H3c-technologies H3C MSR 5600 Uživatelský manuál Strana 1

Procházejte online nebo si stáhněte Uživatelský manuál pro Směrovače H3c-technologies H3C MSR 5600. H3C Technologies H3C MSR 5600 User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 247
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - H3C MSR Series Routers

H3C MSR Series RoutersNetwork Management and MonitoringConfiguration Guide(V7) Hangzhou H3C Technologies Co., Ltd. http://

Strany 2

iv How to use NETCONF ·······························································································································

Strany 3 - Preface

87 Figure 33 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 33. (Details not shown.) 2. Conf

Strany 4 - Conventions

88 # Router A and Router B get synchronized upon receiving a broadcast message from Router C. Display the NTP status of Router A after clock synchron

Strany 5 - Documentation feedback

89 Figure 34 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 34. (Details not shown.) 2. Conf

Strany 6 - We appreciate your comments

90 Clock jitter: 0.044281 s Stability: 0.000 pps Clock precision: 2^-10 Root delay: 0.00229 ms Root dispersion: 4.12572 ms Reference time: d0d2

Strany 7 - Contents

91 Leap indicator: 00 Clock jitter: 0.165741 s Stability: 0.000 pps Clock precision: 2^-10 Root delay: 0.00534 ms Root dispersion: 4.51282 ms

Strany 8

92 2. Configure Router C: # Enable the NTP service. <RouterC> system-view [RouterC] ntp-service enable # Specify the local clock as the refer

Strany 9

93 Total sessions : 1 The output shows that an association has been set up between Router D and Router C. 5. Configure Router B: Because Router A

Strany 10

94 Reference: 127.127.1.0 Clock stratum: 2 Reachabilities: 2 Poll interval: 64 Last receive time: 71 Offset: -

Strany 11

95 # Specify Device A as the NTP server of Device B, and associate the server with key 42. [DeviceB] ntp-service unicast-server 1.0.1.11 authenticat

Strany 12

96 Configuration example for NTP broadcast mode with authentication Network requirements As shown in Figure 37, Router C functions as the NTP server

Strany 13

v Verifying the configuration ·······················································································································

Strany 14 - Ping example

97 3. Configure Router B: # Enable the NTP service. <RouterB> system-view [RouterB] ntp-service enable # Enable NTP authentication on Router B

Strany 15

98 Clock stratum: 4 System peer: 3.0.1.31 Local mode: bclient Reference clock ID: 3.0.1.31 Leap indicator: 00 Clock jitter: 0.006683 s Stabili

Strany 16 - Tracert

99 Figure 38 Network diagram Device Interface IP address Device Interface IP address CE 1 S2/0 10.1.1.1/24 PE 1 S2/0 10.1.1.2/24 CE 2 CE 3 S2/

Strany 17 - Tracert example

100 Clock status: synchronized Clock stratum: 3 System peer: 10.1.1.1 Local mode: client Reference clock ID: 10.1.1.1 Leap indicator: 00 Clock

Strany 18

101 Figure 39 Network diagram Device Interface IP address Device Interface IP address CE 1 S2/0 10.1.1.1/24 PE 1 S2/0 10.1.1.2/24 CE 2 CE 3 S2

Strany 19 - System debugging

102 Reference clock ID: 10.1.1.1 Leap indicator: 00 Clock jitter: 0.005096 s Stability: 0.000 pps Clock precision: 2^-10 Root delay: 0.00655 ms

Strany 20

103 Configuring SNTP SNTP is a simplified, client-only version of NTP specified in RFC 4330. SNTP supports only the client/server mode. An SNTP-enabl

Strany 21 - Configuring NQA

104 Step Command Remarks 2. Specify an NTP server for the device. • For IPv4: sntp unicast-server { ip-address | server-name } [ vpn-instance vpn-i

Strany 22 - Threshold monitoring

105 Step Command Remarks 5. Associate the SNTP authentication key with the specific NTP server. • For IPv4: sntp unicast-server { ip-address | serv

Strany 23 - Configuring the NQA server

106 # Configure an NTP authentication key, with the key ID of 10 and key value of aNiceKey. Input the key in plain text. [DeviceA] ntp-service authen

Strany 24 - Enabling the NQA client

vi Verifying the configurations ·····················································································································

Strany 25

107 Configuring SNMP NOTE: FIPS is not available for Russia. This chapter provides an overview of the Simple Network Management Protocol (SNMP) an

Strany 26

108 MIB and view-based MIB access control A MIB stores variables called "nodes" or "objects" in a tree hierarchy and identifies e

