H3c-technologies H3C MSR 50 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Směrovače H3c-technologies H3C MSR 50. H3C Technologies H3C MSR 50 User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 239
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - H3C MSR Series Routers

H3C MSR Series RoutersNetwork Management and MonitoringConfiguration Guide(V5) Hangzhou H3C Technologies Co., Ltd. http://www.h3

Strany 2

···································································· 100Configuring the refresh rate for NetStream version 9 templates ·············

Strany 3 - Preface

Configuring IP accounting IP accounting collects IP packet statistics on the device. It uses IP accounting rules to classify packets and uses flow en

Strany 4 - Port numbering in examples

Step Command Remarks • Enable IP accounting for valid incoming IP packets on the current interface: ip count inbound-packets • Enable IP accounting

Strany 5 - Documentation feedback

89 Figure 30 Network diagram Configuration procedure The two hosts can be replaced by other types of network devices such as routers. 1. Configure

Strany 6 - We appreciate your comments

Configuring NetStream Overview Conventional ways to collect traffic statistics, like SNMP and port mirroring, cannot provide precise network manageme

Strany 7 - Contents

• NetStream collector (NSC)—The NSC is usually a program running in UNIX or Windows. It parses the packets sent from the NDE, and then it stores the

Strany 8

NetStream aggregation data export NetStream aggregation merges the flow statistics according to the aggregation criteria of an aggregation mode, and

Strany 9

Aggregation mode Aggregation criteria • Source prefix • Destination prefix • Source address mask length • Destination address mask length • ToS

Strany 10

In an aggregation mode with AS, if the packets are not forwarded according to the BGP routing table, the statistics on the AS number cannot be obtain

Strany 11

Figure 32 NetStream configuration flow StartConfigure filtering Filter?YesNoSample?EndConfigure samplingYesNoAggregate?Configure aggregation data ex

Strany 12

Step Command Remarks 221. Enter interface view. interface interface-type interface-number N/A 222. Enable NetStream on the interface. ip netstream {

Strany 13

Configuring sFlow ····································································································································

Strany 14 - Configuring SNMP

Step Command Remarks 228. Configure NetStream sampling. ip netstream sampler sampler-name { inbound | outbound } Disabled by default. Configuring Ne

Strany 15 - SNMP configuration task list

Configuration procedure To configure NetStream aggregation data export: Step Command Remarks 236. Enter system view. system-view N/A interface inte

Strany 16

Configuring attributes of NetStream export data Configuring NetStream export format The NetStream export format exports NetStream data in version 5 o

Strany 17

Figure 33 Recorded AS information varies with different keyword configurations AS 20 AS 21AS 22AS 23Enable NetStreamInclude origin-as in the command.

Strany 18

To configure MPLS-aware NetStream: Step Command Remarks 249. Enter system view. system-view N/A By default, no statistics about MPLS packets are co

Strany 19 - Configuring SNMP traps

Configuration procedure To configure flow aging: Step Command Remarks 251. Enter system view. system-view N/A Optional. By default: • Set the agin

Strany 20 - Enabling SNMP traps

NetStream configuration examples NetStream traditional data export configuration example Network requirements As shown in Figure 34, configure NetStr

Strany 21

Figure 35 Network diagram Configuration procedure # Enable NetStream for incoming and outgoing traffic on Ethernet 1/0. <RouterA> system-view

Strany 22 - SNMP configuration examples

105 # Configure the aggregation mode as destination-prefix, and, then, in aggregation view, configure the destination address and the destination UDP

Strany 23 - SNMPv3 configuration example

Configuring NQA Overview Network quality analyzer (NQA) allows you to monitor link status, measure network performance, verify the service levels for

Strany 24

·············································································································· 175Local port mirroring configuration

Strany 25

Figure 37 Collaboration Application modulesDetection moduleSends the detection resultSends the track entry statusTrack moduleAssociates with a detect

Strany 26

NQA configuration task list Complete the following task to configure the NQA server: Task Remarks Required for NQA operations types of TCP, UDP echo

Strany 27

To configure the NQA server: Step Command Remarks 254. Enter system view. system-view N/A 255. Enable the NQA server. nqa server enable Disabled b

Strany 28 - Configuring MIB style

Step Command Remarks Optional. 263. Specify Payload size in each ICMP echo request. data-size size 100 bytes by default. Optional. 264. Configure the

Strany 29 - Configuring RMON

Step Command Remarks By default, no interface is specified to perform a DHCP operation. 271. Specify an interface to perform the DHCP operation. oper

Strany 30 - Alarm group

Step Command Remarks 277. Enter system view. system-view N/A 278. Create an NQA operation and enter NQA operation view. nqa entry admin-name operati

