HP FlexFabric 7900 Switch Series Network Management and Monitoring Command Reference Part number: 5998-4298 Software version: Release 2109 Document version: 6W100-20140122
Legal and notice information © Copyright 2014 Hewlett-Packard Development Company, L.P. No part of this documentation may be reproduced or transmitted in any form or by any means without prior written consent of Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Contents Ping, tracert, and system debugging commands······································································································· 1 debugging ································································································································································· 1 display debugging ··················································································································································· 2 ping ······
info-center logbuffer ·············································································································································· 44 info-center logbuffer size ······································································································································ 44 info-center logfile enable ······································································································································ 45 info-center lo
snmp-agent trap queue-size ·································································································································· 97 snmp-agent usm-user { v1 | v2c } ························································································································ 97 snmp-agent usm-user v3 ········································································································································ 99 Port mirroring commands ······
nqa template ························································································································································ 151 nqa agent enable ················································································································································ 152 nqa schedule ························································································································································ 153 operat
Documents ···························································································································································· 192 Websites······························································································································································· 192 Conventions ·····························································································································································
Ping, tracert, and system debugging commands debugging Use debugging to enable debugging for a specific module. Use undo debugging to disable debugging for a specific module. Syntax debugging { all [ timeout time ] | module-name [ option ] } undo debugging { all | module-name [ option ] } Default Debugging functions are disabled for all modules. Views User view Predefined user roles network-admin Parameters all: Enables all debugging functions.
display debugging Use display debugging to display the enabled debugging functions. Syntax display debugging [ module-name ] Views Any view Predefined user roles network-admin network-operator Parameters module-name: Specifies a module by its name. To display the current module name, use the display debugging ? command. Examples # Display all enabled debugging functions.
-h ttl: Specifies the TTL value of ICMP echo requests. The value range is 1 to 255, and the default is 255. -i interface-type interface-number: Specifies the source interface of ICMP echo requests. If this option is not provided, the system uses the primary IP address of the matching route's egress interface as the source interface of ICMP echo requests. -m interval: Specifies the interval (in milliseconds) to send ICMP echo requests. The value range is 1 to 65535, and the default is 200.
--- Ping statistics for 1.1.2.2 --5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms # Test whether the device with an IP address of 1.1.2.2 is reachable. Only results are displayed. ping -q 1.1.2.2 Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press CTRL_C to break --- Ping statistics for 1.1.2.2 --5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 1.962/2.196/2.665/0.
Field Description --- Ping statistics for 1.1.2.2 --- Statistics on data received and sent in the ping operation. 5 packet(s) transmitted Number of ICMP echo requests sent. 5 packet(s) received Number of ICMP echo replies received. 0.0% packet loss Percentage of unacknowledged packets to the total packets sent. round-trip min/avg/max/std-dev = 4.685/4.761/4.834/0.058 ms Minimum/average/maximum/standard deviation response time, in milliseconds.
ICMP error message (this can be because the destination is unreachable or sending ICMP timeout/destination unreachable packets is disabled). To abort the tracert operation during the execution of the command, press Ctrl+C. Examples # Display the path that the packets traverse from source to destination (1.1.2.2). tracert 1.1.2.2 traceroute to 1.1.2.2(1.1.2.2), 30 hops at most, 40 bytes each packet, press CTRL_C to break 1 1.1.1.2 673 ms 425 ms 30 ms 2 1.1.2.
NTP commands The term "interface" in this chapter collectively refers to Layer 3 interfaces, including VLAN interfaces and Layer 3 Ethernet interfaces. You can set an Ethernet port as a Layer 3 interface by using the port link-mode route command (see Layer 2—LAN Switching Configuration Guide). display ntp-service sessions Use display ntp-service sessions to display information about all IPv4 NTP associations.
Table 3 Command output Field Description • When the reference clock is the local clock, the field displays LOCAL source (number), which indicates that the IP address of the local clock is 127.127.1.number, where number represents the NTP process number in the range of 0 to 3. • When the reference clock is the clock of another device, the field displays the IP address of the NTP server. If this field displays 0.0.0.0, the IP address of the NTP server has not been resolved successfully.
display ntp-service sessions verbose Clock source: 192.168.1.40 Session ID: 35888 Clock stratum: 2 Clock status: configured, master, sane, valid Reference clock ID: 127.127.1.0 VPN instance: Not specified Local mode: client, local poll interval: 6 Peer mode: server, peer poll interval: 6 Offset: 0.2862ms, roundtrip delay: 3.2653ms, dispersion: 4.5166ms Root roundtrip delay: 0.0000ms, root dispersion: 10.910ms Reachabilities:31, sync distance: 0.
Field Description Reference clock ID of the NTP server: • If the reference clock is the local clock, the value of this field is related to the value of the Clock stratum field: { Reference clock ID { When the value of the Clock stratum field is 0 or 1, this field displays LOCL. When the Clock stratum field has another value, this field displays the IP address of the local clock. • If the reference clock is the clock of another device on the network, this field displays the IP address of the device.
Field Description sync distance Synchronization distance relative to the upper-level clock, in seconds, and calculated from dispersion and roundtrip delay values. Precision Accuracy of the system clock. version NTP version in the range of 1 to 4. source interface Source interface. If the source interface is not specified, this field is Not specified. Reftime Reference timestamp in the NTP message. Orgtime Originate timestamp in the NTP message. Rcvtime Receive timestamp in the NTP message.
Stability: 0.000 pps Clock precision: 2^-10 Root delay: 0.00000 ms Root dispersion: 3.96367 ms Reference time: d0c5fc32.92c70b1e Wed, Dec 29 2010 18:28:02.573 # Display the NTP service status when time is not synchronized. display ntp-service status Clock status: unsynchronized Clock stratum: 16 Reference clock ID: none Clock jitter: 0.000000 s Stability: 0.000 pps Clock precision: 2^-10 Root delay: 0.00000 ms Root dispersion: 0.00002 ms Reference time: d0c5fc32.
Field Description Alarming status: • 00—Normal. • 01—Leap second, indicates that the last minute in a day has 61 seconds. Leap indicator • 10—Leap second, indicates that the last minute in a day has 59 seconds. • 11—Time is not synchronized. Clock jitter Difference between the system clock and reference clock, in seconds. Stability Clock frequency stability. A lower value represents better stability. Clock precision Accuracy of the system clock.
Table 6 Command output Field Description Server IP address of the NTP server. Stratum Stratum level of the NTP server. jitter Root mean square (RMS) value of the clock offset relative to the upper-level clock, in seconds. synch distance Synchronization distance relative to the upper-level NTP server, in seconds, calculated from dispersion and roundtrip delay values. RefID Identifier of the primary reference source.
• If no NTP access control is configured, peer is granted to the local device and peer devices. • If the IP address of the peer device matches a permit statement in an ACL for more than one access right, the least restrictive access right is granted to the peer device. If a deny statement or no ACL is matched, no access right is granted. • If no ACL is created for a specific access right, the associated access right is not granted. • If no ACL is created for any access right, peer is granted.
[Sysname] ntp-service authentication enable Related commands • ntp-service authentication-keyid • ntp-service reliable authentication-keyid ntp-service authentication-keyid Use ntp-service authentication-keyid to set an NTP authentication key. Use undo ntp-service authentication-keyid to remove the NTP authentication key. Syntax ntp-service authentication-keyid keyid authentication-mode md5 { cipher | simple } value undo ntp-service authentication-keyid keyed Default No NTP authentication key is set.
Related commands • ntp-service authentication enable • ntp-service reliable authentication-keyid ntp-service broadcast-client Use ntp-service broadcast-client to configure the device to operate in NTP broadcast client mode and use the current interface to receive NTP broadcast packets. Use undo ntp-service broadcast-client to remove the configuration. Syntax ntp-service broadcast-client undo ntp-service broadcast-client Default The device does not operate in any NTP association mode.
undo ntp-service broadcast-server Default The device does not operate in any NTP association mode. Views Interface view Predefined user roles network-admin Parameters authentication-keyid keyid: Specifies the key ID to be used for sending broadcast messages to broadcast clients, where keyid is in the range of 1 to 4294967295. If this option is not specified, the local device cannot synchronize broadcast clients enabled with NTP authentication. version number: Specifies the NTP version.
Predefined user roles network-admin Parameters dscp-value: Sets a DSCP value in the range of 0 to 63 for IPv4 NTP packets. Usage guidelines The DSCP value is included in the ToS field of an IPv4 packet to identify the packet priority. Examples # Set the DSCP value for IPv4 NTP packets to 30. system-view [Sysname] ntp-service dscp 30 ntp-service enable Use ntp-service enable to enable the NTP service. Use undo ntp-service enable to disable the NTP service.
Views Interface view Predefined user roles network-admin Usage guidelines To disable an interface on the device from synchronizing the peer device in the corresponding subnet or disable the device from being synchronized by the peer device in the subnet corresponding to an interface, execute the command on the interface. Examples # Disable VLAN-interface 1 from processing NTP messages.
