21 11.34% scmd 1000 1000 00:00:09 2.06% [sock/1] 1026 1026 26044K 00:00:05 1.54% syslogd 1027 1027 9280K 00:01:12 1.03% devd 00:00:06 0.51% [ksoftirqd/0] 1009 1009 00:00:08 0.51% [karp/1] 1010 1010 00:00:13 0.51% [kND/1] 5373 5373 1496K 00:00:00 0.51% 00:00:00 0.00% [kthreadd] 00:00:00...
  • Page 354 1092K 00:00:23 3.98% scmd 1027 1027 9280K 00:01:13 1.44% devd 1000 1000 00:00:09 0.36% [sock/1] 1009 1009 00:00:09 0.36% [karp/1] 00:00:06 0.18% [ksoftirqd/0] 1010 1010 00:00:13 0.18% [kND/1] 4795 4795 2372K 00:00:01 0.18% telnetd 5491 5491 1500K 00:00:00 0.18% 00:00:00 0.00% [kthreadd] The system refreshes process statistics every 5 seconds.
  • Page 355 CPU states: 90.66% idle, 0.88% user, 5.77% kernel, 2.66% interrupt Memory: 755M total, 414M available, page size 4K State HH:MM:SS Name 5384K 00:00:01 0.00% dbmd 2464K 00:00:02 0.00% ipbased 1956K 00:00:00 0.00% 30600K 00:00:00 0.00% lsmd 61592K 00:00:00 0.00% routed Enter k and then enter a JID to kill a process.
  • Page 356: Monitor Thread

    monitor thread Use monitor thread to display thread statistics. Syntax Centralized devices in standalone mode: monitor thread [ dumbtty ] [ iteration number ] Distributed devices in standalone mode/centralized devices in IRF mode: monitor thread [ dumbtty ] [ iteration number ] [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: monitor thread [ dumbtty ] [ iteration number ] [ chassis chassis-number slot slot-number [ cpu cpu-number ] ]...
  • Page 357 Table 75 Interactive commands Commands Description ? or h Displays help information that includes available interactive commands. Sets the interval for refreshing statistics. The default interval is 5 seconds. Kills a process. Because the command can impact system operation, be cautious when you use it.
  • Page 358 00:00:06 0.42% scmd 1160 1160 00:00:01 0.21% sshd 00:00:00 0.00% [kthreadd] 00:00:01 0.00% [ksoftirqd/0] 00:00:00 0.00% [watchdog/0] 00:00:00 0.00% [events/0] 00:00:00 0.00% [khelper] Enter h or a question mark (?) to display help information as follows: • Help for interactive commands: Show the available interactive commands Sort by the CPU field(default) Set the delay interval between screen updates...
  • Page 359: Process Core

    Enter q to quit interactive mode. • Table 76 Command output Field Description 84 processes; 107 Numbers of processes and threads. threads Job ID of a thread, which never changes. ID of a thread. LAST_CPU Number of the CPU on which the latest thread scheduling occurs. Priority level of a thread.
  • Page 360: Reset Exception Context

    Predefined user roles network-admin Parameters off: Disables core file generation. maxcore value: Enables core file generation and sets the maximum number of core files, in the range of 1 to 10. name process-name: Specifies a process by its name, a case-insensitive string of 1 to 15 characters. job job-id: Specifies a process by its job ID, in the range of 1 to 2147483647.
  • Page 361: Reset Kernel Deadloop

    Distributed devices in standalone mode/centralized devices in IRF mode: reset exception context [ slot slot-number [ cpu cpu-number ] ] Distributed devices in IRF mode: reset exception context [ chassis chassis-number slot slot-number [ cpu cpu-number ] ] Views User view Predefined user roles network-admin Parameters...
  • Page 362: Reset Kernel Exception

    Parameters slot slot-number: Specifies an MPU by its slot number. If you do not specify this option, the command clears kernel thread deadloop information for the active MPU. (Distributed devices in standalone mode.) slot slot-number: Specifies an IRF member device by its ID. If you do not specify this option, the command clears kernel thread deadloop information for the master device.
  • Page 363 Examples # Clear kernel thread exception information. <Sysname> reset kernel exception Related commands display kernel exception...
  • Page 364: Sampler Configuration Commands

    Sampler configuration commands Commands and descriptions for centralized devices apply to the following routers: MSR1002-4/1003-8S. • MSR2003. • MSR2004-24/2004-48. • • MSR3012/3024/3044/3064. Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers. display sampler Use display sampler to display configuration information for a sampler. Syntax Centralized devices in standalone mode: display sampler [ sampler-name ]...
  • Page 365: Sampler

    Examples # Display the configuration information about sampler 256. <Sysname> display sampler 256 Sampler name: 256 Mode: Fixed; Packet-interval: 256 # (Distributed devices in standalone mode.) Display the configuration information about sampler 256 for card 1. <Sysname> display sampler 256 slot 1 Sampler name: 256 Mode: Fixed;...
  • Page 366 rate: Specifies the sampling rate in the range of 1 to 65536. Usage guidelines This command takes effect on all cards. (Distributed devices in standalone mode/distributed devices in IRF mode.) Examples # Create sampler abc in fixed sampling mode. Set the sampling rate to 256, which means the first packet out of 256 packets is sampled.
  • Page 367: Port Mirroring Commands

