H3c-technologies H3C WX5500E Series Access Controllers Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Routeurs H3c-technologies H3C WX5500E Series Access Controllers. H3C Technologies H3C WX5500E Series Access Controllers User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 104
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
H3C WX5540E Access Controller
Switching Engine
Network Management and Monitoring
Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Software version: WX5500E-CMW520-R2607P26
Document version: 6W100-20140714
Vue de la page 0
1 2 3 4 5 6 ... 103 104

Résumé du contenu

Page 1 - Switching Engine

H3C WX5540E Access ControllerSwitching EngineNetwork Management and MonitoringConfiguration Guide Hangzhou H3C Technologies Co.,

Page 2

2 Test procedure # Use the ping command on Device A to test connectivity to Device C. <DeviceA> ping 1.1.2.2 PING 1.1.2.2: 56 data bytes, pr

Page 3 - Preface

92 [DeviceA] mirroring-group 1 mirroring-port gigabitethernet 1/0/1 gigabitethernet 1/0/2 both [DeviceA] mirroring-group 1 monitor-port gigabitethern

Page 4 - Port numbering in examples

93 Configuration procedure # Create remote source mirroring group 1. <DeviceA> system-view [DeviceA] mirroring-group 1 remote-source # Configur

Page 5 - Documentation feedback

94 [DeviceA] vlan 2 # Disable MAC address learning for VLAN 2. [DeviceA-vlan2] mac-address mac-learning disable [DeviceA-vlan2] quit # Configure VLAN

Page 6 - Contents

95 [DeviceC] vlan 2 # Disable MAC address learning for VLAN 2. [DeviceC-vlan2] mac-address mac-learning disable [DeviceC-vlan2] quit # Configure VLAN

Page 7

96 Index A C D E H I N O P S T A Alarm group configuration example,76 C Configuring access-control rights,18 Configuring Layer 2 remote port mirrori

Page 8

3 1.1.2.2 1.1.1.2 1.1.1.1 --- 1.1.2.2 ping statistics --- 5 packet(s) transmitted 5 packet(s) received 0.00%

Page 9 - Ping example

4 2. The first hop (Device B, the first Layer 3 device that receives the packet) responds by sending a TTL-expired ICMP error message to the source,

Page 10 - Test procedure

5 Output of debugging information depends on the configurations of the information center and the debugging commands of each protocol and functional

Page 11 - Tracert

6 Step Command Remarks 4. Display the enabled debugging functions. display debugging [ interface interface-type interface-number ] [ module-name ] [

Page 12 - System debugging

7 [DeviceC] ip unreachables enable # Execute the tracert command on Device A. <DeviceA> tracert 1.1.2.2 traceroute to 1.1.2.2(1.1.2.2) 30 hops

Page 13 - Debugging a feature module

8 Configuring NTP This chapter provides an overview of NTP configuration. Overview NTP is typically used in large networks to dynamically synchronize

Page 14 - Ping and tracert example

9 • Prior to system clock synchronization between Device A and Device B, the clock of Device A is set to 10:00:00 am while that of Device B is set t

Page 15

10 used in environments where network management is needed. Because NTP control messages are not essential for clock synchronization, they are not de

Page 16 - Configuring NTP

11 • Root Delay—Roundtrip delay to the primary reference source. • Root Dispersion—The maximum error of the local clock relative to the primary ref

Page 17 - NTP message format

Copyright © 2014, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmitted

Page 18

12 Symmetric peers mode Figure 8 Symmetric peers mode In symmetric peers mode, devices that operate in symmetric active mode and symmetric passive

Page 19 - Operation modes

13 Multicast mode Figure 10 Multicast mode In multicast mode, a server periodically sends clock synchronization messages to the user-configured mul

Page 20 - Broadcast mode

14 Configuring the client/server mode For devices operating in client/server mode, make configurations on the clients. If you specify the source inte

Page 21 - NTP configuration task list

15 Step Command Remarks 2. Specify a symmetric-passive peer for the device. ntp-service unicast-peer { ip-address | peer-name } [ authentication-key