Strany 27

109 Configuring SNMP basic parameters SNMPv3 differs from SNMPv1 and SNMPv2c in many ways. Their configuration procedures are described in separate s

Strany 28

110 Step Command Remarks 8. Configure the SNMP access right. • (Method 1) Create an SNMP community: snmp-agent community { read | write } [ simple

Strany 29

111 Security model Security model keyword for the group Security key settings for the user Remarks No authentication, no privacy Neither authenticati

Strany 30

112 Step Command Remarks 8. (Optional.) Create or update a MIB view. snmp-agent mib-view { excluded | included } view-name oid-tree [ mask mask-valu

Strany 31

113 The SNMP agent logs Get requests, Set requests, Set responses, and SNMP notifications, but does not log Get responses. • Get operation—The agen

Strany 32

114 Step Command Remarks 2. Enable notifications globally. snmp-agent trap enable [ protocol | standard [ authentication | coldstart | linkdown | li

Strany 33

115 Step Command Remarks 2. Configure a target host. • (Method 1) Send traps to the target host: In non-FIPS mode: snmp-agent target-host trap addr

Strany 34

116 Displaying the SNMP settings Execute display commands in any view. Task Command Display SNMP agent system information, including the contact, ph

Strany 35

vii Index ···········································································································································

Strany 36

117 # Configure the IP address of the agent and make sure the agent and the NMS can reach each other. (Details not shown.) # Specify SNMPv1, and crea

Strany 37 - Reaction entry

118 SNMPv3 configuration example Network requirements As shown in Figure 44, the NMS (1.1.1.2/24) uses SNMPv3 to monitor and manage the interface sta

Strany 38

119 { Set the authentication key to 123 456T ESTaut h& ! and the privacy key to 123 456 TE STenc r &! . { Set the timeout time and maximum

Strany 39

120 Configuring RMON Overview Remote Network Monitoring (RMON) is an enhancement to SNMP. It enables proactive remote monitoring and management of ne

Strany 40

121 • None—Takes no actions. Alarm group The RMON alarm group monitors alarm variables, such as the count of incoming packets (etherStatsPkts) on an

Strany 41

122 Sample types for the alarm group and the private alarm group The RMON agent supports the following sample types: • absolute—RMON compares the va

Strany 42 - Configuring the DNS template

123 To create an RMON history control entry: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter Ethernet interface view. interfa

Strany 43 - Configuring the TCP template

124 Step Command Remarks 2. (Optional.) Create an event entry in the event table. rmon event entry-number [ description string ] { log | log-trap se

Strany 44

125 Figure 46 Network diagram Configuration procedure # Create an RMON Ethernet statistics entry for Ethernet 1/1. <Sysname> system-view [Sys

Strany 45 - Configuring the FTP template

126 Configuration procedure # Create an RMON history control entry to sample traffic statistics every one minute for Ethernet 1/1. Retain up to eight

Strany 46

1 Using ping, tracert, and system debugging This chapter covers ping, tracert, and information about debugging the system. Ping Use the ping utility

Strany 47 - NQA configuration examples

127 dropevents : 0 , octets : 898 packets : 9 , broadcast packets : 2 multicast packets

Strany 48

128 [Sysname] snmp-agent target-host trap address udp-domain 1.1.1.2 params securityname public # Create an RMON Ethernet statistics entry for Ethern

Strany 49

129 Configuring NETCONF NOTE: FIPS is not available for Russia. Overview Network Configuration Protocol (NETCONF) is an XML-based network manageme

Strany 50

130 NETCONF message format NETCONF All NETCONF messages are XML-based and comply with RFC 4741. The NETCONF operations supported by the device and th

Strany 51

131 <filter type="subtree"> <top xmlns="http://www.h3c.com/netconf/data:1.0"> <Ifmgr

Strany 52

132 NETCONF configuration task list Task at a glance (Optional.) Enabling NETCONF over SOAP (Required.) Establishing a NETCONF session (Optional.) Su

Strany 53

133 Entering xml view Task Command Remarks Enter XML view. xml Available in user view. Exchanging capabilities After you enter XML view, the clie

Strany 54

134 Subscription procedure # Copy the following message to the client to complete the subscription: <?xml version="1.0" encoding="U

Strany 55

135 </rpc-reply> For more information about error messages, see RFC 4741. Example for subscribing to event notifications Network requirements

Strany 56

136 </notification> # When another client (192.168.100.130) logs in to the device, the device sends the following text to notify the client tha

Strany 57

2 Figure 1 Network diagram Configuration procedure # Use the ping command on Device A to test connectivity to Device C. Ping 1.1.2.2 (1.1.2.2): 56

