H3c-technologies H3C WX5500E Series Access Controllers Manuale Utente

Navigare online o scaricare Manuale Utente per Router H3c-technologies H3C WX5500E Series Access Controllers. H3C Technologies H3C WX5500E Series Access Controllers User Manual Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 104
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 0
H3C WX5540E Access Controller
Switching Engine
Network Management and Monitoring
Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Software version: WX5500E-CMW520-R2607P26
Document version: 6W100-20140714
Vedere la pagina 0
1 2 3 4 5 6 ... 103 104

Sommario

Pagina 1 - Switching Engine

H3C WX5540E Access ControllerSwitching EngineNetwork Management and MonitoringConfiguration Guide Hangzhou H3C Technologies Co.,

Pagina 2

2 Test procedure # Use the ping command on Device A to test connectivity to Device C. <DeviceA> ping 1.1.2.2 PING 1.1.2.2: 56 data bytes, pr

Pagina 3 - Preface

92 [DeviceA] mirroring-group 1 mirroring-port gigabitethernet 1/0/1 gigabitethernet 1/0/2 both [DeviceA] mirroring-group 1 monitor-port gigabitethern

Pagina 4 - Port numbering in examples

93 Configuration procedure # Create remote source mirroring group 1. <DeviceA> system-view [DeviceA] mirroring-group 1 remote-source # Configur

Pagina 5 - Documentation feedback

94 [DeviceA] vlan 2 # Disable MAC address learning for VLAN 2. [DeviceA-vlan2] mac-address mac-learning disable [DeviceA-vlan2] quit # Configure VLAN

Pagina 6 - Contents

95 [DeviceC] vlan 2 # Disable MAC address learning for VLAN 2. [DeviceC-vlan2] mac-address mac-learning disable [DeviceC-vlan2] quit # Configure VLAN

Pagina 7

96 Index A C D E H I N O P S T A Alarm group configuration example,76 C Configuring access-control rights,18 Configuring Layer 2 remote port mirrori

Pagina 8

3 1.1.2.2 1.1.1.2 1.1.1.1 --- 1.1.2.2 ping statistics --- 5 packet(s) transmitted 5 packet(s) received 0.00%

Pagina 9 - Ping example

4 2. The first hop (Device B, the first Layer 3 device that receives the packet) responds by sending a TTL-expired ICMP error message to the source,

Pagina 10 - Test procedure

5 Output of debugging information depends on the configurations of the information center and the debugging commands of each protocol and functional

Pagina 11 - Tracert

6 Step Command Remarks 4. Display the enabled debugging functions. display debugging [ interface interface-type interface-number ] [ module-name ] [

Pagina 12 - System debugging

7 [DeviceC] ip unreachables enable # Execute the tracert command on Device A. <DeviceA> tracert 1.1.2.2 traceroute to 1.1.2.2(1.1.2.2) 30 hops

Pagina 13 - Debugging a feature module

8 Configuring NTP This chapter provides an overview of NTP configuration. Overview NTP is typically used in large networks to dynamically synchronize

Pagina 14 - Ping and tracert example

9 • Prior to system clock synchronization between Device A and Device B, the clock of Device A is set to 10:00:00 am while that of Device B is set t

Pagina 15

10 used in environments where network management is needed. Because NTP control messages are not essential for clock synchronization, they are not de

Pagina 16 - Configuring NTP

11 • Root Delay—Roundtrip delay to the primary reference source. • Root Dispersion—The maximum error of the local clock relative to the primary ref

Pagina 17 - NTP message format

Copyright © 2014, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmitted

Pagina 18

12 Symmetric peers mode Figure 8 Symmetric peers mode In symmetric peers mode, devices that operate in symmetric active mode and symmetric passive

Pagina 19 - Operation modes

13 Multicast mode Figure 10 Multicast mode In multicast mode, a server periodically sends clock synchronization messages to the user-configured mul

Pagina 20 - Broadcast mode

14 Configuring the client/server mode For devices operating in client/server mode, make configurations on the clients. If you specify the source inte

Pagina 21 - NTP configuration task list

15 Step Command Remarks 2. Specify a symmetric-passive peer for the device. ntp-service unicast-peer { ip-address | peer-name } [ authentication-key