Strany 31 - Private alarm group

Step Command Remarks 289. Specify the HTTP type and enter its view. type http N/A 290. Configure the IP address of the HTTP server as the destinatio

Strany 32

Step Command Remarks 295. Enter system view. system-view N/A 296. Create an NQA operation and enter NQA operation view. nqa entry admin-name operati

Strany 33

NOTE: The display nqa history command does not show the results of the UDP jitter operation. Use the display nqa result command to display the resu

Strany 34

Step Command Remarks 314. Create an NQA operation and enter NQA operation view. nqa entry admin-name operation-tag By default, no NQA operation is cr

Strany 35

vii Debugging a feature module ·······················································································································

Strany 36

Step Command Remarks By default, no destination IP address is configured. 322. Configure the destination address of UDP packets. The destination addr

Strany 37

The following parameters that reflect VoIP network performance can be calculated by using the metrics gathered by the voice operation: • Calculated

Strany 38 - Configuring NTP

Step Command Remarks Optional. By default, no source IP address is specified. 335. Specify the source IP address of voice packets. The source IP addr

Strany 39 - How NTP works

Step Command Remarks 343. Create an NQA operation and enter NQA operation view. nqa entry admin-name operation-tag By default, no NQA operation is cr

Strany 40 - NTP message format

Step Command Remarks Optional. By default, an NQA operation performs one probe. 352. Specify the probe times. probe count times The voice operation c

Strany 41 - NTP operation modes

Step Command Remarks 361. Exit to system view. quit N/A See High Availability Configuration Guide. 362. Associate Track with NQA. N/A 363. Associate

Strany 42 - Broadcast mode

Configuration procedure To configure threshold monitoring: Step Command Remarks 364. Enter system view. system-view N/A 365. Create an NQA operati

Strany 43 - NTP for VPNs

Step Command Remarks • Enable sending traps to the NMS when specified conditions are met: reaction trap { probe-failure consecutive-probe-failures

Strany 44 - NTP configuration task list

Configuring the NQA statistics function NQA collects statistics for an operation in a statistics group. To view information about the statistics grou

Strany 45

To configure the history records saving function: Step Command Remarks 374. Enter system view. system-view N/A 375. Create an NQA operation and ent

Strany 46

Configuring SNMP This chapter provides an overview of the Simple Network Management Protocol (SNMP) and guides you through the configuration procedur

Strany 47

All MSR routers support the nqa agent max-concurrent command, but they have different value ranges and default values: Hardware Value range and defa

Strany 48 - Configuration guidelines

NQA configuration examples ICMP echo operation configuration example Network requirements As shown in Figure 38, configure and schedule an ICMP echo

Strany 49

# Enable saving history records and configure the maximum number of history records that can be saved as 10. [DeviceA-nqa-admin-test1-icmp-echo] hist

Strany 50

DHCP operation configuration example Network requirements As shown in Figure 39, configure and schedule a DHCP operation to test the time required fo

Strany 51

1 512 Succeeded 2011-11-22 09:54:03.8 The output shows that Router A uses 512 milliseconds to obtain an IP address from

Strany 52

Failures due to timeout: 0 Failures due to disconnect: 0 Failures due to no connection: 0 Failures due to sequence error: 0

Strany 53

[DeviceA-nqa-admin-test1-ftp] filename config.txt # Enable the saving of history records. [DeviceA-nqa-admin-test1-ftp] history-record enable [Device

Strany 54

Configuration procedure # Assign each interface an IP address. (Details not shown.) # Configure static routes or a routing protocol to make sure the

Strany 55 - NTP configuration examples

Index Response Status Time 1 64 Succeeded 2011-11-22 10:12:47.9 The output shows that Device A u

Strany 56

Send operation times: 10 Receive response times: 10 Min/Max/Average round trip time: 15/32/17 Square-Sum of round trip

Strany 57

Figure 2 MIB tree A MIB view represents a set of MIB objects (or MIB object hierarchies) with certain access privilege and is identified by a view

Strany 58

Failures due to disconnect: 0 Failures due to no connection: 0 Failures due to sequence error: 0 Failures due to internal err

Strany 59

<DeviceB> system-view [DeviceB] snmp-agent sys-info version all # Set the read community to public. [DeviceB] snmp-agent community read public

Strany 60

TCP operation configuration example Network requirements As shown in Figure 45, configure a TCP operation to test the time the NQA client uses to est

Strany 61

Extended results: Packet loss in test: 0% Failures due to timeout: 0 Failures due to disconnect: 0 Failures due to no con