Related commands display ntp-service sessions ntp-service multicast-client Use ntp-service multicast-client to configure the device to operate in NTP multicast client mode and use the current interface to receive NTP multicast packets. Use undo ntp-service multicast-client to remove the configuration. Syntax ntp-service multicast-client [ ip-address ] undo ntp-service multicast-client [ ip-address ] Default The device does not operate in any NTP association mode.
Syntax ntp-service multicast-server [ ip-address ] [ authentication-keyid keyid | ttl ttl-number | version number ] * undo ntp-service multicast-server [ ip-address ] Default The device does not operate in any NTP association mode. View Interface view Predefined user roles network-admin Parameters ip-address: Specifies a multicast IP address. The default is 224.0.1.1. A multicast server and client must be configured with the same multicast IP address.
Syntax ntp-service refclock-master [ ip-address ] [ stratum ] undo ntp-service refclock-master [ ip-address ] Default The device does not use its local clock as a reference clock. Views System view Predefined user roles network-admin Parameters ip-address: IP address of the local clock, which is 127.127.1.u, where u is the NTP process ID in the range of 0 to 3. If you do not specify ip-address, it defaults to 127.127.1.0. stratum: Stratum level of the local clock, in the range of 1 to 15.
Views System view Predefined user roles network-admin Parameters keyid: Specifies an authentication key number in the range of 1 to 4294967295. Usage guidelines When NTP authentication is enabled, a client can be synchronized only to a server that can provide a trusted authentication key. Before you use the command, make sure NTP authentication is enabled and an authentication key is configured. The key automatically changes to untrusted after you delete the key.
Parameters interface-type interface-number: Specifies an interface by its type and number. Usage guidelines If you specify the source interface for NTP messages, the device sets the source IP address of the NTP messages as the primary IP address of the specified interface when sending the NTP messages. When the device responds to an NTP request, the source IP address of the NTP response is always the IP address of the interface that has received the NTP request.
ip-address: Specifies the IP address of the symmetric-passive peer. It must be a unicast address, rather than a broadcast address, a multicast address, or the IP address of the local clock. authentication-keyid keyid: Specifies the key ID to be used for sending NTP messages to the peer, where keyid is in the range of 1 to 4294967295. If this option is not specified, the local device and the peer do not authenticate each other.
Parameters server-name: Specifies the host name of the NTP server, a case-insensitive string of 1 to 253 characters. ip-address: Specifies the IP address of the NTP server. It must be a unicast address, rather than a broadcast address, a multicast address, or the IP address of the local clock. authentication-keyid keyid: Specifies the key ID to be used for sending NTP messages to the NTP server, where keyid is in the range of 1 to 4294967295.
SNTP commands display sntp sessions Use display sntp sessions to display information about all SNTP associations. Syntax display sntp sessions Views Any view Predefined user roles network-admin network-operator Examples # Display information about all SNTP associations. display sntp sessions SNTP server Stratum Version Last receive time 1.0.1.11 2 4 Tue, May 17 2011 9:11:20.833 (Synced) Table 7 Command output Field Description SNTP server SNTP server (NTP server).
Views System view Predefined user roles network-admin Usage guidelines You need to enable SNTP authentication in networks that require time synchronization security to make sure SNTP clients are only synchronized to authenticated NTP servers. To authenticate an NTP server, set an authentication key and specify it as a trusted key. Examples # Enable SNTP authentication.
Configure the same key ID and key value on the SNTP client and NTP server. Otherwise, the SNTP client cannot be synchronized to the NTP server. After you configure an SNTP authentication key, use the sntp reliable authentication-keyid command to set it as a trusted key. The key automatically changes to untrusted after you delete the key. In this case, you do not need to execute the undo sntp-service reliable authentication-keyid command. You can set up to 128 keys by executing the command.
Syntax sntp reliable authentication-keyid keyid undo sntp reliable authentication-keyid keyid Default No trust key is specified. Views System view Predefined user roles network-admin Parameters keyid: Specifies an authentication key number in the range of 1 to 4294967295. Usage guidelines If SNTP is enabled, the SNTP client is only synchronized to an NTP server that provides a trusted key. Before you use the command, make sure SNTP authentication is enabled and an authentication key is configured.
Views System view Predefined user roles network-admin Parameters server-name: Specifies the host name of the NTP server, a case-insensitive string of 1 to 253 characters. ip-address: Specifies the IP address of the NTP server. It must be a unicast address, rather than a broadcast address, a multicast address, or the IP address of the local clock. authentication-keyid keyid: Specifies the key ID to be used for sending NTP messages to the NTP server, where keyid is in the range of 1 to 4294967295.
Information center commands diagnostic-logfile save Use diagnostic-logfile save to manually save diagnostic logs from the diagnostic log buffer to the diagnostic log file. Syntax diagnostic-logfile save Views Any view Predefined user roles network-admin Usage guidelines You can specify the directory to save the diagnostic log file with the info-center diagnostic-logfile directory command. The system clears the diagnostic log buffer after saving the buffered diagnostic logs to the diagnostic log file.
Examples # Display the diagnostic log file configuration. display diagnostic-logfile summary Diagnostic log file: Enabled. Diagnostic log file size quota: 10 MB Diagnostic log file directory: flash:/diagfile Writing frequency: 24 hour 0 min 0 sec Table 8 Command output Field Description • Enabled—Diagnostic logs can be output to the diagnostic log Diagnostic log file file. • Disabled—Diagnostic logs cannot be output to the diagnostic log file.
Loghost: Date Other output destination: Date display logbuffer Use display logbuffer to display the state of the log buffer and the log information in the log buffer.
size buffersize: Specifies the number of latest log messages to be displayed, in the range of 1 to 1024. Without this keyword, the command displays all log information. slot slot-number: Specifies a card by its slot number. (In standalone mode.) chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument specifies the ID of the member device. The slot-number argument specifies the slot number of the card. (In IRF mode.) Examples # (In standalone mode.
display logbuffer summary Use display logbuffer summary to display the summary of the log buffer. Syntax In standalone mode: display logbuffer summary [ level severity | slot slot-number ] * In IRF mode: display logbuffer summary [ level severity | chassis chassis-number slot slot-number ] * Views Any view Predefined user roles network-admin network-operator Parameters level severity: Specifies a severity level in the range of 0 to 7.
# (In IRF mode.) Display the summary of the log buffer.
Predefined user roles network-admin network-operator Examples # Display the log file configuration. display logfile summary Log file: Enabled. Log file size quota: 10 MB Log file directory: flash:/logfile Writing frequency: 0 hour 1 min 10 sec Table 12 Command output Field Description Log file • Enabled—Logs can be output to a log file. • Disabled—Logs cannot be output to a log file. Log file size quota Maximum storage size of a log file, in MB. Log file directory Log file directory.
info-center diagnostic-logfile enable Use info-center diagnostic-logfile enable to enable saving diagnostic logs into the diagnostic log file. Use undo info-center diagnostic-logfile enable to disable saving diagnostic logs into the diagnostic log file. Syntax info-center diagnostic-logfile enable undo info-center diagnostic-logfile enable Default Saving diagnostic logs to the diagnostic log file is disabled.
Usage guidelines The system saves diagnostic logs in the diagnostic log buffer, and outputs the buffered diagnostic logs to the diagnostic log file at the specified interval. Examples # Configure the system to save diagnostic logs from the diagnostic log file buffer to the diagnostic log file every 600 seconds.
Predefined user roles network-admin Parameters dir-name: Specifies a directory by its name, a string of 1 to 64 characters. Usage guidelines The specified directory must have been created. The configuration made by this command cannot survive an IRF reboot or a global active/standby switchover in an IRF fabric. (In IRF mode.) Examples # Set the directory to save the diagnostic log file to flash:/test. mkdir test Creating directory flash:/test... Done.
Examples # Enable log file overwrite-protection. system-view [Sysname] info-center logfile overwrite-protection info-center enable Use info-center enable to enable the information center. Use undo info-center enable to disable the information center. Syntax info-center enable undo info-center enable Default The information center is enabled. Views System view Predefined user roles network-admin Examples # Enable the information center.
cmcc: Specifies the China Mobile Communications Corporation (cmcc) format. Usage guidelines Logs can be sent to a log host in HP, unicom, or cmcc format. For more information about log formats, see Network Management and Monitoring Configuration Guide. Examples # Set the format of logs sent to a log host as unicom. system-view [Sysname] info-center format unicom info-center logbuffer Use info-center logbuffer to configure log output to the log buffer.
Views System view Predefined user roles network-admin Parameters buffersize: Specifies the maximum number of logs that can be stored in the log buffer. The value range is 0 to 1024, and the default is 512. Examples # Set the maximum number of logs that can be stored in a log buffer to 50. system-view [Sysname] info-center logbuffer size 50 # Restore the default maximum log buffer size.
Syntax info-center logfile frequency freq-sec undo info-center logfile frequency Default The default saving interval is 86400 seconds. Views System view Predefined user roles network-admin Parameters freq-sec: Specifies the interval at which the system saves logs to the log file, in the range of 1 to 86400 seconds. The default setting is 86400 seconds. Usage guidelines With this command executed, the system saves logs in the log file buffer to the log file at the specified interval.