Pagina 22

16 Step Command Remarks 3. Configure the device to operate in NTP broadcast server mode. ntp-service broadcast-server [ authentication-keyid keyid |

Pagina 23

17 Configuration guidelines • The source interface for NTP unicast messages is the interface specified in the ntp-service unicast-server or ntp-serv

Pagina 24

18 • Symmetric active/passive mode—After you specify a symmetric-passive peer on a symmetric active peer, static associations are created on the sym

Pagina 25 - Configuration guidelines

19 Configuration prerequisites Before you configure the NTP service access-control right to the local device, create and configure an ACL associated

Pagina 26

20 Configuring NTP authentication for client Step Command Remarks 1. Enter system view. system-view N/A 2. Enable NTP authentication. ntp-service

Pagina 27 - Configuration prerequisites

21 { On the active peer, if NTP authentication is enabled and a key is associated with the passive peer, but the key is not a trusted key, no matter

Pagina 28

Preface The H3C WX5540E Access Controller Switching Engine documentation set describes the software features for the H3C WX5540E Access Controller Swi

Pagina 29

22 • A broadcast client can synchronize to the broadcast server only when you configure all the required tasks on both the broadcast client and serv

Pagina 30

23 Configuring NTP authentication for a multicast client Step Command Remarks 1. Enter system view. system-view N/A 2. Enable NTP authentication.

Pagina 31

24 Task Command Remarks Display the brief information about the NTP servers from the local device back to the primary reference source. display ntp-s

Pagina 32 - NTP configuration examples

25 Clock status: synchronized Clock stratum: 3 Reference clock ID: 1.0.1.11 Nominal frequency: 64.0000 Hz Actual frequency: 64.0000 Hz Clock pr

Pagina 33

26 # Specify Device A as the NTP server of Device B. <DeviceB> system-view [DeviceB] ntp-service unicast-server 3.0.1.31 3. Display the NTP s

Pagina 34 - Root delay: 15.00 ms

27 NTP broadcast mode configuration example Network requirements As shown in Figure 13, Switch C functions as the NTP server for multiple devices on

Pagina 35

28 # Take Switch A as an example. Display the NTP status of Switch A after clock synchronization. [SwitchA-Vlan-interface2] display ntp-service stat

Pagina 36

29 Figure 14 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 14. (Details not shown.) 2. Conf

Pagina 37

30 # Display NTP session information for Switch C, which shows that an association has been set up between Switch C and the device. [SwitchC-Vlan-in

Pagina 38 - Root delay: 40.00 ms

31 # Display NTP session information for Switch A, which shows that an association has been set up between Switch A and the device. [SwitchA-Vlan-in

Pagina 39

Convention Description [ x | y | ... ] * Asterisk marked square brackets enclose optional syntax choices separated by vertical bars, from which you se

Pagina 40

32 # Specify the key as a trusted key. [DeviceA] ntp-service reliable authentication-keyid 42 # Display the NTP status of Device B after clock synch

Pagina 41

33 Figure 16 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 16. (Details not shown.) 2. Conf

Pagina 42 - Root delay: 0.00 ms

34 Reference clock ID: 3.0.1.31 Nominal frequency: 64.0000 Hz Actual frequency: 64.0000 Hz Clock precision: 2^7 Clock offset: 0.0000 ms Root

Pagina 43

35 Clock precision: 2^7 Clock offset: 0.0000 ms Root delay: 31.00 ms Root dispersion: 8.31 ms Peer dispersion: 34.30 ms Reference time: 16:

Pagina 44 - Overview

36 Configuring the information center This chapter describes how to configure the information center. Overview The information center collects and c

Pagina 45

37 Table 1 System information levels Severity Severity value Description Corresponding keyword in commands Emergency 0 The system is unusable. For ex

Pagina 46

38 Information channel number Default channel name Default output destination System information received by default 7 channel7 Not specified Log, tr

Pagina 47 - System information formats

39 System information formats The following shows the original format of system information, which might be different from what you see. The actual f