Strany 62

[DeviceA-nqa-admin-test1-udp-echo] destination ip 10.2.2.2 [DeviceA-nqa-admin-test1-udp-echo] destination port 8000 # Enable the saving of history re

Strany 63

Configuration procedure 1. Assign each interface an IP address. (Details not shown.) 2. Configure static routes or a routing protocol to make sure

Strany 64

Positive SD average: 2 Positive DS average: 6 Positive SD square sum: 54127 Positive DS square sum: 1691967

Strany 65

Negative SD sum: 1028 Negative DS sum: 1022 Negative SD average: 4 Negative DS average: 5 Negative

Strany 66

Destination IP address: 10.2.2.2 Send operation times: 1 Receive response times: 1 Min/Max/Average round trip time: 19/1

Strany 67

# Configure the NQA operation type as ICMP echo. [RouterA-nqa-admin-test1] type icmp-echo # Configure 10.2.2.1 as the destination IP address. [Router

Strany 68

Task Remarks Configuring SNMP traps Optional. Configuring SNMP basic parameters SNMPv3 differs from SNMPv1 and SNMPv2c in many ways. Their configur

Strany 69

147 Track ID: 1 Status: Negative Notification delay: Positive 0, Negative 0 (in seconds) Reference object: NQA entry: admin test1 React

Strany 70 - How a cluster works

Configuring IP traffic ordering IP traffic ordering enables a device to collect and rank statistics for IP flows. An interface can be specified as an

Strany 71 - About NTDP

149 IP traffic ordering configuration example Network requirements As shown in Figure 50, enable IP traffic ordering for IP packets sourced from Hos

Strany 72

Configuring sFlow Sampled Flow (sFlow) is a traffic monitoring technology used to collect and analyze traffic statistics. As shown in Figure 51, the

Strany 73 - Management VLAN

Step Command Remarks Not specified by default. The device periodically checks whether the sFlow agent has an IP address. If the sFlow agent has no I

Strany 74

Configuring counter sampling Step Command Remarks 399. Enter system view. system-view N/A interface interface-type interface-number 400. Enter inter

Strany 75 - Configuring NDP parameters

# Configure the IP address for the sFlow agent. [Device] sflow agent ip 3.3.3.1 # Configure parameters for an sFlow collector: specify sFlow collecto

Strany 76 - Configuring NTDP parameters

154 Troubleshooting sFlow configuration The remote sFlow collector cannot receive sFlow packets Symptom The remote sFlow collector cannot receive sFl

Strany 77 - Establishing a cluster

Configuring samplers Overview A sampler samples packets. The sampler selects a packet from among sequential packets, and it sends the packet to the s

Strany 78

Sampler configuration example Network requirements As shown in Figure 53, configure IPv4 NetStream on Device to collect statistics on incoming and ou

Strany 79 - Cluster member management

Step Command Remarks Optional. By default, the MIB view ViewDefault is predefined and its OID is 1. Each view-name oid-tree pair represents a view re

Strany 80 - Enabling NTDP

157 the number of packets for one sampling, and Device selected the first packet from among the 256 packets received on Ethernet 1/2. <Device>

Strany 81

Configuring PoE Hardware compatibility PoE is available only for MSR 50 routers that are installed with the MPU-G2, and MSR 30-16, MSR 30-20, MSR 30-

Strany 82

To configure a single PoE interface, configure it at the CLI. To configure several PoE interfaces in batches, use the PoE profile. For a PoE configur

Strany 83

You can enable PoE of a PSE if the PSE will not result in PoE power overload. Otherwise, whether you can enable PoE of the PSE depends on whether the

Strany 84

Step Command Remarks Optional. 410. Configure PoE interface power supply mode. poe mode signal By default, power is supplied to PDs over signal wires

Strany 85

Configuring the PoE power Configuring the maximum PSE power The maximum PSE power is the sum of power that the PDs connected to the PSE can get. To a

Strany 86

If PoE supplies power to PSEs, the following actions occur: • If the PoE power is overloaded and PSE power management is not enabled, no power is su

Strany 87

disconnected, but its configuration remains unchanged. If you change the priority of the PoE interface from critical to a lower level, the PDs connec

Strany 88

Monitoring PD If a PSE starts or ends power supply to a PD, the system sends a trap message. Configuring a PoE interface by using a PoE profile You c

Strany 89 - Configuring CWMP (TR-069)

Applying a PoE profile You can apply a PoE profile in either system view or interface view. If you perform application to a PoE interface in both vie

Strany 90 - Autoconfiguration

Step Command Remarks Optional. By default, the SNMP agent is disabled. You can also enable the SNMP agent service by using any command that begins w

