H3c-technologies H3C WX5500E Series Access Controllers Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Router H3c-technologies H3C WX5500E Series Access Controllers herunter. H3C Technologies H3C WX5500E Series Access Controllers User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 104
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
H3C WX5540E Access Controller
Switching Engine
Network Management and Monitoring
Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Software version: WX5500E-CMW520-R2607P26
Document version: 6W100-20140714
Seitenansicht 0
1 2 3 4 5 6 ... 103 104

Inhaltsverzeichnis

Seite 1 - Switching Engine

H3C WX5540E Access ControllerSwitching EngineNetwork Management and MonitoringConfiguration Guide Hangzhou H3C Technologies Co.,

Seite 2

2 Test procedure # Use the ping command on Device A to test connectivity to Device C. <DeviceA> ping 1.1.2.2 PING 1.1.2.2: 56 data bytes, pr

Seite 3 - Preface

92 [DeviceA] mirroring-group 1 mirroring-port gigabitethernet 1/0/1 gigabitethernet 1/0/2 both [DeviceA] mirroring-group 1 monitor-port gigabitethern

Seite 4 - Port numbering in examples

93 Configuration procedure # Create remote source mirroring group 1. <DeviceA> system-view [DeviceA] mirroring-group 1 remote-source # Configur

Seite 5 - Documentation feedback

94 [DeviceA] vlan 2 # Disable MAC address learning for VLAN 2. [DeviceA-vlan2] mac-address mac-learning disable [DeviceA-vlan2] quit # Configure VLAN

Seite 6 - Contents

95 [DeviceC] vlan 2 # Disable MAC address learning for VLAN 2. [DeviceC-vlan2] mac-address mac-learning disable [DeviceC-vlan2] quit # Configure VLAN

Seite 7

96 Index A C D E H I N O P S T A Alarm group configuration example,76 C Configuring access-control rights,18 Configuring Layer 2 remote port mirrori

Seite 8

3 1.1.2.2 1.1.1.2 1.1.1.1 --- 1.1.2.2 ping statistics --- 5 packet(s) transmitted 5 packet(s) received 0.00%

Seite 9 - Ping example

4 2. The first hop (Device B, the first Layer 3 device that receives the packet) responds by sending a TTL-expired ICMP error message to the source,

Seite 10 - Test procedure

5 Output of debugging information depends on the configurations of the information center and the debugging commands of each protocol and functional

Seite 11 - Tracert

6 Step Command Remarks 4. Display the enabled debugging functions. display debugging [ interface interface-type interface-number ] [ module-name ] [

Seite 12 - System debugging

7 [DeviceC] ip unreachables enable # Execute the tracert command on Device A. <DeviceA> tracert 1.1.2.2 traceroute to 1.1.2.2(1.1.2.2) 30 hops

Seite 13 - Debugging a feature module

8 Configuring NTP This chapter provides an overview of NTP configuration. Overview NTP is typically used in large networks to dynamically synchronize

Seite 14 - Ping and tracert example

9 • Prior to system clock synchronization between Device A and Device B, the clock of Device A is set to 10:00:00 am while that of Device B is set t

Seite 15

10 used in environments where network management is needed. Because NTP control messages are not essential for clock synchronization, they are not de

Seite 16 - Configuring NTP

11 • Root Delay—Roundtrip delay to the primary reference source. • Root Dispersion—The maximum error of the local clock relative to the primary ref

Seite 17 - NTP message format

Copyright © 2014, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmitted

Seite 18

12 Symmetric peers mode Figure 8 Symmetric peers mode In symmetric peers mode, devices that operate in symmetric active mode and symmetric passive

Seite 19 - Operation modes

13 Multicast mode Figure 10 Multicast mode In multicast mode, a server periodically sends clock synchronization messages to the user-configured mul

Seite 20 - Broadcast mode

14 Configuring the client/server mode For devices operating in client/server mode, make configurations on the clients. If you specify the source inte

Seite 21 - NTP configuration task list

15 Step Command Remarks 2. Specify a symmetric-passive peer for the device. ntp-service unicast-peer { ip-address | peer-name } [ authentication-key

