H3c-technologies H3C WX5500E Series Access Controllers Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Routers H3c-technologies H3C WX5500E Series Access Controllers. H3C Technologies H3C WX5500E Series Access Controllers User Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 104
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 0
H3C WX5540E Access Controller
Switching Engine
Network Management and Monitoring
Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Software version: WX5500E-CMW520-R2607P26
Document version: 6W100-20140714
Vista de página 0
1 2 3 4 5 6 ... 103 104

Resumo do Conteúdo

Página 1 - Switching Engine

H3C WX5540E Access ControllerSwitching EngineNetwork Management and MonitoringConfiguration Guide Hangzhou H3C Technologies Co.,

Página 2

2 Test procedure # Use the ping command on Device A to test connectivity to Device C. <DeviceA> ping 1.1.2.2 PING 1.1.2.2: 56 data bytes, pr

Página 3 - Preface

92 [DeviceA] mirroring-group 1 mirroring-port gigabitethernet 1/0/1 gigabitethernet 1/0/2 both [DeviceA] mirroring-group 1 monitor-port gigabitethern

Página 4 - Port numbering in examples

93 Configuration procedure # Create remote source mirroring group 1. <DeviceA> system-view [DeviceA] mirroring-group 1 remote-source # Configur

Página 5 - Documentation feedback

94 [DeviceA] vlan 2 # Disable MAC address learning for VLAN 2. [DeviceA-vlan2] mac-address mac-learning disable [DeviceA-vlan2] quit # Configure VLAN

Página 6 - Contents

95 [DeviceC] vlan 2 # Disable MAC address learning for VLAN 2. [DeviceC-vlan2] mac-address mac-learning disable [DeviceC-vlan2] quit # Configure VLAN

Página 7

96 Index A C D E H I N O P S T A Alarm group configuration example,76 C Configuring access-control rights,18 Configuring Layer 2 remote port mirrori

Página 8

3 1.1.2.2 1.1.1.2 1.1.1.1 --- 1.1.2.2 ping statistics --- 5 packet(s) transmitted 5 packet(s) received 0.00%

Página 9 - Ping example

4 2. The first hop (Device B, the first Layer 3 device that receives the packet) responds by sending a TTL-expired ICMP error message to the source,

Página 10 - Test procedure

5 Output of debugging information depends on the configurations of the information center and the debugging commands of each protocol and functional

Página 11 - Tracert

6 Step Command Remarks 4. Display the enabled debugging functions. display debugging [ interface interface-type interface-number ] [ module-name ] [

Página 12 - System debugging

7 [DeviceC] ip unreachables enable # Execute the tracert command on Device A. <DeviceA> tracert 1.1.2.2 traceroute to 1.1.2.2(1.1.2.2) 30 hops

Página 13 - Debugging a feature module

8 Configuring NTP This chapter provides an overview of NTP configuration. Overview NTP is typically used in large networks to dynamically synchronize

Página 14 - Ping and tracert example

9 • Prior to system clock synchronization between Device A and Device B, the clock of Device A is set to 10:00:00 am while that of Device B is set t

Página 15

10 used in environments where network management is needed. Because NTP control messages are not essential for clock synchronization, they are not de

Página 16 - Configuring NTP

11 • Root Delay—Roundtrip delay to the primary reference source. • Root Dispersion—The maximum error of the local clock relative to the primary ref

Página 17 - NTP message format

Copyright © 2014, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmitted

Página 18

12 Symmetric peers mode Figure 8 Symmetric peers mode In symmetric peers mode, devices that operate in symmetric active mode and symmetric passive

Página 19 - Operation modes

13 Multicast mode Figure 10 Multicast mode In multicast mode, a server periodically sends clock synchronization messages to the user-configured mul

Página 20 - Broadcast mode

14 Configuring the client/server mode For devices operating in client/server mode, make configurations on the clients. If you specify the source inte

Página 21 - NTP configuration task list

15 Step Command Remarks 2. Specify a symmetric-passive peer for the device. ntp-service unicast-peer { ip-address | peer-name } [ authentication-key