Strany 91 - CWMP mechanism

Displaying and maintaining PoE Task Command Remarks display poe device [ | { begin | exclude | include } regular-expression ] Display PSE informatio

Strany 92

• The power supply priority of GigabitEthernet 3/2 is critical. If a new PD results in PSE power overload, the PSE does not supply power to the new

Strany 93 - Configuring CWMP at the CLI

169 Troubleshooting PoE Failure to set the priority of a PoE interface to critical Analysis • The guaranteed remaining power of the PSE is lower tha

Strany 94 - Enabling CWMP

Configuring port mirroring You cannot configure a Layer 2 mirroring group with the source ports and the monitor port located on different cards of th

Strany 95 - Configuring ACS attributes

Port mirroring classification and implementation Port mirroring includes local port mirroring and remote port mirroring based on whether the mirrorin

Strany 96 - Configuring CPE attributes

Creating a local mirroring group Step Command Remarks 443. Enter system view. system-view N/A 444. Create a local mirroring group. No local mirrorin

Strany 97 - Sending Inform messages

Step Command Remarks • (Method 1) In system view: mirroring-group group-id mirroring-port mirroring-port-list { both | inbound | outbound } Use eithe

Strany 98

Configuring local port mirroring by using the mirror command Step Command Remarks 449. Enter system view. system-view N/A 450. Enter interface view.

Strany 99

Local port mirroring configuration example Network requirements As shown in Figure 56, Device A connects to the marketing department through Ethernet

Strany 100 - Configuring IP accounting

176 status: active mirroring port: Ethernet1/1 both Ethernet1/2 both mirroring vlan: mirroring CPU: monitor port: E

Strany 101 - Network requirements

Step Command Remarks 16. Configure the maximum size (in bytes) of SNMP packets for the SNMP agent. Optional. By default, the SNMP agent can receive

Strany 102 - Configuration procedure

Configuring traffic mirroring The following matrix shows the feature and router compatibility: MSR 20-1X MSR 30 MSR 900 MSR 930 Feature MSR 20 MSR

Strany 103 - Configuring NetStream

Step Command Remarks By default, no match criterion is configured in a traffic class. 457. Configure match criteria. if-match [ not ] match-criteria

Strany 104 - NetStream key technologies

Step Command Remarks interface interface-type interface-number Settings in interface view take effect on the current interface. 465. Enter Layer 2 i

Strany 105

Figure 57 Network diagram Configuration procedure 1. Monitor the traffic sent by the technical department to access the Internet: # Create ACL 300

Strany 106

181 [DeviceA] time-range work 8:0 to 18:0 working-day # Create ACL 3001 to allow packets sent from the technical department (on subnet 192.168.2.0/24

Strany 107 - NetStream sampli

Configuring the information center Overview The information center collects and classifies system information as follows: • Receives system informat

Strany 108

Table 5 System information levels Corresponding keyword in commands Severity value Severity Description The system is unusable. For example, the sys

Strany 109

Channel number Default channel name System information received by default Default output destination 7 channel7 Not specified Log, trap, and debu

Strany 110

Log Trap Debug Destination Source modules Status Severity Status Severity Status Severity All supported modules Web interface Enabled Debug Enabled

Strany 111

Field description Field Description The priority is calculated by using this formula: facility*8+level, where: • facility is the facility name. It c

Strany 112

Copyright © 2006-2015, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmit

Strany 113

Enabling SNMP traps Enable SNMP traps only if necessary. SNMP traps are memory-intensive and might affect device performance. To generate linkUp or l

Strany 114 - Flow aging approaches

Field Description content This field contains the content of the system information. Table 9 Timestamp precisions and configuration commands Destin

Strany 115

FIPS compliance NOTE: FIPS is not available for Russia. Table 11 shows the support of devices for the FIPS mode that complies with NIST FIPS 140 -

Strany 116

Outputting system information to the console Step Command Remarks 467. Enter system view. system-view N/A Optional. 468. Enable the information cent

Strany 117

Step Command Remarks 476. Enter system view. system-view N/A Optional. 477. Enable the information center. info-center enable Enabled by default. Op

Strany 118

Outputting system information to a log host Step Command Remarks 485. Enter system view. system-view N/A Optional. 486. Enable the information cente

Strany 119 - Configuring NQA

Step Command Remarks 493. Enter system view. system-view N/A Optional. 494. Enable the information center. info-center enable Enabled by default. Op

Strany 120 - Threshold monitoring

Step Command Remarks info-center source { module-name | default } channel { channel-number | channel-name } [ debug { level severity | state state }