Pagina 48

40 Field Description %% (vendor ID) This field indicates that the information was generated by an H3C device. It exists only in logs sent to a log ho

Pagina 49

41 Timestamp parameters Description Example date Current date and time, in the format of mm dd hh:mm:ss:xxx yyy. All system information supports this

Pagina 50

Category Documents Purposes Hardware specifications and installation Compliance and safety manual Provides regulatory information and the safety instr

Pagina 51

42 Outputting system information to the console Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-

Pagina 52

43 Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-center enable Optional. Enabled by default. 3

Pagina 53

44 Step Command Remarks 2. Enable the information center. info-center enable Optional. Enabled by default. 3. Specify a name for a channel identifi

Pagina 54

45 Step Command Remarks 3. Specify a name for a channel identified by its number. info-center channel channel-number name channel-name Optional. See

Pagina 55

46 Outputting system information to the SNMP module The SNMP module receives the trap information only, and discards the log and debugging informatio

Pagina 56

47 Step Command Remarks 3. Specify a name for a channel identified by its number. info-center channel channel-number name channel-name Optional. See

Pagina 57

48 Step Command Remarks 6. Configure the directory to save the log file. info-center logfile switch-directory dir-name Optional. By default, the log

Pagina 58

49 To disable an interface from generating link up/down logging information: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter

Pagina 59

50 Figure 18 Network diagram Configuration procedure # Enable the information center. <Sysname> system-view [Sysname] info-center enable # Us

Pagina 60

51 Configuration procedure Before the configuration, make sure that the device and the log host can reach each other. (Details not shown.) 1. Config

Pagina 61 - # syslogd -r &

i Contents Using ping, tracert, and system debugging ································································································

Pagina 62 - Configuring SNMP

52 # ps -ae | grep syslogd 147 # kill -HUP 147 # syslogd -r & Now, the system can record log information into the log file. Outputting log inform

Pagina 63 - SNMP configuration task list

53 NOTE: Be aware of the following issues while editing file /etc/syslog.conf: • Comments must be on a separate line and must begin with the pound

Pagina 64

54 Configuring SNMP This chapter provides an overview of the Simple Network Management Protocol (SNMP) and guides you through the configuration proce

Pagina 65

55 Figure 22 MIB tree A MIB view represents a set of MIB objects (or MIB object hierarchies) with certain access privilege and is identified by a v

Pagina 66

56 Task Remarks Configuring SNMP logging Optional. Configuring SNMP traps Optional. Configuring SNMP basic parameters SNMPv3 differs from SNMPv1

Pagina 67 - Offset Chassis ID

57 Step Command Remarks 5. Create or update a MIB view. snmp-agent mib-view { excluded | included } view-name oid-tree [ mask mask-value ] Optional.

Pagina 68 - Configuring SNMP traps

58 Step Command Remarks 2. Enable the SNMP agent. snmp-agent Optional. By default, the SNMP agent is disabled. You can also enable the SNMP agent s

Pagina 69 - Enabling SNMP traps

59 Step Command Remarks 8. Set the DSCP value for SNMP responses. snmp-agent packet response dscp dscp-value Optional. By default, the DSCP value f

Pagina 70

60 Configuration procedure To switch the NM-specific ifindex format: Step Command Remarks 1. Enter system view. system-view N/A 2. Switch the for

Pagina 71 - SNMP configuration examples

61 SNMP traps generated by a module are sent to the information center. You can configure the information center to enable or disable outputting the

Pagina 72 - SNMPv3 configuration example

ii System information levels ························································································································

Pagina 73

62 Step Command Remarks 2. Configure a target host. snmp-agent target-host trap address udp-domain ip-address [ udp-port port-number ] [ dscp dscp-v

Pagina 74

63 Task Command Remarks Display the modules that can send traps and their trap status (enable or disable). display snmp-agent trap-list [ | { begin

Pagina 75

64 # Enable SNMP traps, set the NMS at 1.1.1.2 as an SNMP trap destination, and use public as the community name. (To make sure the NMS can receive t

Pagina 76 - Configuring MIB style

65 Figure 25 Network diagram Configuration procedure 1. Configure the agent: # Configure the IP address of the agent and make sure the agent and t