Strany 58

137 Unlocking the configuration # Copy the following text to the client to unlock the configuration: <?xml version="1.0" encoding="

Strany 59

138 Verifying the configuration If the client receives the following response, the lock operation is successful: <?xml version="1.0" enc

Strany 60

139 <getopration> <filter> <top xmlns=" http://www.h3c.com/netconf/data:1.0"> Specify the module, s

Strany 61

140 <?xml version="1.0"?> <rpc-reply message-id="100" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0&quo

Strany 62

141 <target><running></running></target> <error-option> Default operation when an error occurs </error-option

Strany 63

142 Verifying the configuration If the client receives the following text, the get-config operation is successful: <rpc-reply xmlns="urn:ietf

Strany 64

143 <Web> <Service> <SessionAgingTime>98</SessionAgingTime> &

Strany 65

144 <LogBuffer> <BufferSize>120</BufferSize> </LogBuffer>

Strany 66

145 <IfIndex>1</IfIndex> <Name>Aux0</Name> <AbbreviatedName>

Strany 67

146 </rpc> Verifying the configuration If the client receives the following text, the edit-config operation is successful: <?xml version=&qu

Strany 68

3 2. The intermediate device (Device B) adds the IP address of its outbound interface (1.1.2.1) to the RR option of the ICMP echo request, and forwa

Strany 69

147 </rpc-reply> Loading the configuration After you perform the load operation, the loaded configurations are merged into the current configur

Strany 70

148 </rpc> Verifying the configuration If the client receives the following response, the save operation is successful: <?xml version="

Strany 71

149 </source> <filter type="subtree"> <top xmlns="http://www.h3c.com/netconf/config:1.0">

Strany 72 - Configuring NTP

150 <filter type="subtree"> <top xmlns="http://www.h3c.com/netconf/data:1.0"> <Device>

Strany 73 - NTP architecture

151 </top> </filter> </get> </rpc> Verifying the configuration If the client receives the following text, the ope

Strany 74 - Association modes

152 <IfIndex>2688</IfIndex> <Description>Ten-GigabitEthernet6/0/2:4 Interface</D

Strany 75

153 # Retrieve data in the Name column with the ifIndex value not less than 5000 in the Interfaces table under the Ifmgr module. <rpc message-id=&

Strany 76 - NTP security

154 Configuration procedure # Copy the following text to the client to execute the commands: <?xml version="1.0" encoding="UTF-8&qu

Strany 77 - NTP for MPLS VPNs

155 </CLI> </rpc> Verifying the configuration If the client receives the following text, the operation is successful. <?xml vers

Strany 78 - Enabling the NTP service

156 <SessionID>Configuration session ID </SessionID> <Line>line information</Line> <UserName>Name of

Strany 79

4 6. The source device thinks that the packet has reached the destination device after receiving the port-unreachable ICMP message, and the path to

Strany 80

157 # Copy the following message to the client to terminate the specified NETCONF session: <rpc message-id="101" xmlns="urn:ietf

Strany 81

158 Returning to the CLI To return from XML view to the CLI, send the following close-session request: <?xml version="1.0"?> <r

Strany 82

159 Appendix Appendix A Supported NETCONF operations Table 18 lists the NETCONF operations available with Comware V7. Table 12 NETCONF operations Ope

Strany 83

160 Operation Description XML example get-config Retrieves the non-default configuration data. If non-default configuration data does not exist, the

Strany 84

161 Operation Description XML example get-bulk-config Retrieves a number of non-default configuration data entries starting from the data entry next

Strany 85

162 Operation Description XML example edit-config: create Creates a specified target. To use the create attribute in the edit-config operation, you m

Strany 86

163 Operation Description XML example edit-config: delete Deletes the specified configuration. • If the specified target has only the table index,

Strany 87

164 Operation Description XML example edit-config: default-operation Modifies the current configuration of the device using the default operation met

Strany 88

165 Operation Description XML example edit-config: error-option Determines the action to take in case of a configuration error. The error-option elem

Strany 89

166 Operation Description XML example edit-config: test-option Determines whether to issue a configuration item in the edit-configure operation. The

Strany 90

5 Test the network connectivity between Device A and Device C. If they cannot reach each other, locate the failed nodes in the network. Figure 3 Netw

Strany 91

167 Operation Description XML example lock Locks the configuration data that can be changed by the edit-config operation. Other configurations are no

Strany 92

168 Operation Description XML example CLI Executes CLI operations. A request message encloses commands in the <CLI> element, and a response mes

Strany 93

169 Configuring port mirroring Overview Port mirroring refers to the process of copying the packets passing through a port to the monitor port connec