Usage guidelines When the log file is full, the system overwrites the earliest logs in the log file with new logs. Examples # Set the maximum size of the log file to 6 MB. system-view [Sysname] info-center logfile size-quota 6 Related commands info-center logfile enable info-center logfile directory Use info-center logfile directory to configure the directory where the log file is saved.
info-center logging suppress duplicates Use info-center logging suppress duplicates to enable duplicate log suppression. Use undo info-center logging suppress duplicate to restore the default. Syntax info-center logging suppress duplicates undo info-center logging suppress duplicates Default Duplicate log suppression is disabled.
%Jan 1 07:30:19:643 2000 Sysname ARP/6/DUPIFIP: Duplicate address 172.16.0.1 on interface Vlan-interface100, sourced from 00e0-fc58-123d This message repeated 20 times in last 2 minutes. The output shows the second suppression period lasts for 2 minutes. %Jan 1 07:30:20:541 2000 Sysname ARP/6/DUPIFIP: Duplicate address 172.16.0.1 on interface Vlan-interface100, sourced from 00e0-fc58-123d This message repeated 1 times in last 1 second.
Examples # Output logs to the log host 1.1.1.1. system-view [Sysname] info-center loghost 1.1.1.1 info-center loghost source Use info-center loghost source to specify the source IP address for output logs. Use undo info-center loghost source to restore the default. Syntax info-center loghost source interface-type interface-number undo info-center loghost source Default The source IP address of output logs is the primary IP address of the matching route's egress interface.
undo info-center source { module-name | default } { console | logbuffer | logfile | loghost | monitor } Default Table 13 lists the default output rules.
If you use the command multiple times, only the most recent output rule takes effect for the specified module. After you set an output rule for a module, you must use the module-name argument to modify or remove the rule. A new output rule configured by using the default keyword does not take effect on the module. Examples # Output only VLAN module's information with a severity level of at least emergency to the console.
[Sysname] display current- Enter configuration to complete the display current-configuration command, and press the Enter key to execute the command. # Enable synchronous information output, and then save the current configuration (enter interactive information). system-view [Sysname] info-center synchronous Info-center synchronous output is on [Sysname] save The current configuration will be written to the device. Are you sure? [Y/N]: At this time, the system receives the log information.
none: Indicates no time information is provided. Examples # Configure the timestamp format for log information as boot. system-view [Sysname] info-center timestamp boot Related commands info-center timestamp loghost info-center timestamp loghost Use info-center timestamp loghost to configure the timestamp format for logs sent to a log host. Use undo info-center timestamp loghost to restore the default.
Syntax info-center trace-logfile quota size undo info-center trace-logfile quota Default The maximum size of the trace log file is 1 MB. Views System view Predefined user roles network-admin Parameters size: Specifies the maximum size of the trace log file, in MB. Examples # Set the maximum size of the trace log file to 6 MB. system-view [Sysname] info-center trace-logfile quota 6 logfile save Use logfile save to manually save logs in the log file buffer into the log file.
reset logbuffer Use reset logbuffer to clear the log buffer. Syntax reset logbuffer Views User view Predefined user roles network-admin Examples # Clear the log buffer. reset logbuffer Related commands display logbuffer terminal debugging Use terminal debugging to enable the display of debug information on the current terminal. Use undo terminal debugging to disable the display of debug information on the current terminal.
Examples # Enable the display of debug information on the current terminal. terminal debugging The current terminal is enabled to display debugging information. Related commands • terminal logging level • terminal monitor terminal logging level Use terminal logging level to set the lowest level of the logs that can be output to the current terminal. Use undo terminal logging level to restore the default.
Syntax terminal monitor undo terminal monitor Default Monitoring of logs is enabled on the console and disabled on the monitor terminal. Views User view Predefined user roles network-admin Usage guidelines The configuration of this command is valid for only the current connection between the terminal and the device. If a new connection is established, the monitoring of system information on the terminal restores the default. Examples # Enable the monitoring of logs on the current terminal.
SNMP commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. The SNMP agent sends notifications (traps and informs) to inform the NMS of significant events, such as link state changes and user logins or logouts. Unless otherwise stated, the trap keyword in the command line includes both traps and informs.
Community name: userv1 Group name: testv1 Storage-type: nonVolatile Table 14 Command output Field Description Community name Displays the community name created by using the snmp-agent community command or the username created by using the snmp-agent usm-user { v1 | v2c } command. SNMP group name. Group name • If the community is created by using the snmp-agent community command, the group name is the same as the community name.
network-operator Parameters context-name: Specifies an SNMP context by its name, a case-sensitive string of 1 to 32 characters. If no SNMP context is specified, the command displays all SNMP contexts created on the device. Examples # Display all SNMP contexts created on the device.
Field Description Security model of the SNMP group: Security model • authPriv—authentication with privacy. • authNoPriv—authentication without privacy. • noAuthNoPriv—no authentication, no privacy. Security model of an SNMPv1 or SNMPv2c group can only be noAuthNoPriv. Readview Read-only MIB view accessible to the SNMP group. Writeview Write MIB view accessible to the SNMP group. Notifyview Notify MIB view for the SNMP group.
Syntax display snmp-agent mib-node [ details | index-node | trap-node | verbose ] Views Any view Predefined user roles network-admin network-operator Parameters details: Specifies detailed MIB node information, including node name, last octet of an OID string, and name of the next leaf node. index-node: Specifies SNMP MIB tables, and node names and OIDs of MIB index nodes. trap-node: Specifies node names and OIDs of MIB notification nodes, and node names and OIDs of notification objects.
Field Description Permissions to MIB nodes: NA—Not accessible. NF—Supports notifications. (NA) RO—Supports read-only access. RW—Supports read and write access. RC—Supports read-write-create access. WO—Supports write-only access. * Leaf node or MIB table node. # Display detailed MIB node information.
Index ||lldpPortConfigPortNum OID ||| Table |lldpConfigManAddrTable Index 1.0.8802.1.1.2.1.1.6.1.1 ||lldpLocManAddrSubtype OID ||| 1.0.8802.1.1.2.1.3.8.1.1 Index ||lldpLocManAddr OID ||| Table |lldpStatsTxPortTable Index ||lldpStatsTxPortNum OID ||| Table |lldpStatsRxPortTable Index ||lldpStatsRxPortNum OID ||| Table |lldpLocPortTable Index ||lldpLocPortNum OID ||| 1.0.8802.1.1.2.1.3.8.1.2 1.0.8802.1.1.2.1.2.6.1.1 1.0.8802.1.1.2.1.2.7.1.1 1.0.8802.1.1.2.1.3.7.1.
OID ||||1.0.8802.1.1.2.1.4.1.1.5 Name |||lldpXMedRemDeviceClass OID ||||1.0.8802.1.1.2.1.5.4795.1.3.1.1.3 Table 19 Command output Field Description Name Name of a MIB notification node. OID OID of a MIB notification node. Trap Object Name and OID of a notification object. # Display detailed information about SNMP MIB nodes, including node names, OIDs, node types, permissions to MIB nodes, data types, MORs, and parent, child, and sibling nodes.
Index ||[indexImplied:0, indexLength:1]: Name |lldpPortConfigPortNum OID ||1.0.8802.1.1.2.1.1.6.1.1 Properties ||NodeType: Column ||AccessType: NA ||DataType: Integer32 ||MOR: 0x020c1201 Parent ||lldpPortConfigEntry First child || Next leaf ||lldpPortConfigAdminStatus Next sibling ||lldpPortConfigAdminStatus Allow ||get/set/getnext Index ||[indexImplied:0, indexLength:1]: Value range || Name |lldpPortConfigAdminStatus OID ||1.0.8802.1.1.2.1.1.6.1.2 Properties ||NodeType: [1.
Field Description Permissions to MIB nodes: AccessType • • • • • • NA—Not accessible. NF—Supports notifications. RO—Supports read-only access. RW—Supports read and write access. RC—Supports read-write-create access. WO—Supports write-only access. Data types of MIB nodes: DataType • • • • • • • • • • • • • • • • Integer—An integer. Integer32—A 32-bit integer. Unsigned32—A 32-bit integer with no mathematical sign. Gauge—A non-negative integer that might increase or decrease.
display snmp-agent mib-view Use display snmp-agent mib-view to display MIB views. Syntax display snmp-agent mib-view [ exclude | include | viewname view-name ] Views Any view Predefined user roles network-admin network-operator Parameters exclude: Displays the subtrees excluded from any MIB view. include: Displays the subtrees included in any MIB view. viewname view-name: Displays information about the specified MIB view.
Storage-type: nonVolatile View Type: excluded View status: active ViewDefault is the default MIB view. The output shows that except for the MIB objects in the snmpUsmMIB, snmpVacmMIB, and snmpModules.18 subtrees, all the MIB objects in the iso subtree are accessible. Table 21 Command output Field Description View name MIB view name. MIB Subtree MIB subtree covered by the MIB view. Subtree mask MIB subtree mask. Storage-type Type of the medium (see Table 14) where the subtree view is stored.