    Port mirroring commands display mirroring-group Use display mirroring-group to display mirroring group information. Syntax display mirroring-group { group-id | all | local } Views Any view Predefined user roles network-admin network-operator Parameters group-id: Specifies a mirroring group by its number in the range of 1 to 6. all: Specifies all mirroring groups.
  • Page 368: Mirroring-Group

    Field Description Type of the mirroring group. This field displays Local for local mirroring Type groups. Status of the mirroring group: • Active—The mirroring group has taken effect. Status • Incomplete—The mirroring group configuration is not complete and does not take effect. Mirroring port Source port.
  • Page 369: Mirroring-Group Mirroring-Port (System View)

    Default No source port is configured for a mirroring group. Views Interface view Predefined user roles network-admin Parameters group-id: Specifies a mirroring group by its number in the range of 1 to 6. The specified mirroring group must already exist. both: Mirrors both received and sent packets.
  • Page 370: Mirroring-Group Monitor-Port (Interface View)

    interface-list: Specifies a space-separated list of up to eight port items. Each item specifies a single port or a port range in the form of interface-type interface-number1 to interface-type interface-number2. The specified interfaces must be of the same type and on the same card. The value for the interface-number2 argument must be equal to or greater than the value for the interface-number1 argument.
  • Page 371: Mirroring-Group Monitor-Port (System View)

    [Sysname] mirroring-group 1 local [Sysname] interface gigabitethernet 2/0/1 [Sysname-GigabitEthernet2/0/1] mirroring-group 1 monitor-port Related commands mirroring-group mirroring-group monitor-port (system view) Use mirroring-group monitor-port to configure a port as the monitor port for a mirroring group. Use undo mirroring-group monitor-port to remove the monitor port from a mirroring group. Syntax mirroring-group group-id monitor-port interface-type interface-number undo mirroring-group group-id monitor-port interface-type interface-number...
  • Page 372: Flow Mirroring Commands

    Flow mirroring commands This feature is supported only on the following ports: Layer 2 Ethernet ports on Ethernet switching modules. • Fixed Layer 2 Ethernet ports on MSR2004-24/2004-48 routers. • Fixed Layer 2 Ethernet ports on MSR1002-4/1003-8S routers. • mirror-to Use mirror-to to configure a mirroring action for a traffic behavior.
  • Page 373: Netstream Configuration Commands

    NetStream configuration commands Commands and descriptions for centralized devices apply to the following routers: MSR1002-4/1003-8S. • MSR2003. • MSR2004-24/2004-48. • • MSR3012/3024/3044/3064. Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers. display ip netstream cache Use display ip netstream cache to display NetStream entry information. Syntax Centralized devices in standalone mode: display ip netstream cache [ verbose ]...
  • Page 374 <Sysname> display ip netstream cache verbose IP NetStream cache information: Active flow timeout : 60 min Inactive flow timeout : 10 sec Max number of entries : 1000 IP active flow entries MPLS active flow entries L2 active flow entries IPL2 active flow entries IP flow entries counted : 10...
  • Page 375 Active: 5.510 Bytes/Pkt: MPLS LDP(3.3.3.3/24) 1:18-6-0 GE2/0/2(O) 2:24-6-0 3:30-6-1 SamplerMode: SamplerInt: Active: 660.084 Bytes/Pkt: IP& 192.168.123.1(2048) 192.168.1.1(0) GE2/0/2(O) 0012-3f86-e95d(0) 0012-3f86-e116(1008) TCPFlag: DstMask: SrcMask: NextHop: 192.168.1.2 DstAS: SrcAS: BGPNextHop: 0.0.0.0 OutVRF: TCPFlag: SamplerMode: SamplerInt: Active: 12.030 Bytes/Pkt: IP& 172.16.1.1(68) 172.16.2.1(67) GE2/0/3(I) 1848 MPLS LDP(4.4.4.4/24) 1:55-6-0...
  • Page 376 Protocol Total Packets Flows Packets Active(sec) Idle(sec) Flows /sec /sec /flow /flow /flow -------------------------------------------------------------------------- TCP-Telnet 2656855 TCP-FTP 5900082 TCP-FTPD 3200453 1006 TCP-WWW 546778274 11170 TCP-other 49148540 3752 UDP-DNS 117240379 UDP-other 45502422 2272 ICMP 14837957 IP-other 77406 Type DstIP(Port) SrcIP(Port) Pro ToS If(Direct) Pkts DstMAC(VLAN) SrcMAC(VLAN)
  • Page 377 SamplerMode: SamplerInt: Active: 382.542 Bytes/Pkt: 1426 Table 79 Command output Field Description Active flow timeout Aging timer for active flows, in minutes. Inactive flow timeout Aging timer for inactive flows, in seconds. Max number of entries Maximum number of flows allowed in the cache. IP active flow entries Number of active IP flows in the cache.
  • Page 378 Field Description Statistics of the active flows in the current cache: • Flow type. Flows are classified into the following types: IP flows. L2 flows. IP&L2 flows. MPLS flows without IP options. MPLS flows with IP options. • Destination IP address (destination port). •...
  • Page 379: Display Ip Netstream Export

    Field Description Other information about the active flows in the cache: • TCP tag. • Destination mask. • Source mask. • Routing next hop. • Destination AS. TCPFlag: • Source AS. DstMask: SrcMask: NextHop: • BGP next hop. DstAS: SrcAS: •...
  • Page 380: Display Ip Netstream Template

