HP MSR2000/3000/4000 Router Series Network Management and Monitoring Command Reference (V7) Part number: 5998-4020 Software version: CMW710-R0007P02 Document version: 6PW100-20130927
Legal and notice information © Copyright 2013 Hewlett-Packard Development Company, L.P. No part of this documentation may be reproduced or transmitted in any form or by any means without prior written consent of Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Contents Ping, tracert, and system debugging commands······································································································· 1 debugging ································································································································································· 1 display debugging ··················································································································································· 2 ping ······
reaction checked-element mos ····························································································································· 54 reaction checked-element { owd-ds | owd-sd } ·································································································· 55 reaction checked-element packet-loss ·················································································································· 56 reaction checked-element probe-duration ············
ntp-service ntp-service ntp-service ntp-service ntp-service ntp-service ntp-service ntp-service max-dynamic-sessions ······················································································································ 107 multicast-client ··································································································································· 107 multicast-server ·····································································································
RMON commands ·················································································································································· 164 display rmon alarm ············································································································································· 164 display rmon event ·············································································································································· 166 display rmon eve
sflow sflow sflow sflow sflow flow collector·············································································································································· 219 flow max-header ········································································································································ 219 sampling-mode ·········································································································································· 220 sampli
event cli ································································································································································ 258 event hotplug ······················································································································································· 259 event interface ····················································································································································· 2
Websites······························································································································································· 321 Conventions ·································································································································································· 322 Index ··························································································································································
Ping, tracert, and system debugging commands debugging Use debugging to enable debugging for a specific module. Use undo debugging to disable debugging for a specific module. Syntax debugging { all [ timeout time ] | module-name [ option ] } undo debugging { all | module-name [ option ] } Default Debugging functions are disabled for all modules. Views User view Predefined user roles network-admin Parameters all: Enables all debugging functions.
display debugging Use display debugging to display the enabled debugging functions. Syntax display debugging [ module-name ] Views Any view Predefined user roles network-admin network-operator Parameters module-name: Displays the debugging settings of the specified module. To display the current module name, use the display debugging ? command. Examples # Display all enabled debugging functions.
-h ttl: Specifies the TTL value for an ICMP echo request. The ttl argument is in the range of 1 to 255. The default value is 255. -i interface-type interface-number: Specifies the ICMP echo request sending interface by its type and number. If this option is not provided, the ICMP echo request sending interface is determined by searching the routing table or forwarding table according to the destination IP address. -m interval: Specifies the interval (in milliseconds) to send an ICMP echo request.
56 bytes from 1.1.2.2: icmp_seq=2 ttl=254 time=1.996 ms 56 bytes from 1.1.2.2: icmp_seq=3 ttl=254 time=1.963 ms 56 bytes from 1.1.2.2: icmp_seq=4 ttl=254 time=1.991 ms --- Ping statistics for 1.1.2.2 --5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 1.963/2.028/2.137/0.062 ms # Test whether the device with an IP address of 1.1.2.2 in VPN 1 is reachable. ping -vpn-instance vpn1 1.1.2.2 Ping 1.1.2.2 (1.1.2.
Table 1 Command output Field Description Ping 1.1.2.2 (1.1.2.2): 56 data bytes, press escape sequence to break Test whether the device with IP address 1.1.2.2 is reachable. There are 56 data bytes in each ICMP echo request. Press the break key sequence combination (Ctrl+C by default) to abort the ping operation. Received ICMP echo replies from the device whose IP address is 1.1.2.2. If no echo reply is received during the timeout period, no information is displayed. 56 bytes from 1.1.2.
-m interval: Specifies the interval (in milliseconds) to send an ICMPv6 echo reply. The interval argument is in the range of 1 to 65535. The default value is 1000. -q: Displays only statistics. If this keyword is not specified, all information including the statistics is displayed. -s packet-size: Specifies length (in bytes) of an ICMPv6 echo request (not including the IPv6 packet header and the ICMPv6 packet header). The packet-size argument is in the range of 20 to 8100. The default value is 56.
Ping6(56 data bytes) 2001::1 --> 2001::2, press escape sequence to break --- Ping6 statistics for 2001::2 --5 packet(s) transmitted, 5 packet(s) received, 0.0% packet loss round-trip min/avg/max/std-dev = 4.000/25.000/62.000/20.000 ms # Test whether the IPv6 address (2001::2) is reachable. Detailed ping information is displayed. ping ipv6 –v 2001::2 Ping6(56 data bytes) 2001::1 --> 2001::2, press escape sequence to break 56 bytes from 2001::2, icmp_seq=0 hlim=64 dst=2001::1 idx=3 time=62.
tracert Use tracert to trace the path the packets traverse from source to destination. Syntax tracert [ -a source-ip | -f first-ttl | -m max-ttl | -p port | -q packet-number | -t tos | -vpn-instance vpn-instance-name | -w timeout ] * host Views Any view Predefined user roles network-admin Parameters -a source-ip: Specifies the source IP address of a tracert packet. It must be a valid IP address configured on the device.
Examples # Display the path that the packets traverse from source to destination (1.1.2.2). tracert 1.1.2.2 traceroute to 1.1.2.2(1.1.2.2), 30 hops at most, 40 bytes each packet, press escape sequence to break 1 1.1.1.2 673 ms 425 ms 30 ms 2 1.1.2.2 580 ms 470 ms 80 ms # Trace the path to destination (192.168.0.46) over an MPLS network. tracert 192.168.0.46 traceroute to 192.168.0.46(192.168.0.46), 30 hops at most, 40 bytes each packet, press escape sequence to break 1 192.0.2.
Syntax tracert ipv6 [ -f first-hop | -m max-hops | -p port | -q packet-number | -t traffic-class | -vpn-instance vpn-instance-name | -w timeout ] * host Views Any view Predefined user roles network-admin Parameters -f first-hop: Specifies the first hoplimit (the allowed number of hops for the first packet). The first-hop argument is in the range of 1 to 255. The default value is 1. The first hoplimit must be less than the value of the max-hops argument.
2 2001:2::2 0.861 ms 0.718 ms 0.679 ms 3 2001:3::2 0.822 ms 0.731 ms 0.708 ms Table 4 Command output Field Description traceroute to 2001:3::2 Display the route that the IPv6 packets traverse from the current device to the device whose IP address is 2001:3:2. hops at most Maximum number of hops of the probe packets, which can be set by the -m keyword. byte packets Number of bytes of a probe packet. 1 2001:1::2 0.661 ms 0.618 ms 0.
NQA commands NQA client commands advantage-factor Use advantage-factor to configure the advantage factor that is used to count Mean Opinion Scores (MOS) and Calculated Planning Impairment Factor (ICPIF) values. Use undo advantage-factor to restore the default. Syntax advantage-factor factor undo advantage-factor Default The advantage factor is 0. Views Voice operation view Predefined user roles network-admin Parameters factor: Specifies the advantage factor in the range of 0 to 20.
Syntax codec-type { g711a | g711u | g729a } undo codec-type Default The codec type for the voice operation is G.711 A-law. Views Voice operation view Predefined user roles network-admin Parameters g711a: Specifies G.711 A-law codec type. g711u: Specifies G.711 μ-law codec type g729a: Specifies G.729 A-law codec type. Examples # Configure the codec type for the voice operation as g729a.
If the payload length is greater than the string length, the system fills the payload with the string cyclically until the payload is full. For example, if you configure the string as abcd and the payload size as 6 bytes, abcdab is filled. How the string is filled varies with operation types: • For the ICMP echo operation, the string fills the whole payload of an ICMP echo request.
Operation type Codec type Default size (bytes) Voice G.711 μ-law 172 Voice G.729 A-law 32 Views ICMP echo operation view, path jitter operation view, UDP echo operation view, UDP jitter operation view, voice operation view, ICMP template view Predefined user roles network-admin Parameters size: Specifies the size of the payload in each probe packet in bytes. Available value ranges include: • 20 to 8100 for probe packets of the ICMP echo or UDP echo operation.
Examples # Configure the description for an NQA operation as icmp-probe. system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] description icmp-probe # In ICMP template view, configure the description for an NQA operation as icmp-probe.
Use undo destination ipv6 to remove the destination IPv6 address. Syntax destination ipv6 ipv6-address undo destination ipv6 Default No destination IPv6 address is configured for the operation. Views DNS template view, ICMP template view, TCP template view Predefined user roles network-admin Parameters ipv6-address: Specifies the destination IPv6 address for the operation. Examples # In ICMP template view, configure the destination IPv6 address for the operation as 1::1.
[Sysname-nqa-admin-test-udp-echo] destination port 9000 # In TCP template view, configure the destination port number for the UDP echo operation as 9000. system-view [Sysname] nqa template tcp tcptplt [Sysname-nqatplt-tcp-tcptplt] destination port 9000 display nqa history Use display nqa history to display the history records of NQA operations.
Table 6 Command output Field Description Index History record ID. Response Round-trip time if the operation succeeds, timeout time upon timeout, or 0 if the operation cannot be completed, in milliseconds. Status of the operation result: Status Time • • • • Succeeded. Unknown error. Internal error. Timeout. Time when the operation was completed. display nqa reaction counters Use display nqa reaction counters to display the current monitoring results of reaction entries.
Index Checked Element Threshold Type Checked Num Over-threshold Num 1 probe-duration accumulate 12 4 2 probe-duration average - - 3 probe-duration consecutive 160 56 4 probe-fail accumulate 12 0 5 probe-fail consecutive 162 2 Table 7 Command output Field Description Index ID of a reaction entry. Checked Element Monitored performance metric. Threshold Type Threshold type. Checked Num Number of targets that have been monitored for data collection.
Monitored performance metric Threshold type Collect data in Checked Num Over-threshold Num MOS N/A N/A N/A N/A display nqa result Use display nqa result to display the most recent result of the specified NQA operation. Syntax display nqa result [ admin-name operation-tag ] Views Any view Predefined user roles network-admin network-operator Parameters admin-name operation-tag: Displays the most recent result of an NQA operation.
Last packet received time: 2011-05-29 10:56:38.
Positive SD number: 0 Positive DS number: 0 Positive SD sum: 0 Positive DS sum: 0 Positive SD average: 0 Positive DS average: 0 Positive SD square-sum: 0 Positive DS square-sum: 0 Min negative SD: 0 Min negative DS: 0 Max negative SD: 0 Max negative DS: 0 Negative SD number: 0 Negative DS number: 0 Negative SD sum: 0 Negative DS sum: 0 Negative SD average: 0 Negative DS average: 0 Negative SD square-sum: 0 Negative DS square-sum: 0 One way results: Max SD delay: 0 Max DS delay: 0 Min S
Receive response times: 10 Min/Max/Average round trip time: 1/1/1 Square-Sum of round trip time: 10 Extended Results: Packet loss ratio: 0% Failures due to timeout: 0 Failures due to internal error: 0 Failures due to other errors: 0 Packets out of sequence: 0 Packets arrived late: 0 Path-Jitter Results: Jitter number: 9 Min/Max/Average jitter: 0/0/0 Positive jitter number: 0 Min/Max/Average positive jitter: 0/0/0 Sum/Square-Sum positive jitter: 0/0 Negative jitter number: 0 Min/Max/Average negative jitter:
Field Description RTT number Number of response packets received. Min positive SD Minimum positive jitter from source to destination. Min positive DS Minimum positive jitter from destination to source. Max positive SD Maximum positive jitter from source to destination. Max positive DS Maximum positive jitter from destination to source. Positive SD number Number of positive jitters from source to destination. Positive DS number Number of positive jitters from destination to source.
Field Description Number of DS delay Number of delays from destination to source. Sum of SD delay Sum of delays from source to destination. Sum of DS delay Sum of delays from destination to source. Square-Sum of SD delay Square sum of delays from source to destination. Square-Sum of DS delay Square sum of delays from destination to source. SD lost packets Number of lost packets from the source to the destination. DS lost packets Number of lost packets from the destination to the source.
Parameters admin-name operation-tag: Displays the statistics for an NQA operation. The admin-name argument represents the name of the administrator who creates the NQA operation, and the operation-tag argument represents the operation tag. Each of the arguments is a case-insensitive string of 1 to 32 characters that cannot contain hyphens (-). If these two arguments are not specified, the command displays statistics for all NQA operations.
RTT number: 550 Min positive SD: 1 Min positive DS: 1 Max positive SD: 7 Max positive DS: 1 Positive SD number: 220 Positive DS number: 97 Positive SD sum: 283 Positive DS sum: 287 Positive SD average: 1 Positive DS average: 2 Positive SD square-sum: 709 Positive DS square-sum: 1937 Min negative SD: 2 Min negative DS: 1 Max negative SD: 10 Max negative DS: 1 Negative SD number: 81 Negative DS number: 94 Negative SD sum: 556 Negative DS sum: 191 Negative SD average: 6 Negative DS average
Max positive SD: 10 Max positive DS: 1 Positive SD number: 3 Positive DS number: 2 Positive SD sum: 18 Positive DS sum: 2 Positive SD average: 6 Positive DS average: 1 Positive SD square-sum: 134 Positive DS square-sum: 2 Min negative SD: 3 Min negative DS: 1 Max negative SD: 9 Max negative DS: 1 Negative SD number: 4 Negative DS number: 2 Negative SD sum: 25 Negative DS sum: 2 Negative SD average: 6 Negative DS average: 1 Negative SD square-sum: 187 Negative DS square-sum: 2 One way r
Min/Max/Average positive jitter: 0/0/0 Sum/Square-Sum positive jitter: 0/0 Negative jitter number: 0 Min/Max/Average negative jitter: 0/0/0 Sum/Square-Sum negative jitter: 0/0 Hop IP 192.168.50.
Field Description Packets out of sequence Number of failures due to out-of-sequence packets. Packets arrived late Number of response packets received after a probe times out. UDP-jitter results UDP jitter operation results, available only in UDP jitter operation. Voice results Voice operation results, available only in voice operation. RTT number Number of response packets received. Min positive SD Minimum positive jitter from source to destination.
Field Description One way results Uni-direction delay result, available only in the UDP Jitter and voice operation. Max SD delay Maximum delay from source to destination. Max DS delay Maximum delay from destination to source. Min SD delay Minimum delay from source to destination. Min DS delay Minimum delay from destination to source. Number of SD delay Number of delays from source to destination. Number of DS delay Number of delays from destination to source.
Field Description Min/Max/Average positive jitter Minimum/maximum/average positive jitter in milliseconds, available only in the path jitter operation. Sum/Square-Sum positive jitter Sum/square sum of positive jitters, available only in the path jitter operation. Negative jitter number Number of negative jitters, available only in the path jitter operation. Min/Max/Average negative jitter Minimum/maximum/average negative jitter in milliseconds, available only in the path jitter operation.
Related commands statistics interval expect data Use expect data to configure the expected data. Use undo expect data to restore the default. Syntax expect data expression [ offset number ] undo expect data Default No expected data is configured. Views HTTP template view, TCP template view Predefined user roles network-admin Parameters expression: Specifies the expected data, a case-sensitive string of 1 to 200 characters.
undo expect status [ status-list ] Default No expected status code is configured. Views HTTP template view Predefined user roles network-admin Parameters status-list: Specifies a space-separated list of up to 10 status codes. The value range for status-num is 0 to 999, and status-num2 cannot be smaller than status-num1. Examples # In HTTP template view, configure the expected status codes 200, 300, and 400 to 500.
expect ipv6 Use expect ipv6 to specify the expected IPv6 address. Use undo expect ipv6 to remove all expected IPv6 addresses. Syntax expect ipv6 ipv6-address undo expect ipv6 Default No expected IPv6 address is configured. Views DNS template view Predefined user roles network-admin Parameters ip-address: Specifies the expected IPv6 address for a DNS echo request. Usage guidelines During a DNS operation, the NQA client compares the expected IPv6 address with the IPv6 address resolved by the DNS server.