Examples # Display all remote SNMP engine IDs. display snmp-agent remote Remote engined: 800063A28000A0FC00580400000001 IPv4 address: 1.1.1.1 Table 22 Command output Field Description Remote engined Remote SNMP engine ID you have configured using the snmp-agent remote command. IPv4 address IPv4 address of the remote SNMP entity. Related commands snmp-agent remote display snmp-agent statistics Use display snmp-agent statistics to display SNMP message statistics.
0 Trap PDUs accepted and processed. 0 alternate Response Class PDUs dropped silently. 0 forwarded Confirmed Class PDUs dropped silently. Table 23 Command output Field Description messages delivered to the SNMP entity Number of messages that the SNMP agent has received. messages were for an unsupported version Number of messages that had an SNMP version not configured on the SNMP agent. messages used an unknown SNMP community name Number of messages that used an unknown SNMP community name.
display snmp-agent sys-info Use display snmp-agent sys-info to display SNMP agent system information. Syntax display snmp-agent sys-info [ contact | location | version ] * Views Any view Predefined user roles network-admin network-operator Parameters contact: Displays the system contact. location: Displays the physical location of the device. version: Displays the SNMP agent version. Usage guidelines If none of the parameters is specified, this command displays all SNMP agent system information.
Examples # Display the trap queue configuration and usage status. display snmp-agent trap queue Queue size: 100 Message number: 6 Related commands • snmp-agent trap life • snmp-agent trap queue-size display snmp-agent trap-list Use display snmp-agent trap-list to display modules that can generate SNMP notifications and their notification function status (enable or disable).
Views Any view Predefined user roles network-admin network-operator Parameters engineid engineid: Displays SNMPv3 user information for the SNMP engine ID identified by engineid. When an SNMPv3 user is created, the system records the local SNMP entity engine ID. The user becomes invalid when the engine ID changes and becomes valid again when the recorded engine ID is restored. group group-name: Displays SNMPv3 user information for a specified SNMP group name. The group name is case-sensitive.
Field Description Storage type: Storage-type • • • • • volatile. nonvolatile. permanent. readOnly. other. For more information about these storage types, see Table 14. SNMP user status: UserStatus • • • • active—The SNMP user is effective. notInService—The SNMP user is correctly configured but not activated. notReady—The SNMP user configuration is incomplete. other—Any other status. SNMP users are active upon their creation at the CLI.
Examples # Enable port FortyGigE 1/0/1 to send linkUp/linkDown SNMP traps to 10.1.1.1 in the community public. system-view [Sysname] snmp-agent trap enable [Sysname] snmp-agent target-host trap address udp-domain 10.1.1.1 params securityname public [Sysname] interface fortygige 1/0/1 [Sysname-FortyGigE1/0/1] enable snmp trap updown Related commands • snmp-agent target-host • snmp-agent trap enable snmp-agent Use snmp-agent to enable the SNMP agent.
snmp-agent calculate-password plain-password mode { md5 | sha } { local-engineid | specified-engineid engineid } In FIPS mode: snmp-agent calculate-password plain-password mode sha { local-engineid | specified-engineid engineid } Views System view Predefined user roles network-admin Parameters plain-password: Specifies a plaintext authentication or privacy key. mode: Specifies the same authentication mode as configured in the snmp-agent usm-user v3 command.
Use undo snmp-agent community to delete an SNMP community. Syntax snmp-agent community { read | write } [ simple | cipher ] community-name [ mib-view view-name ] [ acl acl-number ] undo snmp-agent community { read | write } [ cipher ] community-name Default No SNMP community exists. Views System view Predefined user roles network-admin Parameters read: Assigns the specified community the read only access to MIB objects. A read-only community can only inquire MIB information.
Typically, public is used as the read-only community name and private is used as the read and write community name. To improve security, assign your SNMP communities a name other than public and private. Examples # Create the read-only community readaccess in plain text so an SNMPv1 or SNMPv2c NMS can use the community name readaccess to read the MIB objects in the default view ViewDefault.
Predefined user roles network-admin Parameters community-name: Specifies an SNMP community, a case-sensitive string of 1 to 32 characters. context-name: Specifies an SNMP context, a case-sensitive string of 1 to 32 characters. Usage guidelines This command enables a module on an agent to obtain the context mapped to a community name when an NMS accesses the agent by using SNMPv1 or SNMPv2c. You can configure up to 10 community-context mappings on the device.
Examples # Create SNMP context trillcontext. system-view [Sysname] snmp-agent context trillcontext Related commands display snmp-agent context snmp-agent group Use snmp-agent group to create an SNMP group and specify its access right. Use undo snmp-agent group to delete an SNMP group.
privacy: Specifies the authentication with privacy security model for the SNMPv3 group. read-view view-name: Specifies a read-only MIB view. The view-name represents a MIB view name, a string of 1 to 32 characters. If no read-only MIB view is specified, the SNMP group has read access to the default view ViewDefault. write-view view-name: Specifies a read and write MIB view. The view-name represents a MIB view name, a string of 1 to 32 characters.
system-view [Sysname] snmp-agent group v3 group1 Related commands • display snmp-agent group • snmp-agent mib-view • snmp-agent usm-user snmp-agent local-engineid Use snmp-agent local-engineid to change the SNMP engine ID of the local SNMP agent. Use undo snmp-agent local-engineid to restore the default local SNMP engine ID. Syntax snmp-agent local-engineid engineid undo snmp-agent local-engineid Default The local engine ID is the combination of the company ID and the device ID.
snmp-agent log Use snmp-agent log to enable logging SNMP operations. Use undo snmp-agent log to disable logging SNMP operations. Syntax snmp-agent log { all | get-operation | set-operation } undo snmp-agent log { all | get-operation | set-operation } Default SNMP logging is disabled. Views System view Predefined user roles network-admin Parameters all: Enables logging SNMP Get and Set operations. get-operation: Enables logging SNMP Get operations. set-operation: Enables logging SNMP Set operations.
Default The system creates the ViewDefault view when the SNMP agent is enabled. In this default MIB view, all MIB objects in the iso subtree but the snmpUsmMIB, snmpVacmMIB, and snmpModules.18 subtrees are accessible. Views System view Predefined user roles network-admin Parameters excluded: Denies access to any node in the specified MIB subtree. included: Permits access to all the nodes in the specified MIB subtree. view-name: Specify a view name, a string of 1 to 32 characters.
snmp-agent packet max-size Use snmp-agent packet max-size to set the maximum size (in bytes) of SNMP packets that the SNMP agent can receive or send. Use undo snmp-agent packet max-size to restore the default packet size. Syntax snmp-agent packet max-size byte-count undo snmp-agent packet max-size Default The maximum SNMP packet size that the SNMP agent can handle is 1500 bytes.
Parameters port-num: Specifies the UDP port for receiving SNMP packets, in the range of 1 to 65535. The default is 161. Usage guidelines After changing the port number for receiving SNMP packets, reconnect the device by using the port number for SNMP get and set operations. If you use UDP port 161, the display current-configuration command does not display the UDP port information. Examples # Specify the UDP port for receiving SNMP packets as 5555.
Examples # Configure the SNMP engine ID (123456789A) of the SNMP manager (10.1.1.1). system-view [Sysname] snmp-agent remote 10.1.1.1 engineid 123456789A Related commands display snmp-agent remote snmp-agent source Use snmp-agent source to specify a source IP address for the informs or traps sent by the SNMP agent. Use undo snmp-agent source to restore the default.
Related commands • display snmp-agent community • snmp-agent target-host • snmp-agent trap enable snmp-agent sys-info contact Use snmp-agent sys-info contact to configure the system contact. Use undo snmp-agent sys-info contact to restore the default contact. Syntax snmp-agent sys-info contact sys-contact undo snmp-agent sys-info contact Default The default is null.
Views System view Predefined user roles network-admin Parameters sys-location: Specifies the system location, a string of 1 to 255 characters. Usage guidelines Configure the location of the device for system maintenance and management. Examples # Configure the system location as Room524-row1-3. system-view [Sysname] snmp-agent sys-info location Room524-row1-3 Related commands display snmp-agent sys-info snmp-agent sys-info version Use snmp-agent sys-info version to enable SNMP versions.
Usage guidelines SNMPv1 and SNMPv2c settings in this command are supported only in non-FIPS mode. Configure the SNMP agent with the same SNMP version as the NMS for successful communications between them. Examples # Enable SNMPv3. system-view [Sysname] snmp-agent sys-info version v3 Related commands display snmp-agent sys-info snmp-agent target-host Use snmp-agent target-host to configure the SNMP agent to send SNMP notifications (informs or traps) to a host.
address: Specifies the destination address of SNMP notifications. udp-domain: Specifies UDP as the transport protocol. ip-address: Specifies the IPv4 address of the target host as the destination of SNMP notifications. udp-port port-number: Specifies the UDP port for SNMP notifications. If no UDP port is specified, UDP port 162 is used. params securityname security-string: Specifies the authentication parameter.
undo snmp-agent trap enable [ configuration | protocol | standard [ authentication | coldstart | linkdown | linkup | warmstart ] * | system ] Default SNMP configuration notifications, standard notifications, and system notifications are enabled. Whether other SNMP notifications are enabled varies by modules. Views System view Predefined user roles network-admin Parameters configuration: Specifies configuration notifications.