Strany 94

170 Figure 49 Local port mirroring implementation As shown in Figure 49, the source port Ethernet 1/1 and monitor port Ethernet 1/2 reside on the s

Strany 95

171 Configuration restrictions and guidelines When you configure source ports for a local mirroring group, follow these restrictions and guidelines:

Strany 96

172 Step Command Remarks 1. Enter system view. system-view N/A 2. Configure the monitor port for the specified local mirroring group. mirroring-gr

Strany 97

173 Figure 50 Network diagram Configuration procedure # Create local mirroring group 1. <Device> system-view [Device] mirroring-group 1 local

Strany 99

175 Configuring samplers A sampler samples packets. The sampler selects a packet from among sequential packets, and it sends the packet to other serv

Strany 100 - Configuration procedure

176 • Configure fixed sampling in the inbound direction to select the first packet from among 100 packets. • Configure random sampling in the outbo

Strany 101 - Network requirements

6 5. Use the debugging ip icmp command on Device A and Device C to verify that they can send and receive the specific ICMP packets, or use the displ

Strany 102

177 Configuring NetStream Overview Conventional ways to collect traffic statistics, like SNMP and port mirroring, cannot provide precise network mana

Strany 103

178 • NetStream collector—The NSC is usually a program running in an operation system. It parses the packets received from the NDE, and then it stor

Strany 104

179 NetStream aggregation data export NetStream aggregation merges the flow statistics according to the aggregation criteria of an aggregation mode,

Strany 105

180 Aggregation mode Aggregation criteria Prefix-port aggregation • Source prefix • Destination prefix • Source address mask length • Destinatio

Strany 106

181 In an aggregation mode with AS, if the packets are not forwarded according to the BGP routing table, the AS number cannot be obtained. In the agg

Strany 107

182 Figure 53 NetStream configuration flow Complete these tasks to configure NetStream: Tasks at a glance Remarks (Required.) Enabling NetStream o

Strany 108

183 Step Command Remarks 2. Enter interface view. interface interface-type interface-number N/A 3. Enable NetStream on the interface. ip netstream

Strany 109

184 • Statistics about source AS, destination AS, and peer ASs in version 5 or version 9 format. • Statistics about BGP next hop in version 9 forma

Strany 110

185 Configuring the refresh rate for NetStream version 9 templates Version 9 is template-based and supports formats that can be defined, so the NetSt

Strany 111

186 Periodical aging Periodical aging uses the following methods: • Inactive flow aging—A flow is considered inactive if no packet for this NetStre

Strany 112

Copyright © 2014, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmitted

Strany 113

7 To debug a feature module: Step Command Remarks 1. Enable debugging for a specified module in user view. debugging { all [ timeout time ] | modu

Strany 114

187 Step Command Remarks 3. Configure forced aging of the NetStream entries. 4. Set the maximum entries that the cache can accommodate: ip netstrea

Strany 115

188 Step Command Remarks 1. Enter system view. system-view N/A 2. Set a NetStream aggregation mode and enter its view. ip netstream aggregation {

Strany 116 - Configuring SNTP

189 Task Command Age out and export all NetStream data, and clear the cache. reset ip netstream statistics NetStream traditional data export configu

Strany 117

190 Flow active timeout (minutes) : 30 Flow inactive timeout (seconds) : 30 Max number of entries : 1024 IP active flow ent

Strany 118 - SNTP configuration example

191 NetStream aggregation data export configuration example Network requirements As shown in Figure 56, configure NetStream on Router A to meet the f

Strany 119

192 [RouterA-ns-aggregation-as] enable [RouterA-ns-aggregation-as] ip netstream export host 4.1.1.1 2000 [RouterA-ns-aggregation-as] quit # Configure

Strany 120 - Configuring SNMP

193 L2 flow entries been counted : 0 IPL2 flow entries been counted : 0 Last statistics reset time : Never IP packet size distr

Strany 121 - Protocol versions

194 Version 9 exported flows number : 0 Version 9 exported UDP datagrams number (failed): 0 (0) destination-prefix aggregation e

Strany 122

195 Configuring sFlow Sampled Flow (sFlow) is a traffic monitoring technology. As shown in Figure 57, the sFlow system involves an sFlow agent embed

Strany 123

196 Tasks at a glance Perform at least one of the following tasks: • Configuring flow sampling • Configuring counter sampling Configuring the sFlo

Strany 124

8 Configuring NQA Overview Network quality analyzer (NQA) allows you to measure network performance, verify the service levels for IP services and ap

Strany 125 - Configuring SNMP logging

197 Step Command Remarks 1. Enter system view. system-view N/A 2. Enter Ethernet interface view. interface interface-type interface-number N/A 3.