Parameters filename: Specifies the name of a file, a case-sensitive string of 1 to 200 characters that cannot contain slashes (/). Examples # Specify the file to be uploaded to the FTP server from the FTP client as config.txt. system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type ftp [Sysname-nqa-admin-test-ftp] filename config.txt # In FTP template view, specify the file to be uploaded to the FTP server from the FTP client as config.txt.
[Sysname-nqa-admin-test-icmp-echo] frequency 1000 # In DNS template view, configure the DNS operation to repeat at an interval of 1000 milliseconds. system-view [Sysname] nqa template dns dnstplt [Sysname-nqatplt-dns-dnstplt] frequency 1000 history-record enable Use history-record enable to enable the saving of history records for the NQA operation. Use undo history-record enable to disable the saving of history records.
Default The history records of an NQA operation are kept for 120 minutes. Views DHCP operation view, DLSw operation view, DNS operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation view, UDP echo operation view Predefined user roles network-admin Parameters keep-time: Specifies how long the history records can be saved. The value is in the range of 1 to 1440 minutes. Usage guidelines When an NQA operation completes, the timer starts.
Usage guidelines If the number of history records for an NQA operation exceeds the maximum number, earliest history records are removed. Examples # Set the maximum number of history records for an NQA operation to 10. system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] history-record number 10 lsr-path Use lsr-path to set a loose source routing (LSR) path. Use undo lsr-path to restore the default.
Syntax mode { active | passive } undo mode Default The data transmission mode of active is used by the FTP operation. Views FTP operation view, FTP template view Predefined user roles network-admin Parameters active: Sets the data transmission mode to active. The FTP server initiates a connection request. passive: Sets the data transmission mode to passive. The FTP client initiates a connection request. Examples # Set the data transmission mode to passive for the FTP operation.
Examples # Specify the next hop IP address as 10.1.1.1 for the ICMP echo operation. system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] next-hop 10.1.1.1 nqa Use nqa to create an NQA operation and enter its view. Use undo nqa to remove the operation. Syntax nqa entry admin-name operation-tag undo nqa { all | entry admin-name operation-tag } Default No NQA operation is created.
Syntax nqa template { dns | ftp | http | icmp | tcp } name undo nqa template { dns | ftp | http | icmp | tcp } name Default No NQA template is created. Views System view Predefined user roles network-admin Parameters name: Specifies the name of the NQA template, a case-insensitive string of 1 to 31 characters. Examples # Create an ICMP template named icmptplt, and enter its view.
nqa schedule Use nqa schedule to configure the scheduling parameters for an NQA operation. Use undo nqa schedule to stop the operation. Syntax nqa schedule admin-name operation-tag start-time { hh:mm:ss [ yyyy/mm/dd | mm/dd/yyyy ] | now } lifetime { lifetime | forever } [ recurring ] undo nqa schedule admin-name operation-tag Default No schedule is configured for an NQA operation.
Related commands • destination ip • nqa entry • type operation (FTP operation view) Use operation to specify the operation type for the FTP operation. Use undo operation to restore the default. Syntax operation { get | put } undo operation Default The FTP operation type is get. Views FTP operation view, FTP template view Predefined user roles network-admin Parameters get: Gets a file from the FTP server. put: Transfers a file to the FTP server.
operation (HTTP operation view) Use operation to specify the operation type for the HTTP operation. Use undo operation to restore the default. Syntax operation { get | post | raw } undo operation Default The HTTP operation type is get. Views HTTP operation view, HTTP template view Predefined user roles network-admin Parameters get: Gets data from the HTTP server. post: Transfers data to the HTTP server. raw: Sends the HTTP request specified by the raw-request command to the HTTP server.
Default No FTP or HTTP login password is configured. Views FTP operation view, HTTP operation view, FTP template view, HTTP template view Predefined user roles network-admin Parameters cipher: Sets a ciphertext password. simple: Sets a plaintext password. password: Specifies the password string. This argument is case sensitive. Valid characters include letters, digits, exclamation marks (!), dollar signs ($), asterisks (*), brackets (()), underscores (_), quotation marks ('), comma (,), dots (.
Views DHCP operation view, DNS operation view, DLSw operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation, UDP echo operation view Predefined user roles network-admin Parameters times: Specifies the probe times in the range of 1 to 15. Usage guidelines The following describes how different types of NQA operations operate: • A TCP or DLSw operation sets up a connection. • A UDP jitter or voice operation sends a number of probe packets.
Views Path jitter operation view, UDP jitter operation view, voice operation view Predefined user roles network-admin Parameters packet-interval: Specifies the interval for sending packets, in the range of 10 to 60000 milliseconds. Examples # Configure the UDP jitter operation to send packets at an interval of 100 milliseconds.
probe packet-timeout Use probe packet-timeout to configure the timeout time for waiting for a response in the UDP jitter, path jitter, or voice operation. Use undo probe packet-timeout to restore the default. Syntax probe packet-timeout packet-timeout undo probe packet-timeout Default The response timeout time in the UDP jitter or path jitter operation is 3000 milliseconds, and the response timeout time in the voice operation is 5000 milliseconds.
Parameters timeout: Specifies the probe timeout time in milliseconds. The available value ranges include: • 10 to 86400000 for the FTP or HTTP operation. • 10 to 3600000 for the DHCP, DNS, DLSw, ICMP echo, SNMP, TCP, or UDP echo operation. Usage guidelines If a probe does not complete within the period, the probe is timed out. Examples # Set the probe timeout time for the DHCP operation to 10000 milliseconds.
# In HTTP template view, enter raw request view and specify the content of a request for the HTTP operation. system-view [Sysname] nqa template http httptplt [Sysname-nqatplt-http-httptplt] raw-request [Sysname-nqatplt-http-httptplt-raw-request] reaction checked-element icpif Use reaction checked-element icpif to configure a reaction entry for monitoring the ICPIF value in the voice operation. Use undo reaction to delete the specified reaction entry.
below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS. system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type voice [Sysname-nqa-admin-test-voice] reaction 1 checked-element icpif threshold-value 50 5 action-type trap-only reaction checked-element { jitter-ds | jitter-sd } Use reaction checked-element { jitter-ds | jitter-sd } to configure a reaction entry for monitoring one-way jitter in the NQA operation.
trap-only: Specifies the action of displaying results on the terminal display and meanwhile sending SNMP trap messages to the NMS. Usage guidelines You cannot edit a reaction entry after it is created. To change the attributes in a reaction entry, use undo reaction to delete the entry first and reconfigure a new one. Only successful probe packets are monitored. Statistics about failed probe packets are not collected.
Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. threshold-value: Specifies threshold range. upper-threshold: Specifies the upper limit in the range of 1 to 500. lower-threshold: Specifies the lower limit in the range of 1 to 500. It must not be greater than the upper limit. action-type: Specifies what action to be triggered. The default action is none. none: Specifies the action of only displaying results on the terminal display.
Views UDP jitter operation view, voice operation view Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. owd-ds: Specifies the destination-to-source delay of each probe packet as the monitored element. owd-sd: Specifies the source-to-destination delay of each probe packet as the monitored element. threshold-value: Specifies threshold range in milliseconds. upper-threshold: Specifies the upper limit in the range of 0 to 3600000.
Default No reaction entry for monitoring packet loss is configured. Views UDP jitter operation view, voice operation view Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. threshold-type: Specifies a threshold type. accumulate accumulate-occurrences: Specifies the maximum number of lost packets in the operation. The value is in the range of 1 to 15000 for the UDP jitter operation and 1 to 60000 for the voice operation.
Default No reaction entry for monitoring the probe duration is configured. Views DHCP operation view, DLSw operation view, DNS operation view, FTP operation view, HTTP operation view, ICMP echo operation view, SNMP operation view, TCP operation view, UDP echo operation view, Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. threshold-type: Specifies a threshold type.
state of the reaction entry is invalid. After the operation, the accumulated probe duration is checked against the threshold range. If the total number of threshold violations exceeds 10 (included), the state of the entry is set to over-threshold. If it is below the lower threshold, the state of the entry is set to below-threshold. Once the state of the reaction entry changes, a trap message is generated and sent to the NMS.
consecutive consecutive-occurrences: Checks the maximum number of consecutive probe failures. The value is in the range of 1 to 16. action-type: Specifies what action to be triggered. The default action is none. none: Specifies the action of only displaying results on the terminal display. trap-only: Specifies the action of displaying results on the terminal display and meanwhile sending SNMP trap messages to the NMS. This keyword is not available for the DNS operation.
Predefined user roles network-admin Parameters item-number: Assigns an ID to the reaction entry, in the range of 1 to 10. threshold-type: Specifies a threshold type. consecutive consecutive-occurrences: Checks the maximum number of consecutive probe failures, in the range of 1 to 16. action-type: Specifies what action to be triggered. trigger-only: Triggers other modules to react to certain conditions. Usage guidelines You cannot edit a reaction entry after it is created.
accumulate accumulate-occurrences: Checks the total number of threshold violations. Available value ranges include: • 1 to 15000 for the UDP jitter operation. • 1 to 60000 for the voice operation. average: Checks the packet average round-trip time. threshold-value: Specifies threshold range in milliseconds. upper-threshold: Specifies the upper limit in the range of 0 to 3600000. lower-threshold: Specifies the lower limit in the range of 0 to 3600000. It must not be greater than the upper limit.
Use undo reaction trap to restore the default. Syntax reaction trap { probe-failure cumulate-probe-failures } consecutive-probe-failures | test-complete | test-failure undo reaction trap { probe-failure | test-complete | test-failure } Default No traps are sent to the NMS.
Default When the number of consecutive probe failures reaches 3, the operation fails. Views Any NQA template view Predefined user roles network-admin Parameters count: Specifies the number of consecutive probe failures, in the range of 1 to 15. Usage guidelines If the number of consecutive probe failures for an NQA operation is reached, the NQA client notifies the feature that uses the NQA template of the operation failure.
system-view [Sysname] nqa template http httptplt [Sysname-nqatplt-http-httptplt] reaction trigger probe-pass 5 resolve-target Use resolve-target to set the domain name for the DNS operation. Use undo resolve-target to restore the default. Syntax resolve-target domain-name undo resolve-target Default No domain name is configured. Views DNS operation view, DNS template view Predefined user roles network-admin Parameters domain-name: Specifies the domain name to be resolved.
Views DNS template view Predefined user roles network-admin Parameters A: Specifies the type A queries. A type A query resolves a domain name to a mapped IPv4 address. AAAA: Specifies the type AAAA queries. A type AAAA query resolves a domain name to a mapped IPv6 address. Examples # In DNS template view, configure the domain name resolution type as AAAA.
source interface Use source interface to configure the source interface for ICMP echo request packets. Use undo source interface to restore the default. Syntax source interface interface-type interface-number undo source interface Default No source interface is configured for ICMP echo request packets. Views ICMP echo operation view Predefined user roles network-admin Parameters interface-type interface-number: Specifies an interface by its type and number.
Views DLSw operation view, FTP operation view, HTTP operation view, ICMP echo operation view, path jitter operation view, SNMP operation view, TCP operation view, UDP echo operation view, DHCP operation view, UDP jitter operation view, voice operation view, any NQA template view Predefined user roles network-admin Parameters ip-address: Specifies the source IP address of the operation.
Predefined user roles network-admin Parameters ipv6-address: Specifies the source IPv6 address of the operation. Usage guidelines If you configure both the source interface command and the source ipv6 command, the source ipv6 command takes effect. If you configure the source interface command but not the source ipv6 command for the ICMP echo operation, the IPv6 address of the source interface serves as the source IPv6 address of the probe packet.
[Sysname-nqa-admin-test-udp-echo] source port 8000 # In DNS template view, configure port 8000 as the source port for probe packets in the DNS operation. system-view [Sysname] nqa template dns dnstplt [Sysname-nqatplt-dns-dnstplt] source port 8000 statistics hold-time Use statistics hold-time to configure the hold time of statistics groups for an NQA operation. Use undo statistics hold-time to restore the default.
Views Any operation view Predefined user roles network-admin Parameters interval: Specifies the interval in minutes, in the range of 1 to 35791394. Usage guidelines NQA collects statistics for operations completed within a specific period. The statistics form a statistics group. To view information about the statistics groups, use the display nqa statistics command. Examples # Configure the system to collect the ICMP echo operation statistics at 2-minute intervals.
[Sysname-nqa-admin-test-icmp-echo] statistics max-group 5 target-only Use target-only to perform the path jitter operation on destination only. Use undo target-only to restore the default. Syntax target-only undo target-only Default NQA performs the path jitter operation to the destination hop by hop. Views Path jitter operation view Predefined user roles network-admin Examples # Perform the path jitter operation on the destination address only.
system-view [Sysname] nqa entry admin test [Sysname-nqa-admin-test] type icmp-echo [Sysname-nqa-admin-test-icmp-echo] tos 1 # In ICMP template view, configure the ToS value in an IP packet header of probe packets as 1. system-view [Sysname] nqa template icmp icmptplt [Sysname-nqatplt-icmp-icmptplt] tos 1 ttl Use ttl to specify the TTL for probe packets. Use undo ttl to restore the default. Syntax ttl value undo ttl Default The TTL for probe packets is 20.
type Use type to specify the operation type of the NQA operation and enter operation type view. Syntax type { dhcp | dlsw | dns | ftp | http | icmp-echo | path-jitter | snmp | tcp | udp-echo | udp-jitter | voice } Default No operation type is specified. Views NQA operation view Predefined user roles network-admin Parameters dhcp: Specifies the DHCP operation type. dlsw: Specifies the DLSw operation type. dns: Specifies the DNS operation type. ftp: Specifies the FTP operation type.
undo url Views FTP operation view, HTTP operation view, FTP template view, HTTP template view Predefined user roles network-admin Parameters url: Specifies the URL of the destination server, a case-sensitive string of 1 to 255 characters. Spaces and question marks (?) are not allowed. The following table describes the URL format and parameters for different operations.
Predefined user roles network-admin Parameters username: Specifies the username string. It is a case-sensitive string of 1 to 32 characters. Valid characters include letters, digits, exclamation marks (!), dollar signs ($), asterisks (*), brackets (()), underscores (_), quotation marks ('), comma (,), dots (.), and hyphens (-). Examples # Set the FTP login username to administrator.
[Sysname-nqa-admin-test] type http [Sysname-nqa-admin-test-http] version v1.1 vpn-instance Use vpn-instance to apply the operation to the specified VPN. Use undo vpn-instance to restore the default. Syntax vpn-instance vpn-instance-name undo vpn-instance Default The operation applies to the public network.
Syntax display nqa server Views Any view Predefined user roles network-admin network-operator Examples # Display NQA server status. display nqa server nqa server is: enabled tcp-connect: IP Address Port Vpn-instance 2.2.2.2 2000 - IP Address Port Vpn-instance 3.3.3.3 3000 vpn1 udp-echo: Table 12 Command output Field Description tcp-connect Information about the TCP listening service on the NQA server. udp-echo Information about the UDP listening service on the NQA server.
Examples # Enable the NQA server. system-view [Sysname] nqa server enable Related commands • display nqa server • nqa server tcp-connect • nqa server udp-echo Related commands • display nqa server • nqa server enable nqa server tcp-connect Use nqa server tcp-connect to configure a TCP listening service to enable the NQA server to listen and respond to the specified IP address and port. Use undo nqa server tcp-connect to remove a TCP listening service.