    Version 9 exported UDP datagrams number (failed) : 2 (0) MPLS export information: Flow source interface : GigabitEthernet2/0/1 Flow destination VPN instance : VPN1 Flow destination IP address (UDP) : 10.10.0.10 (30000) Version 9 exported flows number : 20 Version 9 exported UDP datagrams number (failed) : 2 (0) as aggregation export information: Flow source interface : GigabitEthernet2/0/1...
  • Page 381 Syntax Centralized devices in standalone mode: display ip netstream template Distributed devices in standalone mode/centralized devices in IRF mode: display ip netstream template [ slot slot-number ] Distributed devices in IRF mode: display ip netstream template [ chassis chassis-number slot slot-number ] Views Any view Predefined user roles...
  • Page 382 Out bytes First forwarded Last forwarded Source AS Destination AS Input interface index Output interface index Direction Sampling algorithm Sampling interval AS inbound template: Template ID : 3257 Packets Last template export time : Never Field count : 14 Field type Field length (bytes) --------------------------------------------------------------------------- Flows...
  • Page 383: Enable

    Field Description Field length (bytes) Length of the field, in bytes. Flows Number of aggregate flows. Out packets Number of sent packets. In packets Number of received packets. Out bytes Size of sent packets, in bytes. In bytes Size of received packets, in bytes. System time when the first packet was forwarded, accurate to First forwarded milliseconds.
  • Page 384: Ip Netstream

    ip netstream Use ip netstream to enable NetStream on an interface. Use undo ip netstream to disable NetStream on an interface. Syntax ip netstream { inbound | outbound } undo ip netstream { inbound | outbound } Default NetStream is disabled on an interface. Views Interface view Predefined user roles...
  • Page 385: Ip Netstream { Inbound | Outbound } Sampler

    outbound: Filters outgoing traffic. acl acl-number: Specifies an ACL by its number. For a basic ACL, the value range is 2000 to 2999. For an advanced ACL, the value range is 3000 to 3999. Usage guidelines NetStream filtering uses an ACL to identify intended packets. If you want to collect data for specific flows, use the ACL permit statements to identify the flows.
  • Page 386: Ip Netstream Aggregation

    ip netstream aggregation Use ip netstream aggregation to set a NetStream aggregation mode and to enter the NetStream aggregation mode view. Use undo ip netstream aggregation to cancel a NetStream aggregation mode and to remove the configuration for the NetStream aggregation mode. Syntax ip netstream aggregation { as | destination-prefix | prefix | prefix-port | protocol-port | source-prefix | tos-as | tos-bgp-nexthop | tos-destination-prefix | tos-prefix | tos-protocol-port | tos-source-prefix }...
  • Page 387: Ip Netstream Export Host

    Outbound interface index. • protocol-port: Specifies the protocol-port aggregation by protocol number, source port, and destination port. source-prefix: Specifies the source-prefix aggregation by source AS number, source address mask length, source prefix, and inbound interface index. tos-as: Specifies the ToS-AS aggregation by ToS, source AS number, destination AS number, inbound interface index, and outbound interface index.
  • Page 388 Use undo ip netstream export host to remove the specified destination host or all destination hosts that are configured in the current view. Syntax ip netstream export host ip-address udp-port [ vpn-instance vpn-instance-name ] undo ip netstream export host [ ip-address [ vpn-instance vpn-instance-name ] ] Default No destination host is specified.
  • Page 389: Ip Netstream Export Rate

    Related commands ip netstream aggregation • ip netstream export source • ip netstream export rate Use ip netstream export rate to limit the NetStream data export rate. Use undo ip netstream export rate to restore the default. Syntax ip netstream export rate rate undo ip netstream export rate Default The export rate of NetStream data is not limited.
  • Page 390: Ip Netstream Export V9-Template Refresh-Rate Packet

    Parameters interface-type interface-number: Specifies a source interface by its type and number. Usage guidelines You can configure different source interfaces in different NetStream aggregation mode views. If no source interface is configured in NetStream aggregation mode view, the source interface in system view applies.
  • Page 391: Ip Netstream Export V9-Template Refresh-Rate Time

    For a NetStream server to use correct version 9 templates, configure the refresh frequency or refresh interval for version 9 templates. If both settings are configured, templates are sent when either of the conditions is met. To configure the refresh interval for version 9 templates, use the ip netstream export v9-template refresh-rate time command.
  • Page 392: Ip Netstream Export Version

    Related commands ip netstream export v9-template refresh-rate packet ip netstream export version Use ip netstream export version 5 to export NetStream data in the version 5 format and choose whether or not to record data about AS information. Use ip netstream export version 9 to export NetStream data in the version 9 format and choose whether to record data about AS and BGP next hop information.
  • Page 393: Ip Netstream Max-Entry

    <Sysname> system-view [Sysname] ip netstream export version 5 origin-as ip netstream max-entry Use ip netstream max-entry to set the upper limit for NetStream entries. Use undo ip netstream max-entry to restore the default. Syntax ip netstream max-entry max-entries undo ip netstream max-entry Default The upper limit for NetStream entries is 10000.
  • Page 394: Ip Netstream Timeout Active

    Default Counting and exporting of MPLS packets are disabled. Views System view Predefined user roles network-admin Parameters label-positions: Specifies position of the labels to be counted. label-position1: Specifies the position of the first label in the label stack, in the range of 1 to 6. label-position2: Specifies the position of the second label in the label stack, in the range of 1 to 6.
  • Page 395: Ip Netstream Timeout Inactive