Strany 126 - Enabling SNMP notifications

198 sFlow configuration example Network requirements As shown in Figure 58, configure flow sampling in random mode and counter sampling on Ethernet 1

Strany 127 - Configuration prerequisites

199 Verifying the configurations # Display the sFlow configuration and operation information. [Sysname-Ethernet1/1] display sflow sFlow datagram vers

Strany 128

200 Configuring the information center NOTE: FIPS is not available for Russia. The information center on a device classifies and manages logs for

Strany 129 - Displaying the SNMP settings

201 Table 14 Log levels Severity value Level Description 0 Emergency The system is unusable. For example, the system authorization has expired. 1 A

Strany 130 - { Specify SNMPv1

202 Table 16 Default output rule for diagnostic logs Destination Log source modules Output switch Severity Diagnostic log file All supported modules

Strany 131 - SNMPv3 configuration example

203 Output destination Format Example Log host • H3C format: <PRI>Timestamp Sysname %%vvModule/Level/Mnemonic: Source; Content • unicom form

Strany 132

204 Field Description %% (vendor ID) Indicates that the information was generated by an H3C device. This field exists only in logs sent to the log ho

Strany 133 - Configuring RMON

205 Timestamp parameters Description Example none No timestamp is included. All logs support this parameter. % Sysname FTPD/5/FTPD_LOGIN: User ftp (1

Strany 134 - Private alarm group

206 Step Command Remarks 3. Configure an output rule for the console. info-center source { module-name | default } { console | monitor | logbuffer |

Strany 135 - Protocols and standards

9 • A UDP jitter or a voice operation sends a specific number of probe packets. The number of probe packets is configurable with the probe packet-nu

Strany 136

207 Outputting logs to a log host Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-center enable

Strany 137

208 The log file feature saves logs from the log file buffer to a log file every 24 hours. You can adjust the saving interval or manually save logs t

Strany 138

209 Managing security logs Security logs are very important for locating and troubleshooting network problems. Generally, security logs are output to

Strany 139

210 Task Command Remarks Display a summary of the security log file. display security-logfile summary Available in user view. Change the directory of

Strany 140

211 Step Command Remarks 5. (Optional.) Specify the directory to save diagnostic log files. info-center diagnostic-logfile directory dir-name By def

Strany 141

212 • If a different log is generated during the suppression period, the system aborts the current suppression period, outputs suppressed logs and t

Strany 142 - Configuring NETCONF

213 Task Command Display a summary of the log buffer (MSR 2600/MSR 3600). display logbuffer summary [ level severity ] Display a summary of the log

Strany 143 - NETCONF message format

214 Configuration example for outputting logs to a UNIX log host Network requirements Configure the device to output to the UNIX log host FTP logs th

Strany 144 - FIPS compliance

215 NOTE: Follow these guidelines while editing the file /etc/syslog.conf: • Comments must be on a separate line and must begin with a pound sign

Strany 145 - Enabling NETCONF over SOAP

216 [Sysname] info-center source ftp loghost level informational 2. Configure the log host: The following configurations were performed on Solaris.

Strany 146 - Exchanging capabilities

10 Table 1 Performance metrics and NQA operation types Performance metric NQA operation types that can gather the metric Probe duration All NQA oper

Strany 147 - Subscription procedure

217 Configuring EAA Overview Embedded Automation Architecture (EAA) is a monitoring framework that enables you to self-define monitored events and ac

Strany 148 - Verifying the configuration

218 RTM RTM manages the creation, state machine, and execution of monitor policies. EAA monitor policies A monitor policy specifies the event to moni

Strany 149 - Locking the configuration

219 Event type Description SNMP SNMP event occurs when the monitored MIB variable's value changes. Each SNMP event is associated with two user-d

Strany 150 - Unlocking the configuration

220 ($variable_name) instead of entering a specific value for an argument. EAA will replace the variable name with the variable value when it perform

Strany 151

221 User-defined variables You can use user-defined variables for all types of events. User-defined variable names can contain digits, characters, a

Strany 152

222 Step Command Remarks 3. Configure an event in the policy. • Configure a CLI event: event cli { async [ skip ] | sync } mode { execute | help |

Strany 153

223 Step Command Remarks 4. Configure the actions to take when the event occurs. • Configure the action to execute a command: action number cli c

Strany 154

224 Step Command Remarks 4. Create a Tcl-defined policy and bind it to the Tcl script file. rtm tcl-policy policy-name tcl-filename By default, the

Strany 155

225 Displaying and maintaining EAA settings Execute display commands in any view. Task Command Display user-defined EAA environment variables. displ