Strany 121 - Configuring the NQA server

Outputting system information to the Web interface The Web interface only receives log information, and discards trap and debug information. This fea

Strany 122 - Configuring the NQA client

Saving system information to a log file (MSR 900, MSR 930, MSR 20, MSR 30, or MSR 50) Step Command Remarks 517. Enter system view. system-view N/A O

Strany 123 - Configuring a DHCP operation

Saving system information to a log file (MSR 20-1X) Task Command Remarks Optional. Disabled by default. Enable the log file feature. logfile { enabl

Strany 124 - Configuring an FTP operation

Step Command Remarks 23. Enter system view. system-view N/A snmp-agent target-host trap address udp-domain { ip-address | ipv6 ipv6-address } [ udp

Strany 125

Step Command Remarks 525. Enter system view. system-view N/A Optional. 526. Enable the information center. info-center enable Enabled by default. 52

Strany 126

Task Command Remarks Optional. By default, the system saves security logs from the security log buffer into the security log file at the interval spe

Strany 127 - Remarks

Task Command Remarks • Establish an FTP connection: ftp [ server-address [ service-port ] [ [ vpn-instance vpn-instance-name ] | [ source { interface

Strany 128 - Configuring a TCP operation

Disabling an interface from generating link up/down logging information By default, all interfaces generate link up or link down log information when

Strany 129

Task Command Remarks display logfile summary [ | { begin | exclude | include } regular-expression ] Display the configuration of the log file. Availa

Strany 130

[Sysname] info-center source default channel console debug state off log state off trap state off To avoid output of unnecessary information, disable

Strany 131

To avoid outputting unnecessary information, disable the output of log, trap, and debug information on the specified channel (loghost in this example

Strany 132 - Configuring a DLSw operation

Figure 61 Network diagram Configuration procedure Before the configuration, make sure the device and the log host can reach each other. (Details n

Strany 133

205 # ps -ae | grep syslogd 147 # kill -9 147 # syslogd -r & Make sure the syslogd process is started with the -r option on a Linux log host. Now

Strany 134

Using ping, tracert, and system debugging Use the ping, tracert, and system debugging utilities to test network connectivity and identify network pro

Strany 135 - Configuration prerequisites

Task Command Remarks display snmp-agent group [ group-name ] [ | { begin | exclude | include } regular-expression ] Display SNMP group information.

Strany 136

Figure 62 Network diagram Configuration procedure # Use the ping command on Device A to test connectivity to Device C. <DeviceA> ping 1.1.2.2

Strany 137

1.1.1.1 Reply from 1.1.2.2: bytes=56 Sequence=4 ttl=254 time=1 ms Record Route: 1.1.2.1 1.1.2.2 1.1.1.2

Strany 138

Figure 63 Traceroute operation Tracert uses received ICMP error messages to get the IP addresses of devices. As shown in Figure 63, tracert works a

Strany 139 - Scheduling an NQA operation

icmp-extensions compliant command on the devices. For more information about this command, see Layer 3—IP Services Command Reference. For an IPv6 net

Strany 140

displayed on a terminal (including console or VTY). You can also send debugging information to other destinations. For more information, see "Co

Strany 141 - NQA configuration examples

Step Command Remarks display debugging [ interface interface-type interface-number ] [ module-name ] [ | { begin | exclude | include } regular-expres

Strany 142

213 3 * * * 4 * * * 5 <DeviceA> The output shows that Device A and Device C cannot reach other, Device A and Device B can reach each other

Strany 143

Configuring IPv6 NetStream Overview Legacy ways to collect traffic statistics, like SNMP and port mirroring, cannot provide precise network managemen

Strany 144

• NetStream collector (NSC)—The NSC is usually a program running in UNIX or Windows. It parses the packets sent from the NDE, and then it stores the

Strany 145

IPv6 NetStream aggregation data export IPv6 NetStream aggregation merges the flow statistics according to the aggregation criteria of an aggregation

Strany 146

[Agent] snmp-agent community write private # Configure contact and physical location information for the agent. [Agent] snmp-agent sys-info contact M

Strany 147

The version 9 format template-based feature provides support of different statand MPLS information. istics, such as BGP next hop IPv6 fo ing configur

Strany 148

Step Command Remarks ipv6 netstream { inbound Disabled by default. 545. Enable IPv6 NetStream. | outbound } 546. Exit to system view. quit N/A 547.