Seite 22

16 Step Command Remarks 3. Configure the device to operate in NTP broadcast server mode. ntp-service broadcast-server [ authentication-keyid keyid |

Seite 23

17 Configuration guidelines • The source interface for NTP unicast messages is the interface specified in the ntp-service unicast-server or ntp-serv

Seite 24

18 • Symmetric active/passive mode—After you specify a symmetric-passive peer on a symmetric active peer, static associations are created on the sym

Seite 25 - Configuration guidelines

19 Configuration prerequisites Before you configure the NTP service access-control right to the local device, create and configure an ACL associated

Seite 26

20 Configuring NTP authentication for client Step Command Remarks 1. Enter system view. system-view N/A 2. Enable NTP authentication. ntp-service

Seite 27 - Configuration prerequisites

21 { On the active peer, if NTP authentication is enabled and a key is associated with the passive peer, but the key is not a trusted key, no matter

Seite 28

Preface The H3C WX5540E Access Controller Switching Engine documentation set describes the software features for the H3C WX5540E Access Controller Swi

Seite 29

22 • A broadcast client can synchronize to the broadcast server only when you configure all the required tasks on both the broadcast client and serv

Seite 30

23 Configuring NTP authentication for a multicast client Step Command Remarks 1. Enter system view. system-view N/A 2. Enable NTP authentication.

Seite 31

24 Task Command Remarks Display the brief information about the NTP servers from the local device back to the primary reference source. display ntp-s

Seite 32 - NTP configuration examples

25 Clock status: synchronized Clock stratum: 3 Reference clock ID: 1.0.1.11 Nominal frequency: 64.0000 Hz Actual frequency: 64.0000 Hz Clock pr

Seite 33

26 # Specify Device A as the NTP server of Device B. <DeviceB> system-view [DeviceB] ntp-service unicast-server 3.0.1.31 3. Display the NTP s

Seite 34 - Root delay: 15.00 ms

27 NTP broadcast mode configuration example Network requirements As shown in Figure 13, Switch C functions as the NTP server for multiple devices on

Seite 35

28 # Take Switch A as an example. Display the NTP status of Switch A after clock synchronization. [SwitchA-Vlan-interface2] display ntp-service stat

Seite 36

29 Figure 14 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 14. (Details not shown.) 2. Conf

Seite 37

30 # Display NTP session information for Switch C, which shows that an association has been set up between Switch C and the device. [SwitchC-Vlan-in

Seite 38 - Root delay: 40.00 ms

31 # Display NTP session information for Switch A, which shows that an association has been set up between Switch A and the device. [SwitchA-Vlan-in

Seite 39

Convention Description [ x | y | ... ] * Asterisk marked square brackets enclose optional syntax choices separated by vertical bars, from which you se

Seite 40

32 # Specify the key as a trusted key. [DeviceA] ntp-service reliable authentication-keyid 42 # Display the NTP status of Device B after clock synch

Seite 41

33 Figure 16 Network diagram Configuration procedure 1. Set the IP address for each interface as shown in Figure 16. (Details not shown.) 2. Conf

Seite 42 - Root delay: 0.00 ms

34 Reference clock ID: 3.0.1.31 Nominal frequency: 64.0000 Hz Actual frequency: 64.0000 Hz Clock precision: 2^7 Clock offset: 0.0000 ms Root

Seite 43

35 Clock precision: 2^7 Clock offset: 0.0000 ms Root delay: 31.00 ms Root dispersion: 8.31 ms Peer dispersion: 34.30 ms Reference time: 16:

Seite 44 - Overview

36 Configuring the information center This chapter describes how to configure the information center. Overview The information center collects and c

Seite 45

37 Table 1 System information levels Severity Severity value Description Corresponding keyword in commands Emergency 0 The system is unusable. For ex

Seite 46

38 Information channel number Default channel name Default output destination System information received by default 7 channel7 Not specified Log, tr

Seite 47 - System information formats

39 System information formats The following shows the original format of system information, which might be different from what you see. The actual f

Seite 48

40 Field Description %% (vendor ID) This field indicates that the information was generated by an H3C device. It exists only in logs sent to a log ho