Related commands snmp-agent target-host snmp-agent trap if-mib link extended Use snmp-agent trap if-mib link extended to configure the SNMP agent to send extended linkUp/linkDown notifications. Use undo snmp-agent trap if-mib link extended to restore the default. Syntax snmp-agent trap if-mib link extended undo snmp-agent trap if-mib link extended Default The SNMP agent sends standard linkUp/linkDown notifications.
Predefined user roles network-admin Parameters seconds: Sets a lifetime in seconds, in the range of 1 to 2592000. Usage guidelines When congestion occurs, the SNMP agent buffers notifications in a queue. The notification lifetime sets how long a notification can stay in the queue. A trap is deleted when its lifetime expires. Examples # Set the SNMP notification lifetime to 60 seconds.
snmp-agent trap queue-size Use snmp-agent trap queue-size to set the SNMP notification queue size. Use undo snmp-agent trap queue-size to restore the default queue size. Syntax snmp-agent trap queue-size size undo snmp-agent trap queue-size Default The SNMP notification queue can store up to 100 notifications. Views System view Predefined user roles network-admin Parameters size: Sets the maximum number of notifications that the SNMP notification queue can hold. The value range is 1 to 1000.
Views System view Predefined user roles network-admin Parameters v1: Specifies SNMPv1. v2c: Specifies SNMPv2c. user-name: Specifies an SNMP username, a case-sensitive string of 1 to 32 characters. group-name: Specifies an SNMPv1 or SNMPv2c group name, a case-sensitive string of 1 to 32 characters. The group can be one that has been created or not. If the group has not been created, the user takes effect after you create the group.
[Sysname] snmp-agent group v2c readCom [Sysname] snmp-agent usm-user v2c userv2c readCom acl 2001 Related commands • display snmp-agent community • snmp-agent community • snmp-agent group snmp-agent usm-user v3 Use snmp-agent usm-user v3 to add a user to an SNMPv3 group. Use undo snmp-agent usm-user v3 to delete a user from an SNMPv3 group.
• sha: Specifies the SHA-1 authentication algorithm. auth-password: Specifies a case-sensitive plaintext or encrypted authentication key. In non-FIPS mode, a plaintext key is a string of 1 to 64 visible characters. In FIPS mode, a plaintext key is a string of 15 to 64 visible characters, which must contain numbers, upper-case letters, lower-case letters, and special characters.
SNMPv3 users are valid only on the SNMP engine that creates them. By default, SNMPv3 users are created on the local SNMP engine. When you create an SNMPv3 user for sending SNMP inform messages, you must associate it with the remote SNMP engine. If you configure an SNMPv3 user multiple times, the most recent configuration takes effect. For security purposes, all keys, including keys configured in plain text, are saved in cipher text. Make sure you remember the username and the plain text of the keys.
Port mirroring commands The port mirroring commands are available on both Layer 2 and Layer 3 Ethernet interfaces. The term "interface" in this chapter collectively refers to these two types of interfaces. You can use the port link-mode command to configure an Ethernet port as a Layer 2 or Layer 3 interface (see Layer 2—LAN Switching Configuration Guide). display mirroring-group Use display mirroring-group to display mirroring group information.
Mirroring group 2: Type: Remote source Status: Incomplete Mirroring port: FortyGigE1/0/4 Both Remote probe VLAN: 1900 Mirroring group 3: Type: Remote destination Status: Active Monitor port: FortyGigE1/0/6 Remote probe VLAN: 1901 Table 29 Command output Field Description Mirroring group Number of the mirroring group. Type of the mirroring group: Type • Local. • Remote source. • Remote destination. Status of the mirroring group: Status • Active.
Parameters group-id: Specifies the number of a mirroring group, in the range of 1 to 4. local: Specifies a local mirroring group. remote-destination: Specifies a remote destination group. remote-source: Specifies a remote source group. all: Specifies all mirroring groups. Examples # Create local mirroring group 1. system-view [Sysname] mirroring-group 1 local mirroring-group mirroring-cpu Use mirroring-group mirroring-cpu to configure source CPUs for a mirroring group.
hold the cards, in the format of slot-number-list = { slot-number [ to slot-number ] }&<1-8>. &<1-8> indicates that you can specify up to eight slot numbers or number ranges. When you to to specify a slot number range, the end slot number must be equal to or greater than the start slot number. (In IRF mode.) both: Mirrors both received and sent packets on the specified CPUs. inbound: Mirrors only received packets on the specified CPUs. outbound: Mirrors only sent packets on the specified CPUs.
inbound: Mirrors only received packets on the specified port. outbound: Mirrors only sent packets on the specified port. Usage guidelines You can configure source ports only for a local mirroring group or remote source group but not for a remote destination group. Do not assign a source port to the remote probe VLAN. A port can serve as a source port for multiple mirroring groups, but cannot be a reflector port, egress port, or monitor port at the same time.
interface-list: Source port list, containing one or more ports, in the format of interface-list = { interface-type interface-number [ to interface-type interface-number ] }&<1-8>. The interface-type interface-number argument specifies an interface by its type and number. &<1-8> indicates that you can specify up to eight interface-type interface-number [ to interface-type interface-number ] parameters.
Default No egress port is configured for a mirroring group. Views System view, interface view Predefined user roles network-admin Parameters group-id: Specifies the number of a mirroring group, in the range of 1 to 4. The mirroring group specified by group-id must already exist. interface-type interface-number: Specifies a port to be configured as the egress port by its type and number.
Views Interface view Predefined user roles network-admin Parameters group-id: Specifies the number of a mirroring group, in the range of 1 to 4. The mirroring group specified by group-id must already exist. Usage guidelines You can configure the monitor port only for a local mirroring group or remote destination group but not for a remote source group.
Parameters group-id: Specifies the number of a mirroring group, in the range of 1 to 4. The mirroring group specified by group-id must already exist. interface-type interface-number: Specifies a port to be configured as the monitor port by its type and number. Usage guidelines You can configure a monitor port only for a local mirroring group or remote destination group, but not for a remote source group.
Predefined user roles network-admin Parameters group-id: Specifies the number of a mirroring group, in the range of 1 to 4. The mirroring group specified by group-id must already exist. interface-type interface-number: Specifies a port to be configured as the reflector port by its type and number. Usage guidelines You can configure reflector ports only for remote source groups but not for local mirroring groups or remote destination groups.
Views System view Predefined user roles network-admin Parameters group-id: Specifies the number of a mirroring group, in the range of 1 to 4. The mirroring group specified by group-id must already exist. vlan-id: Specifies a VLAN by its ID. Usage guidelines You can configure a remote probe VLAN only for a remote source group or remote destination group but not for a local mirroring group. When a VLAN is configured as a remote probe VLAN, use the remote probe VLAN for port mirroring exclusively.
Traffic mirroring commands The traffic mirroring commands are available on both Layer 2 and Layer 3 Ethernet interfaces. The term "interface" in this chapter collectively refers to these two types of interfaces. You can use the port link-mode command to configure an Ethernet port as a Layer 2 or Layer 3 interface (see Layer 2—LAN Switching Configuration Guide). mirror-to Use mirror-to to specify the mirroring destination for a traffic behavior. Use undo mirror-to to cancel the configuration.
[Sysname-behavior-1] mirror-to vlan 100 sFlow commands display sflow Use display sflow to display sFlow configuration and operation information. Syntax display sflow Views Any view Predefined user roles network-admin network-operator Examples # Display sFlow configuration and operation information. display sflow sFlow datagram version: 5 Global information: Agent IP: 10.10.10.1(CLI) Source address: 10.0.0.
Field Description IP sFlow collector IP address. Port sFlow collector port. Aging Remaining lifetime of the sFlow collector. If this field displays N/A, the sFlow collector never ages out. Size Maximum length of the sFlow data portion in an sFlow packet. Description Description of the sFlow collector. Port information Information about interfaces configured with sFlow. Interface Interface configured with sFlow. CID ID of the sFlow collector, for receiving counter sampled packets.
Parameters ip ip-address: Specifies an IPv4 address for the sFlow agent. Usage guidelines HP recommends that you manually configure an IP address for the sFlow agent. Only one IP address can be specified for the sFlow agent on the device, and a newly configured IP address overwrites the existing one. Examples # Specify IP address 10.10.10.1 for the sFlow agent. system-view [Sysname] sflow agent ip 10.10.10.1 sflow collector Use sflow collector to configure parameters for an sFlow collector.
Examples # Configure parameters for an sFlow collector: specify the ID as 2, IP address as 3.3.3.1, port number as the default, description as netserver, aging timer as 1200 seconds, and maximum length of the sFlow data portion in the sFlow packet as 1000 bytes. system-view [Sysname] sflow collector 2 ip 3.3.3.1 description netserver time-out 1200 datagram-size 1000 sflow counter interval Use sflow counter interval to enable counter sampling and set a counter sampling interval.