Page 22

16 Step Command Remarks 3. Configure the device to operate in NTP broadcast server mode. ntp-service broadcast-server [ authentication-keyid keyid |

Page 23

17 Configuration guidelines • The source interface for NTP unicast messages is the interface specified in the ntp-service unicast-server or ntp-serv

Page 24

18 • Symmetric active/passive mode—After you specify a symmetric-passive peer on a symmetric active peer, static associations are created on the sym

Page 25 - Configuration guidelines

19 Configuration prerequisites Before you configure the NTP service access-control right to the local device, create and configure an ACL associated

Page 26

20 Configuring NTP authentication for client Step Command Remarks 1. Enter system view. system-view N/A 2. Enable NTP authentication. ntp-service

Page 27 - Configuration prerequisites

21 { On the active peer, if NTP authentication is enabled and a key is associated with the passive peer, but the key is not a trusted key, no matter

Page 28

Preface The H3C WX5540E Access Controller Switching Engine documentation set describes the software features for the H3C WX5540E Access Controller Swi

Page 29

22 • A broadcast client can synchronize to the broadcast server only when you configure all the required tasks on both the broadcast client and serv

Page 30

23 Configuring NTP authentication for a multicast client Step Command Remarks 1. Enter system view. system-view N/A 2. Enable NTP authentication.

Page 31

24 Task Command Remarks Display the brief information about the NTP servers from the local device back to the primary reference source. display ntp-s

Page 32 - NTP configuration examples

25 Clock status: synchronized Clock stratum: 3 Reference clock ID: 1.0.1.11 Nominal frequency: 64.0000 Hz Actual frequency: 64.0000 Hz Clock pr

Page 33

26 # Specify Device A as the NTP server of Device B. <DeviceB> system-view [DeviceB] ntp-service unicast-server 3.0.1.31 3. Display the NTP s

Page 34 - Root delay: 15.00 ms

27 NTP broadcast mode configuration example Network requirements As shown in Figure 13, Switch C functions as the NTP server for multiple devices on

Page 35

28 # Take Switch A as an example. Display the NTP status of Switch A after clock synchronization. [SwitchA-Vlan-interface2] display ntp-service stat

Page 36

29 Figure 14 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 14. (Details not shown.) 2. Conf

Page 37

30 # Display NTP session information for Switch C, which shows that an association has been set up between Switch C and the device. [SwitchC-Vlan-in

Page 38 - Root delay: 40.00 ms

31 # Display NTP session information for Switch A, which shows that an association has been set up between Switch A and the device. [SwitchA-Vlan-in

Page 39

Convention Description [ x | y | ... ] * Asterisk marked square brackets enclose optional syntax choices separated by vertical bars, from which you se

Page 40

32 # Specify the key as a trusted key. [DeviceA] ntp-service reliable authentication-keyid 42 # Display the NTP status of Device B after clock synch

Page 41

33 Figure 16 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 16. (Details not shown.) 2. Conf

Page 42 - Root delay: 0.00 ms

34 Reference clock ID: 3.0.1.31 Nominal frequency: 64.0000 Hz Actual frequency: 64.0000 Hz Clock precision: 2^7 Clock offset: 0.0000 ms Root

Page 43

35 Clock precision: 2^7 Clock offset: 0.0000 ms Root delay: 31.00 ms Root dispersion: 8.31 ms Peer dispersion: 34.30 ms Reference time: 16:

Page 44 - Overview

36 Configuring the information center This chapter describes how to configure the information center. Overview The information center collects and c

Page 45

37 Table 1 System information levels Severity Severity value Description Corresponding keyword in commands Emergency 0 The system is unusable. For ex

Page 46

38 Information channel number Default channel name Default output destination System information received by default 7 channel7 Not specified Log, tr

Page 47 - System information formats

39 System information formats The following shows the original format of system information, which might be different from what you see. The actual f

Page 48

40 Field Description %% (vendor ID) This field indicates that the information was generated by an H3C device. It exists only in logs sent to a log ho