    Usage guidelines A flow is considered active if packets for the NetStream entry arrive before the timer set by this command expires. Examples # Set the aging timer to 60 minutes for active flows. <Sysname> system-view [Sysname] ip netstream timeout active 60 Related commands ip netstream timeout inactive ip netstream timeout inactive...
  • Page 396 Views User view Predefined user roles network-admin Usage guidelines It takes the system several minutes to execute the command. During this period, the system does not collect NetStream data. Examples # Age out and export all NetStream data. <Sysname> reset ip netstream statistics This process may take a few minutes.
  • Page 397: Ipv6 Netstream Commands

    IPv6 NetStream commands Commands and descriptions for centralized devices apply to the following routers: MSR1002-4/1003-8S. • MSR2003. • MSR2004-24/2004-48. • • MSR3012/3024/3044/3064. Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers. display ipv6 netstream cache Use display ipv6 netstream cache to display IPv6 NetStream entry information. Syntax Centralized devices in standalone mode: display ipv6 netstream cache [ verbose ]...
  • Page 398 <Sysname> display ipv6 netstream cache verbose IPv6 NetStream cache information: Active flow timeout : 60 min Inactive flow timeout : 10 sec Max number of entries : 1000 IPv6 active flow entries MPLS active flow entries IPL2 active flow entries IPv6 flow entries counted : 10 MPLS flow entries counted...
  • Page 399 <Sysname> display ipv6 netstream cache slot 1 verbose IPv6 NetStream cache information: Active flow timeout : 60 min Inactive flow timeout : 10 sec Max number of entries : 1000 IPv6 active flow entries MPLS active flow entries IPL2 active flow entries IPv6 flow entries counted : 10 MPLS flow entries counted...
  • Page 400 3:30-6-1 SamplerMode: SamplerInt: Active: Bytes/Pkt: IP& 2003::1(2048) 2008::1(0) GE2/0/2(O) IP& 2010::1(1024) 2020::1(67) 255 0x12345 GE2/0/3(I) 1848 MPLS LDP(4.4.4.4/24) 1:55-6-0 2:16-6-1 3:0-0-0 TcpFlag: DstMask: SrcMask: DstAS: SrcAS: NextHop: 2020::2 BGPNextHop: 0:0:0:0:0:0:0:0 InVRF: SamplerMode: SamplerInt: Active: Bytes/Pkt: 1426 Table 82 Command output Field Description Active flow timeout...
  • Page 401 Field Description Range of IPv6 packet length (excluding data link layer header). • For the values in the range of 1 to 576 bytes, the range 1-32 64 96 128 160 192 224 256 increases in the step of 32 bytes. For example, 1-32 shows the number of packets with the size of 1 to 32 bytes.
  • Page 402: Display Ipv6 Netstream Export

    Field Description Information about the active MPLS flows in the current cache: • Type of the labels at the top of the label stack: IP address associated with the label. Mask associated with the label. TopLblType(IP/MASK) Lbl-Exp-S-List • Label list: Lbl—20-bit label value.
  • Page 403: Display Ipv6 Netstream Template

    Flow source interface : GigabitEthernet2/0/1 Flow destination VPN instance : VPN1 Flow destination IP address (UDP) : 10.10.0.10 (30000) Version 9 exported flows number : 16 Version 9 exported UDP datagrams number (failed) : 2 (0) IPv6 export information: Flow source interface : GigabitEthernet2/0/1 Flow destination VPN instance : VPN1...
  • Page 404 display ipv6 netstream template [ slot slot-number ] Distributed devices in IRF mode: display ipv6 netstream template [ chassis chassis-number slot slot-number ] Views Any view Predefined user roles network-admin network-operator Parameters slot slot-number: Specifies a card by its slot number. If you do not specify a card, the command displays IPv6 NetStream template information for the active MPU.
  • Page 405 Direction Sampling algorithm Sampling interval AS inbound template: Template ID : 3292 Field count : 14 Field type Field length (bytes) --------------------------------------------------------------------------- Flows In packets In bytes First forwarded Last forwarded Source AS Destination AS Input Interface Index Output Interface Index IP protocol version Direction Sampling algorithm...
  • Page 406 Source ToS IPv6 source mask IPv6 destination mask Direction Forwarding offset Out VPN ID Sampling algorithm Sampling interval L3 inbound template: Template ID : 3306 Field count : 27 Field type Field length (bytes) --------------------------------------------------------------------------- Out packets Out bytes First forwarded Last forwarded Input Interface Index Output Interface Index...
  • Page 407: Enable

    Field Description Active flow templates Number of active IPv6 NetStream templates. Created flow templates Number of templates that have been created. Information about the AS template in the outbound AS outbound template direction. AS inbound template Information about the AS template in the inbound direction. Packets Number of packets sent by using the template.
  • Page 408: Ipv6 Netstream

    <Sysname> system-view [Sysname] ipv6 netstream aggregation as [Sysname-ns6-aggregation-as] enable Related commands ipv6 netstream aggregation ipv6 netstream Use ipv6 netstream to enable IPv6 NetStream on an interface. Use undo ipv6 netstream to disable IPv6 NetStream on an interface. Syntax ipv6 netstream { inbound | outbound } undo ipv6 netstream { inbound | outbound } Default IPv6 NetStream is disabled on an interface.
  • Page 409: Ipv6 Netstream { Inbound | Outbound } Sampler