Predefined user roles network-admin Parameters collector-id: Specifies an sFlow collector by its ID in the range of 1 to 10. Examples # Specify sFlow collector 2 on FortyGigE 1/0/1 for counter sampling. system-view [Sysname] interface fortygige 1/0/1 [Sysname-FortyGigE1/0/1] sflow counter collector 2 sflow flow collector Use sflow flow collector to specify an sFlow collector for flow sampling. Use undo sflow flow collector to restore the default.
Default Flow sampling can copy up to 128 bytes of a packet. Views Ethernet interface view Predefined user roles network-admin Parameters length: Specifies the maximum number of bytes that can be copied, in the range of 18 to 512. HP recommends that you use the default. Examples # Set the maximum number of bytes that can be copied to 60 on FortyGigE 1/0/1.
[Sysname-FortyGigE1/0/1] sflow sampling-mode determine Related commands sflow sampling-rate sflow sampling-rate Use sflow sampling-rate to enable flow sampling and specify the number of packets out of which flow sampling will sample a packet on an interface. Use undo sflow sampling-rate to disable flow sampling. Syntax sflow sampling-rate rate undo sflow sampling-rate Default Flow sampling samples no packet.
Views System view Predefined user roles network-admin Parameters ip ip-address: Specifies the source IPv4 address of sFlow packets. Examples # Specify the source IPv4 address of sFlow packets as 10.0.0.1. system-view [Sysname] sflow source ip 10.0.0.
NQA commands NQA client commands advantage-factor Use advantage-factor to configure the advantage factor that is used to count Mean Opinion Scores (MOS) and Calculated Planning Impairment Factor (ICPIF) values. Use undo advantage-factor to restore the default. Syntax advantage-factor factor undo advantage-factor Default The advantage factor is 0. Views Voice operation view Predefined user roles network-admin Parameters factor: Specifies the advantage factor in the range of 0 to 20.
Syntax codec-type { g711a | g711u | g729a } undo codec-type Default The codec type for the voice operation is G.711 A-law. Views Voice operation view Predefined user roles network-admin Parameters g711a: Specifies G.711 A-law codec type. g711u: Specifies G.711 μ-law codec type g729a: Specifies G.729 A-law codec type. Examples # Configure the codec type for the voice operation as g729a.
If the payload length is greater than the string length, the system fills the payload with the string cyclically until the payload is full. For example, if you configure the string as abcd and the payload size as 6 bytes, abcdab is filled. How the string is filled varies with operation types: • For the ICMP echo operation, the string fills the whole payload of an ICMP echo request.
Operation type Codec type Default size (bytes) Voice G.711 μ-law 172 Voice G.729 A-law 32 Views ICMP echo operation view, path jitter operation view, UDP echo operation view, UDP jitter operation view, voice operation view, ICMP template view Predefined user roles network-admin Parameters size: Specifies the size of the payload in each probe packet in bytes. Available value ranges include: • 20 to 8100 for probe packets of the ICMP echo or UDP echo operation.
Examples # Configure the description for an NQA operation as icmp-probe. system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] description icmp-probe # In ICMP template view, configure the description for an NQA operation as icmp-probe.
Use undo destination port to remove the destination port number. Syntax destination port port-number undo destination port Default No destination port number is configured for the operation. Views TCP operation view, UDP echo operation view, UDP jitter operation view, voice operation view, DNS template view, TCP template view Predefined user roles network-admin Parameters port-number: Specifies the destination port number for the operation, in the range of 1 to 65535.
Usage guidelines The display nqa history command does not display the results or statistics of UDP jitter and voice operations. Use the display nqa result command or the display nqa statistics command to verify the UDP jitter and voice operations. Examples # Display the history records of the NQA operation with the administrator name administrator and the operation tag test.
Parameters admin-name operation-tag: Displays the current monitoring results of reaction entries for an NQA operation. The admin-name argument represents the name of the administrator who creates the NQA operation. The operation-tag argument represents the operation tag. Each of the arguments is a case-insensitive string of 1 to 32 characters that cannot contain hyphens (-).
Monitored performance metric Threshold type Collect data in Checked Num Over-threshold Num consecutive Probes after the operation starts. Number of completed probes. Number of probes with duration exceeding the threshold. accumulate Probes after the operation starts. Number of completed probes. Number of probe failures. consecutive Probes after the operation starts. Number of completed probes. Number of probe failures. accumulate Packets sent after the operation starts.
Examples # Display the most recent result of the TCP operation with the administrator name administrator and the operation tag test. display nqa result admin test NQA entry (admin admin, tag test) test results: Send operation times: 1 Receive response times: 1 Min/Max/Average round trip time: 35/35/35 Square-Sum of round trip time: 1225 Last succeeded probe time: 2011-05-29 10:50:33.
Sum of SD delay: 125 Sum of DS delay: 132 Square-Sum of SD delay: 1805 Square-Sum of DS delay: 1988 SD lost packets: 0 DS lost packets: 0 Lost packets for unknown reason: 0 # Display the most recent result of the voice operation. display nqa result admin test NQA entry (admin admin, tag test) test results: Send operation times: 1000 Receive response times: 0 Min/Max/Average round trip time: 0/0/0 Square-Sum of round trip time: 0 Last packet received time: 0-00-00 00:00:00.
Receive response times: 10 Min/Max/Average round trip time: 1/1/1 Square-Sum of round trip time: 10 Extended Results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0 Packets arrived late: 0 Path-Jitter Results: Jitter number: 9 Min/Max/Average jitter: 0/0/0 Positive jitter number: 0 Min/Max/Average positive jitter: 0/0/0 Sum/Square-Sum positive jitter: 0/0 Negative jitter number: 0 Min/Max/Average negative jitter:
Field Description Square-Sum of round trip time Square sum of round-trip time. Last succeeded probe time Last packet received time Time when the last successful probe was completed. If no probes are successful in an operation, the field displays 0. This field is not available for UDP jitter, path jitter, and voice operations. Time when the last response packet was received. If no response packets in a probe were received, the field displays 0.
Field Description Max negative DS Maximum absolute value among negative jitters from destination to source. Negative SD number Number of negative jitters from source to destination. Negative DS number Number of negative jitters from destination to source. Negative SD sum Sum of absolute values of negative jitters from source to destination. Negative DS sum Sum of absolute values of negative jitters from destination to source.
Field Description Sum/Square-Sum positive jitter Sum/square sum of the positive jitter, available only in the path jitter operation. Negative jitter number Number of negative jitter, available only in the path jitter operation. Min/Max/Average negative jitter Minimum/maximum/average negative jitter in milliseconds, available only in the path jitter operation. Sum/Square-Sum negative jitter Sum/square sum of the negative jitter, available only in the path jitter operation.
Extended results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to disconnect: 0 Failures due to no connection: 0 Failures due to internal error: 0 Failures due to other errors: 0 # Display the statistics for the UDP jitter operation. display nqa statistics admin test NQA entry (admin admin, tag test) test statistics: NO. : 1 Start time: 2007-01-01 09:33:22.
2 jitter-SD average - - 3 OWD-DS - 100 24 4 OWD-SD - 100 13 5 packet-loss accumulate 0 0 6 RTT accumulate 100 52 # Display the statistics for the voice operation. display nqa statistics admin test NQA entry (admin admin, tag test) test statistics: NO. : 1 Start time: 2007-01-01 09:33:45.
1 ICPIF - - - 2 MOS - - - # Display the statistics for the path jitter operation. display nqa statistics admin test NQA entry (admin admin, tag test) test statistics: NO. : 1 Path 1: Hop IP 192.168.40.
Negative jitter number: 0 Min/Max/Average negative jitter: 0/0/0 Sum/Square-Sum negative jitter: 0/0 Table 36 Command output Field Description No. Statistics group ID. Start time Time when the operation started. Life time Duration of the operation in seconds. Send operation times Number of probe packets sent. Receive response times Number of response packets received. Min/Max/Average round trip time Minimum/maximum/average round-trip time in milliseconds.
Field Description Min negative SD Minimum absolute value among negative jitters from source to destination. Min negative DS Minimum absolute value among negative jitters from destination to source. Max negative SD Maximum absolute value among negative jitters from source to destination. Max negative DS Maximum absolute value among negative jitters from destination to source. Negative SD number Number of negative jitters from source to destination.
Field Description Max ICPIF value Maximum ICPIF value. Min ICPIF value Minimum ICPIF value. Reaction statistics Statistics about the reaction entry in the counting interval. Index ID of a reaction entry. Checked Element Monitored element. Threshold Type Threshold type. Checked Num Number of targets that have been monitored for data collection. Over-threshold Num Number of threshold violations.