Examples # Configure a TCP listening service to enable the NQA server to listen and respond to the IP address 169.254.10.2 and port 9000. system-view [Sysname] nqa server tcp-connect 169.254.10.2 9000 Related commands • display nqa server • nqa server enable nqa server udp-echo Use nqa server udp-echo to configure a UDP listening service to enable the NQA server to listen and respond on the specified IP address and port.
system-view [Sysname] nqa server udp-echo 169.254.10.
NTP commands display ntp-service ipv6 sessions Use display ntp-service ipv6 sessions to display information about all IPv6 NTP associations. Syntax display ntp-service ipv6 sessions [ verbose ] Views Any view Predefined user roles network-admin network-operator Parameters verbose: Displays detailed information about all IPv6 NTP associations. If you do not specify this keyword, the command displays only brief information about the IPv6 NTP associations.
Field Description Reference clock ID of the NTP server: • If the reference clock is the local clock, the value of this field is related to the value of the Clock stratum field: { { Reference { When the value of the Clock stratum field is 0 or 1, this field displays Local. When the value of the Clock stratum field is 16, this field displays INIT. When the Clock stratum field has another value, this field displays the MD5 digest value of the first 32 bits of the IPv6 address.
Orgtime: d17cbb21.0f318106 Tue, May 17 2011 9:15:13.059 Rcvtime: 00000000.00000000 Thu, Feb 7 2036 6:28:16.000 Xmttime: 00000000.00000000 Thu, Feb 7 2036 6:28:16.000 Roundtrip delay samples: 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 Offset samples: 0.00 Filter order: 0 1 0.00 2 0.00 0.00 3 0.00 4 0.00 5 6 0.00 0.00 7 Total sessions: 1 Table 14 Command output Field Description Clock source IPv6 address of the clock source.
Field Description VPN instance VPN instance of the NTP server. If the NTP server is in a public network, the field is displayed as Not specified. Operation mode of the local device: Local mode local poll interval • • • • • • • unspec—The mode is unspecified. sym_active—Active mode. sym_passive—Passive mode. client—Client mode. server—Server mode. broadcast—Broadcast or multicast server mode. bclient—Broadcast or multicast client mode. Polling interval for the local device, in seconds.
Field Description Orgtime Originate timestamp in the NTP message. Rcvtime Receive timestamp in the NTP message. Xmttime Transmit timestamp in the NTP message. Filter order Dispersion information. Status of the local clock. The field is displayed only when you use the ntp-service refclock-master command to set the local clock as a reference clock. Reference clock status When the reach field of the local clock is 255, the field is displayed as working normally.
Table 15 Command output Field Description • When the reference clock is the local clock, the field displays LOCAL (number), which indicates that the IP address of the local clock is 127.127.1.number, where number represents the NTP process number in the range of 0 to 3. source • When the reference clock is the clock of another device, the field displays the IP address of the NTP server.
Clock source: 192.168.1.40 Session ID: 35888 Clock stratum: 2 Clock status: configured, master, sane, valid Reference clock ID: 127.127.1.0 VPN instance: Not specified Local mode: client, local poll interval: 6 Peer mode: server, peer poll interval: 6 Offset: 0.2862ms, roundtrip delay: 3.2653ms, dispersion: 4.5166ms Root roundtrip delay: 0.0000ms, root dispersion: 10.910ms Reachabilities:31, sync distance: 0.0194 Precision: 2^18, version: 3, source interface: Not specified Reftime: d17cbba5.
Field Description Reference clock ID of the NTP server: • If the reference clock is the local clock, the value of this field is related to the value of the Clock stratum field: { Reference clock ID { { When the value of the Clock stratum field is 0 or 1, this field displays LOCL. When the value of the Clock stratum field is 16, this field displays INIT. When the Clock stratum field has another value, this field displays the IP address of the local clock.
Field Description Reachabilities Reachability count of the clock source. 0 indicates that the clock source is unreachable. sync distance Synchronization distance relative to the upper-level clock, in seconds, and calculated from dispersion and roundtrip delay values. Precision Accuracy of the system clock. version NTP version in the range of 1 to 4. source interface Source interface. If the source interface is not specified, this field is Not specified.
Leap indicator: 00 Clock jitter: 0.000977 s Stability: 0.000 pps Clock precision: 2^-10 Root delay: 0.00000 ms Root dispersion: 3.96367 ms Reference time: d0c5fc32.92c70b1e Wed, Dec 29 2010 18:28:02.573 # Display the NTP service status when time is not synchronized. display ntp-service status Clock status: unsynchronized Clock stratum: 16 Reference clock ID: none Clock jitter: 0.000000 s Stability: 0.000 pps Clock precision: 2^-10 Root delay: 0.00000 ms Root dispersion: 0.
Field Description For an IPv4 NTP server: The field represents the IP address of the remote server when the local device is synchronized to a remote NTP server. The field represents the local clock when the local device uses the local clock as a reference source. • When the local clock has a stratum level of 1, this field displays Local. • When the local clock has any other stratum, this field displays the IP address of the local clock.
View Any view Predefined user roles network-admin network-operator Examples # Display brief information about each NTP server from the local device back to the primary reference source. display ntp-service trace Server 127.0.0.1 Stratum 3, jitter Server 3000::32 Stratum 2 , jitter 790.00, synch distance 0.0000. RefID 127.127.1.0 0.000, synch distance 0.0000. The output shows that server 127.0.0.
Predefined user roles network-admin Parameters peer: Allows time requests and NTP control queries (such as alarms, authentication status, and time server information) from a peer device and allows the local device to synchronize itself to a peer device. query: Allows only NTP control queries from a peer device to the local device. server: Allows time requests and NTP control queries from a peer device, but does not allow the local device to synchronize itself to a peer device.
undo ntp-service authentication enable Default NTP authentication is disabled. Views System view Predefined user roles network-admin Usage guidelines Enable NTP authentication in networks that require time synchronization security to make sure NTP clients are only synchronized to authenticated NTP servers. To authenticate an NTP server, set an authentication key and specify it as a trusted key. Examples # Enable NTP authentication.
value: Specifies the MD5 authentication key string. If simple is specified, it is a string of 1 to 32 characters. If cipher is specified, it is a string of 1 to 73 characters. Usage guidelines In a network where there is a high security demand, the NTP authentication feature must be enabled for a system running NTP. This feature enhances the network security by using client-server key authentication, which prohibits a client from synchronizing to a device that has failed the authentication.
system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] ntp-service broadcast-client Related commands ntp-service broadcast-server ntp-service broadcast-server Use ntp-service broadcast-server to configure the device to operate in NTP broadcast server mode and use the current interface to send NTP broadcast packets. Use undo ntp-service broadcast-server to remove the configuration.
Use undo ntp-server dscp to restore the default. Syntax ntp-service dscp dscp-value undo ntp-service dscp Default The DSCP value for IPv4 NTP packets is 48. Views System view Predefined user roles network-admin Parameters dscp-value: Sets a DSCP value in the range of 0 to 63 for IPv4 NTP packets. Usage guidelines The DSCP value is included in the ToS field of an IPv4 packet to identify the packet priority. Examples # Set the DSCP value for IPv4 NTP packets to 30.
ntp-service inbound disable Use ntp-service inbound disable to disable an interface from receiving NTP messages. Use undo ntp-service inbound disable to restore the default. Syntax ntp-service inbound disable undo ntp-service inbound disable Default All interfaces are enabled to receive NTP messages.
Parameters peer: Allows time requests and NTP control queries (such as alarms, authentication status, and time server information) and allows the local device to synchronize itself to a peer device. query: Allows only NTP control queries from a peer device to the local device. server: Allows time requests and NTP control queries, but does not allow the local device to synchronize itself to a peer device. synchronization: Allows only time requests from a system whose address passes the access list criteria.
Default The DSCP value for IPv6 NTP packets is 56. Views System view Predefined user roles network-admin Parameters dscp-value: Specifies a DSCP value in the range of 0 to 63 for IPv6 NTP packets. Usage guidelines The DSCP value is included in the Traffic Class field of an IPv6 packet to identify the packet priority. Examples # Set the DSCP value for IPv6 NTP packets to 30.
ntp-service ipv6 multicast-client Use ntp-service ipv6 multicast-client to configure the device to operate in IPv6 NTP multicast client mode and use the current interface to receive IPv6 NTP multicast packets. Use undo ntp-service ipv6 multicast-client to remove the configuration. Syntax ntp-service ipv6 multicast-client ipv6-multicast-address undo ntp-service ipv6 multicast-client ipv6-multicast-address Default The device does not operate in any NTP association mode.
Default The device does not operate in any NTP association mode. Views Interface view Predefined user roles network-admin Parameters ipv6-multicast-address: Specifies an IPv6 multicast IP address in the range of FFxy::/16 (FFx0::/16, FFx1::/16, FFx2::/16, and FF0y::/16 are not included), where x and y represent any hexadecimal number from 0 through F. An IPv6 multicast client and server must be configured with the same multicast address.
Parameters interface-type interface-number: Specifies an interface by its type and number. Usage guidelines If you specify the source interface for IPv6 NTP messages, the device sets the source IP address of the IPv6 NTP messages as the primary IP address of the specified interface when sending the IPv6 NTP messages. When the device responds to an IPv6 NTP request, the source IPv6 address of the NTP response is always the IPv6 address of the interface that has received the IPv6 NTP request.
vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the symmetric-passive peer belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the symmetric-passive peer is on the public network, do not specify this option. authentication-keyid keyid: Specifies the key ID to be used for sending NTP messages to the peer, where keyid is in the range of 1 to 4294967295. If this option is not specified, the local device and the peer do not authenticate each other.
Default No IPv6 NTP server is specified for the device. Views System view Predefined user roles network-admin Parameters ipv6-address: Specifies an IPv6 address of the NTP server. It must be a unicast address, rather than a multicast address. server-name: Specifies a host name of the NTP server, which is a case-insensitive string of 1 to 255 characters.
Related commands • ntp-service authentication enable • ntp-service authentication-keyid • ntp-service reliable authentication-keyid ntp-service max-dynamic-sessions Use ntp-service max-dynamic-sessions to set the maximum number of dynamic NTP sessions allowed to be established locally. Use undo ntp-service max-dynamic-sessions to restore the default. Syntax ntp-service max-dynamic-sessions number undo ntp-service max-dynamic-sessions Default The maximum number of dynamic NTP sessions is 100.
Syntax ntp-service multicast-client [ ip-address ] undo ntp-service multicast-client [ ip-address ] Default The device does not operate in any NTP association mode. View Interface view Predefined user roles network-admin Parameters ip-address: Specifies a multicast IP address in the range of 224.0.1.0 to 239.255.255.255. The default is 224.0.1.1. A multicast server and client must be configured with the same multicast IP address.
Parameters ip-address: Specifies a multicast IP address in the range of 224.0.1.0 to 239.255.255.255. The default is 224.0.1.1. A multicast server and client must be configured with the same multicast IP address. authentication-keyid keyid: Specifies the key ID to be used for sending multicast messages to multicast clients, where keyid is in the range of 1 to 4294967295. If this option is not specified, the local device cannot synchronize multicast clients enabled with NTP authentication.
Usage guidelines Usually an NTP server that gets its time from an authoritative time source, such as an atomic clock has stratum 1 and operates as the primary time server to provide time synchronization for other devices in the network. The accuracy of each server is the stratum, with the topmost level (primary servers) assigned as one and each level downwards (secondary servers) in the hierarchy assigned as one greater than the preceding level.
system-view [Sysname] ntp-service authentication enable [Sysname] ntp-service authentication-keyid 37 authentication-mode md5 BetterKey # Specify this key as a trusted key. [Sysname] ntp-service reliable authentication-keyid 37 Related commands • ntp-service authentication enable • ntp-service authentication-keyid ntp-service source Use ntp-service source to specify the source interface for NTP messages. Use undo ntp-service source to restore the default.
• If the specified source interface is down, the device searches the routing table for the outbound interface, and uses the primary IP address of the outbound interface as the source IP address for NTP messages. Examples # Specify the source interface for NTP messages as Ethernet 1/1. system-view [Sysname] ntp-service source ethernet 1/1 ntp-service unicast-peer Use ntp-service unicast-peer to specify a symmetric-passive peer for the device.
Usage guidelines When you specify a passive peer for the device, the device and its passive peer can be synchronized to each other. If their clocks are in synchronized state, the clock with a high stratum level is synchronized to the clock with a lower stratum level. To synchronize the PE to a PE or CE in a VPN, provide vpn-instance vpn-instance-name in your command.
vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the NTP server belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the NTP server is on the public network, do not specify this option. authentication-keyid keyid: Specifies the key ID to be used for sending NTP messages to the NTP server, where keyid is in the range of 1 to 4294967295. If the option is not specified, the local device and NTP server do not authenticate each other.
SNTP commands display sntp ipv6 sessions Use display sntp ipv6 sessions to display information about all IPv6 SNTP associations. Syntax display sntp ipv6 sessions Views Any view Predefined user roles network-admin network-operator Examples # Display information about all IPv6 SNTP associations. display sntp ipv6 sessions SNTP server: 2001::1 Stratum: 16 Version: 4 Last receive time: No packet was received.
Syntax display sntp sessions Views Any view Predefined user roles network-admin network-operator Examples # Display information about all SNTP associations. display sntp sessions SNTP server Stratum Version Last receive time 1.0.1.11 2 4 Tue, May 17 2011 9:11:20.833 (Synced) Table 20 Command output Field Description SNTP server SNTP server (NTP server). Stratum Stratum level of the NTP server, which determines the clock accuracy. It is in the range of 1 to 16.
Examples # Enable SNTP authentication. system-view [Sysname] sntp authentication enable Related commands • sntp authentication-keyid • sntp reliable authentication-keyid sntp authentication-keyid Use sntp authentication-keyid to set an SNTP authentication key. Use undo sntp authentication-keyid to remove the SNTP authentication key.
Examples # Set an MD5 authentication key, with the key ID of 10 and key value of BetterKey. Input the key in plain text. system-view [Sysname] sntp authentication enable [Sysname] sntp authentication-keyid 10 authentication-mode md5 simple BetterKey Related commands • sntp authentication enable • sntp reliable authentication-keyid sntp enable Use sntp enable to enable the SNTP service. Use undo sntp enable to disable the SNTP service.
Predefined user roles network-admin Parameters ipv6-address: Specifies an IPv6 address of the NTP server. server-name: Specifies a host name of the NTP server, a case-insensitive string of 1 to 255 characters. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the NTP server belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters. If the NTP server is on the public network, do not specify this option.
Syntax sntp reliable authentication-keyid keyid undo sntp reliable authentication-keyid keyid Default No trust key is specified. Views System view Predefined user roles network-admin Parameters keyid: Specifies an authentication key number in the range of 1 to 4294967295. Usage guidelines If SNTP is enabled, the SNTP client is only synchronized to an NTP server that provides a trusted key. Before you use the command, make sure SNTP authentication is enabled and an authentication key is configured.
Views System view Predefined user roles network-admin Parameters ip-address: Specifies an IP address of the NTP server. It must be a unicast address, rather than a broadcast address, a multicast address, or the IP address of the local clock. server-name: Specifies a host name of the NTP server, a case-insensitive string of 1 to 255 characters. vpn-instance vpn-instance-name: Specifies the MPLS L3VPN to which the NTP server belongs, where vpn-instance-name is a case-sensitive string of 1 to 31 characters.