Strany 156

226 In response to this CLI event, EAA executes the policy. You can see the message "rtm_tcl_test is running" and the policy successfully e

Strany 157

11 Step Command Remarks 2. Enable the NQA server. nqa server enable By default, the NQA server is disabled. 3. Configure a TCP or UDP listening ser

Strany 158

227 Monitoring and maintaining processes H3C Comware V7 is a full-featured, modular, and scalable network operating system based on the Linux kerne

Strany 159 - Saving the configuration

228 Displaying and maintaining user processes Execute display commands in any view. MSR 2600/MSR 3600: Task Command Display log information for all

Strany 160 - Loading the configuration

229 Kernel threads share resources. If a kernel thread monopolizes the CPU, other threads cannot run, resulting in a deadloop. This feature enables t

Strany 161 - Filtering data

230 Step Command Remarks 1. Enter system view. system-view N/A 2. Enable kernel thread starvation detection. monitor kernel starvation enable By d

Strany 162 - Conditional match

231 Task Command Display kernel thread deadloop information. display kernel deadloop show-number [ offset ] [ verbose ] [ slot slot-number ] Display

Strany 163

232 Index A C D E F H I K L M N O P R S T A Alarm function configuration example,127 Appendix A Supported NETCONF operations,159 C Configuration e

Strany 164

233 Enabling the NTP service,65 Enabling the SNTP service,103 Establishing a NETCONF session,132 Ethernet statistics group configuration example,124

Strany 166

12 Configuring the ICMP echo operation The ICMP echo operation measures the reachability of a destination device. It has the same function as the pi

Strany 167 - CLI operation example

13 The NQA client simulates the DHCP relay agent to forward DHCP requests for IP address acquisition from the DHCP server. The interface that perform

Strany 168

14 Step Command Remarks 5. Specify the domain name that needs to be translated. resolve-target domain-name By default, no domain name is specified.

Strany 169

15 Configuring the HTTP operation An HTTP operation measures the time for the NQA client to obtain data from an HTTP server. The TCP port number of

Strany 170 - Configuration example

16 Jitter means inter-packet delay variance. A UDP jitter operation measures unidirectional and bidirectional jitters so that you can verify whether

Strany 171 - Returning to the CLI

Preface The H3C MSR documentation set includes 14 configuration guides, which describe the software features for the H3C MSR Series Routers and guide

Strany 172 - Appendix

17 Step Command Remarks 12. (Optional.) Specify the source IP address for UDP packets. source ip ip-address By default, no source IP address is spec

Strany 173

18 Step Command Remarks 1. Enter system view. system-view N/A 2. Create an NQA operation and enter NQA operation view. nqa entry admin-name operat

Strany 174

19 Step Command Remarks 5. Specify the destination port of UDP packets. destination port port-number By default, no destination port number is speci

Strany 175

20 The voice operation requires both the NQA server and the NQA client. Before you perform a voice operation, configure a UDP listening service on th

Strany 176

21 Step Command Remarks 12. Specify the number of voice packets to be sent in a voice probe. probe packet-number packet-number The default setting

Strany 177

22 • Enable sending ICMP destination unreachable packets on the destination device. If the destination device is an H3C device, use the ip unreachab

Strany 178

23 Step Command Remarks 1. Enter system view. system-view N/A 2. Create an NQA operation and enter NQA operation view. nqa entry admin-name operat

Strany 179

24 Step Command Remarks 1. Enter system view. system-view N/A 2. Create an NQA operation and enter NQA operation view. nqa entry admin-name operat

Strany 180

25 The state of a reaction entry can be invalid, over-threshold, or below-threshold. • Before an NQA operation starts, the reaction entry is in inva

Strany 181

26 Step Command Remarks 5. Configure threshold monitoring. • Monitor the operation duration (not supported in the UDP jitter and voice operations):

Strany 182 - Configuring port mirroring

Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text rep

Strany 183

27 Configuring the NQA statistics collection function NQA collects statistics for operations completed within a specific period. The statistics form

Strany 184

28 Step Command Remarks 2. Create an NQA operation and enter NQA operation view. nqa entry admin-name operation-tag By default, no NQA operation is

Strany 185

29 Configuring the ICMP template A feature that uses the ICMP template creates and starts the ICMP operation to measure the reachability of a destina

Strany 186

30 Step Command Remarks 6. Configure the domain name resolution type. resolve-type { A | AAAA } By default, the type is type A. A type A query resol

Strany 187

31 Step Command Remarks 6. (Optional.) Configure the expected data. expect data expression [ offset number ] By default, no expected data is configu

Strany 188 - Configuring samplers

32 Step Command Remarks 8. (Optional.) Enter or paste the content of the GET request for the HTTP operation. N/A This step is required for the raw o