Strany 149

Step Command Remarks 555. Configure the destination address and destination UDP port number for the IPv6 NetStream aggregation data export. By defaul

Strany 150

Step Command Remarks Optional. By default: 559. Configure the version for IPv6 NetStream export format, and specify whether to record AS and BGP next

Strany 151

• Inactive flow aging—A flow is considered inactive if its statistics have not been changed. No packet for this IPv6 NetStream entry arrives in the

Strany 152

Displaying and maintaining IPv6 NetStream Task Command Remarks display ipv6 netstream cache [ verbose ] [ | { begin | exclude | include } regular-exp

Strany 153

# Configure the destination address and the destination UDP port number for the IPv6 NetStream traditional data export. [RouterA] ipv6 netstream expo

Strany 154

224 [RouterA-ns6-aggregation-as] ipv6 netstream export host 4.1.1.1 2000 [RouterA-ns6-aggregation-as] quit # Configure the aggregation mode as protoc

Strany 155

Index A C D E F H I L M N O P S T U 162 Configuring the PoE power,A Configuring the RMON alarm function,19 Adding a candidate device to a cluster,6

Strany 156

F Outputting system information to the Web interface,194 FIPS compliance,188 Overview,1 H Overview,15 8 Hardware compatibility,158 Overview,182 Hi

Strany 157

The NMS and the agent perform authentication when they set up an SNMP session. The authentication algorithm is MD5 and the authentication key is auth

Strany 158

Send request to 1.1.1.1/161 ... Protocol version: SNMPv3 Operation: Get Request binding: 1: 1.3.6.1.2.1.11.29.0 Response binding: 1: Oid=snmpOutTrap

Strany 159 - Verifying the configuration

Configuration procedure This example assumes that you have configured all required SNMP settings for the NMS and the agent (see "SNMPv1/SNMPv2c

Strany 161 - Enabling IP traffic ordering

Configuring MIB style MIBs include public MIBs and private MIBs. A private MIB is attached to a sub-node under the enterprises MIB node (1.3.6.1.4.1)

Strany 162

Configuring RMON Overview Remote Monitoring (RMON) is an enhancement to SNMP for remote device management and traffic monitoring. An RMON monitor, ty

Strany 163 - Configuring sFlow

Preface The H3C MSR documentation set includes 17 configuration guides, which describe the software features for the H3C MSR Series Routers and guide

Strany 164 - Configuring flow sampling

History group The history group defines that the system periodically collects traffic statistics on interfaces and saves the statistics in the histor

Strany 165 - Configuring counter sampling

Private alarm group The private alarm group calculates the values of alarm variables and compares the results with the defined threshold for a more c

Strany 166

• You can successfully create a history control entry, even if the specified bucket size exceeds the history table size supported by the device. How

Strany 167 - Solution

Table 2 RMON configuration restrictions Maximum number of entries Entry Parameters to be compared Event description (description string), event type

Strany 168 - Configuring samplers

Figure 7 Network diagram Configuration procedure # Configure the RMON statistics group on the RMON agent to gather statistics for Ethernet 1/1. &l

Strany 169 - Verification

Configuration procedure # Configure the RMON history group on the RMON agent to gather traffic statistics every minute for Ethernet 1/1. Retain up to

Strany 170

multicast packets : 6 , CRC alignment errors : 0 undersize packets : 0 , oversize packets : 0 fragments : 0

Strany 171 - Configuring PoE

24 [Sysname] snmp-agent target-host trap address udp-domain 1.1.1.2 params securityname public # Configure the RMON statistics group to gather traffi

Strany 172 - Enabling PoE

Configuring NTP You must synchronize your device with a trusted time source by using the Network Time Protocol (NTP) or changing the system time befo

Strany 173

How NTP works Figure 10 shows how NTP synchronizes the system time between two devices, in this example, Device A and Device B. Assume that: • Prior

Strany 174 - Detecting PDs

Convention Description Asterisk marked square brackets enclose optional syntax choices separated by vertical bars, from which you select one choice, m

Strany 175 - Configuring the PoE power

NTP message format All NTP messages mentioned in this document refer to NTP clock synchronization messages. NTP uses two types of messages: clock syn

Strany 176

• Stratum—An 8-bit integer that indicates the stratum level of the local clock, taking the value of 1 to 16. Clock precision decreases from stratum

Strany 177

(server mode). Upon receiving the replies from the servers, the client performs clock filtering and selection and synchronizes its local clock to tha

Strany 178 - Configuring a PoE profile

The client continues listening to broadcast messages and synchronizes its local clock based on the received broadcast messages. Multicast mode Figure

Strany 179 - Applying a PoE profile

Figure 16 Network diagram NTP configuration task list Task Remarks Configuring NTP operation modes Required. Configuring the local clock as a refe

Strany 180 - PoE configuration example

Configuring NTP client/server mode If you specify the source interface for NTP messages by specifying the source interface source-interface option, N