SNMP commands The device supports the FIPS mode that complies with NIST FIPS 140-2 requirements. Support for features, commands, and parameters might differ in FIPS mode and non-FIPS mode. For more information about FIPS mode, see Security Configuration Guide. The SNMP agent sends notifications (traps and informs) to inform the NMS of significant events, such as link state changes and user logins or logouts. Unless otherwise stated, the trap keyword in the command line includes both traps and informs.
Community name: userv1 Group name: testv1 Storage-type: nonVolatile Table 21 Command output Field Description Community name Displays the community name created by using the snmp-agent community command or the username created by using the snmp-agent usm-user { v1 | v2c } command. SNMP group name. • If the community is created by using the snmp-agent community command, the Group name group name is the same as the community name.
Usage guidelines If no group is specified, this command displays information about all SNMP groups. Examples # Display information about all SNMP groups. display snmp-agent group Group name: groupv3 Security model: v3 noAuthnoPriv Readview: ViewDefault Writeview: Notifyview: Storage-type: nonVolatile Table 22 Command output Field Description Group name SNMP group name. Security model • authPriv—authentication with privacy.
Usage guidelines Every SNMP agent has one SNMP engine to provide services for sending and receiving messages, authenticating and encrypting messages, and controlling access to managed objects. The local SNMP engine ID uniquely identifies the SNMP engine of the SNMP agent in an SNMP domain. Examples # Display the local engine ID.
|-ieee802dot1mibs<1.0.8802.1.1>(NA) |-lldpMIB<1.0.8802.1.1.2>(NA) |-lldpNotifications<1.0.8802.1.1.2.0>(NA) |-lldpNotificationPrefix<1.0.8802.1.1.2.0.0>(NA) |-lldpRemTablesChange<1.0.8802.1.1.2.0.0.1>(NA) |-lldpObjects<1.0.8802.1.1.2.1>(NA) |-lldpConfiguration<1.0.8802.1.1.2.1.1>(NA) |-*lldpMessageTxInterval<1.0.8802.1.1.2.1.1.1>(RW) |-*lldpMessageTxHoldMultiplier<1.0.8802.1.1.2.1.1.2>(RW) |-*lldpReinitDelay<1.0.8802.1.1.2.1.1.3>(RW) Table 23 Command output Field Description -std MIB node name. <1.
|-*lldpPortConfigNotificationEnable(3)(lldpPortConfigTLVsTxEnable) |-*lldpPortConfigTLVsTxEnable(4)(lldpConfigManAddrPortsTxEnable) Table 24 Command output Field Description -std MIB node name. (0) Last bit of a MIB OID string. (lldpMessageTxInterval) Name of a leaf node. * Leaf node or MIB table node. # Display MIB table names, and node names and OIDs of MIB index nodes.
Name |||lldpStatsRemTablesInserts OID ||||1.0.8802.1.1.2.1.2.2 Name |||lldpStatsRemTablesDeletes OID ||||1.0.8802.1.1.2.1.2.3 Name |||lldpStatsRemTablesDrops OID ||||1.0.8802.1.1.2.1.2.4 Name |||lldpStatsRemTablesAgeouts OID ||||1.0.8802.1.1.2.1.2.5 Name |lldpXMedTopologyChangeDetected OID ||1.0.8802.1.1.2.1.5.4795.0.1 Trap Object Name |||lldpRemChassisIdSubtype OID ||||1.0.8802.1.1.2.1.4.1.1.4 Name |||lldpRemChassisId OID ||||1.0.8802.1.1.2.1.4.1.1.
Value range || [5..3600] Name |lldpPortConfigTable OID ||1.0.8802.1.1.2.1.1.6 Properties ||NodeType: Table ||AccessType: NA ||DataType: NA ||MOR: 0x00000000 Parent ||lldpConfiguration First child ||lldpPortConfigEntry Next leaf ||lldpPortConfigPortNum Next sibling ||lldpConfigManAddrTable Name |lldpPortConfigEntry OID ||1.0.8802.1.1.2.1.1.6.
Next sibling ||lldpPortConfigNotificationEnable Allow ||get/set/getnext Index ||[indexImplied:0, indexLength:1]: Value range || || ['txOnly', 1] || ['rxOnly', 2] || ['txAndRx', 3] || ['disabled', 4] Table 27 Command output Field Description Name MIB node name. OID OID of a MIB node. MIB node types: NodeType • • • • • • • Table—Table node. Row—Row node in a MIB table. Column—Column node in a MIB table. Leaf—Leaf node. Group—Group node (parent node of a leaf node).
Field Description MOR MOR for a MIB node. Parent Name of a parent node. First child Name of the first leaf node. Next leaf Name of the next leaf node. Next sibling Name of the next sibling node. Operation types allowed: • • • • Allow get/set/getnext—All operations. get—Get operation. set—Set operation. getnext—GetNext operation. Value range Value range of a MIB node. Index Table index. This field appears only for a table node.
Storage-type: nonVolatile View Type: included View status: active View name: ViewDefault MIB Subtree: snmpUsmMIB Subtree mask: Storage-type: nonVolatile View Type: excluded View status: active View name: ViewDefault MIB Subtree: snmpVacmMIB Subtree mask: Storage-type: nonVolatile View Type: excluded View status: active View name: ViewDefault MIB Subtree: snmpModules.18 Subtree mask: Storage-type: nonVolatile View Type: excluded View status: active ViewDefault is the default MIB view.
display snmp-agent remote Use display snmp-agent remote to display remote SNMP engine IDs configured by using the snmp-agent remote command. Syntax display snmp-agent remote [ ip-address [ vpn-instance vpn-instance-name ] | ipv6 ipv6-address [ vpn-instance vpn-instance-name ] ] Views Any view Predefined user roles network-admin network-operator Parameters ip-address: Specifies the IP address of a remote SNMP entity to display its SNMP engine ID.
display snmp-agent statistics Use display snmp-agent statistics to display SNMP message statistics. Syntax display snmp-agent statistics Views Any view Predefined user roles network-admin network-operator Examples # Display SNMP message statistics. display snmp-agent statistics 1684 messages delivered to the SNMP entity. 5 messages were for an unsupported version. 0 messages used an unknown SNMP community name. 0 messages represented an illegal operation for the community supplied. 0 ASN.
Field Description ASN.1 or BER errors in the process of decoding Number of messages that had ASN.1 or BER errors during decoding. messages passed from the SNMP entity Number of messages sent by the SNMP agent. SNMP PDUs had badValue error-status Number of PDUs with a BadValue error. SNMP PDUs had genErr error-status Number of PDUs with a General error. SNMP PDUs had noSuchName error-status Number of PDUs with a NoSuchName error.
Parameters contact: Displays the system contact. location: Displays the physical location of the device. version: Displays the SNMP agent version. Usage guidelines If none of the parameters is specified, this command displays all SNMP agent system information. Examples # Display all SNMP agent system information.
display snmp-agent trap-list Use display snmp-agent trap-list to display modules that can generate SNMP notifications and their notification function status (enable or disable). Syntax display snmp-agent trap-list Views Any view Usage guidelines You can use the snmp-agent trap enable command to enable or disable the notification function of a module. For a module that has sub-modules, the notification function status is enable if the trap function of any of its sub-modules is enabled.
group group-name: Displays SNMPv3 user information for a specified SNMP group name. The group name is case-sensitive. username user-name: Displays information about the specified SNMPv3 user. The username is case-sensitive. Usage guidelines This command displays only SNMPv3 users that you have created by using the snmp-agent usm-user v3 command. To display SNMPv1 or SNMPv2c users created by using the snmp-agent usm-user { v1 | v2c } command, use the display snmp-agent community command.
Field Description ACL Number of the ACL that controls the access of the SNMP user (the NMS) to the device. To access the device, the IP address of the NMS must be permitted in the ACL. Related commands snmp-agent usm-user v3 enable snmp trap updown Use enable snmp trap updown to enable link state notifications on an interface. Use undo enable snmp trap updown to disable link state notifications on an interface.
Use undo snmp-agent to disable the SNMP agent. Syntax snmp-agent undo snmp-agent Default SNMP agent is disabled. Views System view Predefined user roles network-admin Usage guidelines The snmp-agent command is optional for an SNMP configuration task. The SNMP agent is automatically enabled when you execute any command that begins with snmp-agent except for the snmp-agent calculate-password command. Examples # Enable the SNMP agent.
• md5: Converts the plaintext authentication key to a ciphertext key for MD5 authentication, or converts the plaintext privacy key to a ciphertext key for AES or DES encryption used in conjunction with MD5. • sha: Converts the plaintext authentication key to a ciphertext key for SHA-1 authentication, or converts the plaintext privacy key to a ciphertext key for AES or DES encryption used in conjunction with SHA-1 authentication. local-engineid: Uses the local engine ID to calculate the ciphertext key.
Parameters read: Assigns the specified community the read only access to MIB objects. A read-only community can only inquire MIB information. write: Assigns the specified community the read and write access to MIB objects. A read and write community can configure MIB information. simple: Sets a community name in plain text. For security purposes, this community name is saved in cipher text. cipher: Sets and saves the community name in cipher text. community-name: Sets a case-sensitive community name.
# Create the read and write community writeaccess in plain text so only the SNMPv2c NMS at 1.1.1.1 can use the community name writeaccess to read or set the MIB objects in the default view ViewDefault. system-view [Sysname] acl number 2001 [Sysname-acl-basic-2001] rule permit source 1.1.1.1 0.0.0.
Parameters v1: Specifies SNMPv1. v2c: Specifies SNMPv2c. v3: Specifies SNMPv3. group-name: Specifies an SNMP group name, a string of 1 to 32 case-sensitive characters. authentication: Specifies the authentication without privacy security model for the SNMPv3 group. privacy: Specifies the authentication with privacy security model for the SNMPv3 group. read-view view-name: Specifies a read-only MIB view. The view-name represents a MIB view name, a string of 1 to 32 characters.
Security model Security model keyword for the group Authentication without privacy authentication No authentication, no privacy Neither authentication nor privacy Security key settings for the user Authentication key None Remarks If no authentication key is configured, SNMP communication will fail. The privacy key (if any) for the user does not take effect. The authentication and privacy keys, if configured, do not take effect.
Usage guidelines An SNMP engine ID uniquely identifies an SNMP entity in an SNMP managed network. Make sure that the local SNMP engine ID is unique within your SNMP managed network to avoid communication problems. If you have configured SNMPv3 users, change the local SNMP engine ID only when necessary. The change can void the SNMPv3 usernames and encrypted keys you have configured. Examples # Change the local engine ID to 123456789A.
system-view [Sysname] snmp-agent log set-operation snmp-agent mib-view Use snmp-agent mib-view to create or update a MIB view. Use undo snmp-agent mib-view to delete a MIB view. Syntax snmp-agent mib-view { excluded | included } view-name oid-tree [ mask mask-value ] undo snmp-agent mib-view view-name Default The system creates the ViewDefault view when the SNMP agent is enabled. In this default MIB view, all MIB objects in the iso subtree but the snmpUsmMIB, snmpVacmMIB, and snmpModules.
[Sysname] snmp-agent mib-view included mibtest 1.3.6.1 [Sysname] snmp-agent mib-view excluded mibtest system [Sysname] snmp-agent community read public mib-view mibtest An SNMPv1 NMS in the public community can query the objects in the mib-2 subtree but not any object (for example, the sysDescr or sysObjectID node) in the system subtree.
undo snmp-agent port Default The device uses UDP port 161 for receiving SNMP packets. Views System view Predefined user roles network-admin Parameters port-num: Specifies the UDP port for receiving SNMP packets, in the range of 1 to 65535. The default is 161. Usage guidelines After changing the port number for receiving SNMP packets, reconnect the device by using the port number for SNMP get and set operations.
ipv6 ipv6-address: Specifies the IPv6 address of a remote SNMP entity. vpn-instance vpn-instance-name: Specifies the VPN for a remote SNMP entity. The vpn-instance-name argument specifies the name of the MPLS L3VPN, a case-sensitive string of 1 to 31 characters. If this parameter is not specified, the remote SNMP entity is in public network. engineid: Specifies the SNMP engine ID of the remote SNMP entity.
Usage guidelines The snmp-agent source command enables the SNMP agent to use the primary IP address of an interface or subinterface as the source IP address in all its SNMP informs or traps, regardless of their outgoing interfaces. An NMS can use this IP address to filter all the informs or traps sent by the SNMP agent. Make sure the specified interface has been created and assigned a valid IP address.
Related commands display snmp-agent sys-info snmp-agent sys-info location Use snmp-agent sys-info location to configure the system location. Use undo snmp-agent sys-info location to restore the default location. Syntax snmp-agent sys-info location sys-location undo snmp-agent sys-info location Default The system location is null. Views System view Predefined user roles network-admin Parameters sys-location: Specifies the system location, a string of 1 to 255 characters.
Default SNMPv3 is used. Views System view Predefined user roles network-admin Parameters all: Specifies SNMPv1, SNMPv2c, and SNMPv3. v1: Specifies SNMPv1. v2c: Specifies SNMPv2c. v3: Specifies SNMPv3. Usage guidelines SNMPv1 and SNMPv2c settings in this command are supported only in non-FIPS mode. Configure the SNMP agent with the same SNMP version as the NMS for successful communications between them. Examples # Enable SNMPv3.
snmp-agent target-host inform address udp-domain { ip-address | ipv6 ipv6-address } [ udp-port port-number ] [ vpn-instance vpn-instance-name ] params securityname security-string v3 [ authentication | privacy ] snmp-agent target-host trap address udp-domain { ip-address | ipv6 ipv6-address } [ udp-port port-number ] [ vpn-instance vpn-instance-name ] params securityname security-string v3 [ authentication | privacy ] undo snmp-agent target-host { trap | inform } address udp-domain { ip-address | ipv6 ipv6-
Make sure that the SNMP agent uses the same UDP port for SNMP notifications as the target host. Typically, NMSs, for example, IMC and MIB Browser, use port 162 for SNMP notifications as defined in the SNMP protocols. If none of the keywords v1, v2c, or v3 is specified, SNMPv1 is used. Make sure the SNMP agent uses the same SNMP version as the target host so the host can receive the notification. If neither authentication nor privacy is specified, the security model is no authentication, no privacy.
coldstart Notification sent when the device restarts. linkdown Notification sent when the link of a port goes down. linkup Notification sent when the link of a port comes up. warmstart Notification sent when the SNMP agent restarts. system: Specifies notifications sent when the system time is modified, the system reboots, or the main system software image is not available.
When you use this command, make sure that the NMS supports the extended linkup and linkDown notifications. Examples # Enable extended linkUp/linkDown notifications. system-view [Sysname] snmp-agent trap if-mib link extended snmp-agent trap life Use snmp-agent trap life to configure the lifetime of notifications in the SNMP notification queue. Use undo snmp-agent trap life to restore the default notification lifetime.
undo snmp-agent trap log Default SNMP notification logging is disabled. Views System view Predefined user roles network-admin Usage guidelines Use SNMP notification logging to record SNMP notifications sent by the SNMP agent for notification tracking. The SNMP agent sends logs to the information center. You can configure the information center to output the logs to a specific destination as needed. Examples # Enable SNMP notification logging.
Related commands • snmp-agent target-host • snmp-agent trap enable • snmp-agent trap life snmp-agent usm-user { v1 | v2c } Use snmp-agent usm-user { v1 | v2c } to add a user to an SNMPv1 or SNMPv2c group. Use undo snmp-agent usm-user { v1 | v2c } to delete a user from an SNMPv1 or SNMPv2c group.