    Views Interface view Predefined user roles network-admin Parameters inbound: Filters incoming traffic. outbound: Filters outgoing traffic. acl acl-number: Specifies an ACL by its number. For a basic or an advanced ACL, the value range is 2000 to 3999. • • For an Ethernet frame header ACL, the value range is 4000 to 4999.
  • Page 410: Ipv6 Netstream Aggregation

    sampler sampler-name: Specifies a sampler by its name. The name is a case-insensitive string of 1 to 31 characters. Examples # Use sampler abc for outbound IPv6 NetStream sampling on GigabitEthernet 2/0/1. <Sysname> system-view [Sysname] interface gigabitethernet 2/0/1 [Sysname-GigabitEthernet2/0/1] ipv6 netstream inbound [Sysname-GigabitEthernet2/0/1] ipv6 netstream inbound sampler abc ipv6 netstream aggregation Use ipv6 netstream aggregation to set an IPv6 NetStream aggregation mode and to enter the IPv6...
  • Page 411: Ipv6 Netstream Export Host

    protocol-port: Specifies the protocol-port aggregation by protocol number, source port, and destination port. source-prefix: Specifies the source-prefix aggregation by source AS number, source address mask length, source prefix, and input interface index. Usage guidelines In IPv6 NetStream aggregation mode view, you can perform the following tasks: •...
  • Page 412: Ipv6 Netstream Export Rate

    Usage guidelines You cannot use the display ipv6 netstream export command to display information about the IPv6 NetStream aggregation mode that is not enabled. You can specify the same destination host in different IPv6 NetStream aggregation mode views. The destination hosts in an IPv6 NetStream aggregation mode view take precedence over those in system view.
  • Page 413: Ipv6 Netstream Export Source

    If no source interface is configured in IPv6 NetStream aggregation mode view, the source interface in system view applies. HP recommends that you connect the management Ethernet interface to a NetStream server, and configure the interface as the source interface.
  • Page 414: Ipv6 Netstream Export V9-Template Refresh-Rate Packet

    Related commands ipv6 netstream aggregation ipv6 netstream export v9-template refresh-rate packet Use ipv6 netstream export v9-template refresh-rate packet to configure the refresh frequency (in packets) for IPv6 NetStream version 9 templates. The templates are sent after the specified number of packets are sent.
  • Page 415: Ipv6 Netstream Export Version 9

    Syntax ipv6 netstream export v9-template refresh-rate time minutes undo ipv6 netstream export v9-template refresh-rate time Default Version 9 templates are resent every 30 minutes. Views System view Predefined user roles network-admin Parameters minutes: Specifies the refresh interval in the range of 1 to 3600 minutes. Usage guidelines An IPv6 NetStream server uses version 9 templates to parse the data from the NetStream device, but the server does not permanently save version 9 templates.
  • Page 416: Ipv6 Netstream Max-Entry

    Views System view Predefined user roles network-admin Parameters origin-as: Exports statistics of the source AS originating the route for the source address and the destination AS for the destination address. peer-as: Exports statistics of the peer ASs for the source and destination address. bgp-nexthop: Exports statistics of BGP next hops.
  • Page 417: Ipv6 Netstream Timeout Active

    Usage guidelines If you execute this command multiple times, the most recent configuration takes effect. When the number of IPv6 NetStream entries reaches the upper limit, all IPv6 NetStream entries are automatically aged out. The entry statistics are then exported to the IPv6 NetStream server and cleared in the cache.
  • Page 418: Reset Ipv6 Netstream Statistics

    Syntax ipv6 netstream timeout inactive seconds undo ipv6 netstream timeout inactive Default The aging timer is 30 seconds for inactive flows. Views System view Predefined user roles network-admin Parameters seconds: Sets the aging timer for inactive flows, in the range of 10 to 600 seconds. Usage guidelines A flow is considered inactive if no packet for the IPv6 NetStream entry arrives before the timer set by this command expires.
  • Page 419: Sflow Commands

    sFlow commands display sflow Use display sflow to display sFlow configuration and operation information. Syntax display sflow Views Any view Predefined user roles network-admin network-operator Examples # Display sFlow configuration and operation information. <Sysname> display sflow sFlow datagram version: 5 Global information: Agent IP: 10.10.10.1(CLI) Source address: 10.0.0.1 2001::1...
  • Page 420: Sflow Agent

    Field Description Port sFlow collector port. Remaining lifetime of the sFlow collector. If this field displays N/A, the sFlow Aging collector never ages out. Size Maximum length of the sFlow data portion in an sFlow packet. VPN-instance Name of the VPN bound with the sFlow collector. Description Description of the sFlow collector.
  • Page 421: Sflow Collector

    Specifies an IPv6 address for the sFlow agent. Usage guidelines HP recommends that you manually configure an IP address for the sFlow agent. Only one IP address can be specified for the sFlow agent on the device. A newly configured IP address overwrites the existing one.
  • Page 422: Sflow Counter Interval

    time-out seconds: Specifies the aging timer of the sFlow collector, in the range of 1 to 2147483647 seconds. When the aging timer expires, the sFlow collector settings are deleted. The sFlow collector settings do not age out by default. Examples # Configure the following parameters for sFlow collector 2: VPN name—vpn1.
  • Page 423: Sflow Flow Collector

    Syntax sflow counter collector collector-id undo sflow counter collector Default No sFlow collector is specified for counter sampling. Views Layer 2 Ethernet interface view, Layer 3 Ethernet interface view Predefined user roles network-admin Parameters collector-id: Specifies an sFlow collector by its ID in the range of 1 to 10. Examples # Specify sFlow collector 2 on GigabitEthernet 2/0/1 for counter sampling.
  • Page 424: Sflow Flow Max-Header