Pagina 77 - Configuring RMON

66 Request binding: 1: 1.3.6.1.2.1.11.29.0 Response binding: 1: Oid=snmpOutTraps.0 Syntax=CNTR32 Value=18 Get finished # Try to get the device name

Pagina 78 - Alarm group

67 <Agent> terminal logging # Enable the information center to output system information with severity level equal to or higher than informatio

Pagina 79 - Private alarm group

68 Configuring MIB style MIBs include public MIBs and private MIBs. A private MIB is attached to a sub-node under the enterprises MIB node (1.3.6.1.4

Pagina 80

69 Configuring RMON This chapter describes how to configure RMON. Overview Remote Monitoring (RMON) is an enhancement to SNMP for remote device mana

Pagina 81

70 History group The history group defines that the system periodically collects traffic statistics on interfaces and saves the statistics in the his

Pagina 82

71 Private alarm group The private alarm group calculates the values of alarm variables and compares the results with the defined threshold for a mor

Pagina 83

iii Displaying and maintaining RMON ·················································································································

Pagina 84

72 • You can configure multiple history control entries for one interface, but must make sure their entry numbers and sampling intervals are differe

Pagina 85

73 Step Command Remarks 3. Create an entry in the alarm table or private alarm table. • Create an entry in the alarm table: rmon alarm entry-numbe

Pagina 86

74 Task Command Remarks Display log information for event entries. display rmon eventlog [ entry-number ] [ | { begin | exclude | include } regular-e

Pagina 87 - Configuring port mirroring

75 History group configuration example Network requirements Configure the RMON history group on the RMON agent in Figure 29 to gather periodical traf

Pagina 88 - Remote port mirroring

76 collisions : 0 , utilization : 0 Sampled values of record 4 : dropevents : 0 , octets

Pagina 89

77 Figure 30 Network diagram Configuration procedure # Configure the SNMP agent with the same SNMP settings as the NMS at 1.1.1.2. This example use

Pagina 90

78 etherStatsUndersizePkts : 0 , etherStatsOversizePkts : 0 etherStatsFragments : 0 , etherStatsJabbers : 0 etherS

Pagina 91

79 Configuring port mirroring This chapter describes how to configure port mirroring. Overview Port mirroring refers to copying packets passing thro

Pagina 92

80 Reflector port, egress port, and remote probe VLAN The reflector port, remote probe VLAN, and egress port are used for Layer 2 remote port mirrori

Pagina 93

81 The source device copies packets received on the source port to the egress port. The egress port forwards the packets to the intermediate devices,

Pagina 94

1 Using ping, tracert, and system debugging Use the ping, tracert, and system debugging utilities to test network connectivity and identify network p

Pagina 95

82 Local port mirroring configuration task list Local port mirroring takes effect only when the source ports and the monitor port are configured. Com

Pagina 96

83 Configuring a source port in interface view Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view. interface inter

Pagina 97

84 Configuring the monitor port in interface view Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view. interface in

Pagina 98

85 • A remote probe VLAN must be a static VLAN. To remove the VLAN configured as a remote probe VLAN, you must first remove the remote probe VLAN wi

Pagina 99

86 Layer 2 remote port mirroring configuration task list CAUTION: For a mirrored packet to successfully arrive at the remote destination device, mak

Pagina 100 - Network requirements

87 Step Command Remarks 2. Create a remote source group. mirroring-group group-id remote-source By default, no remote source group exists on a devic

Pagina 101 - Configuration procedure

88 Configuring the egress port for a remote source group CAUTION: Disable these functions on the egress port: spanning tree, 802.1X, IGMP snooping,

Pagina 102

89 Step Command Remarks 1. Enter system view. system-view N/A 2. Configure the remote probe VLAN. mirroring-group group-id remote-probe vlan rprob

Pagina 103

90 Step Command Remarks 3. Configure the current port as the monitor port for a remote destination group. [ mirroring-group group-id ] monitor-port

Pagina 104 - A C D E H I N O P S T

91 Displaying and maintaining port mirroring Task Command Remarks Display mirroring group information. display mirroring-group { group-id | all | loc

Commenti su questo manuale

Nessun commento