SNMPv1 or SNMPv2c group. To display the SNMPv1 and SNMPv2c communities created in this way, use the display snmp-agent community command. To change the access right of the SNMPv1 or SNMPv2c user, use the snmp-agent community command or the snmp-agent group { v1 | v2c } command. If the snmp-agent community command is used, the SNMPv1 or SNMPv2c is removed from the SNMP group. The snmp-agent usm-user { v1 | v2c } command enables managing SNMPv1 and SNMPv2c communities in the same way as managing SNMPv3 users.
snmp-agent usm-user v3 user-name group-name [ remote { ip-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ] ] [ { cipher | simple } authentication-mode sha auth-password [ privacy-mode aes128 priv-password ] ] [ acl acl-number | acl ipv6 ipv6-acl-number ] * undo snmp-agent usm-user v3 user-name group-name { local | engineid engineid-string | remote { ip-address | ipv6 ipv6-address } [ vpn-instance vpn-instance-name ] } Default No SNMPv3 users have been configured.
• des56: Specifies the DES (Data Encryption Standard) algorithm. priv-password: Specifies a case-sensitive plaintext or encrypted privacy key. A plaintext key is a string of 1 to 64 characters. If the cipher keyword is specified, the encrypted privacy key length requirements differ by authentication algorithm and key string format, as shown in Table 35.
[Sysname] snmp-agent usm-user v3 testUser testGroup simple authentication-mode sha 123456TESTplat&! An NMS can use the same SNMPv3 username, SNMP protocol version, and authentication algorithm and key as the SNMP agent to access the MIB objects in the default view ViewDefault.
RMON commands display rmon alarm Use display rmon alarm to display entries in the RMON alarm table. Syntax display rmon alarm [entry-number] Views Any view Predefined user roles network-admin network-operator Parameters entry-number: Specifies an alarm entry index in the range of 1 to 65535. If no entry is specified, the command displays all entries in the RMON alarm table. Examples # Display all entries in the RMON alarm table. display rmon alarm AlarmEntry 1 owned by user1 is VALID.
Field Description Sample type (MIB object alarmSampleType): • absolute—RMON compares the value of the variable with the rising and Sample type falling thresholds at the end of the sampling interval. • delta—RMON subtracts the value of the variable at the previous sample from the current value, and then compares the difference with the rising and falling thresholds. Sampled variable Monitored variable (MIB object alarmVariable).
display rmon event Use display rmon event to display RMON event entries. Syntax display rmon event [entry-number] Views Any view Predefined user roles network-admin network-operator Parameters entry-number: Specifies an event entry index in the range of 1 to 65535. If no entry is specified, the command displays all event entries.
Field Description Actions that the system takes when the event occurs (MIB object eventType): Take the action action when triggered last triggered at time uptime • • • • none—Takes no action. log—Logs the event. trap—Sends an SNMP notification. log-trap—Logs the event and sends an SNMP notification. Last time when the event occurred, which is represented as the amount of time that elapsed since the system startup. The MIB object for this field is eventLastTimeSent.
LogEntry 99.3 created at 50days 09h:18m:43s uptime. Description: The alarm formula defined in prialarmEntry 777, less than(or =) 15000000 with alarm value 14026493. Alarm sample type is absolute. LogEntry 99.4 created at 50days 09h:23m:28s uptime. Description: The alarm formula defined in prialarmEntry 777, uprise 17000000 with alarm value 17077846. Alarm sample type is absolute. Table 38 Command output Field Description Event log entry owner and status.
Parameters interface-type interface-number: Specifies an interface by its type and number. If no interface is specified, the command displays history samples for all interfaces that have an RMON history control entry. Usage guidelines RMON uses the etherHistoryTable object to store the history samples of Ethernet statistics for Ethernet interfaces. To collect history samples for an Ethernet interface, you must first create a history control entry on the interface.
collisions : 0 , utilization : 0 Table 39 Command output Field Description Status and owner of the history control entry. HistoryControlEntry entry-number owned by owner is status. • entry-number—History control entry index (MIB object historyControlIndex). • owner—Entry owner (MIB object historyControlOwner). • status—Entry status (MIB object historyControlStatus): { VALID—The entry is valid. { UNDERCREATION—The entry is invalid. The status field is not configurable at the CLI.
Field oversize packets Description Number of oversize packets received during the sampling interval (MIB object etherHistoryOversizePkts). Oversize packets are longer than 1518 octets (excluding framing bits but including FCS octets). fragments Number of undersize packets with CRC errors received during the sampling interval (MIB object etherHistoryFragments). jabbers Number of oversize packets with CRC errors received during the sampling interval (MIB object etherHistoryJabbers).
Table 40 Command output Field Description Alarm entry owner and status: • entry-number—Alarm entry index (MIB object hh3cRmonExtAlarmIndex). • owner—Entry owner (MIB object hh3cRmonExtAlarmOwner). • status—Entry status (MIB object hh3cRmonExtAlarmStatus): PrialarmEntry entry-number owned by owner is status. { VALID—The entry is valid. { UNDERCREATION—The entry is invalid. The status field is not configurable at the CLI. All alarm entries created from the CLI are valid by default.
Field Description Alarm that can be generated when the entry becomes valid (MIB object hh3cRmonExtAlarmStartupAlarm): • risingAlarm—Generates a rising alarm if the first sample after the entry becomes valid is greater than or equal to the rising threshold. Alarm sent upon entry startup • fallingAlarm—Generates a falling alarm if the first sample after the entry becomes valid is less than or equal to the rising threshold.
etherStatsBroadcastPkts : 503581 , etherStatsMulticastPkts : 44013 etherStatsUndersizePkts : 0 , etherStatsOversizePkts : 0 etherStatsFragments : 0 , etherStatsJabbers : 0 , etherStatsCollisions : 0 etherStatsCRCAlignErrors : 0 etherStatsDropEvents (insufficient resources): 0 Incoming packets by size: 64 : 0 , 65-127 : 0 , 128-255 256-511: 0 , 512-1023: 0 , 1024-1518: 0 : 0 Table 41 Command output Field Description Statistics entry owner and status: • entry-number—Statistics ent
Field Description Total number of events in which packets were dropped (MIB object etherStatsDropEvents). etherStatsDropEvents NOTE: This statistic is the number of times that a drop condition occurred. It is not necessarily the total number of dropped packets. Incoming-packet statistics by packet length: • 64—Number of 64-byte packets. The value is stored in the MIB node etherStatsPkts64Octets. • 65-127—Number of 65- to 127-byte packets. The value is stored in the MIB node etherStatsPkts65to127Octets.
alarm-variable: Specifies an alarm variable, a string of 1 to 255 characters. You can only specify variables that can be parsed as an ASN.1 INTEGER value (INTEGER, INTEGER32, Unsigned32, Counter32, Counter64, Gauge, or TimeTicks) for the alarm-variable argument. The alarm variables must use one of the following formats: Format Examples Dotted OID format: 1.3.6.1.2.1.2.1.10.1 entry.integer.instance etherStatsOctets.1 etherStatsPkts.1 etherStatsBroadcastPkts.1 Object name.instance ifInOctets.
To create an alarm entry successfully, make sure it has a different alarm variable, sampling interval, sample type, rising threshold, or falling threshold than any existing alarm entry. Two entries are considered duplicate if all these parameters are the same. To trigger the event associated with an alarm condition, you must create the event with the rmon event command.
Predefined user roles network-admin Parameters entry-number: Specifies an event entry index in the range of 1 to 65535. description string: Configures an event description, a case-sensitive string of 1 to 127 characters. The string can contain spaces, but it cannot contain the question mark (?) or any unprintable control characters in the US ASCII character set. log: Logs the event when it occurs. log-trap security-string: Logs the event and sends an SNMP notification when the event occurs.
rmon history Use rmon history to create an entry in the RMON history control table. Use undo rmon history to remove an entry from the RMON history control table. Syntax rmon history entry-number buckets number interval sampling-interval [ owner text ] undo rmon history entry-number Default The RMON history control table does not contain any entries.
rmon prialarm Use rmon prialarm to create an entry in the private alarm table. Use undo rmon prialarm to remove an entry from the private alarm table.
rising-threshold threshold-value1 event-entry1: Sets the rising threshold. The threshold-value1 argument represents the rising threshold in the range of –2147483648 to +2147483647. The event-entry1 argument represents the index of the event that is triggered when the rising threshold is crossed. The value range for the event-entry1 argument is 0 to 65535. If 0 is specified, the alarm does not trigger any event. falling-threshold threshold-value2 event-entry2: Sets the falling threshold.
[Sysname] rmon prialarm 1 (.1.3.6.1.2.1.16.1.1.1.6.1*100/.1.3.6.1.2.1.16.1.1.1.5.1) BroadcastPktsRatioOfEth1/1 10 absolute rising-threshold 80 1 falling-threshold 5 2 entrytype forever owner user1 The last number in the OID forms of variables must be the same as the statistics entry index for the interface. For example, if you execute the rmon statistics 5 command, you must replace 1.3.6.1.2.1.16.1.1.1.6.1 and 1.3.6.1.2.1.16.1.1.1.5.1 with 1.3.6.1.2.1.16.1.1.1.6.5 and 1.3.6.1.2.1.16.1.1.1.5.
Related commands display rmon statistics 183
NETCONF commands xml Use xml to enter XML view. Syntax xml Views User view Predefined user roles network-admin network-operator Usage guidelines After entering XML view, you can use NETCONF messages to configure the device or obtain data from the device. NETCONF operations you can perform depend on the user roles you have, as shown in Table 42.
f:params:netconf:capability:hp-netconf-ext:1.01]]>]]> # Send a hello message to negotiate capabilities. urn:ietf:params:netconf:base:1.0 ]]>]]> # Quit XML view. PAGE 195Port mirroring commands display mirroring-group Use display mirroring-group to display mirroring group information. Syntax display mirroring-group { group-id | all | local } Views Any view Predefined user roles network-admin network-operator Parameters group-id: Displays information about a mirroring group specified by its number.
Field Description Mirroring port Source port. Monitor port Destination port. mirroring-group Use mirroring-group to create a mirroring group. Use undo mirroring-group to remove mirroring groups. Syntax mirroring-group group-id local undo mirroring-group { group-id | all | local } Default No mirroring group exists on a device. Views System view Predefined user roles network-admin Parameters group-id: Specifies the number of a mirroring group.
Syntax mirroring-group group-id mirroring-port { both | inbound | outbound } undo mirroring-group group-id mirroring-port Default No source port is configured for any mirroring group. Views Interface view Predefined user roles network-admin Parameters group-id: Specifies the number of a mirroring group. The mirroring group specified by the group-id argument must already exist.
Default No source port is configured for a mirroring group. Views System view Predefined user roles network-admin Parameters group-id: Specifies the number of a mirroring group. The mirroring group specified by the group-id argument must already exist.
undo mirroring-group group-id monitor-port Default No monitor port is configured for a mirroring group. Views Interface view Predefined user roles network-admin Parameters group-id: Specifies the number of a mirroring group. The mirroring group specified by group-id must already exist. The value range for this argument varies with device models.
Predefined user roles network-admin Parameters group-id: Specifies the number of a mirroring group. The mirroring group specified by group-id must already exist. The following matrix shows the value ranges for the group-id argument: MSR2000 MSR3000 MSR4000 Always 1 1 to 6 1 to 6 interface-type interface-number: Specifies a port to be configured as the monitor port by its type and number. Usage guidelines You can configure a monitor port only for a local mirroring group.
Sampler configuration commands display sampler Use display sampler to display configuration information about a sampler. Syntax MSR2000/MSR3000: display sampler [ sampler-name ] MSR4000: display sampler [ sampler-name ] [ slot slot-number ] Views Any view Predefined user roles network-admin network-operator Parameters sampler-name: Specifies a sampler by its name, a case-insensitive string of 1 to 31 characters. Without this argument, the command displays configuration information about all samplers.
sampler Use sampler to create a sampler. Use undo sampler to delete a sampler. Syntax sampler sampler-name mode { fixed | random } packet-interval rate undo sampler sampler-name Default No sampler exists. Views System view Predefined user roles network-admin Parameters sampler-name: Specifies a sampler by its name, a case-insensitive string of 1 to 31 characters. fixed: Specifies the fixed sampling mode, in which the first packet is selected per sampling.
NetStream configuration commands display ip netstream cache Use display ip netstream cache to display configuration and status information about the NetStream entries in the cache. Syntax MSR2000/MSR3000: display ip netstream cache [ verbose ] MSR4000: display ip netstream cache [ slot slot-number ] [ verbose ] Views Any view Predefined user roles network-admin network-operator Parameters slot slot-number Displays NetStream entry information in the cache of a card.
512 544 576 1024 1536 2048 2560 3072 3584 4096 4608 >4608 .000 .000 .027 .000 .027 .000 .000 .000 .000 .000 .000 .
TCPFlag: 0 DstMask: 24 DstAS: 0 InVRF: 0 SamplerMode: Active: SrcMask: 24 SrcAS: 0 0 SamplerInt: 382 NextHop: Bytes/Pkt: 172.16.2.10 BGPNextHop: 0.0.0.0 0 1426 # Display detailed information about the NetStream entries in the cache of slot 1. (MSR4000.
DstMask: 24 DstAS: 0 InVRF: 10 SamplerMode: Active: L2 2 120 SrcMask: 24 SrcAS: 0 SamplerInt: 256 Bytes/Pkt: 152 0012-3f86-e94c(10) 0012-3f86-e86a(0) SamplerMode: SamplerInt: 64 Bytes/Pkt: 210 Active: 1 5 MPLS LDP(3.3.3.3/24) NextHop: 0.0.0.0 BGPNexthop: 0.0.0.0 ET1/4/1(I) 1253 1:18-6-0 ET1/2(O) 291 ET1/2(O) 10 2:24-6-0 3:30-6-1 SamplerMode: Active: 0 660 SamplerInt: 0 Bytes/Pkt: 100 IP& 192.168.123.1(2048) 192.168.1.
Field Description IPL2 flow entries been counted Number of Layer 2 and Layer 3 flows that have been counted. Last time when the statistics were cleared. The time is displayed only when the reset ip netstream statistics command has been executed. Otherwise, the value for this field is Never.
Field Description Other information about the active flows in the cache, including TCP tag, destination mask, source mask, routing next hop, destination AS, source AS, BGP next hop, VPN to which the outbound packets belong, VPN to which the inbound packets belong, sampling mode, sampling interval, flow active time, and number of bytes in each packet.
Flow destination IP (UDP) : 10.10.0.10 (30000) Version 8 exported flows number : 16 Version 8 exported UDP datagrams number (failed) : 2 (0) Version 9 exported flows number : 16 Version 9 exported UDP datagrams number (failed) : 2 (0) Table 46 Command output Field Description IP export information Statistics of the NetStream data export in version 5 and version 9. Flow source interface Source interface from which the NetStream data are exported.
Parameters slot slot-number: Displays NetStream template information for a card. The slot-number argument specifies a card by its slot number. (MSR4000.) Examples # Display information about the NetStream template when the NetStream aggregation mode of AS is enabled.
Input interface index 4 Output interface index 4 Direction 1 Sampling algorithm 1 PAD 1 PAD 1 Sampling interval 4 Table 47 Command output Field Description Flow template refresh-rate packet Refresh frequency with which the template is sent. Flow template refresh-rate time(minutes) Refresh interval (in minutes) at which the template is sent. Active flow templates Number of active NetStream templates. Created flow templates Number of templates that have been created.