Monitored performance metric Threshold type Collect data in Checked Num Over-threshold Num accumulate Probes in the counting interval. Number of completed probes. Number of probe failures. consecutive Probes in the counting interval. Number of completed probes. Number of probe failures. accumulate Packets sent in the counting interval. Number of sent packets. Number of packets of which the round-trip time exceeds the threshold.
offset number: Specifies the offset between the expected data and the actual data. The value range for the number argument is 0 to 1000, and the default value is 0. Usage guidelines After you configure the expected data for the NQA operation, the NQA client checks the data in the received response. If the actual data is the same as the expected data, it considers the NQA destination device legal.
expect ip Use expect ip to specify the expected IP address. Use undo expect ip to remove all expected IP addresses. Syntax expect ip ip-address undo expect ip Default No expected IP address is configured. Views DNS template view Predefined user roles network-admin Parameters ip-address: Specifies the expected IP address for a DNS echo request. Usage guidelines During a DNS operation, the NQA client compares the expected IP address with the IP address resolved by the DNS server.
Parameters filename: Specifies the name of a file, a case-sensitive string of 1 to 200 characters that cannot contain slashes (/). Examples # Specify the file to be transferred between the FTP server and the FTP client as config.txt. system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] filename config.txt # In FTP template view, specify the file to be transferred between the FTP server and the FTP client as config.txt.
[Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] frequency 1000 # In DNS template view, configure the DNS operation to repeat at an interval of 1000 milliseconds. system-view [Sysname] nqa template dns dnstplt [Sysname-nqatplt-dns-dnstplt] frequency 1000 history-record enable Use history-record enable to enable the saving of history records for the NQA operation. Use undo history-record enable to disable the saving of history records.
undo history-record keep-time Default The history records of an NQA operation are kept for 120 minutes. Views DHCP operation view, DLSw operation view, DNS operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation view, UDP echo operation view Predefined user roles network-admin Parameters keep-time: Specifies how long the history records can be saved. The value is in the range of 1 to 1440 minutes.
Usage guidelines If the number of history records for an NQA operation exceeds the maximum number, earliest history records are removed. Examples # Set the maximum number of history records for an NQA operation to 10. system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] history-record number 10 lsr-path Use lsr-path to set a loose source routing (LSR) path. Use undo lsr-path to restore the default.
Syntax mode { active | passive } undo mode Default The data transmission mode of active is used by the FTP operation. Views FTP operation view, FTP template view Predefined user roles network-admin Parameters active: Sets the data transmission mode to active. The FTP server initiates a connection request. passive: Sets the data transmission mode to passive. The FTP client initiates a connection request. Examples # Set the data transmission mode to passive for the FTP operation.
Examples # Specify the next hop IP address as 10.1.1.1 for the ICMP echo operation. system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] next-hop 10.1.1.1 nqa Use nqa to create an NQA operation and enter its view. Use undo nqa to remove the operation. Syntax nqa entry admin-name operation-tag undo nqa { all | entry admin-name operation-tag } Default No NQA operation is created.
Syntax nqa template { dns | ftp | http | icmp | tcp } name undo nqa template { dns | ftp | http | icmp | tcp } name Default No NQA template is created. Views System view Predefined user roles network-admin Parameters name: Specifies the name of the NQA template, a case-insensitive string of 1 to 31 characters. Examples # Create an ICMP template named icmptplt, and enter its view.
nqa schedule Use nqa schedule to configure the scheduling parameters for an NQA operation. Use undo nqa schedule to stop the operation. Syntax nqa schedule admin-name operation-tag start-time { hh:mm:ss [ yyyy/mm/dd | mm/dd/yyyy ] | now } lifetime { lifetime | forever } [ recurring ] undo nqa schedule admin-name operation-tag Default No schedule is configured for an NQA operation.
Related commands • destination ip • nqa entry • type operation (FTP operation view) Use operation to specify the operation type for the FTP operation. Use undo operation to restore the default. Syntax operation { get | put } undo operation Default The FTP operation type is get. Views FTP operation view, FTP template view Predefined user roles network-admin Parameters get: Gets a file from the FTP server. put: Transfers a file to the FTP server.
operation (HTTP operation view) Use operation to specify the operation type for the HTTP operation. Use undo operation to restore the default. Syntax operation { get | post | raw } undo operation Default The HTTP operation type is get. Views HTTP operation view, HTTP template view Predefined user roles network-admin Parameters get: Gets data from the HTTP server. post: Transfers data to the HTTP server. raw: Sends the HTTP request specified by the raw-request command to the HTTP server.
Default No FTP or HTTP login password is configured. Views FTP operation view, HTTP operation view, FTP template view, HTTP template view Predefined user roles network-admin Parameters cipher: Sets a ciphertext password. simple: Sets a plaintext password. password: Specifies the password string. This argument is case sensitive. Valid characters include letters, digits, exclamation marks (!), dollar signs ($), asterisks (*), brackets (()), underscores (_), quotation marks ('), commas (,), dots (.
Views DHCP operation view, DNS operation view, DLSw operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation, UDP echo operation view Predefined user roles network-admin Parameters times: Specifies the probe times in the range of 1 to 15. Usage guidelines The following describes how different types of NQA operations operate: • A TCP or DLSw operation sets up a connection. • A UDP jitter or voice operation sends a number of probe packets.
Views Path jitter operation view, UDP jitter operation view, voice operation view Predefined user roles network-admin Parameters packet-interval: Specifies the interval for sending packets, in the range of 10 to 60000 milliseconds. Examples # Configure the UDP jitter operation to send packets at an interval of 100 milliseconds.
probe packet-timeout Use probe packet-timeout to configure the timeout time for waiting for a response in the UDP jitter, path jitter, or voice operation. Use undo probe packet-timeout to restore the default. Syntax probe packet-timeout packet-timeout undo probe packet-timeout Default The response timeout time in the UDP jitter or path jitter operation is 3000 milliseconds, and the response timeout time in the voice operation is 5000 milliseconds.
Parameters timeout: Specifies the probe timeout time in milliseconds. The available value ranges include: • 10 to 86400000 for the FTP or HTTP operation. • 10 to 3600000 for the DHCP, DNS, DLSw, ICMP echo, SNMP, TCP, or UDP echo operation. Usage guidelines If a probe does not complete within the period, the probe is timed out. Examples # Set the probe timeout time for the DHCP operation to 10000 milliseconds.
# In HTTP template view, enter raw request view and specify the content of a request for the HTTP operation. system-view [Sysname] nqa template http httptplt [Sysname-nqatplt-http-httptplt] raw-request [Sysname-nqatplt-http-httptplt-raw-request] reaction checked-element icpif Use reaction checked-element icpif to configure a reaction entry for monitoring the ICPIF value in the voice operation. Use undo reaction to delete the specified reaction entry.
below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS. system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type voice [Sysname-nqa-admin-test-voice] reaction 1 checked-element icpif threshold-value 50 5 action-type trap-only reaction checked-element { jitter-ds | jitter-sd } Use reaction checked-element { jitter-ds | jitter-sd } to configure a reaction entry for monitoring one-way jitter in the NQA operation.
trap-only: Specifies the action of displaying results on the terminal display and meanwhile sending SNMP trap messages to the NMS. Usage guidelines You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use undo reaction to delete the entry first and reconfigure a new one. Only successful probe packets are monitored. Statistics about failed probe packets are not collected.
Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. threshold-value: Specifies threshold range. upper-threshold: Specifies the upper limit in the range of 1 to 500. lower-threshold: Specifies the lower limit in the range of 1 to 500. It must not be greater than the upper limit. action-type: Specifies what action to be triggered. The default action is none. none: Specifies the action of only displaying results on the terminal display.
Views UDP jitter operation view, voice operation view Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. owd-ds: Specifies the destination-to-source delay of each probe packet as the monitored element. owd-sd: Specifies the source-to-destination delay of each probe packet as the monitored element. threshold-value: Specifies threshold range in milliseconds. upper-threshold: Specifies the upper limit in the range of 0 to 3600000.
Default No reaction entry for monitoring packet loss is configured. Views UDP jitter operation view, voice operation view Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. threshold-type: Specifies a threshold type. accumulate accumulate-occurrences: Specifies the total number of lost packets in the operation. The value is in the range of 1 to 15000 for the UDP jitter operation and 1 to 60000 for the voice operation.
Default No reaction entry for monitoring the probe duration is configured. Views DHCP operation view, DLSw operation view, DNS operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation view, UDP echo operation view, Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. threshold-type: Specifies a threshold type.
state of the reaction entry is invalid. After the operation, the accumulated probe duration is checked against the threshold range. If the total number of threshold violations exceeds 10 (included), the state of the entry is set to over-threshold. If it is below the lower threshold, the state of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS.
consecutive consecutive-occurrences: Checks the maximum number of consecutive probe failures. The value is in the range of 1 to 16. action-type: Specifies what action to be triggered. The default action is none. none: Specifies the action of only displaying results on the terminal display. trap-only: Specifies the action of displaying results on the terminal display and meanwhile sending SNMP trap messages to the NMS. This keyword is not available for the DNS operation.
Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. threshold-type: Specifies a threshold type. consecutive consecutive-occurrences: Checks the maximum number of consecutive probe failures, in the range of 1 to 16. action-type: Specifies what action to be triggered. trigger-only: Triggers other modules to react to certain conditions. Usage guidelines You cannot edit a reaction entry after it is created.
accumulate accumulate-occurrences: Checks the total number of threshold violations. Available value ranges include: • 1 to 15000 for the UDP jitter operation. • 1 to 60000 for the voice operation. average: Checks the packet average round-trip time. threshold-value: Specifies threshold range in milliseconds. upper-threshold: Specifies the upper limit in the range of 0 to 3600000. lower-threshold: Specifies the lower limit in the range of 0 to 3600000. It must not be greater than the upper limit.