    Predefined user roles network-admin Parameters length: Specifies the maximum number of bytes that can be copied, in the range of 18 to 512. HP recommends the default. Examples # Set the maximum number of bytes to 60 for flow sampling to copy per packet on GigabitEthernet 2/0/1.
  • Page 425: Sflow Sampling-Rate

    Parameters determine: Specifies the fixed sampling mode. For example, if the flow sampling interval is set to 4000 (by using the sflow sampling-rate command), the device samples packets as follows: The device randomly samples a packet, like the tenth packet, from the first 4000 packets. •...
  • Page 426: Sflow Source

    [Sysname-GigabitEthernet2/0/1] sflow sampling-rate 4000 Related commands sflow sampling-mode sflow source Use sflow source to specify the source IP address of sFlow packets. Use undo sflow source to restore the default. Syntax sflow source { ip ip-address | ipv6 ipv6-address } * undo sflow source { ip | ipv6 } * Default The source IP address of sent sFlow packets is determined by routing.
  • Page 427: Information Center Commands

    Information center commands Commands and descriptions for centralized devices apply to the following routers: MSR1002-4/1003-8S. • MSR2003. • MSR2004-24/2004-48. • • MSR3012/3024/3044/3064. Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers. diagnostic-logfile save Use diagnostic-logfile save to manually save diagnostic logs from the diagnostic log file buffer to the diagnostic log file.
  • Page 428: Display Info-Center

    Views Any view Predefined user roles network-admin network-operator Examples # Display the diagnostic log file configuration. <Sysname> display diagnostic-logfile summary Diagnostic log file: Enabled. Diagnostic log file size quota: 10 MB Diagnostic log file directory: cfa0:/diagfile Writing frequency: 24 hour 0 min 0 sec Table 86 Command output Field Description...
  • Page 429: Display Logbuffer

    IP address: 192.168.0.2, port number: 5001, host facility: local5 Log buffer: Enabled Max buffer size 1024, current buffer size 512, Current messages 0, dropped messages 0, overwritten messages 0 Log file: Enabled Security log file: Enabled Information timestamp format: Loghost: Date Other output destination: Date display logbuffer Use display logbuffer to display the state of the log buffer and the log information in the log buffer.
  • Page 430 Corresponding Severity Level Description keyword in value commands Error condition. For example, the link state changes or a Error error storage card is unplugged. Warning condition. For example, an interface is Warning warning disconnected, or the memory resources are used up. Normal but significant condition.
  • Page 431: Display Logbuffer Summary

    # (Distributed devices in IRF mode.) Display the state and log information of the log buffer. <Sysname> display logbuffer chassis 0 slot 1 Log buffer: Enabled Max buffer size: 1024 Actual buffer size: 512 Dropped messages: 0 Overwritten messages: 0 Current messages: 127 %Jun 19 18:03:24:55 2006 Sysname SYSLOG/7/SYS_RESTART:System restarted …...
  • Page 432 Parameters level severity: Specifies a severity level in the range of 0 to 7. If you do not specify a severity level, this command displays log information of all levels in the log buffer. For more information about log levels, Table slot slot-number: Specifies a card by its slot number.
  • Page 433: Display Logfile Summary

    Field Description SLOT Device ID. (Centralized devices in IRF mode.) EMERG Represents emergency. For more information, see Table ALERT Represents alert. For more information, see Table CRIT Represents critical. For more information, see Table ERROR Represents error. For more information, see Table WARN Represents warning.
  • Page 434: Display Security-Logfile Summary

    display security-logfile summary Use display security-logfile summary to display the summary of the security log file. Syntax display security-logfile summary Views Any view Predefined user roles security-audit Usage guidelines A local user can use this command only after being authorized as the security log administrator by the system administrator through the authorization-attribute user-role security-audit command.
  • Page 435: Info-Center Diagnostic-Logfile Enable

    Syntax enable log updown undo enable log updown Default All interfaces are allowed to generate link up and link down logs. Views Interface view Predefined user roles network-admin Examples # Disable port GigabitEthernet 2/0/1 from generating link up or link down logs. <Sysname>...
  • Page 436: Info-Center Diagnostic-Logfile Frequency

    info-center diagnostic-logfile frequency Use info-center diagnostic-logfile frequency to configure the interval at which the system saves diagnostic logs from the diagnostic log file buffer to the diagnostic log file. Use undo info-center diagnostic-logfile frequency to restore the default saving interval. Syntax info-center diagnostic-logfile frequency freq-sec undo info-center diagnostic-logfile frequency...
  • Page 437: Info-Center Diagnostic-Logfile Directory

    Predefined user roles network-admin Parameters size: Specifies the maximum size for the diagnostic log file, in MB. The value range is 1 to 10. Examples # Set the maximum size to 6 MB for the diagnostic log file. <Sysname> system-view [Sysname] info-center diagnostic-logfile quota 6 info-center diagnostic-logfile directory Use info-center diagnostic-logfile directory to configure the directory to save the diagnostic log file.
  • Page 438: Info-Center Logfile Overwrite-Protection

    info-center logfile overwrite-protection Use info-center logfile overwrite-protection to enable log file overwrite-protection. When the last log file is full or the storage device runs out of space, the device stops saving new logs to the log files. Use undo info-center logfile overwrite-protection to disable log file overwrite-protection. When the last log file is full or the storage device runs out of space, the device deletes the oldest log file and creates a new one to save new logs.
  • Page 439: Info-Center Format