Seite 49

41 Timestamp parameters Description Example date Current date and time, in the format of mm dd hh:mm:ss:xxx yyy. All system information supports this

Seite 50

Category Documents Purposes Hardware specifications and installation Compliance and safety manual Provides regulatory information and the safety instr

Seite 51

42 Outputting system information to the console Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-

Seite 52

43 Step Command Remarks 1. Enter system view. system-view N/A 2. Enable the information center. info-center enable Optional. Enabled by default. 3

Seite 53

44 Step Command Remarks 2. Enable the information center. info-center enable Optional. Enabled by default. 3. Specify a name for a channel identifi

Seite 54

45 Step Command Remarks 3. Specify a name for a channel identified by its number. info-center channel channel-number name channel-name Optional. See

Seite 55

46 Outputting system information to the SNMP module The SNMP module receives the trap information only, and discards the log and debugging informatio

Seite 56

47 Step Command Remarks 3. Specify a name for a channel identified by its number. info-center channel channel-number name channel-name Optional. See

Seite 57

48 Step Command Remarks 6. Configure the directory to save the log file. info-center logfile switch-directory dir-name Optional. By default, the log

Seite 58

49 To disable an interface from generating link up/down logging information: Step Command Remarks 1. Enter system view. system-view N/A 2. Enter

Seite 59

50 Figure 18 Network diagram Configuration procedure # Enable the information center. <Sysname> system-view [Sysname] info-center enable # Us

Seite 60

51 Configuration procedure Before the configuration, make sure that the device and the log host can reach each other. (Details not shown.) 1. Config

Seite 61 - # syslogd -r &

i Contents Using ping, tracert, and system debugging ································································································

Seite 62 - Configuring SNMP

52 # ps -ae | grep syslogd 147 # kill -HUP 147 # syslogd -r & Now, the system can record log information into the log file. Outputting log inform

Seite 63 - SNMP configuration task list

53 NOTE: Be aware of the following issues while editing file /etc/syslog.conf: • Comments must be on a separate line and must begin with the pound

Seite 64

54 Configuring SNMP This chapter provides an overview of the Simple Network Management Protocol (SNMP) and guides you through the configuration proce

Seite 65

55 Figure 22 MIB tree A MIB view represents a set of MIB objects (or MIB object hierarchies) with certain access privilege and is identified by a v

Seite 66

56 Task Remarks Configuring SNMP logging Optional. Configuring SNMP traps Optional. Configuring SNMP basic parameters SNMPv3 differs from SNMPv1

Seite 67 - Offset Chassis ID

57 Step Command Remarks 5. Create or update a MIB view. snmp-agent mib-view { excluded | included } view-name oid-tree [ mask mask-value ] Optional.

Seite 68 - Configuring SNMP traps

58 Step Command Remarks 2. Enable the SNMP agent. snmp-agent Optional. By default, the SNMP agent is disabled. You can also enable the SNMP agent s

Seite 69 - Enabling SNMP traps

59 Step Command Remarks 8. Set the DSCP value for SNMP responses. snmp-agent packet response dscp dscp-value Optional. By default, the DSCP value f

Seite 70

60 Configuration procedure To switch the NM-specific ifindex format: Step Command Remarks 1. Enter system view. system-view N/A 2. Switch the for

Seite 71 - SNMP configuration examples

61 SNMP traps generated by a module are sent to the information center. You can configure the information center to enable or disable outputting the

Seite 72 - SNMPv3 configuration example

ii System information levels ························································································································

Seite 73

62 Step Command Remarks 2. Configure a target host. snmp-agent target-host trap address udp-domain ip-address [ udp-port port-number ] [ dscp dscp-v

Seite 74

63 Task Command Remarks Display the modules that can send traps and their trap status (enable or disable). display snmp-agent trap-list [ | { begin

Seite 75

64 # Enable SNMP traps, set the NMS at 1.1.1.2 as an SNMP trap destination, and use public as the community name. (To make sure the NMS can receive t

Seite 76 - Configuring MIB style

65 Figure 25 Network diagram Configuration procedure 1. Configure the agent: # Configure the IP address of the agent and make sure the agent and t