Page 49

41 Timestamp parameters Description Example date Current date and time, in the format of mm dd hh:mm:ss:xxx yyy. All system information supports this

Page 50

Category Documents Purposes Hardware specifications and installation Compliance and safety manual Provides regulatory information and the safety instr

Page 51

42 Outputting system information to the console Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-

Page 52

43 Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-center enable Optional. Enabled by default. 3

Page 53

44 Step Command Remarks 2. Enable the information center. info-center enable Optional. Enabled by default. 3. Specify a name for a channel identifi

Page 54

45 Step Command Remarks 3. Specify a name for a channel identified by its number. info-center channel channel-number name channel-name Optional. See

Page 55

46 Outputting system information to the SNMP module The SNMP module receives the trap information only, and discards the log and debugging informatio

Page 56

47 Step Command Remarks 3. Specify a name for a channel identified by its number. info-center channel channel-number name channel-name Optional. See

Page 57

48 Step Command Remarks 6. Configure the directory to save the log file. info-center logfile switch-directory dir-name Optional. By default, the log

Page 58

49 To disable an interface from generating link up/down logging information: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter

Page 59

50 Figure 18 Network diagram Configuration procedure # Enable the information center. <Sysname> system-view [Sysname] info-center enable # Us

Page 60

51 Configuration procedure Before the configuration, make sure that the device and the log host can reach each other. (Details not shown.) 1. Config

Page 61 - # syslogd -r &

i Contents Using ping, tracert, and system debugging ································································································

Page 62 - Configuring SNMP

52 # ps -ae | grep syslogd 147 # kill -HUP 147 # syslogd -r & Now, the system can record log information into the log file. Outputting log inform

Page 63 - SNMP configuration task list

53 NOTE: Be aware of the following issues while editing file /etc/syslog.conf: • Comments must be on a separate line and must begin with the pound

Page 64

54 Configuring SNMP This chapter provides an overview of the Simple Network Management Protocol (SNMP) and guides you through the configuration proce

Page 65

55 Figure 22 MIB tree A MIB view represents a set of MIB objects (or MIB object hierarchies) with certain access privilege and is identified by a v

Page 66

56 Task Remarks Configuring SNMP logging Optional. Configuring SNMP traps Optional. Configuring SNMP basic parameters SNMPv3 differs from SNMPv1

Page 67 - Offset Chassis ID

57 Step Command Remarks 5. Create or update a MIB view. snmp-agent mib-view { excluded | included } view-name oid-tree [ mask mask-value ] Optional.

Page 68 - Configuring SNMP traps

58 Step Command Remarks 2. Enable the SNMP agent. snmp-agent Optional. By default, the SNMP agent is disabled. You can also enable the SNMP agent s

Page 69 - Enabling SNMP traps

59 Step Command Remarks 8. Set the DSCP value for SNMP responses. snmp-agent packet response dscp dscp-value Optional. By default, the DSCP value f

Page 70

60 Configuration procedure To switch the NM-specific ifindex format: Step Command Remarks 1. Enter system view. system-view N/A 2. Switch the for

Page 71 - SNMP configuration examples

61 SNMP traps generated by a module are sent to the information center. You can configure the information center to enable or disable outputting the

Page 72 - SNMPv3 configuration example

ii System information levels ························································································································

Page 73

62 Step Command Remarks 2. Configure a target host. snmp-agent target-host trap address udp-domain ip-address [ udp-port port-number ] [ dscp dscp-v

Page 74

63 Task Command Remarks Display the modules that can send traps and their trap status (enable or disable). display snmp-agent trap-list [ | { begin

Page 75

64 # Enable SNMP traps, set the NMS at 1.1.1.2 as an SNMP trap destination, and use public as the community name. (To make sure the NMS can receive t

Page 76 - Configuring MIB style

65 Figure 25 Network diagram Configuration procedure 1. Configure the agent: # Configure the IP address of the agent and make sure the agent and t