    Views System view Predefined user roles network-admin Examples # Enable the information center. <Sysname> system-view [Sysname] info-center enable Information center is enabled. info-center format Use info-center format to set the format for logs sent to log hosts. Use undo info-center format to restore the default. Syntax info-center format { unicom | cmcc } undo info-center format...
  • Page 440: Info-Center Logbuffer Size

    Syntax info-center logbuffer undo info-center logbuffer Default Log output to the log buffer is enabled. Views System view Predefined user roles network-admin Examples # Enable log output to the log buffer. <Sysname> system-view [Sysname] info-center logbuffer Related commands display logbuffer •...
  • Page 441: Info-Center Logfile Enable

    [Sysname] undo info-center logbuffer size Related commands • display logbuffer info-center enable • info-center logfile enable Use info-center logfile enable to enable the log file feature. Use undo info-center logfile enable to disable the log file feature. Syntax info-center logfile enable undo info-center logfile enable Default The log file feature is enabled.
  • Page 442: Info-Center Logfile Size-Quota

    Usage guidelines This command enables the system to automatically save logs in the log file buffer to a log file at the specified interval. Examples # Set the log file saving interval to 60000 seconds. <Sysname> system-view [Sysname] info-center logfile frequency 60000 Related commands info-center logfile enable info-center logfile size-quota...
  • Page 443: Info-Center Logging Suppress Duplicates

    Syntax info-center logfile directory dir-name Default Log files are saved in the logfile directory under the root directory of the storage device. Views System view Predefined user roles network-admin Parameters dir-name: Specifies a directory by its name, a string of 1 to 64 characters. Usage guidelines The specified directory must have been created.
  • Page 444 Default Duplicate log suppression is disabled. Views System view Predefined user roles network-admin Usage guidelines Outputting consecutive duplicate logs at an interval of less than 30 seconds wastes system and network resources. With this feature enabled, the system starts a suppression period when outputting a new log: During the suppression period, the system does not output logs with the same module name, level, •...
  • Page 445: Info-Center Loghost

    The output shows that a different log is generated during the suppression period. %Jan 1 07:30:24:643 2000 Sysname ARP/6/DUPIFIP: Duplicate address 172.16.0.1 on interface Vlan-interface100, sourced from 00e0-fc58-123d %Jan 1 07:30:55:645 2000 Sysname ARP/6/DUPIFIP: Duplicate address 172.16.0.1 on interface Vlan-interface100, sourced from 00e0-fc58-123d This message repeated 4 times in last 30 seconds.
  • Page 446: Info-Center Loghost Source

    <Sysname> system-view [Sysname] info-center loghost 1.1.1.1 info-center loghost source Use info-center loghost source to specify a source IP address for logs sent to log hosts. Use undo info-center loghost source to restore the default. Syntax info-center loghost source interface-type interface-number undo info-center loghost source Default The source IP address of logs sent to log hosts is the primary IP address of the matching route's egress...
  • Page 447: Info-Center Security-Logfile Enable

    Views System view Predefined user roles network-admin Parameters usage: Specifies an alarm threshold. The value must be an integer in the range of 1 to 100. Usage guidelines When the security log file is full, the system deletes the oldest logs and then writes new logs to the security log file.
  • Page 448: Info-Center Security-Logfile Frequency

    info-center security-logfile frequency Use info-center security-logfile frequency to configure the interval for saving security logs to the security log file. Use undo info-center security-logfile frequency to restore the default saving interval. Syntax info-center security-logfile frequency freq-sec undo info-center security-logfile frequency Default The security log file saving interval is 86400 seconds.
  • Page 449: Info-Center Security-Logfile Directory

    Predefined user roles network-admin Parameters size: Specifies the maximum size for the security log file, in MB. The value range is 1 to 10. Examples # Set the maximum size to 6 MB for the security log file. <Sysname> system-view [Sysname] info-center security-logfile size-quota 6 Related commands info-center security-logfile alarm-threshold...
  • Page 450: Info-Center Source

    info-center source Use info-center source to configure a log output rule for a module. Use undo info-center source to restore the default. Syntax info-center source { module-name | default } { console | logbuffer | logfile | loghost | monitor } { deny | level severity } undo info-center source { module-name | default } { console | logbuffer | logfile | loghost | monitor } Default...
  • Page 451: Info-Center Synchronous

    loghost: Outputs logs to the log host. monitor: Outputs logs to the monitor terminal. deny: Disables log output. level severity: Specifies a severity level in the range of 0 to 7. The smaller the severity value, the higher the severity level. See Table 87 for more information.
  • Page 452: Info-Center Timestamp

    Examples # Enable synchronous information output, and then issue the display current-configuration command to view the current configuration of the device. <Sysname> system-view [Sysname] info-center synchronous Info-center synchronous output is on [Sysname] display current- At this time, the system receives log information. It displays the log information first, and then displays your previous input, which is display current- in this example.
  • Page 453: Info-Center Timestamp Loghost

    Parameters boot: Sets the timestamp format to xxx.yyy, where xxx is the most significant 32 bits (in milliseconds) and yyy is the least significant 32 bits. For example, 0.21990989 equals Jun 25 14:09:26:881 2007. The boot time shows the time since system startup. date: Sets the timestamp format to MMM DD hh:mm:ss:xxx YYYY, such as Dec 8 10:12:21:708 2007.
  • Page 454: Info-Center Trace-Logfile Quota