Seite 77 - Configuring RMON

66 Request binding: 1: 1.3.6.1.2.1.11.29.0 Response binding: 1: Oid=snmpOutTraps.0 Syntax=CNTR32 Value=18 Get finished # Try to get the device name

Seite 78 - Alarm group

67 <Agent> terminal logging # Enable the information center to output system information with severity level equal to or higher than informatio

Seite 79 - Private alarm group

68 Configuring MIB style MIBs include public MIBs and private MIBs. A private MIB is attached to a sub-node under the enterprises MIB node (1.3.6.1.4

Seite 80

69 Configuring RMON This chapter describes how to configure RMON. Overview Remote Monitoring (RMON) is an enhancement to SNMP for remote device mana

Seite 81

70 History group The history group defines that the system periodically collects traffic statistics on interfaces and saves the statistics in the his

Seite 82

71 Private alarm group The private alarm group calculates the values of alarm variables and compares the results with the defined threshold for a mor

Seite 83

iii Displaying and maintaining RMON ·················································································································

Seite 84

72 • You can configure multiple history control entries for one interface, but must make sure their entry numbers and sampling intervals are differe

Seite 85

73 Step Command Remarks 3. Create an entry in the alarm table or private alarm table. • Create an entry in the alarm table: rmon alarm entry-numbe

Seite 86

74 Task Command Remarks Display log information for event entries. display rmon eventlog [ entry-number ] [ | { begin | exclude | include } regular-e

Seite 87 - Configuring port mirroring

75 History group configuration example Network requirements Configure the RMON history group on the RMON agent in Figure 29 to gather periodical traf

Seite 88 - Remote port mirroring

76 collisions : 0 , utilization : 0 Sampled values of record 4 : dropevents : 0 , octets

Seite 89

77 Figure 30 Network diagram Configuration procedure # Configure the SNMP agent with the same SNMP settings as the NMS at 1.1.1.2. This example use

Seite 90

78 etherStatsUndersizePkts : 0 , etherStatsOversizePkts : 0 etherStatsFragments : 0 , etherStatsJabbers : 0 etherS

Seite 91

79 Configuring port mirroring This chapter describes how to configure port mirroring. Overview Port mirroring refers to copying packets passing thro

Seite 92

80 Reflector port, egress port, and remote probe VLAN The reflector port, remote probe VLAN, and egress port are used for Layer 2 remote port mirrori

Seite 93

81 The source device copies packets received on the source port to the egress port. The egress port forwards the packets to the intermediate devices,

Seite 94

1 Using ping, tracert, and system debugging Use the ping, tracert, and system debugging utilities to test network connectivity and identify network p

Seite 95

82 Local port mirroring configuration task list Local port mirroring takes effect only when the source ports and the monitor port are configured. Com

Seite 96

83 Configuring a source port in interface view Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view. interface inter

Seite 97

84 Configuring the monitor port in interface view Step Command Remarks 1. Enter system view. system-view N/A 2. Enter interface view. interface in

Seite 98

85 • A remote probe VLAN must be a static VLAN. To remove the VLAN configured as a remote probe VLAN, you must first remove the remote probe VLAN wi

Seite 99

86 Layer 2 remote port mirroring configuration task list CAUTION: For a mirrored packet to successfully arrive at the remote destination device, mak

Seite 100 - Network requirements

87 Step Command Remarks 2. Create a remote source group. mirroring-group group-id remote-source By default, no remote source group exists on a devic

Seite 101 - Configuration procedure

88 Configuring the egress port for a remote source group CAUTION: Disable these functions on the egress port: spanning tree, 802.1X, IGMP snooping,

Seite 102

89 Step Command Remarks 1. Enter system view. system-view N/A 2. Configure the remote probe VLAN. mirroring-group group-id remote-probe vlan rprob

Seite 103

90 Step Command Remarks 3. Configure the current port as the monitor port for a remote destination group. [ mirroring-group group-id ] monitor-port

Seite 104 - A C D E H I N O P S T

91 Displaying and maintaining port mirroring Task Command Remarks Display mirroring group information. display mirroring-group { group-id | all | loc

Kommentare zu diesen Handbüchern

Keine Kommentare