Page 77 - Configuring RMON

66 Request binding: 1: 1.3.6.1.2.1.11.29.0 Response binding: 1: Oid=snmpOutTraps.0 Syntax=CNTR32 Value=18 Get finished # Try to get the device name

Page 78 - Alarm group

67 <Agent> terminal logging # Enable the information center to output system information with severity level equal to or higher than informatio

Page 79 - Private alarm group

68 Configuring MIB style MIBs include public MIBs and private MIBs. A private MIB is attached to a sub-node under the enterprises MIB node (1.3.6.1.4

Page 80

69 Configuring RMON This chapter describes how to configure RMON. Overview Remote Monitoring (RMON) is an enhancement to SNMP for remote device mana

Page 81

70 History group The history group defines that the system periodically collects traffic statistics on interfaces and saves the statistics in the his

Page 82

71 Private alarm group The private alarm group calculates the values of alarm variables and compares the results with the defined threshold for a mor

Page 83

iii Displaying and maintaining RMON ·················································································································

Page 84

72 • You can configure multiple history control entries for one interface, but must make sure their entry numbers and sampling intervals are differe

Page 85

73 Step Command Remarks 3. Create an entry in the alarm table or private alarm table. • Create an entry in the alarm table: rmon alarm entry-numbe

Page 86

74 Task Command Remarks Display log information for event entries. display rmon eventlog [ entry-number ] [ | { begin | exclude | include } regular-e

Page 87 - Configuring port mirroring

75 History group configuration example Network requirements Configure the RMON history group on the RMON agent in Figure 29 to gather periodical traf

Page 88 - Remote port mirroring

76 collisions : 0 , utilization : 0 Sampled values of record 4 : dropevents : 0 , octets

Page 89

77 Figure 30 Network diagram Configuration procedure # Configure the SNMP agent with the same SNMP settings as the NMS at 1.1.1.2. This example use

Page 90

78 etherStatsUndersizePkts : 0 , etherStatsOversizePkts : 0 etherStatsFragments : 0 , etherStatsJabbers : 0 etherS

Page 91

79 Configuring port mirroring This chapter describes how to configure port mirroring. Overview Port mirroring refers to copying packets passing thro

Page 92

80 Reflector port, egress port, and remote probe VLAN The reflector port, remote probe VLAN, and egress port are used for Layer 2 remote port mirrori

Page 93

81 The source device copies packets received on the source port to the egress port. The egress port forwards the packets to the intermediate devices,

Page 94

1 Using ping, tracert, and system debugging Use the ping, tracert, and system debugging utilities to test network connectivity and identify network p

Page 95

82 Local port mirroring configuration task list Local port mirroring takes effect only when the source ports and the monitor port are configured. Com

Page 96

83 Configuring a source port in interface view Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view. interface inter

Page 97

84 Configuring the monitor port in interface view Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view. interface in

Page 98

85 • A remote probe VLAN must be a static VLAN. To remove the VLAN configured as a remote probe VLAN, you must first remove the remote probe VLAN wi

Page 99

86 Layer 2 remote port mirroring configuration task list CAUTION: For a mirrored packet to successfully arrive at the remote destination device, mak

Page 100 - Network requirements

87 Step Command Remarks 2. Create a remote source group. mirroring-group group-id remote-source By default, no remote source group exists on a devic

Page 101 - Configuration procedure

88 Configuring the egress port for a remote source group CAUTION: Disable these functions on the egress port: spanning tree, 802.1X, IGMP snooping,

Page 102

89 Step Command Remarks 1. Enter system view. system-view N/A 2. Configure the remote probe VLAN. mirroring-group group-id remote-probe vlan rprob

Page 103

90 Step Command Remarks 3. Configure the current port as the monitor port for a remote destination group. [ mirroring-group group-id ] monitor-port

Page 104 - A C D E H I N O P S T

91 Displaying and maintaining port mirroring Task Command Remarks Display mirroring group information. display mirroring-group { group-id | all | loc

Commentaires sur ces manuels

Pas de commentaire