    Examples # Set the timestamp format to no-year-date for logs sent to log hosts. <Sysname> system-view [Sysname] info-center timestamp loghost no-year-date Related commands info-center timestamp info-center trace-logfile quota Use info-center trace-logfile quota to set the maximum size for the trace log file. Use undo info-center trace-logfile quota to restore the default.
  • Page 455: Reset Logbuffer

    The system clears the log file buffer after saving logs from the buffer to a log file automatically or manually. Examples # Manually save logs from the log file buffer to a log file. <Sysname> logfile save The contents in the log file buffer have been saved to the file cfa0:/logfile/logfile.log. Related commands •...
  • Page 456: Terminal Debugging

    A local user can use this command only after being authorized as the security log administrator by the system administrator. For more information about security log administrator, see Security Configuration Guide. Examples # Manually save the security logs in the security log file buffer to the security log file. <Sysname>...
  • Page 457: Terminal Logging Level

    The terminal logging level 7 command enables log display for all levels (levels 0 through 7) on the • current terminal. The terminal debugging command only enables display of logs with the following severity levels: • Debug level (level 7). Severity level higher than or equal to the level specified in the terminal logging level command.
  • Page 458: Terminal Monitor

    terminal monitor Use terminal monitor to enable the monitoring of logs on the current terminal. Use undo terminal monitor to disable the monitoring of logs on the current terminal. Syntax terminal monitor undo terminal monitor Default Monitoring of logs is enabled on the console and disabled on the monitor terminal. Views User view Predefined user roles...
  • Page 459: Packet Capture Commands

    Packet capture commands packet-capture interface Use packet-capture interface to capture incoming packets on an interface. Syntax Save captured packets to a file: packet-capture interface interface-type interface-number capture-filter capt-expression limit-captured-frames limit | limit-frame-size bytes | autostop filesize kilobytes | autostop duration seconds | autostop files numbers | capture-ring-buffer filesize kilobytes | capture-ring-buffer duration seconds | capture-ring-buffer files numbers ] * write filepath [ raw | { brief | verbose } ] * Filter packet data to display:...
  • Page 460 capture creates a file to store packet data when a rotation is triggered. The first rotation occurs when the capture starts. If you do not set a limit, the number of file rotations is unlimited. This option must be used with the autostop filesize kilobytes, capture-ring-buffer filesize kilobytes, or capture-ring-buffer duration seconds option.
  • Page 461: Packet-Capture Read

    Table 93 Using the packet filter parameters Purpose Options Remarks • Stop based on the capturing duration: The packet capture stops if any one of autostop duration seconds the limits for the stop options is • Stop based on the number of reached.
  • Page 462 display-filter disp-expression: Specifies an expression to match packets to be displayed. If you do not specify a display filter expression, this command displays all file contents. raw: Displays file contents in hexadecimal notation. If you do not specify this keyword, the capture displays packet data in a human-readable format.
  • Page 463: Support And Other Resources

    Related information Documents To find related documents, browse to the Manuals page of the HP Business Support Center website: http://www.hp.com/support/manuals For related documentation, navigate to the Networking section, and select a networking category. •...
  • Page 464: Conventions

    Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown. Italic Italic text represents arguments that you replace with actual values. Square brackets enclose syntax choices (keywords or arguments) that are optional. Braces enclose a set of required syntax choices separated by vertical bars, from which { x | y | ...
  • Page 465 Network topology icons Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features.
  • Page 466: Index

    Index A C D E F H I L M N O P R S T U V W X...
  • Page 467 Contacting HP,452 display ipv6 netstream cache,386 context (action-set view),228 display ipv6 netstream export,391 context (trigger view),228 display ipv6 netstream template,392 Conventions,453 display kernel...
  • Page 468 display process,323 event enable,240 display process cpu,326 event hotplug,295 display process log,328 event interface,296 display process memory,329 event owner (trigger-Boolean view),241 display process memory heap,331 event owner (trigger-existence view),241 display process memory heap address,332 event process,298 display process memory heap size,334 event snmp oid,300...
  • Page 469 info-center timestamp,441 mirror-to,361 info-center timestamp loghost,442 mode,41 info-center trace-logfile quota,443 monitor kernel deadloop enable,336 init-ttl,39 monitor kernel deadloop exclude-thread,337 netstream,373 monitor kernel deadloop time,338 ip netstream { inbound | outbound } filter,373 monitor process,339 ip netstream { inbound | outbound } sampler,374 monitor thread,345...
  • Page 470 ntp-service source,1 12 reaction checked-element { jitter-ds | jitter-sd },54 ntp-service unicast-peer,1 13 reaction checked-element { owd-ds | owd-sd },55 ntp-service unicast-server,1 15 reaction checked-element icpif,56 reaction checked-element mos,57 reaction checked-element packet-loss,58 object list owner (action-notification view),244 reaction checked-element probe-duration,59 object list owner (trigger view),247 reaction checked-element probe-fail (for...
  • Page 471 snmp mib event owner,251 statistics interval,70 snmp mib event sample instance maximum,253 statistics max-group,71 snmp mib event sample minimum,254 Subscription service,452 snmp mib event trigger,255 snmp-agent,175 target-only,72 snmp-agent { inform | trap } source,189 terminal debugging,445 snmp-agent calculate-password,176 terminal logging level,446 snmp-agent community,177...

Table of Contents