Strany 181

Step Command Remarks By default, no symmetric-passive peer is specified. ntp-service unicast-peer [ vpn-instance vpn-instance-name ] { ip-address | p

Strany 182 - Troubleshooting PoE

Configure the NTP multicast mode on both the server and clients. The NTP multicast mode must be configured in a specific interface view. For more inf

Strany 183 - Configuring port mirroring

Step Command Remarks The value of the ip-address argument must be 127.127.1.u, where u represents the NTP process ID in the range of 0 to 3. 57. Con

Strany 184 - Configuration Guide

Step Command Remarks interface interface-type interface-number 61. Enter interface view. N/A 62. Disable the interface from receiving NTP messages.

Strany 185 - Configuring source ports

Category Documents Purposes specifications Technology white papers Provide an in-depth description of software features and technologies. Card datash

Strany 186 - Configuring the monitor port

Configuration procedure To configure the NTP service access-control right to the local device: Step Command Remarks 65. Enter system view. system-v

Strany 187

Step Command Remarks By default, no NTP authentication key is configured. ntp-service authentication-keyid keyid authentication-mode md5 [ cipher | s

Strany 188

Configuring NTP authentication for an active peer Step Command Remarks 76. Enter system view. system-view N/A By default, NTP authentication is dis

Strany 189

Step Command Remarks By default, NTP authentication is disabled. 86. Enable NTP authentication. ntp-service authentication enable By default, no NTP

Strany 190 - Overview

Step Command Remarks By default, no NTP authentication key is configured. ntp-service authentication-keyid keyid authentication-mode md5 [ cipher | s

Strany 191 - Applying a QoS policy

NTP configuration examples NTP client/server mode configuration example Network requirements Perform the following configurations to synchronize the

Strany 192

Actual frequency: 64.0000 Hz Clock precision: 2^7 Clock offset: 0.0000 ms Root delay: 31.00 ms Root dispersion: 1.05 ms Peer dispersion: 7.81 m

Strany 193

<DeviceA> system-view [DeviceA] ntp-service refclock-master 2 3. Configure Device B: # Specify Device A as the NTP server of Device B. <D

Strany 194

• Router C operates in broadcast server mode and sends broadcast messages from Ethernet 1/1. • Router B and Router A operate in broadcast client mo

Strany 195

Nominal frequency: 64.0000 Hz Actual frequency: 64.0000 Hz Clock precision: 2^7 Clock offset: 0.0000 ms Root delay: 31.00 ms Root dispersio

Strany 196

We appreciate your comments.

Strany 197

# Specify the local clock as the reference source, with the stratum level 2. <RouterC> system-view [RouterC] ntp-service refclock-master 2 # C

Strany 198 - System information formats

[RouterB-Ethernet1/1] igmp static-group 224.0.1.1 [RouterB-Ethernet1/1] quit [RouterB] interface ethernet 1/2 [RouterB-Ethernet1/2] pim dm 5. Config

Strany 199 - Field description

Figure 21 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 21. (Details not shown.) 2. Configu

Strany 200

# Display NTP session information for Device B, which shows that an association has been set up Device B and Device A. [DeviceB] display ntp-service

Strany 201 - FIPS compliance

# Enable NTP authentication on Router B. Configure an NTP authentication key, with the key ID of 88 and key value of 123456. Specify the key as a tru

Strany 202

Clock status: unsynchronized Clock stratum: 16 Reference clock ID: none Nominal frequency: 100.0000 Hz Actual frequency: 100.0000 Hz Clock prec

Strany 203

Clock stratum: 4 Reference clock ID: 3.0.1.31 Nominal frequency: 64.0000 Hz Actual frequency: 64.0000 Hz Clock precision: 2^7 Clock offset:

Strany 204

Configuration procedure Before you perform the following configuration, be sure you have completed MPLS VPN-related configurations and make sure of t

Strany 205

55 as a reference source, with the stratum level 1, configure CE 1 to operate in symmetric peers mode, and specify VPN 1 as the target VPN. Configura

Strany 206

Configuring cluster management Overview Cluster management is an effective way to manage large numbers of dispersed network devices in groups and off

Strany 207

Contents Configuring SNMP ····························································································································

Strany 208

Figure 24 Cluster example Network manager69.110.1.1/24CandidateAdministrator69.110.1.100/24IP networkMemberClusterMemberMember As shown in Figure 2

Strany 209 - Managing security logs

About NDP NDP discovers information about directly connected neighbors, including the device name, software version, and connecting port of the adjac

Strany 210

You should specify the management device before creating a cluster. The management device discovers and defines a candidate device through NDP and NT