Strany 189

33 Step Command Remarks 8. Set the data transmission mode. mode { active | passive } The default mode is active. Configuring optional parameters f

Strany 190 - Configuring NetStream

34 Task Command Display history records of NQA operations. display nqa history [ admin-name operation-tag ] Display the current monitoring results of

Strany 191 - Key NetStream technologies

35 [DeviceA-nqa-admin-test1-icmp-echo] destination ip 10.2.2.2 # Configure 10.1.1.2 as the next hop. The ICMP echo requests are sent through Device C

Strany 192

36 DHCP operation configuration example Network requirements As shown in Figure 8, configure and schedule a DHCP operation to test the time required

Strany 193

About the H3C MSR documentation set The H3C MSR documentation set includes: Category Documents Purposes Product description and specifications Market

Strany 194 - NetStream sampling

37 DNS operation configuration example Network requirements As shown in Figure 9, configure a DNS operation to test whether Device A can translate th

Strany 195

38 [DeviceA] display nqa history admin test NQA entry (admin admin, tag test) history records: Index Response Status Time

Strany 196

39 # Display the results of the FTP operation. [DeviceA] display nqa result admin test1 NQA entry (admin admin, tag test1) test results: Send

Strany 197

40 [DeviceA-nqa-admin-test1-http] operation get # Configure the operation to use HTTP version 1.0. (Version 1.0 is the default version, and this step

Strany 198 - Flow aging methods

41 Configuration procedure 1. Assign each interface an IP address. (Details not shown.) 2. Configure static routes or a routing protocol to make su

Strany 199

42 Positive SD square-sum: 754 Positive DS square-sum: 460 Min negative SD: 1 Min negative DS: 6 Max

Strany 200

43 Number of SD delay: 410 Number of DS delay: 410 Sum of SD delay: 3705 Sum of DS delay: 3891 Squa

Strany 201

44 Send operation times: 1 Receive response times: 1 Min/Max/Average round trip time: 50/50/50 Square-Sum of round tri

Strany 202

45 # Enable the saving of history records. [DeviceA-nqa-admin-test1-tcp] history-record enable [DeviceA-nqa-admin-test1-tcp] quit # Start the TCP ope

Strany 203

46 # Enable the NQA server, and configure a listening service to listen on the IP address 10.2.2.2 and UDP port 8000. <DeviceB> system-view [De

Strany 204

We appreciate your comments.

Strany 205

47 Figure 16 Network diagram Configuration procedure 1. Assign each interface an IP address. (Details not shown.) 2. Configure static routes or a

Strany 206

48 Min positive SD: 1 Min positive DS: 1 Max positive SD: 204 Max positive DS: 1297 Positive

Strany 207

49 Max negative SD: 360 Max negative DS: 1297 Negative SD number: 1028 Negative DS number: 1022 Neg

Strany 208 - Configuring sFlow

50 [DeviceA] display nqa result admin test1 NQA entry (admin admin, tag test1) test results: Send operation times: 1 Receive res

Strany 209 - Configuring flow sampling

51 [DeviceA-nqa-admin-test1-path-jitter] quit # Start the path jitter operation. [DeviceA] nqa schedule admin test1 start-time now lifetime forever #

Strany 210 - Configuring counter sampling

52 Min/Max/Average negative jitter: 2/10/6 Sum/Square-Sum positive jitter: 19/153 NQA collaboration configuration example Network

Strany 211

53 # Create track entry 1, and associate it with reaction entry 1 of the ICMP echo operation (admin-test1). [RouterA] track 1 nqa entry admin test1 r

Strany 212 - Verifying the configurations

54 Reaction: 1 # Display brief information about active routes in the routing ta

Strany 213 - Overview

55 Configuration procedure # Assign each interface an IP address. (Details not shown.) # Configure static routes or a routing protocol to make sure t

Strany 214 - Log destinations

56 [DeviceA-nqatplt-dns-dns] reaction trigger probe-pass 2 # If the number of consecutive probe failures reaches 2, the operation fails. [DeviceA-nqa

Strany 215 - Log formats

i Contents Using ping, tracert, and system debugging ································································································

Strany 216

57 Figure 23 Network diagram Configuration procedure # Assign each interface an IP address. (Details not shown.) # Configure static routes or a rou

Strany 217

58 # Specify the URL of the FTP server. [DeviceA-nqatplt-ftp-ftp] url ftp://admin:[email protected] # Specify 10.1.1.1 as the source IP address. [D

Strany 218

59 Configuring NTP Synchronize your device with a trusted time source by using the Network Time Protocol (NTP) or changing the system time before you