Use undo reaction trap to restore the default. Syntax reaction trap { probe-failure cumulate-probe-failures } consecutive-probe-failures | test-complete | test-failure undo reaction trap { probe-failure | test-complete | test-failure } Default No traps are sent to the NMS.
Default When the number of consecutive probe failures reaches 3, the operation fails. Views Any NQA template view Predefined user roles network-admin Parameters count: Specifies the number of consecutive probe failures, in the range of 1 to 15. Usage guidelines If the number of consecutive probe failures for an NQA operation is reached, the NQA client notifies the feature that uses the NQA template of the operation failure.
system-view [Sysname] nqa template http httptplt [Sysname-nqatplt-http-httptplt] reaction trigger probe-pass 5 resolve-target Use resolve-target to set the domain name for the DNS operation. Use undo resolve-target to restore the default. Syntax resolve-target domain-name undo resolve-target Default No domain name is configured. Views DNS operation view, DNS template view Predefined user roles network-admin Parameters domain-name: Specifies the domain name to be resolved.
Views DNS template view Predefined user roles network-admin Parameters A: Specifies the type A queries. A type A query resolves a domain name to a mapped IPv4 address. Examples # In DNS template view, configure the domain name resolution type as A. system-view [Sysname] nqa template dns dnstplt [Sysname-nqatplt-dns-dnstplt] resolve-type A route-option bypass-route Use route-option bypass-route to enable the routing table bypass function to test the connectivity to the direct destination.
source interface Use source interface to specify the IP address of the specified interface as the source IP address of ICMP echo request packets. Use undo source interface to restore the default. Syntax source interface interface-type interface-number undo source interface Default No source IP address is specified for ICMP echo request packets. The requests take the primary IP address of the outgoing interface as their source IP address.
Syntax source ip ip-address undo source ip Default No source IP address is configured for probe packets. Views DLSw operation view, FTP operation view, HTTP operation view, ICMP echo operation view, path jitter operation view, SNMP operation view, TCP operation view, UDP echo operation view, DHCP operation view, UDP jitter operation view, voice operation view, any NQA template view Predefined user roles network-admin Parameters ip-address: Specifies the source IP address of the operation.
Views SNMP operation view, UDP echo operation view, UDP jitter operation view, voice operation view, DNS template view Predefined user roles network-admin Parameters port-number: Specifies the source port number in the range of 1 to 65535. Examples # Configure port 8000 as the source port for probe packets in the UDP echo operation.
[Sysname-nqa-admin-test-icmp-echo] statistics hold-time 3 statistics interval Use statistics interval to configure the interval for collecting statistics for an NQA operation. Use undo statistics interval to restore the default. Syntax statistics interval interval undo statistics interval Default The interval is 60 minutes. Views Any operation view Predefined user roles network-admin Parameters interval: Specifies the interval in minutes, in the range of 1 to 35791394.
Predefined user roles network-admin Parameters number: Specifies the maximum number of statistics groups, in the range of 0 to 100. To disable statistics collection, set the value to 0. Usage guidelines When the maximum number of statistics groups is reached and a new statistics group is to be saved, the earliest statistics group is deleted. Examples # Configure the NQA to save up to 5 statistics groups for the ICMP operation.
undo tos Default The ToS value in the IP packet header of probe packets is 0. Views Any operation view, any NQA template view Predefined user roles network-admin Parameters value: Specifies the ToS value in the IP packet header, in the range of 0 to 255. Examples # Configure the ToS value in an IP packet header of probe packets as 1.
Examples # Configure the TTL for probe packets as 16. system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] ttl 16 # In ICMP template view, configure the TTL for probe packets as 16. system-view [Sysname] nqa template icmp icmptplt [Sysname-nqatplt-icmp-icmptplt] ttl 16 type Use type to specify the operation type of the NQA operation and enter operation type view.
[Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] url Use url to specify the URL of the destination HTTP or FTP server. Use undo url to remove the URL. Syntax url url undo url Views FTP operation view, HTTP operation view, FTP template view, HTTP template view Predefined user roles network-admin Parameters url: Specifies the URL of the destination server, a case-sensitive string of 1 to 255 characters. Spaces and question marks (?) are not allowed.
Use undo username to remove the configuration. Syntax username username undo username Default No FTP or HTTP login username is configured. Views FTP operation view, HTTP operation view, FTP template view, HTTP template view Predefined user roles network-admin Parameters username: Specifies the username string. It is a case-sensitive string of 1 to 32 characters.
Predefined user roles network-admin Parameters v1.0: Uses HTTP version 1.0. v1.1: Uses HTTP version 1.1. Examples # Configure the HTTP operation to use the HTTP version 1.1. system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] version v1.1 NQA server commands IMPORTANT: Configure the NQA server only for UDP jitter, TCP, UDP echo, and voice operations. display nqa server Use display nqa server status to display NQA server status.
Table 38 Command output Field Description tcp-connect Information about the TCP listening service on the NQA server. udp-echo Information about the UDP listening service on the NQA server. IP Address IP address specified for the TCP/UDP listening service on the NQA server. Port Port number specified for the TCP/UDP listening service on the NQA server. nqa server enable Use nqa server enable to enable the NQA server. Use undo nqa server enable to disable the NQA server.
Syntax nqa server tcp-connect ip-address port-number [ tos tos ] undo nqa server tcp-connect ip-address port-number Views System view Predefined user roles network-admin Parameters ip-address: Specifies the IP address for the TCP listening service. port-number: Specifies the port number for the TCP listening service, in the range of 1 to 65535. tos: Specifies the ToS value in the IP packet header of NQA probe packets. The value range is 0 to 255 and the default value is 0.
Predefined user roles network-admin Parameters ip-address: Specifies the IP address for the UDP listening service. port-number: Specifies the port number for the UDP listening service, in the range of 1 to 65535. tos: Specifies the ToS value in the IP packet header of NQA probe packets. The value range is 0 to 255 and the default value is 0. Usage guidelines Use this command on the NQA server for only the UDP jitter, UDP echo, and voice operations.
NETCONF commands xml Use xml to enter XML view. Syntax xml Views User view Predefined user roles network-admin network-operator Usage guidelines In XML view, you can use NETCONF messages to configure the device or obtain data from the device. NETCONF operations you can perform depend on the user roles you have, as shown in Table 39.
rams:netconf:base:1.1urn:ietf:params:netconf:writable-runnin gurn:ietf:params:netconf:capability:notification:1.0urn:ietf:params:netconf:capability:validate:1.1urn:ietf:params:netconf:capability:interleave:1.0urn:iet f:params:netconf:capability:hp-netconf-ext:1.01]]>]]> # Quit XML view.
Views System view Predefined user roles network-admin Usage guidelines This command enables the device to resolve NETCONF messages that are encapsulated with SOAP in HTTPS packets. Examples # Enable NETCONF over SOAP over HTTPS.
Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.
Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown. Italic Italic text represents arguments that you replace with actual values. [] Square brackets enclose syntax choices (keywords or arguments) that are optional. { x | y | ... } Braces enclose a set of required syntax choices separated by vertical bars, from which you select one.
Network topology icons Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features. Represents an access controller, a unified wired-WLAN module, or the switching engine on a unified wired-WLAN switch. Represents an access point. Represents a mesh access point.
Index ACDEFHILMNOPRSTUVWX display snmp-agent trap queue,73 A display snmp-agent trap-list,74 advantage-factor,122 display snmp-agent usm-user,74 C display sntp sessions,28 codec-type,122 Documents,192 D E data-fill,123 enable log updown,39 data-size,124 enable snmp trap updown,76 debugging,1 expect data,143 description (any NQA operation type view),125 expect ip,145 destination ip,126 expect status,144 destination port,126 F diagnostic-logfile save,33 filename,145 display debugging,
info-center synchronous,52 ntp-service source,24 info-center timestamp,53 ntp-service unicast-peer,25 info-center timestamp loghost,54 ntp-service unicast-server,26 info-center trace-logfile quota,54 O L operation (FTP operation view),154 logfile save,55 operation (HTTP operation view),155 lsr-path,149 P M password,155 mirroring-group,103 ping,2 mirroring-group mirroring-cpu,104 probe count,156 mirroring-group mirroring-port (interface view),105 probe packet-interval,157 mirroring-grou
snmp-agent calculate-password,77 source ip,176 snmp-agent community,78 source port,177 snmp-agent community-map,80 statistics hold-time,178 snmp-agent context,81 statistics interval,179 snmp-agent group,82 statistics max-group,179 snmp-agent local-engineid,84 Subscription service,192 snmp-agent log,85 T snmp-agent mib-view,85 target-only,180 snmp-agent packet max-size,87 terminal debugging,56 snmp-agent port,87 terminal logging level,57 snmp-agent remote,88 terminal monitor,57 snmp-age