Syntax enable undo enable Default No NetStream aggregation is enabled. Views NetStream aggregation view Predefined user roles network-admin Examples # Enable NetStream AS aggregation. system-view [Sysname] ip netstream aggregation as [Sysname-ns-aggregation-as] enable Related commands ip netstream aggregation ip netstream Use ip netstream to enable NetStream on the specified interface. Use undo ip netstream to disable NetStream on the specified interface.
ip netstream aggregation Use ip netstream aggregation to set a NetStream aggregation mode and to enter the NetStream aggregation view. Use undo ip netstream aggregation to close a NetStream aggregation mode and to remove the NetStream aggregation configuration.
tos-source-prefix: Specifies the ToS-source-prefix aggregation by ToS, source AS number, source prefix, source address mask length, and inbound interface index. Usage guidelines In NetStream aggregation view, you can perform the following tasks: • Enable or disable the specified NetStream aggregation. • Configure source interface, destination IP address, and destination port for the NetStream data export. A flow matching multiple aggregation modes is counted as multiple aggregate flows.
Usage guidelines You can configure the same destination address and destination UDP port number in different NetStream aggregation views. The destination address and destination UDP port number configured in a NetStream aggregation view takes precedence over those configured in system view. If no destination address or destination UDP port number is configured in a NetStream aggregation view, those configured in system view apply.
Examples # Allow a maximum of 10 packets to be exported per second. system-view [Sysname] ip netstream export rate 10 ip netstream export source Use ip netstream export source to configure the source interface for the NetStream data export. Use undo ip netstream export source to remove the configuration.
Syntax ip netstream export v9-template refresh-rate packet packets undo ip netstream export v9-template refresh-rate packet Default Version 9 templates are sent every 20 packets. Views System view Predefined user roles network-admin Parameters packets: Specifies the number of packets that are sent before version 9 templates are sent to the NetStream server for an update. The value range is 1 to 600.
Predefined user roles network-admin Parameters minutes: Specifies the refresh interval in minutes that the device waits after NetStream version 9 templates are sent to the NetStream server. The value range is 1 to 3600. Usage guidelines Version 9 is template-based and supports user-defined formats, so the NetStream-enabled device needs to send the new template to the NetStream server for an update.
Parameters origin-as: Exports statistics of the source AS originating the route for the source address and the destination AS for the destination address. peer-as: Exports statistics of the peer ASs for the source and destination address. bgp-nexthop: Exports statistics of BGP next hops. Usage guidelines A NetStream entry for a flow records the source IP address and destination IP address, and two AS numbers for each IP address.
Examples # Reference ACL 2003 to enable NetStream filtering in the outbound direction of Ethernet 1/1. system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] ip netstream outbound [Sysname-Ethernet1/1] ip netstream filter acl 2003 outbound ip netstream max-entry Use ip netstream max-entry max-entries to configure the maximum number of NetStream entries that the cache can accommodate. Use undo ip netstream max-entry to restore the default.
Default Counting and exporting of MPLS packets are disabled. Views System view Predefined user roles network-admin Parameters label-positions: Specifies position of the labels to be counted. label-position1: Specifies the position of the first label in the label stack, in the range of 1 to 6. label-position2: Specifies the position of the second label in the label stack, in the range of 1 to 6. label-position3: Specifies the position of the third label in the label stack, in the range of 1 to 6.
outbound: Enables NetStream sampling in the outbound direction. Examples # Enable NetStream sampling in the inbound direction of Ethernet 1/1 by referencing sampler abc. system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] ip netstream inbound [Sysname-Ethernet1/1] ip netstream sampler abc inbound ip netstream timeout active Use ip netstream timeout active to set the aging timer for active flows. Use undo ip netstream timeout active to restore the default.
Default The aging timer is 30 seconds for inactive flows. Views System view Predefined user roles network-admin Parameters seconds: Sets the aging timer for inactive flows, in the range of 10 to 600 seconds. Usage guidelines A flow is considered inactive if no packet for this NetStream entry arrives in a specific period of time that is called an aging timer for inactive flows. Examples # Set the aging timer to 60 seconds for inactive flows.
sFlow commands display sflow Use display sflow to display sFlow configuration and operation information. Syntax display sflow Views Any view Predefined user roles network-admin network-operator Examples # Display sFlow configuration and operation information. display sflow sFlow datagram version: 5 Global information: Agent IP: 10.10.10.1(CLI) Source address: 10.0.0.
Field Description Port sFlow collector port. Aging Remaining lifetime of the sFlow collector. If this field displays N/A, the sFlow collector never ages out. Size Maximum length of the sFlow data portion in an sFlow packet. VPN-instance Name of the VPN bound with the sFlow collector. Description Description of the sFlow collector. Port information Information about interfaces configured with sFlow. Interface Interface configured with sFlow.
Parameters ip ip-address: Specifies an IPv4 address for the sFlow agent. ipv6 ipv6-address: Specifies an IPv6 address for the sFlow agent. Usage guidelines HP recommends that you manually configure an IP address for the sFlow agent. Only one IP address can be specified for the sFlow agent on the device, and a newly configured IP address overwrites the existing one. Examples # Specify IP address 10.10.10.1 for the sFlow agent. system-view [Sysname] sflow agent ip 10.10.10.
time-out seconds: Specifies the aging timer of the sFlow collector, in the range of 1 to 2147483647 seconds. When the aging timer expires, the sFlow collector is deleted and all the settings of the sFlow collector are restored to the default. For an sFlow collector with the aging timer configured, the system does not save its configuration in the configuration file. By default, the sFlow collector does not age out.
Default No sFlow collector is specified for counter sampling. Views Ethernet interface view Predefined user roles network-admin Parameters collector-id: Specifies an sFlow collector by its ID in the range of 1 to 10. Examples # Specify sFlow collector 2 on Ethernet 1/1 for counter sampling. system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] sflow counter collector 2 sflow flow collector Use sflow flow collector to specify an sFlow collector for flow sampling.
Syntax sflow flow max-header length undo sflow flow max-header Default Flow sampling can copy up to 128 bytes of a packet. Views Ethernet interface view Predefined user roles network-admin Parameters length: Specifies the maximum number of bytes that can be copied, in the range of 18 to 512. HP recommends that you use the default. Examples # Set the maximum number of bytes that can be copied to 60 on Ethernet 1/1.
Examples # Specify fixed flow sampling mode on Ethernet 1/1. system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] sflow sampling-mode determine Related commands sflow sampling-rate sflow sampling-rate Use sflow sampling-rate to enable flow sampling and specify the number of packets out of which flow sampling will sample a packet on an interface. Use undo sflow sampling-rate to disable flow sampling.
Default The source IP address of sent sFlow packets is determined by routing. Views System view Predefined user roles network-admin Parameters ip ip-address: Specifies the source IPv4 address of sFlow packets. ipv6 ipv6-address: Specifies the source IPv6 address of sFlow packets. Examples # Specify the source IPv4 address of sFlow packets as 10.0.0.1. system-view [Sysname] sflow source ip 10.0.0.
Information center commands diagnostic-logfile save Use diagnostic-logfile save to manually save diagnostic logs from the diagnostic log buffer to the diagnostic log file. Syntax diagnostic-logfile save Views Any view Predefined user roles network-admin Usage guidelines You can specify the directory to save the diagnostic log file with the info-center diagnostic-logfile directory command. The system clears the diagnostic log buffer after saving the buffered diagnostic logs to the diagnostic log file.
Examples # Display the diagnostic log file configuration. display diagnostic-logfile summary Diagnostic log file: Enabled. Diagnostic log file size quota: 10 MB Diagnostic log file directory: cfa0:/diagfile Writing frequency: 24 hour 0 min 0 sec Table 49 Command output Field Description • Enabled—Saving diagnostic logs from the buffer to the Diagnostic log file diagnostic log file is enabled. • Disabled—Saving diagnostic logs from the buffer to the diagnostic log file is disabled.
Information timestamp format: Loghost: Date Other output destination: Date display logbuffer Use display logbuffer to display the state of the log buffer and the log information in the log buffer.
Severity value Level Description Corresponding keyword in commands 7 Debug Debugging message. debugging size buffersize: Specifies the number of latest log messages to be displayed, in the range of 1 to 1024. Without this keyword, the command displays all log information. slot slot-number: Specifies a card by its slot number. (MSR4000.) Examples # (MSR2000/MSR3000.) Display the state and log information of the log buffer.
reset logbuffer • display logbuffer summary Use display logbuffer summary to display the summary of the log buffer. Syntax MSR2000/MSR3000: display logbuffer summary [ level severity ] MSR4000: display logbuffer summary [ level severity | slot slot-number ] * Views Any view Predefined user roles network-admin network-operator Parameters level severity: Specifies a severity level in the range of 0 to 7. Without this keyword, the command displays log information of all levels in the log buffer.
Field Description WARN Represents warning. For more information, see Table 50. NOTIF Represents notification. For more information, see Table 50. INFO Represents informational. For more information, see Table 50. DEBUG Represents debug. For more information, see Table 50. display logfile summary Use display logfile summary to display the log file configuration.
Predefined user roles network-admin network-operator Usage guidelines A local user can use this command only after being authorized as the security log administrator by the system administrator through the authorization-attribute user-role security-audit command. For more information about security log administrator, see Security Configuration Guide. Examples # Display the summary of the security log file.
Views Interface view Predefined user roles network-admin network-operator Examples # Disable port Ethernet 1/1 from generating link up or link down logs. system-view [Sysname] interface ethernet 1/1 [Sysname-Ethernet1/1] undo enable log updown info-center diagnostic-logfile enable Use info-center diagnostic-logfile enable to enable saving diagnostic logs into the diagnostic log file. Use undo info-center diagose-logfile enable to disable saving diagnostic logs into the diagnostic log file.
undo info-center diagnostic-logfile frequency Default The default saving interval is 86400 seconds. Views System view Predefined user roles network-admin Parameters freq-sec: Specifies the interval at which the system saves diagnostic logs from the diagnostic log file buffer to the diagnostic log file, in the range 10 to 86400 seconds.
[Sysname] info-center diagnostic-logfile quota 6 Related commands • info-center diagnostic-logfile alarm-threshold info-center diagnostic-logfile directory Use info-center diagnostic-logfile directory to configure the directory to save the diagnostic log file. Syntax info-center diagnostic-logfile directory dir-name Default The diagnostic log file is saved in the diagfile directory under the root directory of the storage device.
Views System view Predefined user roles network-admin Parameters all-port-powerdown: Shuts down all the physical Ethernet ports except for the console port, the management Ethernet port, and IRF ports when the last log file is full or the storage device runs out of space. Usage guidelines This command is supported only in FIPS mode. Examples # Enable log file overwrite-protection.
undo info-center format Default Logs are sent to a log host in HP format. Views System view Predefined user roles network-admin Parameters unicom: Specifies the unicom format. cmcc: Specifies the China Mobile Communications Corporation (cmcc) format. Usage guidelines Logs can be sent to a log host in HP, unicom, or cmcc format. For more information about log formats, see Network Management and Monitoring Configuration Guide. Examples # Set the format of logs sent to a log host as unicom.
info-center logbuffer size Use info-center logbuffer size to set the maximum number of logs that can be stored in the log buffer. Use undo info-center logbuffer size to restore the default. Syntax info-center logbuffer size buffersize undo info-center logbuffer size Default The log buffer can store up to 512 logs. Views System view Predefined user roles network-admin Parameters buffersize: Specifies the maximum number of logs that can be stored in the log buffer.
Predefined user roles network-admin Examples # Enable the output of logs to a log file. system-view [Sysname] info-center logfile enable info-center logfile frequency Use info-center logfile frequency to configure the interval for saving logs to a log file. Use undo info-center logfile frequency to restore the default saving interval. Syntax info-center logfile frequency freq-sec undo info-center logfile frequency Default The default saving interval is 86400 seconds.
Default The maximum size of a log file is 5 MB. Views System view Predefined user roles network-admin Parameters size: Specifies the maximum size for a log file, in the range of 1 to 10 MB. Usage guidelines The router support multiple log files. Each log file has a specific capacity. When the capacity is reached, the system creates a new log file to save new messages. The log files are named as logfile1.log, logfile2.log, and so on.
The configuration made by this command cannot survive a reboot or an active/standby switchover. (MSR4000.) Examples # Create a directory named test under the root directory cfa0. mkdir test Creating directory cfa0:/test... Done. # Set the directory to save the log file to cfa0:/test.
%Jan 1 07:27:48:636 2000 Sysname ARP/6/DUPIFIP: Duplicate address 172.16.0.1 on interface Vlan-interface100, sourced from 00e0-fc58-123d # Enable duplicate log suppression on device A. system-view [Sysname] info-center logging suppress duplicates Device A continues to output the following log information: %Jan 1 07:27:48:636 2000 Sysname ARP/6/DUPIFIP: Duplicate address 172.16.0.
Predefined user roles network-admin Parameters vpn-instance vpn-instance-name: Specifies an MPLS L3VPN by its name, a case-sensitive string of 1 to 31 characters. If the log host is on the public network, do not specify this option. ipv4-address: Specifies the IPv4 address of a log host. ipv6 ipv6-address: Specifies the IPv6 address of a log host. port port-number: Specifies the port number of the log host, in the range of 1 to 65535. The default is 514.
The info-center loghost source command takes effect only after the information center is enabled with the info-center enable command. The IP address of the specified egress interface must have been configured. Otherwise, although the info-center loghost source command can be configured successfully, the log host cannot receive any log. Examples # Specify the IP address of interface loopback 0 as the source IP address of logs.
info-center security-logfile enable Use info-center security-logfile enable to enable saving of security logs into the security log file. Use undo info-center security-logfile enable to restore the default. Syntax info-center security-logfile enable undo info-center security-logfile enable Default The saving of security logs into the security log file is disabled.
Usage guidelines The system first outputs the security logs to the security log file buffer, and then saves the logs in the buffer into the security log file at the specified interval. Examples # Save security logs to the security log file every 600 seconds.
Views System view Predefined user roles network-admin Parameters dir-name: Specifies a directory by its name, a string of 1 to 64 characters. Usage guidelines The specified directory must have been created. The configuration made by this command cannot survive a reboot. (MSR2000/MSR3000.) (MSR4000.) The configuration made by this command cannot survive a reboot or an active/standby switchover. Examples # Set the directory to save the security log file as cfa0:/test.
Destination Source modules Common log Security log Diagnostic log Hidden log Log file All supported modules informational Disabled Disabled informational Security log file All supported modules, cannot be filtered Disabled Debugging, which cannot be filtered Disabled Disabled Diagnostic log file All supported modules, cannot be filtered Disabled Disabled Debugging, which cannot be filtered Disabled Views System view Predefined user roles network-admin Parameters module-name: Specif
system-view [Sysname] info-center source default console deny [Sysname] info-center source vlan console level emergency # Based on the previous configuration, disable output of VLAN module's information to the console so no system information is output to the console. system-view [Sysname] undo info-center source vlan console info-center synchronous Use info-center synchronous to enable synchronous information output.
[Sysname] info-center synchronous Info-center synchronous output is on [Sysname] save The current configuration will be written to the device. Are you sure? [Y/N]: At this time, the system receives the log information. It displays the log information first and then displays [Y/N]. %May 21 14:33:19:425 2007 Sysname SHELL/4/LOGIN: VTY login from 192.168.1.44 [Y/N]: Enter Y or N to complete your input.
Related commands info-center timestamp loghost info-center timestamp loghost Use info-center timestamp loghost to configure the timestamp format for logs sent to a log host. Use undo info-center timestamp loghost to restore the default. Syntax info-center timestamp loghost { date | iso | no-year-date | none } undo info-center timestamp loghost Default The timestamp format for logs sent to a log host is date.