Strany 219

60 The synchronization process is as follows: 1. Device A sends Device B an NTP message, which is timestamped when it leaves Device A. The time stam

Strany 220 - Saving logs to a log file

61 many NTP hops away a device is from the primary time server. A stratum 2 time server receives its time from a stratum 1 time server, and so on. To

Strany 221

62 Mode Working process Principle Application scenario Symmetric active/passive On the symmetric active peer, specify the IP address of the symmetric

Strany 222 - Managing security logs

63 NTP security To improve time synchronization security, NTP provides the access control and authentication functions. NTP access control You can co

Strany 223

64 in the NTP message. If they are the same, the receiver accepts the message. Otherwise, it discards the message. NTP for MPLS VPNs The device suppo

Strany 224

65 Configuration task list Tasks at a glance (Required.) Enabling the NTP service (Required.) Perform at least one of the following tasks: • Configu

Strany 225

66 Step Command Remarks 2. Specify an NTP server for the device. • Specify an NTP server for the device: ntp-service unicast-server { ip-address |

Strany 226

ii ICMP echo operation configuration example ···································································································· 34

Strany 227 - UNIX log host

67 Step Command Remarks 2. Specify a symmetric-passive peer for the device. • Specify a symmetric-passive peer: ntp-service unicast-peer { ip-addre

Strany 228

68 Step Command Remarks 3. Configure the device to operate in NTP broadcast server mode. ntp-service broadcast-server [ authentication-keyid keyid |

Strany 229

69 Step Command Remarks 3. Configure the device to operate in multicast server mode. • Configure the device to operate in multicast server mode: nt

Strany 230 - Configuring EAA

70 NTP server on the client. The key IDs and key values configured on the server and client must be the same. Otherwise, NTP authentication fails. To

Strany 231 - Elements in a monitor policy

71 Table 3 NTP authentication results Client Server Authentication result Enable NTP authentication Configure a key and configure it as a trusted key

Strany 232 - EAA environment variables

72 Step Command Remarks 3. Configure an NTP authentication key. ntp-service authentication-keyid keyid authentication-mode md5 { cipher | simple } v

Strany 233 - System-defined variables

73 Active peer Passive peer Authentication result Enable NTP authentication Configure a key and configure it as a trusted key Associate the key with

Strany 234 - Configuring a monitor policy

74 Step Command Remarks 1. Enter system view. system-view N/A 2. Enable NTP authentication. ntp-service authentication enable By default, NTP auth

Strany 235

75 Broadcast server Broadcast client Authentication result Enable NTP authentication Configure a key and configure it as a trusted key Associate the

Strany 236

76 Step Command Remarks 3. Configure an NTP authentication key. ntp-service authentication-keyid keyid authentication-mode md5 { cipher | simple } v

Strany 237 - Suspending monitor policies

iii Configuration example for NTP client/server mode with authentication ································································· 94Configu

Strany 238 - Configuration examples

77 Multicast server Multicast client Authentication result Enable NTP authentication Configure a key and configure it as a trusted key Associate the

Strany 239

78 To specify the source interface for NTP messages: Step Command Remarks 1. Enter system view. system-view N/A 2. Specify the source interface f

Strany 240

79 A single device can have a maximum of 128 concurrent associations, including static associations and dynamic associations. Perform this task to re

Strany 241 - Monitoring kernel threads

80 Displaying and maintaining NTP Execute display commands in any view. Task Command Display information about NTP service status. display ntp-serv

Strany 242

81 Local mode: client Reference clock ID: 1.0.1.11 Leap indicator: 00 Clock jitter: 0.000977 s Stability: 0.000 pps Clock precision: 2^-10 Roo

Strany 243 - ] [ verbose ]

82 <DeviceB> system-view [DeviceB] ntp-service enable # Specify Device A as the IPv6 NTP server of Device B so that Device B is synchronized to

Strany 244 - Task Command

83 • Configure Device C to operate in symmetric-active mode and specify Device B as the passive peer of Device C. Figure 31 Network diagram Config

Strany 245

84 Clock status: synchronized Clock stratum: 3 System peer: 3.0.1.33 Local mode: sym_passive Reference clock ID: 3.0.1.33 Leap indicator: 00 C

Strany 246

85 Figure 32 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 32. (Details not shown.) 2. Conf

Strany 247

86 Clock stratum: 3 System peer: 3000::36 Local mode: sym_passive Reference clock ID: 163.29.247.19 Leap indicator: 11 Clock jitter: 0.000977 s

Příbuzné modely H3C MSR 3600

Komentáře k této Příručce

Žádné komentáře