Strany 211

• Besides, a member device sends handshake packets to inform the management device of neighbor topology changes. Management VLAN Management VLAN lim

Strany 212

Task Remarks Configuring the management device: • Enabling NDP globally and for specific ports Required. • Configuring NDP parameters Optional. •

Strany 213

Step Command Remarks 105. Enter system view. system-view N/A Optional. 106. Enable NDP globally. ndp enable By default, this function is enabled. Us

Strany 214

Step Command Remarks Optional. By default, NTDP is enabled on all ports. To avoid the management device collecting unnecessary topology data, disable

Strany 215

Manually collecting topology information The management device collects topology information periodically after a cluster is created. In addition, yo

Strany 216

Step Command Remarks Optional. 123. Specify the management VLAN. management-vlan vlan-id By default, VLAN 1 is the management VLAN. 124. Enter cluste

Strany 217

To configure communication between the management device and the member devices within a cluster: Step Command Remarks 130. Enter system view. syste

Strany 218 - # syslogd -r &

························································································································· 33Configuring NTP multicas

Strany 219 - Ping example

Adding a member device Step Command 138. Enter system view. system-view 139. Enter cluster view. cluster add-member [ member-number ] mac-address mac

Strany 220

Deleting a member device from a cluster Step Command 147. Enter system view. system-view 148. Enter cluster view. cluster 149. Delete a member device

Strany 221 - Tracert

Configuring advanced cluster functions Configuring topology management The concepts of blacklist and whitelist are used for topology management. An a

Strany 222 - Prerequisites

Configuring interaction for a cluster You configure the FTP/TFTP server, NMS and log host settings for the cluster on the cluster management device.

Strany 223 - System debugging

Step Command Remarks 169. Configure the SNMP community name shared by a cluster. cluster-snmp-agent community { read | write } community-name [ mib-v

Strany 224 - Debugging a feature module

Displaying and maintaining cluster management Task Command Remarks display ndp [ interface interface-list ] [ | { begin | exclude | include } regular

Strany 225 - Ping and tracert example

use the same SNMP NMS and log services on host IP address: 69.172.55.4/24. • Add the device whose MAC address is 00E0-FC01-0013 to the blacklist. Fi

Strany 226 - <DeviceA>

[DeviceB] interface ethernet 1/3 [DeviceB-Ethernet1/3] ndp enable [DeviceB-Ethernet1/3] quit # Configure the period for the receiving device to keep

Strany 227 - Configuring IPv6 NetStream

75 (Please confirm in 30 seconds, default No). (Y/N) N # Enable management VLAN auto-negotiation. [abc_0.DeviceB-cluster] management-vlan synchroniza

Strany 228 - IPv6 NetStream data export

Configuring CWMP (TR-069) Overview CPE WAN Management Protocol (CWMP), also called "TR-069," is a DSL Forum technical specification for rem

Strany 229 - IPv6 NetStream export format

······································································································· 71Configuring Web user accounts in batches ·

Strany 230 - Enabling IPv6 NetStream

• A CPE starts up. A CPE can find the corresponding ACS according to the acquired URL, and automatically initiates a connection to the ACS. • A CPE

Strany 231 - Configur

• Manufacturer name (Manufacturer) • ManufacturerOUI • SerialNumber • HardwareVersion • SoftwareVersion • DeviceStatus • UpTime • Configurati

Strany 232

Figure 29 Example of the CWMP message interaction The following steps show how CWMP works: 1. Establish a TCP connection. 2. Initialize SSL and e

Strany 233

ACS may assign some ACS and CPE attributes to the CPE, depending on the CWMP implementation in your network. Support for these configuration modes va

Strany 234

Complete the following tasks to configure CWMP at the CLI: Task Remarks Enabling CWMP Required. Configuring ACS attributes: Required. • Configurin

Strany 235

Configuring ACS attributes ACS attributes include ACS URL, username and password. When the CPE initiates a connection to the ACS, the ACS URL, userna

Strany 236

Configuring CPE attributes CPE attributes include CPE username and password, which a CPE uses to authenticate the validity of an ACS. When an ACS ini

Strany 237

Sending Inform messages Inform messages need to be sent during the connection establishment between a CPE and an ACS. You can configure the Inform m

Strany 238

Configuring the close-wait timer of the CPE The close-wait timer is used mainly in the following cases: • During the establishment of a connection,

Strany 239

86 Step Command Remarks 209. Enter system view. system-view N/A 210. Enter CWMP view. cwmp N/A 211. Specify an SSL client policy. ssl client-policy

Komentáře k této Příručce

Žádné komentáře