Página 22

16 Step Command Remarks 3. Configure the device to operate in NTP broadcast server mode. ntp-service broadcast-server [ authentication-keyid keyid |

Página 23

17 Configuration guidelines • The source interface for NTP unicast messages is the interface specified in the ntp-service unicast-server or ntp-serv

Página 24

18 • Symmetric active/passive mode—After you specify a symmetric-passive peer on a symmetric active peer, static associations are created on the sym

Página 25 - Configuration guidelines

19 Configuration prerequisites Before you configure the NTP service access-control right to the local device, create and configure an ACL associated

Página 26

20 Configuring NTP authentication for client Step Command Remarks 1. Enter system view. system-view N/A 2. Enable NTP authentication. ntp-service

Página 27 - Configuration prerequisites

21 { On the active peer, if NTP authentication is enabled and a key is associated with the passive peer, but the key is not a trusted key, no matter

Página 28

Preface The H3C WX5540E Access Controller Switching Engine documentation set describes the software features for the H3C WX5540E Access Controller Swi

Página 29

22 • A broadcast client can synchronize to the broadcast server only when you configure all the required tasks on both the broadcast client and serv

Página 30

23 Configuring NTP authentication for a multicast client Step Command Remarks 1. Enter system view. system-view N/A 2. Enable NTP authentication.

Página 31

24 Task Command Remarks Display the brief information about the NTP servers from the local device back to the primary reference source. display ntp-s

Página 32 - NTP configuration examples

25 Clock status: synchronized Clock stratum: 3 Reference clock ID: 1.0.1.11 Nominal frequency: 64.0000 Hz Actual frequency: 64.0000 Hz Clock pr

Página 33

26 # Specify Device A as the NTP server of Device B. <DeviceB> system-view [DeviceB] ntp-service unicast-server 3.0.1.31 3. Display the NTP s

Página 34 - Root delay: 15.00 ms

27 NTP broadcast mode configuration example Network requirements As shown in Figure 13, Switch C functions as the NTP server for multiple devices on

Página 35

28 # Take Switch A as an example. Display the NTP status of Switch A after clock synchronization. [SwitchA-Vlan-interface2] display ntp-service stat

Página 36

29 Figure 14 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 14. (Details not shown.) 2. Conf

Página 37

30 # Display NTP session information for Switch C, which shows that an association has been set up between Switch C and the device. [SwitchC-Vlan-in

Página 38 - Root delay: 40.00 ms

31 # Display NTP session information for Switch A, which shows that an association has been set up between Switch A and the device. [SwitchA-Vlan-in

Página 39

Convention Description [ x | y | ... ] * Asterisk marked square brackets enclose optional syntax choices separated by vertical bars, from which you se

Página 40

32 # Specify the key as a trusted key. [DeviceA] ntp-service reliable authentication-keyid 42 # Display the NTP status of Device B after clock synch

Página 41

33 Figure 16 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 16. (Details not shown.) 2. Conf

Página 42 - Root delay: 0.00 ms

34 Reference clock ID: 3.0.1.31 Nominal frequency: 64.0000 Hz Actual frequency: 64.0000 Hz Clock precision: 2^7 Clock offset: 0.0000 ms Root

Página 43

35 Clock precision: 2^7 Clock offset: 0.0000 ms Root delay: 31.00 ms Root dispersion: 8.31 ms Peer dispersion: 34.30 ms Reference time: 16:

Página 44 - Overview

36 Configuring the information center This chapter describes how to configure the information center. Overview The information center collects and c

Página 45

37 Table 1 System information levels Severity Severity value Description Corresponding keyword in commands Emergency 0 The system is unusable. For ex

Página 46

38 Information channel number Default channel name Default output destination System information received by default 7 channel7 Not specified Log, tr

Página 47 - System information formats

39 System information formats The following shows the original format of system information, which might be different from what you see. The actual f

Página 48

40 Field Description %% (vendor ID) This field indicates that the information was generated by an H3C device. It exists only in logs sent to a log ho