Usage guidelines You can specify the directory to save a log file with the info-center logfile switch-directory command. The system clears the log file buffer after saving logs from the buffer to a log file automatically or manually. Examples # Manually save logs from the log file buffer into a log file. logfile save The contents in the log file buffer have been saved to the file cfa0:/logfile/logfile.log.
A local user can use this command only after being authorized as the security log administrator by the system administrator. For more information about security log administrator, see Security Configuration Guide. Examples # Manually save the security logs in the security log file buffer into the security log file. security-logfile save The contents in the security log file buffer have been saved to the file cfa0:/seclog/seclog.log.
terminal logging level Use terminal logging level to set the lowest level of the logs that can be output to the current terminal. Use undo terminal logging level to restore the default. Syntax terminal logging level severity undo terminal logging level Default The lowest level of the logs that can be output to the console and the monitor terminal is 6 (Informational).
Predefined user roles network-admin Usage guidelines The configuration of this command is valid for only the current connection between the terminal and the device. If a new connection is established, the monitoring of system information on the terminal restores the default. Examples # Enable the monitoring of logs on the current terminal. terminal monitor Current terminal monitor is on.
EAA commands action cli Use action cli to add a CLI action to a monitor policy. Use undo action to remove an action. Syntax action number cli command-line undo action number Default Monitor policies do not contain any actions. Views CLI-defined policy view Predefined user roles network-admin Parameters number: Specifies an action ID in the range of 0 to 231. cli command-line: Specifies the command line to be executed when the event occurs.
action reboot Use action reboot to add a reboot action to a monitor policy. Use undo action to remove an action. Syntax MSR2000/MSR3000: action number reboot [ subslot subslot-number ] undo action number MSR4000: action number reboot [ slot slot-number [ subslot subslot-number ] ] undo action number Default Monitor policies do not contain any actions. Views CLI-defined policy view Predefined user roles network-admin Parameters number: Specifies an action ID in the range of 0 to 231.
action switchover Use action switchover to add an active/standby switchover action to a monitor policy. Use undo action to remove an action. Syntax action number switchover undo action number Default Monitor policies do not contain any actions. Views CLI-defined policy view Predefined user roles network-admin Parameters number: Specifies an action ID in the range of 0 to 231. Usage guidelines You can configure a series of actions to take in response to the event specified in a monitor policy.
Parameters number: Specifies an action ID, in the range of 0 to 231. priority level: Specifies the log severity level in the range of 0 to 7. A lower value represents a higher severity level. facility local-number: Specifies a logging facility by its device number in the range of local0 to local7. msg msg-body: Configures the log message body. Usage guidelines You can configure a series of actions to take in response to the event specified in a monitor policy.
display rtm environment Use display rtm environment to display user-defined EAA environment variables and their values. Syntax display rtm environment [ var-name ] Views Any view Predefined user roles network-admin Parameters var-name: Specifies a user-defined EAA environment variable by its name. If no variable is specified, this command displays all user-defined EAA environment variables. Examples # Display all user-defined EAA environment variables.
display rtm policy registered Total number: 2 PolicyName Type Event TimeRegistered User-role test1 TCL INTERFACE Apr 21 16:33:00 2012 network-admin test2 CLI INTERFACE Apr 21 16:35:00 2012 network-admin Table 56 Command output Field Description JID Job ID. This field is available for the display rtm policy active command. PolicyName Monitor policy name. Method for creating the policy: Type • TCL—The policy is configured by using Tcl.
sync: Enables the system to execute the command that triggers the event only if the policy has been executed successfully. execute: Triggers the policy when a matching command is entered. help: Triggers the policy when a question mark (?) is entered at a matching command line. tab: Triggers the policy when the Tab key is pressed to complete a parameter in a matching command line. pattern regular-exp: Specifies a regular expression for matching commands that trigger the policy.
undo event Default No hotplug events are configured. Views CLI-defined policy view Predefined user roles network-admin Parameters slot slot-number: Specifies a card by its slot number. (MSR4000.) slot slot-number: Specifies a device by its number. (MSR2000/MSR3000.) subslot subslot-number: Specifies a subcard by its subslot number. Usage guidelines Use hotplug event monitor policies to monitor cards for card swapping performed while the device is operating.
Predefined user roles network-admin Parameters interface-type interface-number: Specifies an interface by its type and number. monitor-obj monitor-obj: Specifies the traffic statistic to be monitored on the interface. For keywords available for the monitor-obj argument, see Table 57. start-op start-op: Specifies the operator for comparing the monitored traffic statistic with the start threshold. The policy is triggered if the comparison result meets the condition.
Usage guidelines Use interface event monitor policies to monitor traffic statistics on an interface. EAA uses the following process to monitor a traffic statistic for an interface event: 1. Compares the traffic statistic sample with the start threshold at sampling intervals by using the start operator until the comparison result meets the condition. 2. Executes the policy. 3.
Parameters exception: Monitors the specified process for exceptional events. EAA executes the policy when an exception occurs to the monitored process. restart: Monitors the specified process for restart events. EAA executes the policy when the monitored process restarts. shutdown: Monitors the specified process for shutdown events. EAA executes the policy when the monitored process is shut down. start: Monitors the specified process for start events.
Parameters oid oid: Specifies the OID of the monitored MIB variable, a string of 1 to 256 characters. monitor-obj { get | next }: Specifies the SNMP operation used for sampling variable values. The get keyword represents the SNMP get operation, and the next keyword represents the SNMP getNext operation. start-op start-op: Specifies the operator for comparing the sampled value with the start threshold. The policy is triggered if the comparison result meets the condition.
event snmp-notification Use event snmp-notification to configure an SNMP_Notification event for a CLI-defined policy. Use undo event to remove the event in a CLI-defined policy. Syntax event snmp-notification oid oid oid-val oid-val op op [ drop ] undo event Default No SNMP_Notification events are configured. Views CLI-defined policy view Predefined user roles network-admin Parameters oid oid: Specifies the OID of the monitored MIB variable, a string of 1 to 256 characters.
event syslog Use event syslog to configure a Syslog event for a CLI-defined monitor policy. Use undo event to delete the event in a CLI-defined monitor policy. Syntax event syslog priority level msg msg-body occurs times period period undo event Default No log event is configured. Views CLI-defined policy view Predefined user roles network-admin Parameters priority level: Specifies the lowest severity level for matching log messages.
rtm cli-policy Use rtm cli-policy to create a CLI-defined EAA monitor policy and enter its view. Use undo rtm cli-policy to delete a CLI-defined monitor policy. Syntax rtm cli-policy policy-name undo rtm cli-policy policy-name Default No CLI-defined monitor policy exists. Views System view Predefined user roles network-admin Parameters policy-name: Specifies the name of a CLI-defined monitor policy, a case-sensitive string of 1 to 63 characters.
Default The system provides the variables in Table 59. You cannot create, delete, or modify these system-defined variables. Table 59 System-defined EAA environment variables by event type Variable name Description Any event: _event_id Event ID. _event_type Event type. _event_type_string Event type description. _event_time Time when the event occurs. _event_severity Severity level of an event. CLI: _cmd Commands that are matched. Syslog: _syslog_pattern Log message content.
Usage guidelines When you define an action, you can enter a variable name with a leading dollar sign ($variable_name) instead of entering a specific value for an argument. EAA will replace the variable name with the variable value when it performs the action. For an action argument, you can specify a list of variable names in the form of $variable_name1$variable_name2...$variable_nameN. Examples # Create an environment variable: set its name to if and set its value to interface.
Default No Tcl policies exist. Views System view Predefined user roles network-admin Parameters policy-name: Specifies a policy name, a case-sensitive string of 1 to 63 characters. tcl-filename: Specifies a .tcl script file name. The file name is case sensitive. You must make sure the file is available on a storage medium of the device. Usage guidelines Use this command if you want to configure a monitor policy in Tcl. This command both creates and enables the specified Tcl-defined monitor policy.
Usage guidelines Policy runtime limits the maximum amount of time that the monitor policy can run from the time it is triggered. When the maximum runtime is reached, the system stops executing the policy even if the execution is not finished. This setting prevents an incorrectly defined policy from running permanently to occupy resources. Examples # Set the maximum runtime to 60 seconds for the CLI-defined policy test.
[Sysname-rtm-test] user-role network-admin [Sysname-rtm-test] user-role admin 272
Process monitoring and maintenance commands The display memory, display process, display process cpu, monitor process and monitor thread commands display information about both user processes and kernel threads. In these commands, "process" refers to both user processes and kernel threads. display kernel deadloop Use display kernel deadloop to display kernel thread deadloop information.
Kernel module info : module name (mrpnc) module address (0xe332a000) module name (12500) module address (0xe00bd000) # Display detailed information about the latest kernel thread deadloop. display kernel deadloop 1 verbose ----------------- Deadloop record 1 ----------------Description : BUG: soft lockup - CPU#0 stuck for 61! [comsh: 16306] Recorded at : 2011-09-01 11:16:00.823018 Occurred at : 2011-09-01 11:16:00.
0xe2be5ec0: 02 be 60 a0 01 86 ef f0 00 00 00 00 00 00 00 00 0xe2be5ed0: 02 04 05 b4 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5ef0: 95 47 73 35 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f00: a0 e1 64 21 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f10: 00 00 00 00 00 00 00 00 00 00 00 00 01 e9 00 00 0xe2be5f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f30: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0 0xe2be5f40: 02 be 61 e0 00 00 00
Table 60 Command output Field Description Description Description for the kernel thread deadloop, including the CPU number, thread running time, thread name, and thread number. Recorded at Time when the kernel thread deadloop was recorded on the MPU, with microsecond precision. Occurred at Time when the kernel thread deadloop occurred, with microsecond precision. Instruction address Instruction address for the kernel thread deadloop. Thread Name and number of the kernel thread deadloop.
Views Any view Predefined user roles network-admin Parameters slot slot-number: Specifies an MPU by its slot number. Without this option, the command displays kernel thread deadloop detection configuration for the active MPU. (MSR4000.) Examples # Display kernel thread deadloop detection configuration.
Parameters show-number: Specifies the number of kernel exceptions to display, in the range of 1 to 20. offset: Specifies the offset between the starting exception and the latest exception, in the range of 0 to 19. The default value is 0. verbose: Displays detailed information. Without this keyword, the command displays brief information. slot slot-number: Specifies an MPU by its slot number. Without this option, the command displays kernel thread exception information for the active MPU. (MSR4000.
Reg: r0, Val = 0x00000000 ; Reg: r1, Val = 0xe2be5ea0 ; Reg: r2, Val = 0x00000000 ; Reg: r3, Val = 0x77777777 ; Reg: r4, Val = 0x00000000 ; Reg: r5, Val = 0x00001492 ; Reg: r6, Val = 0x00000000 ; Reg: r7, Val = 0x0000ffff ; Reg: r8, Val = 0x77777777 ; Reg: r9, Val = 0x00000000 ; Reg: r10, Val = 0x00000001 ; Reg: r11, Val = 0x0000002c ; Reg: r12, Val = 0x057d9484 ; Reg: r13, Val = 0x00000000 ; Reg: r14, Val = 0x00000000 ; Reg: r15, Val = 0x02000000 ; Reg: r16, Val = 0xe2be5f00 ; Reg:
0xe2be6030: 02 27 00 00 00 00 00 00 00 00 00 00 02 be 60 68 0xe2be6040: 02 be 60 60 00 00 00 01 00 00 b0 30 02 be 60 98 0xe2be6050: 00 00 00 04 02 21 00 00 00 00 00 00 01 e9 00 00 0xe2be6060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be6070: 00 00 00 00 00 00 00 00 02 be 66 c0 02 be 66 d0 0xe2be6080: 02 be 61 e0 00 00 00 02 00 00 00 00 02 be 61 70 0xe2be6090: 00 00 00 00 02 21 00 00 05 8d 34 c4 05 7d 92 44 Call trace: Function Address = 0x8012a4b4 Function Address = 0x8017989c Function Address =
slot slot-number: Specifies an MPU by its slot number. Without this option, the command displays kernel thread reboot information for the active MPU. (MSR4000.) Examples # Display brief information about the latest kernel thread reboot. display kernel reboot 1 ----------------- Reboot record 1 ----------------Recorded at : 2011-09-01 11:16:00.823018 Occurred at : 2011-09-01 11:16:00.
0xe2be5f60: 02 be 5f 80 00 ac 1b 14 00 00 00 00 00 00 00 00 0xe2be5f70: 05 b4 5f 90 02 be 5f e0 00 00 00 30 02 be 5f e0 0xe2be5f80: 02 be 5f c0 00 ac 1b f4 00 00 00 00 02 45 00 00 0xe2be5f90: 00 03 00 00 00 00 00 00 02 be 5f e0 00 00 00 30 0xe2be5fa0: 02 be 5f c0 00 ac 1b 14 61 f1 2e ae 02 45 00 00 0xe2be5fb0: 02 44 b3 74 02 be 5f d0 00 00 00 30 02 be 5f e0 0xe2be5fc0: 02 be 60 60 01 74 ff f8 00 00 00 00 00 00 08 00 0xe2be5fd0: 02 be 5f f0 00 e8 93 7e 02 be 5f f8 02 be 5f fc 0xe2be5fe0: 00 00 00 00 00 00 00
Field Description Last 5 thread switches Last five kernel thread switches on the CPU before the kernel thread rebooted, including kernel thread name and kernel thread switching time, with microsecond precision. Dump stack Stack information. Call trace Function call stack information, which shows the instruction address of a called function at each level. No information to display No kernel thread reboot information.
Slot : 0 CPU ID : 0 Kernel module info : module name (mrpnc) module address (0xe332a000) module name (12500) module address (0xe00bd000) # Display detailed information about the latest kernel thread starvation. display kernel starvation 1 verbose ----------------- Starvation record 1 ----------------Description : INFO: task comsh: 16306 blocked for more than 10 seconds. Recorded at : 2011-09-01 11:16:00.823018 Occurred at : 2011-09-01 11:16:00.
0xe2be5ea0: 02 be 5e c0 24 00 00 24 00 00 00 00 05 7d 94 84 0xe2be5eb0: 00 00 00 04 00 00 00 00 00 00 00 28 05 8d 34 c4 0xe2be5ec0: 02 be 60 a0 01 86 ef f0 00 00 00 00 00 00 00 00 0xe2be5ed0: 02 04 05 b4 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5ef0: 95 47 73 35 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f00: a0 e1 64 21 00 00 00 00 00 00 00 00 00 00 00 00 0xe2be5f10: 00 00 00 00 00 00 00 00 00 00 00 00 01 e9 00 00 0xe2be5f20: 00 00 00 00 00 00 00
Related commands reset kernel starvation display kernel starvation configuration Use display kernel starvation configuration to display kernel thread starvation detection configuration. Syntax MSR2000/MSR3000: display kernel starvation configuration MSR4000: display kernel starvation configuration [ slot slot-number] Views Any view Predefined user roles network-admin Parameters slot slot-number: Specifies an MPU by its slot number.
display process Use display process to display process state information. Syntax MSR2000/MSR3000: display process [ all | job job-id | name process-name ] MSR4000: display process [ all | job job-id | name process-name ] [ slot slot-number ] Views Any view Predefined user roles network-admin network-operator Parameters all: Specifies all processes. With the all keyword or without any parameters, the command displays state information for all processes.
Table 64 Command output Field Description Job ID Job ID of the process. The job ID never changes. PID Number of the process. The number identifies the process, and it might change as the process restarts. Parent JID Job ID of the parent process. Parent PID Number of the parent process. Executable path Executable path of the process. For a kernel thread, this field displays a hyphen (-). Instance Instance number of the process.