Página 49

41 Timestamp parameters Description Example date Current date and time, in the format of mm dd hh:mm:ss:xxx yyy. All system information supports this

Página 50

Category Documents Purposes Hardware specifications and installation Compliance and safety manual Provides regulatory information and the safety instr

Página 51

42 Outputting system information to the console Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-

Página 52

43 Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-center enable Optional. Enabled by default. 3

Página 53

44 Step Command Remarks 2. Enable the information center. info-center enable Optional. Enabled by default. 3. Specify a name for a channel identifi

Página 54

45 Step Command Remarks 3. Specify a name for a channel identified by its number. info-center channel channel-number name channel-name Optional. See

Página 55

46 Outputting system information to the SNMP module The SNMP module receives the trap information only, and discards the log and debugging informatio

Página 56

47 Step Command Remarks 3. Specify a name for a channel identified by its number. info-center channel channel-number name channel-name Optional. See

Página 57

48 Step Command Remarks 6. Configure the directory to save the log file. info-center logfile switch-directory dir-name Optional. By default, the log

Página 58

49 To disable an interface from generating link up/down logging information: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter

Página 59

50 Figure 18 Network diagram Configuration procedure # Enable the information center. <Sysname> system-view [Sysname] info-center enable # Us

Página 60

51 Configuration procedure Before the configuration, make sure that the device and the log host can reach each other. (Details not shown.) 1. Config

Página 61 - # syslogd -r &

i Contents Using ping, tracert, and system debugging ································································································

Página 62 - Configuring SNMP

52 # ps -ae | grep syslogd 147 # kill -HUP 147 # syslogd -r & Now, the system can record log information into the log file. Outputting log inform

Página 63 - SNMP configuration task list

53 NOTE: Be aware of the following issues while editing file /etc/syslog.conf: • Comments must be on a separate line and must begin with the pound

Página 64

54 Configuring SNMP This chapter provides an overview of the Simple Network Management Protocol (SNMP) and guides you through the configuration proce

Página 65

55 Figure 22 MIB tree A MIB view represents a set of MIB objects (or MIB object hierarchies) with certain access privilege and is identified by a v

Página 66

56 Task Remarks Configuring SNMP logging Optional. Configuring SNMP traps Optional. Configuring SNMP basic parameters SNMPv3 differs from SNMPv1

Página 67 - Offset Chassis ID

57 Step Command Remarks 5. Create or update a MIB view. snmp-agent mib-view { excluded | included } view-name oid-tree [ mask mask-value ] Optional.

Página 68 - Configuring SNMP traps

58 Step Command Remarks 2. Enable the SNMP agent. snmp-agent Optional. By default, the SNMP agent is disabled. You can also enable the SNMP agent s

Página 69 - Enabling SNMP traps

59 Step Command Remarks 8. Set the DSCP value for SNMP responses. snmp-agent packet response dscp dscp-value Optional. By default, the DSCP value f

Página 70

60 Configuration procedure To switch the NM-specific ifindex format: Step Command Remarks 1. Enter system view. system-view N/A 2. Switch the for

Página 71 - SNMP configuration examples

61 SNMP traps generated by a module are sent to the information center. You can configure the information center to enable or disable outputting the

Página 72 - SNMPv3 configuration example

ii System information levels ························································································································

Página 73

62 Step Command Remarks 2. Configure a target host. snmp-agent target-host trap address udp-domain ip-address [ udp-port port-number ] [ dscp dscp-v

Página 74

63 Task Command Remarks Display the modules that can send traps and their trap status (enable or disable). display snmp-agent trap-list [ | { begin

Página 75

64 # Enable SNMP traps, set the NMS at 1.1.1.2 as an SNMP trap destination, and use public as the community name. (To make sure the NMS can receive t

Página 76 - Configuring MIB style

65 Figure 25 Network diagram Configuration procedure 1. Configure the agent: # Configure the IP address of the agent and make sure the agent and t

Página 77 - Configuring RMON

66 Request binding: 1: 1.3.6.1.2.1.11.29.0 Response binding: 1: Oid=snmpOutTraps.0 Syntax=CNTR32 Value=18 Get finished # Try to get the device name

Página 78 - Alarm group

67 <Agent> terminal logging # Enable the information center to output system information with severity level equal to or higher than informatio

Página 79 - Private alarm group

68 Configuring MIB style MIBs include public MIBs and private MIBs. A private MIB is attached to a sub-node under the enterprises MIB node (1.3.6.1.4

Página 80

69 Configuring RMON This chapter describes how to configure RMON. Overview Remote Monitoring (RMON) is an enhancement to SNMP for remote device mana

Página 81

70 History group The history group defines that the system periodically collects traffic statistics on interfaces and saves the statistics in the his

Página 82

71 Private alarm group The private alarm group calculates the values of alarm variables and compares the results with the defined threshold for a mor

Página 83

iii Displaying and maintaining RMON ·················································································································

Página 84

72 • You can configure multiple history control entries for one interface, but must make sure their entry numbers and sampling intervals are differe

Página 85

73 Step Command Remarks 3. Create an entry in the alarm table or private alarm table. • Create an entry in the alarm table: rmon alarm entry-numbe

Página 86

74 Task Command Remarks Display log information for event entries. display rmon eventlog [ entry-number ] [ | { begin | exclude | include } regular-e

Página 87 - Configuring port mirroring

75 History group configuration example Network requirements Configure the RMON history group on the RMON agent in Figure 29 to gather periodical traf

Página 88 - Remote port mirroring

76 collisions : 0 , utilization : 0 Sampled values of record 4 : dropevents : 0 , octets

Página 89

77 Figure 30 Network diagram Configuration procedure # Configure the SNMP agent with the same SNMP settings as the NMS at 1.1.1.2. This example use

Página 90

78 etherStatsUndersizePkts : 0 , etherStatsOversizePkts : 0 etherStatsFragments : 0 , etherStatsJabbers : 0 etherS

Página 91

79 Configuring port mirroring This chapter describes how to configure port mirroring. Overview Port mirroring refers to copying packets passing thro

Página 92

80 Reflector port, egress port, and remote probe VLAN The reflector port, remote probe VLAN, and egress port are used for Layer 2 remote port mirrori

Página 93

81 The source device copies packets received on the source port to the egress port. The egress port forwards the packets to the intermediate devices,

Página 94

1 Using ping, tracert, and system debugging Use the ping, tracert, and system debugging utilities to test network connectivity and identify network p

Página 95

82 Local port mirroring configuration task list Local port mirroring takes effect only when the source ports and the monitor port are configured. Com

Página 96

83 Configuring a source port in interface view Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view. interface inter

Página 97

84 Configuring the monitor port in interface view Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view. interface in

Página 98

85 • A remote probe VLAN must be a static VLAN. To remove the VLAN configured as a remote probe VLAN, you must first remove the remote probe VLAN wi

Página 99

86 Layer 2 remote port mirroring configuration task list CAUTION: For a mirrored packet to successfully arrive at the remote destination device, mak

Página 100 - Network requirements

87 Step Command Remarks 2. Create a remote source group. mirroring-group group-id remote-source By default, no remote source group exists on a devic

Página 101 - Configuration procedure

88 Configuring the egress port for a remote source group CAUTION: Disable these functions on the egress port: spanning tree, 802.1X, IGMP snooping,

Página 102

89 Step Command Remarks 1. Enter system view. system-view N/A 2. Configure the remote probe VLAN. mirroring-group group-id remote-probe vlan rprob

Página 103

90 Step Command Remarks 3. Configure the current port as the monitor port for a remote destination group. [ mirroring-group group-id ] monitor-port

Página 104 - A C D E H I N O P S T

91 Displaying and maintaining port mirroring Task Command Remarks Display mirroring group information. display mirroring-group { group-id | all | loc

Comentários a estes Manuais

Sem comentários