Field Description Name Process name. # Display state information for all processes. display process all JID PID %CPU %MEM STAT PRI TTY HH:MM:SS COMMAND 1 1 0.0 0.0 S 120 - 00:00:04 scmd 2 2 0.0 0.0 S 115 - 00:00:00 [kthreadd] 3 3 0.0 0.0 S 99 - 00:00:00 [migration/0] 4 4 0.0 0.0 S 115 - 00:00:05 [ksoftirqd/0] 5 5 0.0 0.0 S 99 - 00:00:00 [watchdog/0] 6 6 0.0 0.0 S 115 - 00:00:00 [events/0] 7 7 0.0 0.0 S 115 - 00:00:00 [khelper] 8 8 0.
Field Description COMMAND Name and parameters of a process. If square brackets ([ ]) exist in a process name, the process is a kernel thread. display process cpu Use display process cpu to display CPU usage for all processes. Syntax MSR2000/MSR3000: display process cpu MSR4000: display process cpu [ slot slot-number ] Views Any view Predefined user roles network-admin network-operator Parameters slot slot-number: Specifies a card by its slot number.
752 0.0% 0.0% 0.0% [lipc_topology] 762 0.0% 0.0% 0.0% [MNET] 763 0.0% 0.0% 0.0% [SYSM] ---- More ---- Table 66 Command output Field Description CPU utilization in 5 secs: 16.8%; 1 min: 4.7%; 5 mins: 4.7% System CPU usage within the last 5 seconds, 1 minute, and 5 minutes. JID Job ID of a process. It never changes. 5Sec CPU usage of the process within the last 5 seconds. 1Min CPU usage of the process within the last minute. 5Min CPU usage of the process within the last 5 minutes.
autocfgd 219 219 N N 2012-06-11 09:31:13 2012-06-11 09:31:13 comsh 202 202 N N 2012-06-11 09:31:05 2012-06-11 09:31:13 Table 67 Command output Field Description Name Name of a user process. JID Job ID of a user process. PID ID of a user process. Indicates whether the process exited abnormally: Abort • Y—Yes. • N—No. Core • Y—Yes. • N—No. Start-time Time when the user process started. End-time Time when the user process ended.
Dynamic memory—Heap memory dynamically assigned and released by the system according to the needs of the user process. To view dynamic memory information, execute the display process memory heap command. • Examples # Display memory usage for all user processes.
Views Any view Predefined user roles network-admin network-operator Parameters job job-id: Specifies a user process by its job ID, in the range of 1 to 2147483647. verbose: Displays detailed information. Without this keyword, the command displays brief information. slot slot-number: Specifies a card by its slot number. Without this option, the command displays heap memory usage for the user process on the active MPU. (MSR4000.
Field Description Free Number of free memory blocks. Used Number of used memory blocks. Total Total number of memory blocks. Free Ratio Ratio of free memory to total memory. It helps identify fragment information. Related commands • display process memory • display process memory heap address • display process memory heap size display process memory heap address Use display process memory heap address to display memory content starting from a specified memory block for a process.
B7E30590: 14 00 EF FF 2F 73 62 69 6E 2F 73 6C 62 67 64 00 ..../sbin/slbgd. B7E305A0: 14 00 EF FF 00 00 00 00 44 3B E2 B7 8C 05 E3 B7 ........D;...... B7E305B0: 14 00 EF FF 2F 73 62 69 6E 2F 6F 73 70 66 64 00 ..../sbin/ospfd. B7E305C0: 14 00 EF FF 00 00 00 00 A4 3C E2 B7 AC 05 E3 B7 .........<...... B7E305D0: 14 00 EF FF 2F 73 62 69 6E 2F 6D 73 74 70 64 00 ..../sbin/mstpd. B7E305E0: 14 00 EF FF 00 00 00 00 04 3E E2 B7 CC 05 E3 B7 .........>......
0xb7e30100 0xb7e30110 0xb7e30120 0xb7e30130 0xb7e30140 0xb7e30150 0xb7e30160 0xb7e30170 0xb7e30180 0xb7e30190 0xb7e301a0 0xb7e301b0 0xb7e301c0 0xb7e301d0 0xb7e301e0 0xb7e301f0 0xb7e30200 0xb7e30210 0xb7e30220 0xb7e30230 # Display the addresses of 16-byte memory blocks starting from the fifth block used by process job 1.
This command enables the device to detect deadloops. If a thread occupies the CPU for a specific interval, the device considers that a deadloop has occurred. It outputs a deadloop message and reboots to remove the deadloop. Inappropriate use of this command can cause service problems or system breakdown. Make sure you understand the impact of this command on your network before you use it. Examples # Enable kernel thread deadloop detection.
Usage guidelines You can disable kernel thread deadloop detection for up to 128 kernel threads by executing this command. Inappropriate use of this command can cause service problems or system breakdown. Make sure you understand the impact of this command on your network before you use it. Examples # Disable kernel thread deadloop detection for kernel thread 15.
Usage guidelines If a kernel thread runs for the specified interval, kernel thread deadloop detection considers that a deadloop has occurred. The system records the deadloop and restarts. Inappropriate use of this command can cause service problems or system breakdown. Make sure you understand the impact of this command on your network before you use it. Examples # Set the interval for identifying a kernel thread deadloop to 8 seconds.
This command enables the system to detect and report thread starvation. If a thread is not executed within a specific interval, the system considers that a starvation has occurred, and outputs a starvation message. Thread starvation does not impact system operation. A starved thread can automatically run when certain conditions are met. Inappropriate use of this command can cause service problems or system breakdown. Make sure you understand the impact of this command on your network before you use it.
slot slot-number: Specifies an MPU by its slot number. If you do not specify this option, the active MPU is specified. (MSR4000.) Usage guidelines You can disable kernel thread starvation detection for up to 128 kernel threads by executing the command. Inappropriate use of this command can cause service problems or system breakdown. Make sure you understand the impact of this command on your network before you use it. Examples # Disable kernel thread starvation detection for kernel thread 15.
Usage guidelines If a thread is not executed within the specified interval, the system considers that a starvation has occurred, and outputs a starvation message. Inappropriate use of this command can cause service problems or system breakdown. Make sure you understand the impact of this command on your network before you use it. Examples # Set the interval for identifying a kernel thread starvation to 120 seconds.
to the screen size, and does not display exceeding processes. You can also input interactive commands as shown in Table 70 to perform relevant operations. Table 70 Interactive commands Commands Description ? or h Displays help information that includes available interactive commands. c Sorts processes by CPU usage in descending order, which is the default setting. d Sets the interval for refreshing process statistics, in the range of 1 to 2147483647 seconds. The default value is 5 seconds.
# Display process statistics twice in dumbtty mode. monitor process dumbtty iteration 2 76 processes; 103 threads; 687 fds Thread states: 1 running, 102 sleeping, 0 stopped, 0 zombie CPU states: 44.84% idle, 0.51% user, 39.17% kernel, 15.46% interrupt Memory: 496M total, 341M available, page size 4K JID PID PRI State FDs MEM HH:MM:SS CPU Name 1047 1047 120 R 9 1420K 00:02:30 37.11% diagd scmd 1 1 120 S 17 1092K 00:00:21 11.34% 1000 1000 115 S 0 0K 00:00:09 2.
# Display process statistics in interactive mode. monitor process 76 processes; 103 threads; 687 fds Thread states: 1 running, 102 sleeping, 0 stopped, 0 zombie CPU states: 78.98% idle, 0.16% user, 14.57% kernel, 6.27% interrupt Memory: 496M total, 341M available, page size 4K JID PID PRI State FDs MEM HH:MM:SS CPU Name 1047 1047 120 R 9 1420K 00:02:39 14.13% diagd 1 1 120 S 17 1092K 00:00:23 3.98% scmd 1027 1027 120 S 12 9280K 00:01:13 1.
1 1 120 S 16 1968K 00:00:04 0.41% scmd 881 881 120 S 8 2420K 00:00:07 0.41% diagd Enter f to sort processes by FDs in descending order. (You can also enter command c, m, or t to sort processes.) • 87 processes; 113 threads; 735 fds Thread states: 1 running, 112 sleeping, 0 stopped, 0 zombie CPU states: 90.66% idle, 0.88% user, 5.77% kernel, 2.
Field Description CPU CPU usage of a process. Name Name of a process. If square brackets ([ ]) exist in a process name, the process is a kernel thread. monitor thread Use monitor thread to display thread statistics. Syntax MSR2000/MSR3000: monitor thread [ dumbtty ] [ iteration number ] MSR4000: monitor thread [ dumbtty ] [ iteration number ] [ slot slot-number ] Views Any view Predefined user roles network-admin Parameters dumbtty: Specifies dumbtty mode.
Commands Description n Changes the maximum number of threads displayed within a screen, in the range of 0 to 2147483647. The default value is 10. A value of 0 means no limit. Only threads not exceeding the screen size can be displayed. q Quits interactive mode. < Moves sort field to the next left column. > Moves sort field to the next right column. Examples # Display thread statistics in dumbtty mode.
• Enter h or a question mark (?) to display help information as follows: Help for interactive commands: ?,h Show the available interactive commands c Sort by the CPU field(default) d Set the delay interval between screen updates k Kill a job l Refresh the screen n Set the maximum number of threads to display q Quit the interactive display t Sort by run time of threads since last restart < Move sort field to the next left column > Move sort field to the next right column Press any key to
Field Description JID Job ID of a thread, which never changes. TID ID of a thread. LAST_CPU Number of the CPU on which the latest thread scheduling occurs. PRI Priority level of a thread. State of a thread: State • • • • • R—Running. S—Sleeping. T—Traced or stopped. D—Uninterruptible sleep. Z—Zombie. HH:MM:SS Running time of a thread since last restart. MAX Longest time that a single thread scheduling occupies the CPU, in milliseconds. CPU CPU usage of a thread. Name Name of a thread.
reset kernel exception Use reset kernel exception to clear kernel thread exception information. Syntax MSR2000/MSR3000: reset kernel exception MSR4000: reset kernel exception [ slot slot-number ] Views User view Predefined user roles network-admin Parameters slot slot-number: Specifies an MPU by its slot number. If you do not specify this option, the command clears kernel thread exception information for the active MPU. (MSR4000.) Examples # Clear kernel thread exception information.
reset kernel reboot Related commands display kernel reboot reset kernel starvation Use reset kernel starvation to clear kernel thread starvation information. Syntax MSR2000/MSR3000: reset kernel starvation MSR4000: reset kernel starvation [ slot slot-number ] Views User view Predefined user roles network-admin Parameters slot slot-number: Specifies an MPU by its slot number. If you do not specify this option, the command clears kernel thread starvation information for the active MPU.
Diagnostic commands process core Use process core to enable or disable a process to generate core files for exceptions and to set the maximum number of core files. Syntax MSR2000/MSR3000: process core { maxcore value | off } { job job-id | name process-name } MSR4000: process core { maxcore value | off } { job job-id | name process-name } [ slot slot-number] Views User view Default A process generates a core file for the first exception and does not generate any core files for subsequent exceptions.
# Enable core file generation for process routed and set the maximum number of core files to 5. process core maxcore 5 name routed Related commands • display context • exception filepath exception filepath Use exception filepath to specify the directory to save core files. Use undo exception filepath to remove the specified directory. Syntax exception filepath directory undo exception filepath directory Default The core files are stored in the root directory of Flash or a CF card.
Syntax MSR2000/MSR3000: display exception filepath MSR4000: display exception filepath [ slot slot-number ] Views Any view Predefined user roles network-admin Parameters slot slot-number: Specifies an MPU by its slot number. If you do not specify this option, the active MPU is specified. (MSR4000) Examples # Display the core file directory on the MPU. (MSR2000/MSR3000) display exception filepath The exception filepath is flash:. # Display the core file directory on the active MPU.
Usage guidelines The system generates a context information entry for each core file. A context information entry includes the process ID, the crash time, the core file directory, stack information, and register information. Examples # Display the exception context information on the MPU. display exception context Index 1 of 1 -----------------------------Crashed PID: 85 (/sbin/routed) Crash signal: SIGABRT Crash time: Thu Sep 28 19:34:14 2010 Core file path: flash:/core/core.
Syntax MSR2000/MSR3000: reset exception context MSR4000: reset exception context [ slot slot-number] Views User view Predefined user roles network-admin Parameters slot slot-number: Specifies an MPU by its slot number. If you do not specify this option, the active MPU is specified. (MSR4000) Examples # Clear context information for exceptions.
monitor cpu-usage enable Use monitor cpu-usage enable to enable monitoring CPU usage. Use undo monitor cpu-usage enable to disable monitoring CPU usage. Syntax MSR2000/MSR3000: monitor cpu-usage enable undo monitor cpu-usage enable MSR4000: monitor cpu-usage enable [ slot slot-number] undo monitor cpu-usage enable [ slot slot-number] Default CPU usage monitoring is enabled. Views System view Predefined user roles network-admin Parameters slot slot-number: Specifies a card by its slot number.
Predefined user roles network-admin Parameters interval-value: Specifies the sampling interval as 5 seconds, 1 minute, or 5 minutes. slot slot-number: Specifies a card by its slot number. If you do not specify this option, the active MPU is specified. (MSR4000) Examples # Set the interval for sampling CPU usage to 5 seconds.
Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.
• HP software depot http://www.software.hp.com • HP Education http://www.hp.com/learn Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown. Italic Italic text represents arguments that you replace with actual values. [] Square brackets enclose syntax choices (keywords or arguments) that are optional. { x | y | ...
Network topology icons Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features. Represents an access controller, a unified wired-WLAN module, or the switching engine on a unified wired-WLAN switch. Represents an access point.
Index ACDEFHILMNOPRSTUVWX display logfile summary,228 A display mirroring-group,186 action cli,253 display nqa history,18 action reboot,254 display nqa reaction counters,19 action switchover,255 display nqa result,21 action syslog,255 display nqa server,77 advantage-factor,12 display nqa statistics,26 C display ntp-service ipv6 sessions,82 codec-type,12 display ntp-service sessions,86 commit,256 display ntp-service status,90 D display ntp-service trace,92 display process,287 data-fill,1
display snmp-agent trap queue,136 info-center logfile overwrite-protection,232 display snmp-agent trap-list,137 info-center logfile size-quota,236 display snmp-agent usm-user,137 info-center logging suppress duplicates,238 display sntp ipv6 sessions,115 info-center loghost,239 display sntp sessions,115 info-center loghost source,240 Documents,321 info-center security-logfile alarm-threshold,241 E info-center security-logfile directory,243 info-center security-logfile enable,242 enable,202 inf
monitor kernel deadloop exclude-thread,298 operation (FTP operation view),45 monitor kernel deadloop time,299 operation (HTTP operation view),46 monitor kernel starvation enable,300 P monitor kernel starvation exclude-thread,301 password,46 monitor kernel starvation time,302 ping,2 monitor process,303 ping ipv6,5 monitor thread,308 probe count,47 N probe packet-interval,48 netconf soap http enable,185 probe packet-number,49 next-hop,41 probe packet-timeout,50 nqa,42 probe timeout,50 nq
rtm environment,267 sntp authentication enable,116 rtm scheduler suspend,269 sntp authentication-keyid,117 rtm tcl-policy,269 sntp enable,118 running-time,270 sntp ipv6 unicast-server,118 sntp reliable authentication-keyid,119 S sntp unicast-server,120 sampler,193 source interface,67 security-logfile save,249 source ip,67 sflow agent,216 source ipv6,68 sflow collector,217 source port,69 sflow counter collector,218 statistics hold-time,70 sflow counter interval,218 statistics interval,70